[edk2-devel] [PATCH V5] ShellPkg: add more items for smbiosview -t 3 .

2021-03-02 Thread Mars CC Lin
https://bugzilla.tianocore.org/show_bug.cgi?id=3177 Add ContainedElementCount, ContainedElementRecordLength and ContainedElements for smbiosview type 3. Signed-off-by: Mars CC Lin Cc: Zhichao Gao Cc: Philippe Mathieu-Daude Cc: Liming Gao --- .../SmbiosView/PrintInfo.c|

[edk2-devel] [PATCH edk2-platforms v3 3/4] SbsaQemu: add standalone MM build instruction

2021-03-02 Thread Masahisa Kojima
This commit adds the standalone MM build instruction to enable UEFI secure boot. Signed-off-by: Masahisa Kojima --- Platform/Qemu/SbsaQemu/Readme.md | 35 1 file changed, 35 insertions(+) diff --git a/Platform/Qemu/SbsaQemu/Readme.md b/Platform/Qemu/SbsaQemu/Readme.md index

[edk2-devel] [PATCH edk2-platforms v3 4/4] SbsaQemu: fix typo

2021-03-02 Thread Masahisa Kojima
Fix typo in Readme.md Signed-off-by: Masahisa Kojima Reviewed-by: Leif Lindholm --- Platform/Qemu/SbsaQemu/Readme.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Platform/Qemu/SbsaQemu/Readme.md b/Platform/Qemu/SbsaQemu/Readme.md index 50f61b6e3bf4..cef98383884a 100644 --

[edk2-devel] [PATCH edk2-platforms v3 2/4] SbsaQemu: add MM based UEFI secure boot support

2021-03-02 Thread Masahisa Kojima
This implements support for UEFI secure boot on SbsaQemu using the standalone MM framework. This moves all of the software handling of the UEFI authenticated variable store into the standalone MM context residing in a secure partition. Secure variable storage is located at 0x0100 in secure NOR

[edk2-devel] [PATCH edk2-platforms v3 1/4] SbsaQemu: Build infrastructure for StandaloneMm image

2021-03-02 Thread Masahisa Kojima
Add the build infrastructure for compilation of StandaloneMm image. SbsaQemu.fdf is modified to extend the FLASH0 region enough big to contain StandaloneMM image(BL32). Signed-off-by: Masahisa Kojima --- Platform/Qemu/SbsaQemu/SbsaQemuStandaloneMm.dsc | 132 Platform/Qemu/Sb

[edk2-devel] [PATCH edk2-platforms v3 0/4] add MM based UEFI secure boot on SbsaQemu

2021-03-02 Thread Masahisa Kojima
This patch series implment the UEFI secure boot on SbsaQemu. Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Graeme Gregory Cc: Radoslaw Biernacki Cc: Shashi Mallela v3: - create device-tree parsing helper functions - update the .dsc file layout to minimize the modification - remove unnesessary

Re: [edk2-devel] [PATCH edk2-platforms v2 2/4] SbsaQemu: add MM based UEFI secure boot support

2021-03-02 Thread Masahisa Kojima
On Tue, 2 Mar 2021 at 02:22, Leif Lindholm wrote: > > On Mon, Mar 01, 2021 at 14:19:50 +0900, Masahisa Kojima wrote: > > This implements support for UEFI secure boot on SbsaQemu using > > the standalone MM framework. This moves all of the software handling > > of the UEFI authenticated variable st

Re: [edk2-devel] [PATCH v3] ShellPkg: add more items for smbiosview -t 3 .

2021-03-02 Thread Gao, Zhichao
Hi Mars, I still cannot extract your patch thru this email. But I got it from the BZ link. There still some problems I missed last time. You should add a length check before showing the contained elements. Thanks, Zhichao From: Mars CC Lin Sent: Tuesday, March 2, 2021 11:14 AM To: devel@edk2.g

[edk2-devel] [PATCH 1/1] BaseTools: Modify struct parser for StructPcd

2021-03-02 Thread Yuwei Chen
Currently the struct parser for StructPcd Generation does not fliter the types such as UINT8 which should be ignored successfully. This patch modifies this issue. Cc: Bob Feng Cc: Liming Gao Signed-off-by: Yuwei Chen --- BaseTools/Scripts/ConvertFceToStructurePcd.py | 2 ++ 1 file changed, 2 i

Re: [edk2-devel] [PATCH v4 6/7] SecurityPkg: Tcg2Smm: Added support for Standalone Mm

