|
[PATCH v2 0/3] OvmfPkg: Check arguments for validity
Some functions across OVMF don't check pointer arguments for
validity, which causes null pointer dereferences and crashes
in the SCT test suite.
This series adds checks to return
Some functions across OVMF don't check pointer arguments for
validity, which causes null pointer dereferences and crashes
in the SCT test suite.
This series adds checks to return
|
By
Dimitrije Pavlov
·
#92443
·
|
|
[PATCH v2 1/3] OvmfPkg/PlatformDxe: Check ExtractConfig and RouteConfig arguments
The current implementation does not check if Progress or Results
pointers in ExtractConfig are NULL, or if Progress pointer in
RouteConfig is NULL. This causes the SCT test suite to crash.
Add a
The current implementation does not check if Progress or Results
pointers in ExtractConfig are NULL, or if Progress pointer in
RouteConfig is NULL. This causes the SCT test suite to crash.
Add a
|
By
Dimitrije Pavlov
·
#92442
·
|
|
[PATCH v2 3/3] OvmfPkg/VirtioFsDxe: Check GetDriverName arguments
The current implementation does not check if Language or DriverName
are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these pointers
are
The current implementation does not check if Language or DriverName
are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these pointers
are
|
By
Dimitrije Pavlov
·
#92441
·
|
|
[PATCH v2 2/3] OvmfPkg/VirtioGpuDxe: Check QueryMode arguments
The current implementation does not check if Info or SizeInfo
pointers are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these
pointers are
The current implementation does not check if Info or SizeInfo
pointers are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these
pointers are
|
By
Dimitrije Pavlov
·
#92440
·
|
|
Re: [PATCH 01/10] UefiCpuPkg: Create CpuPageTableLib for manipulating X86 paging structs
Hi Ray,
How do you envision this library working with SEV and/or TDX which use the one of the bits in PageTableBaseAddress to indicate whether the page is encrypted or shared? For SEV, the encryption
Hi Ray,
How do you envision this library working with SEV and/or TDX which use the one of the bits in PageTableBaseAddress to indicate whether the page is encrypted or shared? For SEV, the encryption
|
By
Lendacky, Thomas
·
#92439
·
|
|
Re: [PATCH v1 1/1] OvmfPkg/VirtioFsDxe: Check GetDriverName arguments
Hello Dimitrije,
These patches look corrupted again. Can you please double check your
setup, and maybe compare notes with colleagues how to send patches to
the list in a way that doesn't corrupt
Hello Dimitrije,
These patches look corrupted again. Can you please double check your
setup, and maybe compare notes with colleagues how to send patches to
the list in a way that doesn't corrupt
|
By
Ard Biesheuvel
·
#92438
·
|
|
[PATCH v1 1/1] OvmfPkg/PlatformDxe: Check ExtractConfig and RouteConfig arguments
The current implementation does not check if Progress or Results
pointers in ExtractConfig are NULL, or if Progress pointer in
RouteConfig is NULL. This causes the SCT test suite to crash.
Add a
The current implementation does not check if Progress or Results
pointers in ExtractConfig are NULL, or if Progress pointer in
RouteConfig is NULL. This causes the SCT test suite to crash.
Add a
|
By
Dimitrije Pavlov
·
#92437
·
|
|
[PATCH v1 1/1] OvmfPkg/VirtioGpuDxe: Check QueryMode arguments for validity
The current implementation does not check if Info or SizeInfo
pointers are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these
pointers are
The current implementation does not check if Info or SizeInfo
pointers are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these
pointers are
|
By
Dimitrije Pavlov
·
#92436
·
|
|
Re: [Patch 0/2] Remove MptScsi and PvScsi reviewers
Acked-by: Gerd Hoffmann <kraxel@...>
Acked-by: Gerd Hoffmann <kraxel@...>
|
By
Gerd Hoffmann
·
#92435
·
|
|
[PATCH v1 1/1] OvmfPkg/VirtioFsDxe: Check GetDriverName arguments
The current implementation does not check if Language or DriverName
are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these pointers
are
The current implementation does not check if Language or DriverName
are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these pointers
