Re: [edk2-devel] [patch V2 00/29] Add a new library class RegisterFilterLib in edk2 to filter/trace port IO/MMIO/MSR access

2021-03-24 Thread Dandan Bi
Thank you Liming. If no more comments, I plan to submit following 2 patches firstly tomorrow. [patch V2 01/29] MdePkg: Add RegisterFilterLib class and NULL instance (https://edk2.groups.io/g/devel/message/73072) [patch V2 02/29] MdePkg: Add MdeLibs.dsc.inc file to MdePkg (https://edk2.groups.io/

Re: [edk2-devel] [PATCH V3 2/2] ShellPkg/UefiHandleParsingLib: Support EFI Redfish protocols

2021-03-24 Thread Abner Chang
> -Original Message- > From: gaoliming [mailto:gaolim...@byosoft.com.cn] > Sent: Thursday, March 25, 2021 10:04 AM > To: devel@edk2.groups.io; Chang, Abner (HPS SW/FW Technologist) > > Cc: 'Ray Ni' ; 'Zhichao Gao' ; > Wang, Nickle (HPS SW) ; O'Hanley, Peter (EXL) > > Subject: 回复: [edk2-

[edk2-devel] [PATCH v4 1/2] MdePkg/Include: EFI Redfish Discover protocol

2021-03-24 Thread Abner Chang
Move GUID definition of EFI Redfish Discover protocol to under MdePkg. With this we don't have dependency of RedfishPkg in ShellPkg. Signed-off-by: Abner Chang Cc: Michael D Kinney Cc: Liming Gao Cc: Zhiguang Liu Cc: Nickle Wang Cc: Peter O'Hanley Reviewed-by: Liming Gao --- MdePkg/MdePkg

[edk2-devel] [PATCH v4 0/2] Support EFI Redfish protocols

2021-03-24 Thread Abner Chang
In v4: In UefiHandleParsingLib.c, move the changes for UEFI 2.8 to below UEFI 2.7 section In v3: Correct the mismatched definitions in both RedfishDiscover.h and UEFI spec 2.8 (Refer to v2.9). In v2: Address comments given by Liming on patch 1/2. Add handle parsing for EFI Redfish Di

[edk2-devel] [PATCH v4 2/2] ShellPkg/UefiHandleParsingLib: Support EFI Redfish protocols

2021-03-24 Thread Abner Chang
Add handle parsing for EFI Redfish Discover protocol. Add handle parsing for EFI RestEx protocol. Signed-off-by: Abner Chang Cc: Ray Ni Cc: Zhichao Gao Cc: Nickle Wang Cc: Peter O'Hanley Reviewed-by: Zhichao Gao --- .../Library/UefiHandleParsingLib/UefiHandleParsingLib.inf | 4 +++- .../Lib

Re: [edk2-devel] [Patch V2 0/2] Let AcpiTableDxe driver install Acpi table from Hob

2021-03-24 Thread Andrew Fish via groups.io
Ray, The other option would be to define a Library Class for the AcpiTableDxe driver to consume and have a NULL version of it in the MdeModulePkg. That would allow more flexibility? It kind of depends if you want to make the implementation depend on a HOB or a LibraryClass? It at least gives th

Re: [edk2-devel] [PATCH v2] OvmfPkg: strip build paths in release builds

2021-03-24 Thread Andrew Fish via groups.io
While we are talking about what toolchain targets should do I don’t understand this [1]? Why does OVMF need to turn on —keepexceptiontable? If these toolchains require it why don’t they turn it on? I see Mike fixed it[2]. Is this another case of a global GENFW_FLAG breaking things? Looks like th

Re: [edk2-devel] [PATCH v2] OvmfPkg: strip build paths in release builds

2021-03-24 Thread Andrew Fish via groups.io
Liming, I understand how the tool works, but that is not how it is used. To make it work like other toolchains *_*_*_GENFW_FLAGS for ELF targets should pass —zero for builds that do not contain symbols. This is how it works today [1]. The proposed fix is a global hammer ` RELEASE_*_*_GENFW_FLAG