2021-03-02 Thread Yao, Jiewen
Reviewed-by: Jiewen Yao > -Original Message- > From: Kun Qin > Sent: Wednesday, March 3, 2021 4:05 AM > To: devel@edk2.groups.io > Cc: Yao, Jiewen ; Wang, Jian J ; > Zhang, Qi1 ; Kumar, Rahul1 > Subject: [PATCH v4 6/7] SecurityPkg: Tcg2Smm: Added support for Standalone > Mm > > https:/

Re: [edk2-devel] [PATCH edk2-platforms v2 1/4] SbsaQemu: Build infrastructure for StandaloneMm image

2021-03-02 Thread Masahisa Kojima
On Tue, 2 Mar 2021 at 23:13, Leif Lindholm wrote: > > On Tue, Mar 02, 2021 at 21:45:26 +0900, Masahisa Kojima wrote: > > Hi Leif, > > > > Thank you for you comments. > > > > On Tue, 2 Mar 2021 at 02:05, Leif Lindholm wrote: > > > > > > On Mon, Mar 01, 2021 at 14:19:49 +0900, Masahisa Kojima wrote

Re: [edk2-devel] [RFC PATCH 02/14] OvmfPkg/PlatformPei: Mark SEC GHCB page in the page encrpytion bitmap.

2021-03-02 Thread Ashish Kalra
Hello Tobin, Just a high level question, why is this patch included in this patch series, i don't think you are supporting SEV-ES platform migration in this patch-set ? Thanks, Ashish On Tue, Mar 02, 2021 at 03:48:27PM -0500, Tobin Feldman-Fitzthum wrote: > From: Ashish Kalra > > Mark the SEC

[edk2-devel] [RFC PATCH 07/14] OvmfPkg/AmdSev: MH support for mailbox protocol

2021-03-02 Thread Tobin Feldman-Fitzthum
The migration handler communicates with the hypervisor via a shared mailbox page. The MH can perform four functions at the behest of the HV: init, save page, restore page, and reset. Signed-off-by: Tobin Feldman-Fitzthum --- .../ConfidentialMigrationDxe.inf | 1 + .../ConfidentialM

[edk2-devel] [RFC PATCH 14/14] OvmfPkg/AmdSev: MH page encryption POC

2021-03-02 Thread Tobin Feldman-Fitzthum
This code is for demonstration purposes only. It is not secure or robust. The purpose is to show where encryption will be incorporated and to get a sense of the performance impact of adding encryption. We plan to use AES-GCM to encrypt the pages as a stream. This will also allow us to verify the G

[edk2-devel] [RFC PATCH 13/14] OvmfPkg/AmdSev: Don't overwrite MH stack

2021-03-02 Thread Tobin Feldman-Fitzthum
When restoring pages, the Migration Handler shoudl avoid overwriting its own stack. Signed-off-by: Tobin Feldman-Fitzthum --- .../ConfidentialMigrationDxe.inf | 2 + OvmfPkg/AmdSev/ConfidentialMigration/MpLib.h | 235 ++ .../ConfidentialMigrationDxe.c

[edk2-devel] [RFC PATCH 11/14] OvmfPkg/AmdSev: Build page table for migration handler

2021-03-02 Thread Tobin Feldman-Fitzthum
From: Dov Murik The migration handler builds its own page tables and switches to them. The MH pagetables are reserved as runtime memory. When the hypervisor asks the MH to import/export a page, the HV writes the guest physical address of the page in question to the mailbox. The MH uses an identi

[edk2-devel] [RFC PATCH 10/14] UefiCpuPkg/CpuExceptionHandlerLib: Exception handling as runtime memory

2021-03-02 Thread Tobin Feldman-Fitzthum
Reserve IDT and other exception-related memory as runtime so it won't be overwritten by the OS while the MH is running. Signed-off-by: Tobin Feldman-Fitzthum --- UefiCpuPkg/Library/CpuExceptionHandlerLib/DxeException.c | 8 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/U

[edk2-devel] [RFC PATCH 03/14] OvmfPkg/PlatformDxe: Add support for SEV live migration.

