|
Event: Tools, CI, Code base construction meeting series - 08/15/2022
#cal-reminder
Reminder: Tools, CI, Code base construction meeting series
When:
08/15/2022
4:30pm to 5:30pm
(UTC-07:00) America/Los Angeles
Where:
https://github.com/tianocore/edk2/discussions/2614
View
Reminder: Tools, CI, Code base construction meeting series
When:
08/15/2022
4:30pm to 5:30pm
(UTC-07:00) America/Los Angeles
Where:
https://github.com/tianocore/edk2/discussions/2614
View
|
By
Group Notification <noreply@...>
·
#92455
·
|
|
[PATCH 2/2] MdeModulePkg/Core/Dxe: Fix memory leak issue in FwVolBlock.c
FvbDev->LbaCache must be freed on error path before deallocating FvbDev.
Cc: Liming Gao <gaoliming@...>
Cc: Dandan Bi <dandan.bi@...>
Signed-off-by: Mike Maslenkin
FvbDev->LbaCache must be freed on error path before deallocating FvbDev.
Cc: Liming Gao <gaoliming@...>
Cc: Dandan Bi <dandan.bi@...>
Signed-off-by: Mike Maslenkin
|
By
Mike Maslenkin
·
#92454
·
|
|
[PATCH 1/2] MdeModulePkg/Core/Dxe: Fix memory leak issue in FwVol.c
FwVolHeader must be deallocated on error path.
Cc: Liming Gao <gaoliming@...>
Cc: Dandan Bi <dandan.bi@...>
Signed-off-by: Mike Maslenkin <mike.maslenkin@...>
---
FwVolHeader must be deallocated on error path.
Cc: Liming Gao <gaoliming@...>
Cc: Dandan Bi <dandan.bi@...>
Signed-off-by: Mike Maslenkin <mike.maslenkin@...>
---
|
By
Mike Maslenkin
·
#92453
·
|
|
[PATCH 0/2] MdeModulePkg/Core/Dxe: Fix memory leak issues
Cc: Liming Gao <gaoliming@...>
Cc: Dandan Bi <dandan.bi@...>
Signed-off-by: Mike Maslenkin <mike.maslenkin@...>
Cc: Liming Gao <gaoliming@...>
Cc: Dandan Bi <dandan.bi@...>
Signed-off-by: Mike Maslenkin <mike.maslenkin@...>
|
By
Mike Maslenkin
·
#92452
·
|
|
[PATCH v1] MinPlatformPkg: Add PcdAcpiGpe1BlockLength for FADT from board package
From: Aryeh Chen <aryeh.chen@...>
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4020
Add PcdAcpiGpe1BlockLength of FADT Gpe1BlkLen register on
MinPlatformPkg for PlatformBoardpkg to
From: Aryeh Chen <aryeh.chen@...>
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4020
Add PcdAcpiGpe1BlockLength of FADT Gpe1BlkLen register on
MinPlatformPkg for PlatformBoardpkg to
|
By
Chen, Aryeh
·
#92451
·
|
|
Re: [PATCH v1] MinPlatformPkg: Add PcdAcpiGpe1BlockLength for FADT from board package
Reviewed-by: Chasel Chiu <chasel.chiu@...>
Reviewed-by: Chasel Chiu <chasel.chiu@...>
|
By
Chiu, Chasel
·
#92450
·
|
|
[edk2-platforms][PATCH v5 4/4] PhytiumCommonPkg: Platform Build: Resolving newly introduced dependency
The new changes in SecureBootVariableLib brought in a new dependency
of PlatformPKProtectionLib.
This change added the new library instance from SecurityPkg to resolve
PhytiumCommonPkg platforms
The new changes in SecureBootVariableLib brought in a new dependency
of PlatformPKProtectionLib.
This change added the new library instance from SecurityPkg to resolve
PhytiumCommonPkg platforms
|
By
Kun Qin
·
#92449
·
|
|
[edk2-platforms][PATCH v5 3/4] AmpereAltraPkg: Platform Build: Resolving newly introduced dependency
The new changes in SecureBootVariableLib brought in a new dependency
of PlatformPKProtectionLib.
This change added the new library instance from SecurityPkg to resolve
AmpereAltraPkg platforms
The new changes in SecureBootVariableLib brought in a new dependency
of PlatformPKProtectionLib.
This change added the new library instance from SecurityPkg to resolve
AmpereAltraPkg platforms
|
By
Kun Qin
·
#92448
·
|
|
[edk2-platforms][PATCH v5 2/4] U5SeriesPkg: Platform Build: Resolving newly introduced dependency
The new changes in SecureBootVariableLib brought in a new dependency
of PlatformPKProtectionLib.
This change added the new library instance from SecurityPkg to resolve
U5SeriesPkg platforms
The new changes in SecureBootVariableLib brought in a new dependency
of PlatformPKProtectionLib.
This change added the new library instance from SecurityPkg to resolve
U5SeriesPkg platforms
|
By
Kun Qin
·
#92447
·
|
|
[edk2-platforms][PATCH v5 1/4] RaspberryPi: Platform Build: Resolving newly introduced dependency
The new changes in SecureBootVariableLib brought in a new dependency
of PlatformPKProtectionLib.