回复: [edk2-devel] 回复: [RESEND v2] MdePkg: use CpuPause() in CpuDeadLoop()

2021-03-24 Thread gaoliming
Create PR https://github.com/tianocore/edk2/pull/1515 Thanks Liming > -邮件原件- > 发件人: devel@edk2.groups.io 代表 gaoliming > 发送时间: 2021年3月22日 9:40 > 收件人: 'Ankur Arora' ; devel@edk2.groups.io > 抄送: 'Michael D Kinney' ; 'Laszlo Ersek' > > 主题: [edk2-devel] 回复: [RESEND v2] MdePkg: use CpuPause()

回复: [edk2-devel] reg: clarification on Form Browser Action on save changes in IP4 and IP6 configuration

2021-03-24 Thread gaoliming
Siva: This question prompt string is "Save Changes and Exit". So, its behavior is to save and exit. In Edk2 MdeModulePkg SetupBrowser, exit behavior is to exit current page and enter into its parent page. Does your SetupBrowser implement exit behavior to exit the whole UI? Thanks Liming 发件

Re: [EXTERNAL] [edk2-devel] [PATCH 1/1] MdeModulePkg/BmpSupportLib: Allow BMP with extra data

2021-03-24 Thread Andrew Fish via groups.io
> On Mar 24, 2021, at 11:26 AM, Laszlo Ersek wrote: > > On 03/24/21 16:25, Jeff Brasen wrote: >> Some of the logo files we received for the group that makes our assets like >> this (not sure what tool they were created with) look like they pad the BMP >> size to 8 bytes. >> >> TranslateBmpTo

回复: [edk2-devel] [RFC PATCH 09/19] MdePkg: Add AsmPvalidate() support

2021-03-24 Thread gaoliming
Is this API X64 only? Or IA32 and X64 both? Thanks Liming > -邮件原件- > 发件人: devel@edk2.groups.io 代表 Brijesh Singh > 发送时间: 2021年3月24日 23:32 > 收件人: devel@edk2.groups.io > 抄送: Brijesh Singh ; James Bottomley > ; Min Xu ; Jiewen Yao > ; Tom Lendacky ; > Jordan Justen ; Ard Biesheuvel > ; Laszlo

回复: [edk2-devel] [PATCH v2] OvmfPkg: strip build paths in release builds

2021-03-24 Thread gaoliming
Andrew: GenFw generates debug entry, and zero debug entry. Its functionality is same to the image without debug entry. So, new option is not introduced to control whether GenFw generates debug entry when it converts ELF image to EFI image. Thanks Liming 发件人: devel@edk2.groups.io 代表 Andr

回复: [edk2-devel] [PATCH V3 2/2] ShellPkg/UefiHandleParsingLib: Support EFI Redfish protocols

2021-03-24 Thread gaoliming
Abner: I have one comment. > -邮件原件- > 发件人: devel@edk2.groups.io 代表 Abner Chang > 发送时间: 2021年3月24日 13:35 > 收件人: devel@edk2.groups.io > 抄送: Ray Ni ; Zhichao Gao ; > Nickle Wang ; Peter O'Hanley > > 主题: [edk2-devel] [PATCH V3 2/2] ShellPkg/UefiHandleParsingLib: Support > EFI Redfish prot

Re: [edk2-devel] [PATCH v1 02/15] StandaloneMmPkg: StandaloneMmCoreHobLib: Extend support for x64 Mm Core

2021-03-24 Thread Dawn via groups.io
Importing spamReporting Tracking successful  On Fri, Mar 12, 2021 at 4:46 AM, Yao, Jiewen wrote: Can we merge the common part between X64 and AArch64 into one Common.c? > -Original Message- > From: Kun Qin > Sent: Saturday, December 19, 2020 2:50 AM > To: devel@edk2.groups.io > Cc: A