are
|
By
Dimitrije Pavlov
·
#92434
·
|
|
Re: [PATCH v1 1/1] OvmfPkg: increase max debug message length to 512
Acked-by: Gerd Hoffmann <kraxel@...>
take care,
Gerd
Acked-by: Gerd Hoffmann <kraxel@...>
take care,
Gerd
|
By
Gerd Hoffmann
·
#92433
·
|
|
Re: [PATCH v2] MdeModulePkg/NonDiscoverablePciDeviceDxe: Allow partial
FreeBuffer
<jbrasen@...> wrote:
What I was wondering is whether such allocations are themselves
multiples of 64k. This is perhaps orthogonal to the issue this patch
addresses, as we'' still need
<jbrasen@...> wrote:
What I was wondering is whether such allocations are themselves
multiples of 64k. This is perhaps orthogonal to the issue this patch
addresses, as we'' still need
|
By
Ard Biesheuvel
·
#92432
·
|
|
Re: [edk2-platforms][PATCH v4 4/6] Socionext: Platform Build: Resolving newly introduced dependency
Thanks for the fix
Reviewed-by: Ard Biesheuvel <ardb@...>
Pushed as 01e3a8877180..9675047d7245
Thanks for the fix
Reviewed-by: Ard Biesheuvel <ardb@...>
Pushed as 01e3a8877180..9675047d7245
|
By
Ard Biesheuvel
·
#92431
·
|
|
Re: [PATCH edk2-platforms v1 1/1] Platform/ARM: FVP: Fix build break when Secure Boot is enabled
Thanks for the fix
Reviewed-by: Ard Biesheuvel <ardb@...>
Pushed as 01e3a8877180..9675047d7245
Thanks for the fix
Reviewed-by: Ard Biesheuvel <ardb@...>
Pushed as 01e3a8877180..9675047d7245
|
By
Ard Biesheuvel
·
#92430
·
|
|
[PATCH edk2-platforms v1 1/1] Platform/ARM: FVP: Fix build break when Secure Boot is enabled
The edk2 patch at:
"6eb407947592 SecurityPkg: SecureBootVariableLib: Added
newly supported interfaces" introduced a new dependency
of PlatformPKProtectionLib to SecureBootVariableLib.
This causes the
The edk2 patch at:
"6eb407947592 SecurityPkg: SecureBootVariableLib: Added
newly supported interfaces" introduced a new dependency
of PlatformPKProtectionLib to SecureBootVariableLib.
This causes the
|
By
Sami Mujawar
·
#92429
·
|
|
Re: [PATCH 2/2] OvmfPkg/OvmfPkgX64: Allow runtime control of IPv4 and IPv6 support
Hmm. Not a comment to this specifically, but more to the OVMF *.dsc and
*.fdf files in general. We have a lot of duplication here. I've
already moved some bits to include files
Hmm. Not a comment to this specifically, but more to the OVMF *.dsc and
*.fdf files in general. We have a lot of duplication here. I've
already moved some bits to include files
|
By
Gerd Hoffmann
·
#92428
·
|
|
Re: [PATCH] OvmfPkg: Update I/O port related to ACPI devices for CloudHv
Can this be detected by the guest somehow, so the firmware can work with
both old+new cloudhv?
Requiring lockstep updates tends to be painful, so we try avoid that
with qemu ...
(just a suggestion,
Can this be detected by the guest somehow, so the firmware can work with
both old+new cloudhv?
Requiring lockstep updates tends to be painful, so we try avoid that
with qemu ...
(just a suggestion,
|
By
Gerd Hoffmann
·
#92427
·
|
|
[OVMF] Using EFI_TIMESTAMP_PROTOCOL in OVMF
Hello everyone. I wanted to ask if there was a device/parameter to have `EFI_TIMESTAMP_PROTOCOL` in OVMF.
I would like to use this protocol to provide monotonic time in Rust (and fall back to
Hello everyone. I wanted to ask if there was a device/parameter to have `EFI_TIMESTAMP_PROTOCOL` in OVMF.
I would like to use this protocol to provide monotonic time in Rust (and fall back to
|
By
Ayush Singh
·
#92426
·
|
|
[PATCH EDK2 v2 0/1] MdeModulePkg/PiSmmCore:Avoid overflow risk
Main Changes since v1 :
1.treate overflow as overlap
Wenyi Xie (1):
MdeModulePkg/PiSmmCore:Avoid overflow risk
MdeModulePkg/Core/PiSmmCore/PiSmmCore.c | 5 ++++-
Main Changes since v1 :
1.treate overflow as overlap
Wenyi Xie (1):
MdeModulePkg/PiSmmCore:Avoid overflow risk
MdeModulePkg/Core/PiSmmCore/PiSmmCore.c | 5 ++++-
|
By
wenyi,xie
·
#92425
·
|
|
[PATCH EDK2 v2 1/1] MdeModulePkg/PiSmmCore:Avoid overflow risk
As the CommunicationBuffer plus BufferSize may overflow, check the
value first before using.
Cc: Liming Gao <gaoliming@...>
Cc: Eric Dong <eric.dong@...>
Cc: Ray Ni
As the CommunicationBuffer plus BufferSize may overflow, check the
value first before using.
Cc: Liming Gao <gaoliming@...>
Cc: Eric Dong <eric.dong@...>
Cc: Ray Ni
|
By
wenyi,xie
·
#92424
·
|