|
[edk2-platforms][PATCH v5 3/4] AmpereAltraPkg: Platform Build: Resolving newly introduced dependency
The new changes in SecureBootVariableLib brought in a new dependency
of PlatformPKProtectionLib.
This change added the new library instance from SecurityPkg to resolve
AmpereAltraPkg platforms
The new changes in SecureBootVariableLib brought in a new dependency
of PlatformPKProtectionLib.
This change added the new library instance from SecurityPkg to resolve
AmpereAltraPkg platforms
|
By
Kun Qin
·
#92448
·
|
|
[edk2-platforms][PATCH v5 2/4] U5SeriesPkg: Platform Build: Resolving newly introduced dependency
The new changes in SecureBootVariableLib brought in a new dependency
of PlatformPKProtectionLib.
This change added the new library instance from SecurityPkg to resolve
U5SeriesPkg platforms
The new changes in SecureBootVariableLib brought in a new dependency
of PlatformPKProtectionLib.
This change added the new library instance from SecurityPkg to resolve
U5SeriesPkg platforms
|
By
Kun Qin
·
#92447
·
|
|
[edk2-platforms][PATCH v5 1/4] RaspberryPi: Platform Build: Resolving newly introduced dependency
The new changes in SecureBootVariableLib brought in a new dependency
of PlatformPKProtectionLib.
This change added the new library instance from SecurityPkg to resolve
RaspberryPi platforms
The new changes in SecureBootVariableLib brought in a new dependency
of PlatformPKProtectionLib.
This change added the new library instance from SecurityPkg to resolve
RaspberryPi platforms
|
By
Kun Qin
·
#92446
·
|
|
[edk2-platforms][PATCH v5 0/4] Resolving SecureBootVariableLib dependency
This v5 series is a follow up of previously submitted patches:
https://edk2.groups.io/g/devel/message/92128
The v5 patches include a new `Reviewed-by` tag collected during the v4
round and skipped 2
This v5 series is a follow up of previously submitted patches:
https://edk2.groups.io/g/devel/message/92128
The v5 patches include a new `Reviewed-by` tag collected during the v4
round and skipped 2
|
By
Kun Qin
·
#92445
·
|
|
Re: [PATCH v2 0/3] OvmfPkg: Check arguments for validity
Thank you for the resend.
@Liming: these are all bug fixes that affect SCT results, so unless
there are any objections, I intend to merge these tomorrow (Tuesday).
Thanks,
Ard.
Thank you for the resend.
@Liming: these are all bug fixes that affect SCT results, so unless
there are any objections, I intend to merge these tomorrow (Tuesday).
Thanks,
Ard.
|
By
Ard Biesheuvel
·
#92444
·
|
|
[PATCH v2 0/3] OvmfPkg: Check arguments for validity
Some functions across OVMF don't check pointer arguments for
validity, which causes null pointer dereferences and crashes
in the SCT test suite.
This series adds checks to return
Some functions across OVMF don't check pointer arguments for
validity, which causes null pointer dereferences and crashes
in the SCT test suite.
This series adds checks to return
|
By
Dimitrije Pavlov
·
#92443
·
|
|
[PATCH v2 1/3] OvmfPkg/PlatformDxe: Check ExtractConfig and RouteConfig arguments
The current implementation does not check if Progress or Results
pointers in ExtractConfig are NULL, or if Progress pointer in
RouteConfig is NULL. This causes the SCT test suite to crash.
Add a
The current implementation does not check if Progress or Results
pointers in ExtractConfig are NULL, or if Progress pointer in
RouteConfig is NULL. This causes the SCT test suite to crash.
Add a
|
By
Dimitrije Pavlov
·
#92442
·
|
|
[PATCH v2 3/3] OvmfPkg/VirtioFsDxe: Check GetDriverName arguments
The current implementation does not check if Language or DriverName
are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these pointers
are
The current implementation does not check if Language or DriverName
are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these pointers
are
|
By
Dimitrije Pavlov
·
#92441
·
|
|
[PATCH v2 2/3] OvmfPkg/VirtioGpuDxe: Check QueryMode arguments
The current implementation does not check if Info or SizeInfo
pointers are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these
pointers are
The current implementation does not check if Info or SizeInfo
pointers are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these
pointers are
|
By
Dimitrije Pavlov
·
#92440
·
|
|
Re: [PATCH 01/10] UefiCpuPkg: Create CpuPageTableLib for manipulating X86 paging structs
Hi Ray,
How do you envision this library working with SEV and/or TDX which use the one of the bits in PageTableBaseAddress to indicate whether the page is encrypted or shared? For SEV, the encryption
Hi Ray,
How do you envision this library working with SEV and/or TDX which use the one of the bits in PageTableBaseAddress to indicate whether the page is encrypted or shared? For SEV, the encryption
|
By
Lendacky, Thomas
·
#92439
·
|
|
Re: [PATCH v1 1/1] OvmfPkg/VirtioFsDxe: Check GetDriverName arguments
Hello Dimitrije,
These patches look corrupted again. Can you please double check your
setup, and maybe compare notes with colleagues how to send patches to
the list in a way that doesn't corrupt
Hello Dimitrije,
These patches look corrupted again. Can you please double check your
setup, and maybe compare notes with colleagues how to send patches to
the list in a way that doesn't corrupt
|
By
Ard Biesheuvel
·
#92438
·
|
|
[PATCH v1 1/1] OvmfPkg/PlatformDxe: Check ExtractConfig and RouteConfig arguments
The current implementation does not check if Progress or Results
pointers in ExtractConfig are NULL, or if Progress pointer in
RouteConfig is NULL. This causes the SCT test suite to crash.