[edk2-devel] 回复: [PATCH V3 1/2] MdePkg/Include: EFI Redfish Discover protocol

2021-03-24 Thread gaoliming
Reviewed-by: Liming Gao > -邮件原件- > 发件人: Abner Chang > 发送时间: 2021年3月24日 13:35 > 收件人: devel@edk2.groups.io > 抄送: Michael D Kinney ; Liming Gao > ; Zhiguang Liu ; Nickle > Wang ; Peter O'Hanley > 主题: [PATCH V3 1/2] MdePkg/Include: EFI Redfish Discover protocol > > Move GUID definition of

Re: [edk2-devel] [Patch V2 0/2] Let AcpiTableDxe driver install Acpi table from Hob

2021-03-24 Thread Benjamin Doron
On Wed, Mar 24, 2021 at 02:33 PM, Laszlo Ersek wrote: > > >> >>> Hi all, Would it be acceptable/feasible for AcpiTableDxe or AcpiPlatformDxe (in MdeModulePkg) to use `EfiGetSystemConfigurationTable` to get the RSDP and then install the tables? It's a solution that uses the

Re: [edk2-devel] [Patch V2 0/2] Let AcpiTableDxe driver install Acpi table from Hob

2021-03-24 Thread Ni, Ray
Ben, I understand your point. The purpose of changing the AcpiTableDxe to directly consume the HOB is to reduce the overall system complexity. The complexity I see with your option is: 1. platform needs to include that driver to consume the ACPI table from bootloader 2. that driver (consume HOB a

Re: [edk2-devel] [PATCH] RISC-V/PlatformPkg: Fix compilation breakage in OpenSBI

2021-03-24 Thread Abner Chang
Hi Loic, The current edk2 RISC-V is incorporated with opensbi v0.8, please check below link https://github.com/riscv/riscv-uefi-edk2-docs We have to update below library with the latest opensbi with your changes, https://github.com/tianocore/edk2-platforms/tree/master/Silicon/RISC-V/ProcessorPkg/

Re: [edk2-devel] [PATCH v2] OvmfPkg: strip build paths in release builds

2021-03-24 Thread Andrew Fish via groups.io
This breaks some usage we have have in our fork. We have symbols turned on for Release builds, so this change would break that. It looks to me that the root cause of this issue might be that the GenFw is blindly writing the debug directory entry into the PE/COFF? For native PE/COFF I think thi

Re: [edk2-devel] [PATCH v2] OvmfPkg: strip build paths in release builds

2021-03-24 Thread Laszlo Ersek
On 03/24/21 12:58, Ross Burton wrote: > GenFw will embed a NB10 section which contains the path to the input file, > which means the output files have build paths embedded in them. To reduce > information leakage and ensure reproducible builds, pass --zero in release > builds to remove this inform

Re: [edk2-devel] [RFC PATCH 18/19] OvmfPkg/MemEncryptSevLib: Validate the memory during set or clear enc attribute

2021-03-24 Thread Brijesh Singh
On 3/24/21 10:32 AM, Brijesh Singh wrote: > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 > > The MemEncryptSev{Set,Clear}PageEncMask() functions are used to set or > clear the memory encryption attribute in the page table. When SEV-SNP is > active, we also need to validate or invalidat

Re: [edk2-devel] [PATCH v2 2/2] Platform/RaspberryPi: Enable Bluetooth and UART in Windows OS

2021-03-24 Thread Jeremy Linton
Hi, On 3/24/21 4:45 AM, Sunny Wang wrote: Merge changes in edk2-platforms-raspberrypi-pl011-bth-noflow.diff in https://github.com/worproject/RPi-Bluetooth-Testing/ for enabling Bluetooth and serial port (Mini UART) in Windows OS. Testing Done: - Successfully booted Windows 10 (20279.1) on SD