2021-03-02 Thread Tobin Feldman-Fitzthum
From: Ashish Kalra Detect for KVM hypervisor and check for SEV live migration feature support via KVM_FEATURE_CPUID, if detected setup a new UEFI enviroment variable to indicate OVMF support for SEV live migration. Signed-off-by: Ashish Kalra --- OvmfPkg/OvmfPkg.dec | 1 + Ov

[edk2-devel] [RFC PATCH 01/14] OvmfPkg/BaseMemEncryptLib: Support to issue unencrypted hypercall

2021-03-02 Thread Tobin Feldman-Fitzthum
From: Brijesh Singh By default all the SEV guest memory regions are considered encrypted, if a guest changes the encryption attribute of the page (e.g mark a page as decrypted) then notify hypervisor. Hypervisor will need to track the unencrypted pages. The information will be used during guest l

[edk2-devel] [RFC PATCH 08/14] UefiCpuPkg/MpInitLib: temp removal of MpLib cleanup

2021-03-02 Thread Tobin Feldman-Fitzthum
The Migration Handdler is started using the Mp Service, which is only designed to function during boot time. The MH needs to run continuously. In the abscence of a generalized persitent Mp Service, temporary alterations were made to keep the MH running. Here, we skip registering the ExitBootServic

[edk2-devel] [RFC PATCH 05/14] OvmfPkg/PlatfomPei: Set Confidential Migration PCD

2021-03-02 Thread Tobin Feldman-Fitzthum
Confidential Migration relies on two boolean PCDs set from FW_CFG Signed-off-by: Tobin Feldman-Fitzthum --- OvmfPkg/PlatformPei/PlatformPei.inf | 2 ++ OvmfPkg/PlatformPei/Platform.c | 10 ++ 2 files changed, 12 insertions(+) diff --git a/OvmfPkg/PlatformPei/PlatformPei.inf b/Ovm

[edk2-devel] [RFC PATCH 04/14] OvmfPkg/AmdSev: Base for Confidential Migration Handler

2021-03-02 Thread Tobin Feldman-Fitzthum
Base enablement of DXE driver that supports confidential migration. Signed-off-by: Tobin Feldman-Fitzthum --- OvmfPkg/OvmfPkg.dec | 5 ++ OvmfPkg/AmdSev/AmdSevX64.dsc | 1 + OvmfPkg/AmdSev/AmdSevX64.fdf | 1 + .../ConfidentialMigrati

[edk2-devel] [RFC PATCH 00/14] Firmware Support for Fast Live Migration for AMD SEV

2021-03-02 Thread Tobin Feldman-Fitzthum
This is a demonstration of fast migration for encrypted virtual machines using a Migration Handler that lives in OVMF. This demo uses AMD SEV, but the ideas may generalize to other confidential computing platforms. With AMD SEV, guest memory is encrypted and the hypervisor cannot access or move it.

[edk2-devel] [RFC PATCH 02/14] OvmfPkg/PlatformPei: Mark SEC GHCB page in the page encrpytion bitmap.

2021-03-02 Thread Tobin Feldman-Fitzthum
From: Ashish Kalra Mark the SEC GHCB page that is mapped as unencrypted in ResetVector code in the hypervisor page encryption bitmap. Cc: Jordan Justen Cc: Laszlo Ersek Cc: Ard Biesheuvel Signed-off-by: Ashish Kalra --- OvmfPkg/PlatformPei/AmdSev.c | 10 ++ 1 file changed, 10 inser

[edk2-devel] [RFC PATCH 06/14] OvmfPkg/AmdSev: Setup Migration Handler Mailbox

2021-03-02 Thread Tobin Feldman-Fitzthum
The migration handler communicates with the hypervisor using a special mailbox, a page of shared memory where pending commands can be written. Another shared page is used to pass the incoming or outgoing guest memory pages. These pages are set aside in MEMFD, which this patch expands, and reserved

[edk2-devel] [RFC PATCH 09/14] UefiCpuPkg/MpInitLib: Allocate MP buffer as runtime memory

2021-03-02 Thread Tobin Feldman-Fitzthum
Another temporary change to support the persistence of the MH. The Mp buffer needs to be allocated as runtime memory or it may be overwritten by the OS. Signed-off-by: Tobin Feldman-Fitzthum --- UefiCpuPkg/Library/MpInitLib/PeiMpInitLib.inf | 2 ++ UefiCpuPkg/Library/MpInitLib/MpLib.c |

[edk2-devel] [RFC PATCH 12/14] OvmfPkg/AmdSev: Don't overwrite mailbox or pagetables

2021-03-02 Thread Tobin Feldman-Fitzthum
While restoring pages, the MH should avoid overwriting its pagetables or the mailbox it uses to communicate with the HV. Signed-off-by: Tobin Feldman-Fitzthum --- .../ConfidentialMigrationDxe.c| 22 +-- 1 file changed, 20 insertions(+), 2 deletions(-) diff --git

