TianoCore Community Meeting

May 6, 2021





EVENTS:
UEFI Plugfest (update from Dick Wilkins):
We are planning a plug fest during the week of April 4th during 2022 in 
Hillsboro, Oregon.

Google Summer of Code (update from Nate Desimone)

  *   Google has accepted all of our projects. Google will make that 
announcement.
  *   Google will communicate the decisions to those applicants on the accepted 
projects on May 17th.
  *   Projects will begin from Jun 7 till Aug 16th.
  *   Community Action: We encourage entire community to be involved, for 
getting your input/comments and supporting our mentors. The community can 
involved in activities such as code reviews etc.. we need support from 
maintainers, reviewers. Be responsive on the mailing list. you can respond to 
students when they post questions on the mailing list.


Stable Tag updates:

o   Up to date information: 
https://github.com/tianocore/tianocore.github.io/wiki/EDK-II-Release-Planning

o   Feature planning freeze scheduled for 5/10/2021


Stewards Meeting Download (Mike Kinney)

*       Limited attendance this month.

o   We are seeing an increase in EDK2 CI failure/coverage issues. Azure moved 
to Ubuntu 20 and we are still on Ubuntu 18. There are some gaps (such as 
emulator package) that we are addressing. There is a specific failure on 
emulator package that we need to disable temporarily. Ubuntu GCC IA32 
EmulatorPkg - 32-bit X11 dependency conflicts. May need to consider adding text 
console support.

o   Action: Mike Kinney will submit an RFC

*       Bugzilla 988 (https://bugzilla.tianocore.org/show_bug.cgi?id=988) - 
performance issues in handles database.

o   DXE core implementation and performance issues on large number of handles.

o   Question to the Community: Can we drop EFI 1.02 driver compatibility 
support from DXE core?

Removing the compatibility will help the performance issues, but not fully 
resolve them. Risk is extremely low for support. Simple change in DXE core. 
Base tools still have support for building EDK1 style modules. Action: Mike to 
start an RFC on this topic.



Opens:
Dick Wilkins - MSFT maintains the list of revoked code signatures for UEFI code 
modules and loaders for the UEFI Forum and produces
binary files that contain revoked signatures for use by secure boot.  MSFT has 
approved the latest update of revoked
signatures list for general testing. They are posted at 
https://uefi.org/revocationlistfile. These files should only be used for
testing at this time. Use of these files my cause systems to not boot and 
should not be used in shipping products without
appropriate planning and testing.


Regards,
Soumya

Soumya Guptha
Firmware Ecosystem Enabling Manager, Intel Corporation





-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#74837): https://edk2.groups.io/g/devel/message/74837
Mute This Topic: https://groups.io/mt/82665600/21656
Group Owner: devel+ow...@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-


Reply via email to