Re: [edk2-devel] [PATCH v2 1/2] Platform/RaspberryPi: Dynamically build UARTs info in ACPI

2021-03-24 Thread Jeremy Linton
Hi, Thanks for working on this! Comments inline: On 3/24/21 4:45 AM, Sunny Wang wrote: Changes: 1. Add code to ConfigDxe driver and AcpiTables module to dynamically build either Mini UART or PL011 UART info in ACPI. This fixes the issue discussed in https://github.com/pftf/RPi4

Re: [edk2-devel] [RFC PATCH 00/19] Add AMD Secure Nested Paging (SEV-SNP) support

2021-03-24 Thread Laszlo Ersek
On 03/24/21 16:31, Brijesh Singh wrote: > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 > > SEV-SNP builds upon existing SEV and SEV-ES functionality while adding > new hardware-based memory protections. SEV-SNP adds strong memory integrity > protection to help prevent malicious hypervis

[edk2-devel] [RFC PATCH 01/19] OvmfPkg: Reserve the Secrets and Cpuid page for the SEV-SNP guest

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 During the SEV-SNP guest launch sequence, two special pages need to be inserted, the secrets page and cpuid page. The secrets page, contain the VM platform communication keys. The guest BIOS and OS can use this key to communicate with the SEV

[edk2-devel] [RFC PATCH 03/19] MdePkg: Expand the SEV MSR to include the SNP definition

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Define the SEV-SNP MSR bits. Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc: Ard Biesheuvel Cc: Laszlo Ersek Signed-off-by: Brijesh Singh --- MdePkg/Include/Register/Amd/Fam17Msr.h | 7 ++- 1

[edk2-devel] [RFC PATCH 13/19] OvmfPkg/SecMain: Validate the data/code pages used for the PEI phase

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The VMM launch sequence should have validated all the data pages used in the SEC phase. Before decompressing the firmware volume, validate the data/code pages used during the decompression steps, and any other pages used during the PEI phase

[edk2-devel] [RFC PATCH 19/19] OvmfPkg/MemEncryptSevLib: Skip page state change for non RAM region

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The PEI phases uses MemEncryptSevSnpValidateSystemRam() to validate the system RAM. MemEncryptSev{Set,Clear}PageEncMask() is later used by libraries/drivers to change the page state from private to shared and vice versa. The AmdSevDxe driver

[edk2-devel] [RFC PATCH 16/19] OvmfPkg/MemEncryptSevLib: Add support to validate > 4GB memory in PEI phase

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The initial page built during the SEC phase is used by the MemEncryptSevSnpValidateSystemRam() for the system RAM validation. The page validation process requires using the PVALIDATE instruction; the instruction accepts a virtual address of

[edk2-devel] [RFC PATCH 11/19] OvmfPkg/ResetVector: Invalidate the GHCB page

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 When SEV-SNP is active, the GHCB page is mapped un-encrypted in the initial page table built by the reset vector code. Just clearing the encryption attribute from the page table is not enough. The page also needs to be added as shared in the

[edk2-devel] [RFC PATCH 09/19] MdePkg: Add AsmPvalidate() support

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The PVALIDATE instruction validates or rescinds validation of a guest page RMP entry. Upon completion, a return code is stored in EAX, rFLAGS bits OF, ZF, AF, PF and SF are set based on this return code. If the instruction completed succesful

[edk2-devel] [RFC PATCH 18/19] OvmfPkg/MemEncryptSevLib: Validate the memory during set or clear enc attribute

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The MemEncryptSev{Set,Clear}PageEncMask() functions are used to set or clear the memory encryption attribute in the page table. When SEV-SNP is active, we also need to validate or invalidate the pages and update the RMP entry. Before clearin

[edk2-devel] [RFC PATCH 07/19] OvmfPkg: Add a library to support registering GHCB GPA