[edk2-devel] [PATCH v4 7/7] SecurityPkg: Tcg2Acpi: Added unblock memory interface for NVS region

2021-03-02 Thread Kun Qin
This changes added usage of MmUnblockMemoryLib to explicitly request allocated NVS region to be accessible from MM environment. It will bring in compatibility with architectures that supports full memory blockage inside MM. Cc: Jiewen Yao Cc: Jian J Wang Cc: Qi Zhang Cc: Rahul Kumar Signed-of

[edk2-devel] [PATCH v4 6/7] SecurityPkg: Tcg2Smm: Added support for Standalone Mm

2021-03-02 Thread Kun Qin
https://bugzilla.tianocore.org/show_bug.cgi?id=3169 This change added Standalone MM instance of Tcg2. The notify function for Standalone MM instance is left empty. A dependency DXE driver with a Depex of gEfiMmCommunication2ProtocolGuid was created to indicate the readiness of Standalone MM Tcg2

[edk2-devel] [PATCH v4 5/7] SecurityPkg: Tcg2Smm: Separate Tcg2Smm into 2 modules

2021-03-02 Thread Kun Qin
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3169 This change separated the original Tcg2Smm module into 2 drivers: the SMM driver that registers callback for physical presence and memory clear; the Tcg2Acpi driver that patches and publishes ACPI table for runtime use. Tcg2Smm introduced a

[edk2-devel] [PATCH v4 3/7] MdeModulePkg: VariableSmmRuntimeDxe: Added request unblock memory interface

2021-03-02 Thread Kun Qin
This changes added usage of MmUnblockMemoryLib to explicitly request runtime cache regions(and its indicators) to be accessible from MM environment when PcdEnableVariableRuntimeCache is enabled. It will bring in compatibility with architectures that supports full memory blockage inside MM. Cc: Jia

[edk2-devel] [PATCH v4 4/7] SecurityPkg: Tcg2Smm: Switching from gSmst to gMmst

2021-03-02 Thread Kun Qin
This change replaced gSmst with gMmst to support broader compatibility under MM environment for Tcg2Smm driver. Cc: Jiewen Yao Cc: Jian J Wang Cc: Qi Zhang Cc: Rahul Kumar Signed-off-by: Kun Qin Reviewed-by: Jiewen Yao --- Notes: v4: - Previously reviewed, no change. v3: -

[edk2-devel] [PATCH v4 2/7] OvmfPkg: resolve MmUnblockMemoryLib (mainly for VariableSmmRuntimeDxe)

2021-03-02 Thread Kun Qin
This change added NULL MmUnblockMemoryLib instance in dsc files of OvmfPkg to pass CI build. When SMM_REQUIRE flag is set, the library interface is consumed by VariableSmmRuntimeDxe to better support variable runtime cache feature. Cc: Laszlo Ersek Cc: Ard Biesheuvel Cc: Jordan Justen Signed-o

[edk2-devel] [PATCH v4 1/7] MdePkg: MmUnblockMemoryLib: Added definition and null instance

2021-03-02 Thread Kun Qin
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3168 This interface provides an abstration layer to allow MM modules to access requested areas that are outside of MMRAM. On MM model that blocks all non-MMRAM accesses, areas requested through this API will be mapped or unblocked for accessibili

[edk2-devel] [PATCH v4 0/7] Add MmUnblockMemoryLib Interface and Usages

2021-03-02 Thread Kun Qin
This patch series is a follow up of previous submission: https://edk2.groups.io/g/devel/message/72239 The module changes are validated on two different physical platforms and QEMU based Q35 plastform. Standalone and traditional MM are both tested to be functional on these systems. v4 patches main

Re: [edk2-devel] [PATCH edk2-platforms 1/1] Silicon/Qemu: Move SbsaQemu MPIDR-retrieval function to FdtHelperLib

2021-03-02 Thread Marcin Juszkiewicz
W dniu 02.03.2021 o 15:14, Graeme Gregory pisze: On 02/03/2021 13:38, Leif Lindholm wrote: Commit 822634fc1bf1 ("SbsaQemu: Update SbsaQemuAcpiDxe to use FdtHelperLib") replaced the CountCpusFromFdt() function in SbsaQemuAcpiDxe with a call to FdtHelperCountCpus() in FdtHelperLib. This ended up