This change added the new library instance from SecurityPkg to resolve
RaspberryPi platforms
The new changes in SecureBootVariableLib brought in a new dependency
of PlatformPKProtectionLib.
This change added the new library instance from SecurityPkg to resolve
RaspberryPi platforms
|
By
Kun Qin
·
#92446
·
|
|
[edk2-platforms][PATCH v5 0/4] Resolving SecureBootVariableLib dependency
This v5 series is a follow up of previously submitted patches:
https://edk2.groups.io/g/devel/message/92128
The v5 patches include a new `Reviewed-by` tag collected during the v4
round and skipped 2
This v5 series is a follow up of previously submitted patches:
https://edk2.groups.io/g/devel/message/92128
The v5 patches include a new `Reviewed-by` tag collected during the v4
round and skipped 2
|
By
Kun Qin
·
#92445
·
|
|
Re: [PATCH v2 0/3] OvmfPkg: Check arguments for validity
Thank you for the resend.
@Liming: these are all bug fixes that affect SCT results, so unless
there are any objections, I intend to merge these tomorrow (Tuesday).
Thanks,
Ard.
Thank you for the resend.
@Liming: these are all bug fixes that affect SCT results, so unless
there are any objections, I intend to merge these tomorrow (Tuesday).
Thanks,
Ard.
|
By
Ard Biesheuvel
·
#92444
·
|
|
[PATCH v2 0/3] OvmfPkg: Check arguments for validity
Some functions across OVMF don't check pointer arguments for
validity, which causes null pointer dereferences and crashes
in the SCT test suite.
This series adds checks to return
Some functions across OVMF don't check pointer arguments for
validity, which causes null pointer dereferences and crashes
in the SCT test suite.
This series adds checks to return
|
By
Dimitrije Pavlov
·
#92443
·
|
|
[PATCH v2 1/3] OvmfPkg/PlatformDxe: Check ExtractConfig and RouteConfig arguments
The current implementation does not check if Progress or Results
pointers in ExtractConfig are NULL, or if Progress pointer in
RouteConfig is NULL. This causes the SCT test suite to crash.
Add a
The current implementation does not check if Progress or Results
pointers in ExtractConfig are NULL, or if Progress pointer in
RouteConfig is NULL. This causes the SCT test suite to crash.
Add a
|
By
Dimitrije Pavlov
·
#92442
·
|
|
[PATCH v2 3/3] OvmfPkg/VirtioFsDxe: Check GetDriverName arguments
The current implementation does not check if Language or DriverName
are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these pointers
are
The current implementation does not check if Language or DriverName
are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these pointers
are
|
By
Dimitrije Pavlov
·
#92441
·
|
|
[PATCH v2 2/3] OvmfPkg/VirtioGpuDxe: Check QueryMode arguments
The current implementation does not check if Info or SizeInfo
pointers are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these
pointers are
The current implementation does not check if Info or SizeInfo
pointers are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these
pointers are
|
By
Dimitrije Pavlov
·
#92440
·
|
|
Re: [PATCH 01/10] UefiCpuPkg: Create CpuPageTableLib for manipulating X86 paging structs
Hi Ray,
How do you envision this library working with SEV and/or TDX which use the one of the bits in PageTableBaseAddress to indicate whether the page is encrypted or shared? For SEV, the encryption
Hi Ray,
How do you envision this library working with SEV and/or TDX which use the one of the bits in PageTableBaseAddress to indicate whether the page is encrypted or shared? For SEV, the encryption
|
By
Lendacky, Thomas
·
#92439
·
|
|
Re: [PATCH v1 1/1] OvmfPkg/VirtioFsDxe: Check GetDriverName arguments
Hello Dimitrije,
These patches look corrupted again. Can you please double check your
setup, and maybe compare notes with colleagues how to send patches to
the list in a way that doesn't corrupt
Hello Dimitrije,
These patches look corrupted again. Can you please double check your
setup, and maybe compare notes with colleagues how to send patches to
the list in a way that doesn't corrupt
|
By
Ard Biesheuvel
·
#92438
·
|
|
[PATCH v1 1/1] OvmfPkg/PlatformDxe: Check ExtractConfig and RouteConfig arguments
The current implementation does not check if Progress or Results
pointers in ExtractConfig are NULL, or if Progress pointer in
RouteConfig is NULL. This causes the SCT test suite to crash.
Add a
The current implementation does not check if Progress or Results
pointers in ExtractConfig are NULL, or if Progress pointer in
RouteConfig is NULL. This causes the SCT test suite to crash.
Add a
|
By
Dimitrije Pavlov
·
#92437
·
|
|
[PATCH v1 1/1] OvmfPkg/VirtioGpuDxe: Check QueryMode arguments for validity
The current implementation does not check if Info or SizeInfo
pointers are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these
pointers are
The current implementation does not check if Info or SizeInfo
pointers are NULL. This causes the SCT test suite to crash.
Add a check to return EFI_INVALID_PARAMETER if any of these
pointers are
|
By
Dimitrije Pavlov
·
#92436
·
|