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 An SEV-SNP guest us required to perform GHCB GPA registration before using a GHCB. See the GHCB spec section 2.5.2 for more details. Add a library that can be called to perform the GHCB GPA registration. Cc: James Bottomley Cc: Min Xu Cc:

[edk2-devel] [RFC PATCH 02/19] OvmfPkg: validate the data pages used in the SEC phase

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 An SEV-SNP guest requires that private memory (aka pages mapped as encrypted) must be validated before being accessed. The validation process consist of the following sequence: 1) Set the memory encryption attribute in the page table (aka C

[edk2-devel] [RFC PATCH 15/19] OvmfPkg/PlatformPei: Validate the system RAM when SNP is active

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 When SEV-SNP is active, a memory region mapped encrypted in the page table must be validated before access. There are two approaches that can be taken to validate the system RAM detected during the PEI phase: 1) Validate on-demand OR 2) Vali

[edk2-devel] [RFC PATCH 17/19] OvmfPkg/VmgExitLib: Allow PMBASE register access in Dxe phase

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Commit 85b8eac59b8c5bd9c7eb9afdb64357ce1aa2e803 added support to ensure that MMIO is only performed against the un-encrypted memory. If MMIO is performed against encrypted memory, a #GP is raised. The VmgExitLib library depends on ApicTimerL

[edk2-devel] [RFC PATCH 00/19] Add AMD Secure Nested Paging (SEV-SNP) support

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 SEV-SNP builds upon existing SEV and SEV-ES functionality while adding new hardware-based memory protections. SEV-SNP adds strong memory integrity protection to help prevent malicious hypervisor-based attacks like data replay, memory re-mappi

[edk2-devel] [RFC PATCH 12/19] OvmfPkg/MemEncryptSevLib: Add support to validate system RAM

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Many of the integrity guarantees of SEV-SNP are enforced through the Reverse Map Table (RMP). Each RMP entry contains the GPA at which a particular page of DRAM should be mapped. The guest can request the hypervisor to add pages in the RMP ta

[edk2-devel] [RFC PATCH 14/19] OvmfPkg/MemEncryptSevLib: Add support to validate RAM in PEI phase

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 MemEncryptSevSnpValidateSystemRam() is used for validating the system RAM. During the validation process, we must avoid double validation cases. The double validation can lead to security issues. Extend the MemEncryptSevSnpValidateSystemRam()

[edk2-devel] [RFC PATCH 10/19] OvmfPkg: Define the Page State Change VMGEXIT structures

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The Page State Change NAE exit will be used by the SEV-SNP guest to request a page state change using the GHCB protocol. See the GHCB spec section 4.1.6 and 2.3.1 for more detail on the structure definitions. Cc: James Bottomley Cc: Min Xu

[edk2-devel] [RFC PATCH 08/19] OvmfPkg: register GHCB gpa for the SEV-SNP guest

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The SEV-SNP guest requires that GHCB GPA must be registered before using. The GHCB GPA can be registred using the GhcbGPARegister(). Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc: Ard Biesheuvel Cc

[edk2-devel] [RFC PATCH 06/19] UefiCpuPkg/MpLib: add support to register GHCB GPA when SEV-SNP is enabled

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 An SEV-SNP guest requires that the physical address of the GHCB must be registered with the hypervisor before using it. See the GHCB specification for the futher detail. Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc:

[edk2-devel] [RFC PATCH 05/19] MdePkg: Define the GHCB GPA structure

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 An SEV-SNP guest is required to perform the GHCB GPA registration. See the GHCB specification for further details. Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc: Ard Biesheuvel Cc: Laszlo Ersek Si

[edk2-devel] [RFC PATCH 04/19] OvmfPkg/MemEncryptSevLib: add MemEncryptSevSnpEnabled()

2021-03-24 Thread Brijesh Singh
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Create a function can be used to determine if VM is running as an SEV-SNP guest. Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc: Ard Biesheuvel Cc: Laszlo Ersek Signed-off-by: Brijesh Singh --- O