Re: [edk2-devel] [PATCH edk2-test 1/1] SctPkg: remove CR in uefi-sct/SctPkg/build.sh

2021-03-02 Thread G Edhaya Chandran
Reviewed-by: G Edhaya Chandran > -Original Message- > From: Heinrich Schuchardt > Sent: 26 February 2021 18:10 > To: EDK II Development > Cc: Eric Jin ; G Edhaya Chandran > ; Barton Gao ; Arvin > Chen ; Samer El-Haj-Mahmoud mahm...@arm.com>; Heinrich Schuchardt > Subject: [PATCH edk2-t

Re: [edk2-devel] [PATCH] drop Tanmay Jagdale from sbsa-ref maintainers

2021-03-02 Thread Leif Lindholm
On Tue, Mar 02, 2021 at 15:10:16 +0100, Marcin Juszkiewicz wrote: > Tanmay is no longer at Linaro > > Signed-off-by: Marcin Juszkiewicz Reviewed-by: Leif Lindholm Thanks! Pushed as db922e1253cb. > --- > Maintainers.txt | 1 - > 1 file changed, 1 deletion(-) > > diff --git Maintainers.txt Ma

Re: [edk2-devel] [PATCH edk2-platforms 1/1] Silicon/Qemu: Move SbsaQemu MPIDR-retrieval function to FdtHelperLib

2021-03-02 Thread Leif Lindholm
On Tue, Mar 02, 2021 at 16:01:56 +0100, Marcin Juszkiewicz wrote: > W dniu 02.03.2021 o 15:14, Graeme Gregory pisze: > > On 02/03/2021 13:38, Leif Lindholm wrote: > > > Commit 822634fc1bf1 ("SbsaQemu: Update SbsaQemuAcpiDxe to use > > > FdtHelperLib") > > > replaced the CountCpusFromFdt() function

[edk2-devel] [PATCH] drop Tanmay Jagdale from sbsa-ref maintainers

2021-03-02 Thread Marcin Juszkiewicz
Tanmay is no longer at Linaro Signed-off-by: Marcin Juszkiewicz --- Maintainers.txt | 1 - 1 file changed, 1 deletion(-) diff --git Maintainers.txt Maintainers.txt index 2e6e87bb6d..afbd2cff0e 100644 --- Maintainers.txt +++ Maintainers.txt @@ -295,7 +295,6 @@ M: Ard Biesheuvel M: Leif Lindhol

Re: [edk2-devel] [PATCH edk2-platforms 1/1] Silicon/Qemu: Move SbsaQemu MPIDR-retrieval function to FdtHelperLib

2021-03-02 Thread Graeme Gregory
On 02/03/2021 13:38, Leif Lindholm wrote: Commit 822634fc1bf1 ("SbsaQemu: Update SbsaQemuAcpiDxe to use FdtHelperLib") replaced the CountCpusFromFdt() function in SbsaQemuAcpiDxe with a call to FdtHelperCountCpus() in FdtHelperLib. This ended up leaving static variables FdtFirstCpuOffset and FdtC

Re: [edk2-devel] [PATCH edk2-platforms v2 1/4] SbsaQemu: Build infrastructure for StandaloneMm image

2021-03-02 Thread Leif Lindholm
On Tue, Mar 02, 2021 at 21:45:26 +0900, Masahisa Kojima wrote: > Hi Leif, > > Thank you for you comments. > > On Tue, 2 Mar 2021 at 02:05, Leif Lindholm wrote: > > > > On Mon, Mar 01, 2021 at 14:19:49 +0900, Masahisa Kojima wrote: > > > Add the build infrastructure for compilation of StandaloneM

Re: [edk2-devel] [PATCH edk2-platforms 1/1] Silicon/Qemu: Move SbsaQemu MPIDR-retrieval function to FdtHelperLib

2021-03-02 Thread Ard Biesheuvel
On Tue, 2 Mar 2021 at 14:38, Leif Lindholm wrote: > > Commit 822634fc1bf1 ("SbsaQemu: Update SbsaQemuAcpiDxe to use FdtHelperLib") > replaced the CountCpusFromFdt() function in SbsaQemuAcpiDxe with a call to > FdtHelperCountCpus() in FdtHelperLib. This ended up leaving static variables > FdtFirstC

Re: [edk2-devel] [PATCH] [edk2-platforms]Intel/BoardModulePkg: Always sort load option