Add a
The current implementation does not check if Progress or Results
pointers in ExtractConfig are NULL, or if Progress pointer in
RouteConfig is NULL. This causes the SCT test suite to crash.
Add a
|
By
Dimitrije Pavlov
·
#92437
·
|
|
[PATCH v1 1/1] OvmfPkg/VirtioGpuDxe: Check QueryMode arguments for validity
The current implementation does not check if Info or SizeInfo
pointers are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these
pointers are
The current implementation does not check if Info or SizeInfo
pointers are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these
pointers are
|
By
Dimitrije Pavlov
·
#92436
·
|
|
Re: [Patch 0/2] Remove MptScsi and PvScsi reviewers
Acked-by: Gerd Hoffmann <kraxel@...>
Acked-by: Gerd Hoffmann <kraxel@...>
|
By
Gerd Hoffmann
·
#92435
·
|
|
[PATCH v1 1/1] OvmfPkg/VirtioFsDxe: Check GetDriverName arguments
The current implementation does not check if Language or DriverName
are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these pointers
are
The current implementation does not check if Language or DriverName
are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these pointers
are
|
By
Dimitrije Pavlov
·
#92434
·
|
|
Re: [PATCH v1 1/1] OvmfPkg: increase max debug message length to 512
Acked-by: Gerd Hoffmann <kraxel@...>
take care,
Gerd
Acked-by: Gerd Hoffmann <kraxel@...>
take care,
Gerd
|
By
Gerd Hoffmann
·
#92433
·
|
|
Re: [PATCH v2] MdeModulePkg/NonDiscoverablePciDeviceDxe: Allow partial
FreeBuffer
<jbrasen@...> wrote:
What I was wondering is whether such allocations are themselves
multiples of 64k. This is perhaps orthogonal to the issue this patch
addresses, as we'' still need
<jbrasen@...> wrote:
What I was wondering is whether such allocations are themselves
multiples of 64k. This is perhaps orthogonal to the issue this patch
addresses, as we'' still need
|
By
Ard Biesheuvel
·
#92432
·
|
|
Re: [edk2-platforms][PATCH v4 4/6] Socionext: Platform Build: Resolving newly introduced dependency
Thanks for the fix
Reviewed-by: Ard Biesheuvel <ardb@...>
Pushed as 01e3a8877180..9675047d7245
Thanks for the fix
Reviewed-by: Ard Biesheuvel <ardb@...>
Pushed as 01e3a8877180..9675047d7245
|
By
Ard Biesheuvel
·
#92431
·
|
|
Re: [PATCH edk2-platforms v1 1/1] Platform/ARM: FVP: Fix build break when Secure Boot is enabled
Thanks for the fix
Reviewed-by: Ard Biesheuvel <ardb@...>
Pushed as 01e3a8877180..9675047d7245
Thanks for the fix
Reviewed-by: Ard Biesheuvel <ardb@...>
Pushed as 01e3a8877180..9675047d7245
|
By
Ard Biesheuvel
·
#92430
·
|
|
[PATCH edk2-platforms v1 1/1] Platform/ARM: FVP: Fix build break when Secure Boot is enabled
The edk2 patch at:
"6eb407947592 SecurityPkg: SecureBootVariableLib: Added
newly supported interfaces" introduced a new dependency
of PlatformPKProtectionLib to SecureBootVariableLib.
This causes the
The edk2 patch at:
"6eb407947592 SecurityPkg: SecureBootVariableLib: Added
newly supported interfaces" introduced a new dependency
of PlatformPKProtectionLib to SecureBootVariableLib.
This causes the
|
By
Sami Mujawar
·
#92429
·
|