Re: [edk2-devel] [Patch V2 0/2] Let AcpiTableDxe driver install Acpi table from Hob

2021-03-24 Thread Laszlo Ersek
On 03/24/21 17:55, Benjamin Doron wrote: >> >> >>> Hi all, >>> Would it be acceptable/feasible for AcpiTableDxe or AcpiPlatformDxe (in >>> MdeModulePkg) to use `EfiGetSystemConfigurationTable` to get the RSDP >>> and then install the tables? It's a solution that uses the regular >>> UefiLib, so it

Re: [EXTERNAL] [edk2-devel] [PATCH 1/1] MdeModulePkg/BmpSupportLib: Allow BMP with extra data

2021-03-24 Thread Laszlo Ersek
On 03/24/21 16:25, Jeff Brasen wrote: > Some of the logo files we received for the group that makes our assets like > this (not sure what tool they were created with) look like they pad the BMP > size to 8 bytes. > > TranslateBmpToGopBlt: invalid BmpImage... >BmpHeader->Size: 0xE1038 >Bm

Re: [edk2-devel] [Patch V2 0/2] Let AcpiTableDxe driver install Acpi table from Hob

2021-03-24 Thread Benjamin Doron
> > >> Hi all, >> Would it be acceptable/feasible for AcpiTableDxe or AcpiPlatformDxe (in >> MdeModulePkg) to use `EfiGetSystemConfigurationTable` to get the RSDP >> and then install the tables? It's a solution that uses the regular >> UefiLib, so it avoids platform-specific quirks (and as I see

Re: [EXTERNAL] [edk2-devel] [PATCH 1/1] MdeModulePkg/BmpSupportLib: Allow BMP with extra data

2021-03-24 Thread Jeff Brasen
Some of the logo files we received for the group that makes our assets like this (not sure what tool they were created with) look like they pad the BMP size to 8 bytes. TranslateBmpToGopBlt: invalid BmpImage... BmpHeader->Size: 0xE1038 BmpHeader->ImageOffset: 0x36 BmpImageSize: 0xE1038

[edk2-devel] [PATCH] RISC-V/PlatformPkg: Fix compilation breakage in OpenSBI

2021-03-24 Thread Loic Devulder via groups.io
platform_ops and platform structures have older entries that don't exist anymore on recent OpenSBI versions, so we can remove them. Cc: Abner Chang Cc: Daniel Schaefer Cc: Gilbert Chen Signed-off-by: Loic Devulder --- .../PlatformPkg/Library/OpensbiPlatformLibNull/Platform.c | 4 +--- 1

[edk2-devel] reg: clarification on Form Browser Action on save changes in IP4 and IP6 configuration

2021-03-24 Thread Sivaraman Nainar
Hello all: In the IPV4 and IPV6 Configuration Page after the changes are applied the system proceed to boot to the boot device and its not staying in same form. case KEY_SAVE_CHANGES: Status = Ip6ConvertIfrNvDataToConfigNvDataGeneral (IfrNvData, Instance); if (EFI_ERROR (Status)) {

Re: [edk2-devel] [PATCH v2 1/2] Platform/RaspberryPi: Dynamically build UARTs info in ACPI

2021-03-24 Thread Pete Batard
Hi Sunny, I understand that you are going to re-send these patches due to e-mail mangling, but let me add a few of notes that might help you as you are doing that. First of all, your patch series was missing a cover letter (there should have been a [PATCH v2 0/2]), that doesn't get applied,

Re: [edk2-devel] [Patch V2 0/2] Let AcpiTableDxe driver install Acpi table from Hob

2021-03-24 Thread Benjamin Doron
Hi all, Would it be acceptable/feasible for AcpiTableDxe or AcpiPlatformDxe (in MdeModulePkg) to use `EfiGetSystemConfigurationTable` to get the RSDP and then install the tables? It's a solution that uses the regular UefiLib, so it avoids platform-specific quirks (and as I see it, if RSDP is in