2021-03-02 Thread Ni, Ray
Good catch. BdsAfterConsoleReadyBeforeBootOptionCallback() in BoardModulePkg is not implemented properly. It should only do the boot option sort either: 1. in the first boot after flashing the firmware, or 2. in BOOT_WITH_FULL_CONFIGURATION boot path if the platform PEI can correctly changes the

[edk2-devel] [PATCH edk2-platforms 1/1] Silicon/Qemu: Move SbsaQemu MPIDR-retrieval function to FdtHelperLib

2021-03-02 Thread Leif Lindholm
Commit 822634fc1bf1 ("SbsaQemu: Update SbsaQemuAcpiDxe to use FdtHelperLib") replaced the CountCpusFromFdt() function in SbsaQemuAcpiDxe with a call to FdtHelperCountCpus() in FdtHelperLib. This ended up leaving static variables FdtFirstCpuOffset and FdtCpuNodeSize uninitialised, such that the GetM

Re: [edk2-devel] [PATCH edk2-platforms v2 1/4] SbsaQemu: Build infrastructure for StandaloneMm image

2021-03-02 Thread Masahisa Kojima
Hi Leif, Thank you for you comments. On Tue, 2 Mar 2021 at 02:05, Leif Lindholm wrote: > > On Mon, Mar 01, 2021 at 14:19:49 +0900, Masahisa Kojima wrote: > > Add the build infrastructure for compilation of StandaloneMm image. > > > > Signed-off-by: Masahisa Kojima > > --- > > .../Qemu/SbsaQemu

Re: [edk2-devel] [PATCH] [edk2-platforms]Intel/BoardModulePkg: Always sort load option

2021-03-02 Thread Gao, Zhichao
Hi Ray, I just think of that if we always do the sort, it may cause the changed boot order (by the user of the platform) resort again. That's unexpected. Thanks, Zhichao > -Original Message- > From: devel@edk2.groups.io On Behalf Of Ni, Ray > Sent: Tuesday, March 2, 2021 5:12 PM > To:

Re: [edk2-devel] [PATCH] [edk2-platforms]Intel/BoardModulePkg: Always sort load option

2021-03-02 Thread Ni, Ray
Zhiguang, Reviewed-by: Ray Ni I think you can add a third reason in commit message: 3. Below change in UefiBootManagerLib puts setup in the end MdeModulePkg/UefiBootManagerLib: Put BootMenu at the end of BootOrder SHA-1: 7f34681c488aee2563eaa2afcc6a2c8aa7c5b912 > -Original Message-

[edk2-devel] [PATCH] [edk2-platforms]Intel/BoardModulePkg: Always sort load option

2021-03-02 Thread Zhiguang Liu
Currently, load option is only sorted when setup is the first priority in boot option. This condition is not needed because the below reasons: 1. Setup option may have different string name depending on platform side. It shouldn't be hardcoded here. 2. Always sorting meets the needs that setup

Re: [edk2-devel] [PATCH v3 1/7] MdePkg: MmUnblockMemoryLib: Added definition and null instance

2021-03-02 Thread Laszlo Ersek
On 03/01/21 20:03, Kun Qin wrote: > Hi Laszlo, > > The library is intended to allow MM modules to access requested areas that > are outside of MMRAM. The idea behind this library is to create an MM model > that will block access to all non-MMRAM regions except the requested areas > for isolatio

[edk2-devel] [PATCH v1 2/2] BaseTools: Make undefined VFR macro an error (MSVC)

2021-03-02 Thread Daniel Schaefer
VFR successfully compiles if we forget to include a header that defines a macro. In that case the HII option was hidden when it shouldn't be just because the macro was used but not defined. The behaviour is totally intended by the C/PP standard. When a macro is undefined it evaluates to 0. GCC, MS

[edk2-devel] [PATCH v1 1/2] BaseTools: Make undefined VFR macro an error (GCC)

2021-03-02 Thread Daniel Schaefer
VFR successfully compiles if we forget to include a header that defines a macro. In that case the HII option was hidden when it shouldn't be just because the macro was used but not defined. The behaviour is totally intended by the C/PP standard. When a macro is undefined it evaluates to 0. GCC, MS

[edk2-devel] [PATCH v1 0/2] BaseTools: Make undefined VFR macro an error

2021-03-02 Thread Daniel Schaefer
See the individual commit descriptions. I split it up into GCC/CLANG and MSVC commits but feel free to squash them if you think they belong together. We found a few bugs and lots of dead code with this in our internal code-base. I only tested GCC5, CLANBPDB and VS2015 toolchains. Not 100% sure if