[edk2-devel] [PATCH v2] OvmfPkg: strip build paths in release builds

2021-03-24 Thread Ross Burton
GenFw will embed a NB10 section which contains the path to the input file, which means the output files have build paths embedded in them. To reduce information leakage and ensure reproducible builds, pass --zero in release builds to remove this information. Ref: https://bugzilla.tianocore.org/sh

Re: [EXTERNAL] [edk2-devel] [PATCH 1/1] MdeModulePkg/BmpSupportLib: Allow BMP with extra data

2021-03-24 Thread Laszlo Ersek
On 03/23/21 18:41, Bret Barkelew via groups.io wrote: > Is this a *good* idea? > > What is considered valid extra data? If it’s immaterial to the FW displaying > the image, our policy has been to strip it off BEFORE adding it to the FW > image. Not counting any potential security aspects, strip

Re: [edk2-devel] [Patch V2 0/2] Let AcpiTableDxe driver install Acpi table from Hob

2021-03-24 Thread Laszlo Ersek
On 03/24/21 05:09, Ni, Ray wrote: >> >> (1) Currently, BlSupportDxe expects the ACPI content to come from >> "SYSTEM_TABLE_INFO.AcpiTableBase" >> [Include/Guid/SystemTableInfoGuid.h]. >> That header file is at least *moderately* documented (it's better than >> nothing). Additionally, BlSupportDxe i

Re: [edk2-devel] [Patch V2 0/2] Let AcpiTableDxe driver install Acpi table from Hob

2021-03-24 Thread Laszlo Ersek
On 03/24/21 00:52, Benjamin Doron wrote: > Hi all, > Would it be acceptable/feasible for AcpiTableDxe or AcpiPlatformDxe (in > MdeModulePkg) to use `EfiGetSystemConfigurationTable` to get the RSDP > and then install the tables? It's a solution that uses the regular > UefiLib, so it avoids platform-

Re: [edk2-devel] [PATCH v2 1/2] Platform/RaspberryPi: Dynamically build UARTs info in ACPI

2021-03-24 Thread Sunny Wang
Somehow my first patch got messed up. Please ignore this. I will check the problem and send the patches again. Best Regards, Sunny Wang -Original Message- From: devel@edk2.groups.io On Behalf Of Sunny Wang via groups.io Sent: Wednesday, March 24, 2021 5:45 PM To: devel@edk2.groups.io Cc

Re: [edk2-devel] [Patch V2 0/2] Let AcpiTableDxe driver install Acpi table from Hob

2021-03-24 Thread Laszlo Ersek
On 03/23/21 18:15, Dong, Guo wrote: > > Hi Laszlo, > > I don't mean currently UEFI payload is already standardized and modularized. > There are still lots of things to do and I think the AcpiTableDxe patch is > the one it needed. > > More information on ideas behind could be found from > https

[edk2-devel] [PATCH v2 1/2] Platform/RaspberryPi: Dynamically build UARTs info in ACPI

2021-03-24 Thread Sunny Wang
Changes: 1. Add code to ConfigDxe driver and AcpiTables module to dynamically build either Mini UART or PL011 UART info in ACPI. This fixes the issue discussed in https://github.com/pftf/RPi4/issues/118. 2. Cleanup by moving duplicate Debug Port 2 table related defines and struct

[edk2-devel] [PATCH v2 2/2] Platform/RaspberryPi: Enable Bluetooth and UART in Windows OS

2021-03-24 Thread Sunny Wang
Merge changes in edk2-platforms-raspberrypi-pl011-bth-noflow.diff in https://github.com/worproject/RPi-Bluetooth-Testing/ for enabling Bluetooth and serial port (Mini UART) in Windows OS. Testing Done: - Successfully booted Windows 10 (20279.1) on SD (made by WOR) with the RPi-Windows-Driver