|
EDK2: DNS: Parsing of DNS A records
Hi,
We are working on a feature that leverages UEFI HTTP protocol and during our testing we found an issue with the underlying DNS implementation.
The current DNS implementation in EDK2 do not parse
Hi,
We are working on a feature that leverages UEFI HTTP protocol and during our testing we found an issue with the underlying DNS implementation.
The current DNS implementation in EDK2 do not parse
|
By
Vineel Kovvuri
·
#91130
·
|
|
Re: [PATCH] UefiPayloadPkg: Add CryptoDxe driver to UefiPayload
Can we always enable CRYPTO_ENABLE?
If yes, can we remove the macro?
Can we always enable CRYPTO_ENABLE?
If yes, can we remove the macro?
|
By
Ni, Ray
·
#91129
·
|
|
回复: [edk2-devel] [PATCH v4 1/8] MdePkg: IORT header update for IORT Rev E.d spec
Sami:
I suggest to keep EFI_ACPI_IO_REMAPPING_TABLE_REVISION. Its value can be EFI_ACPI_IO_REMAPPING_TABLE_REV5, because the structure has been updated, such as EFI_ACPI_6_0_IO_REMAPPING_RC_NODE.
Sami:
I suggest to keep EFI_ACPI_IO_REMAPPING_TABLE_REVISION. Its value can be EFI_ACPI_IO_REMAPPING_TABLE_REV5, because the structure has been updated, such as EFI_ACPI_6_0_IO_REMAPPING_RC_NODE.
|
By
gaoliming
·
#91128
·
|
|
回复: [PATCH] MdePkg/include: Update DMAR definitions to Intel VT-d spec ver4.0
Reviewed-by: Liming Gao <gaoliming@...>
Architecture
set for
the
below
recipient,
distribution by
Reviewed-by: Liming Gao <gaoliming@...>
Architecture
set for
the
below
recipient,
distribution by
|
By
gaoliming
·
#91127
·
|
|
回复: [PATCHv3 1/1] MdePkg/UefiDevicePathLib: Add support for PEIMs
Mateusz:
To be compatible, I suggest to add one new UefiDevicePathLibPeim.inf for
PEIM module. It will be same to UefiDevicePathLibStandaloneMm.inf except for
module type and base name.
The
Mateusz:
To be compatible, I suggest to add one new UefiDevicePathLibPeim.inf for
PEIM module. It will be same to UefiDevicePathLibStandaloneMm.inf except for
module type and base name.
The
|
By
gaoliming
·
#91126
·
|
|
Re: [PATCH v3 00/11] Enhance Secure Boot Variable Libraries
Thank you so much for the help, Jiewen!
On 7/6/2022 6:09 PM, Yao, Jiewen wrote:
Thank you so much for the help, Jiewen!
On 7/6/2022 6:09 PM, Yao, Jiewen wrote:
|
By
Kun Qin
·
#91125
·
|
|
Re: [PATCH v3 00/11] Enhance Secure Boot Variable Libraries
Merged https://github.com/tianocore/edk2/pull/3050
Merged https://github.com/tianocore/edk2/pull/3050
|
By
Yao, Jiewen
·
#91124
·
|
|
Re: [PATCH v2] MdePkg/BasePrintLib: Add %z specifier
Hi Mike,
How can sizeof(size_t) != sizeof(UINTN)? It seems to be quite a stretch to interpret the standard in a way that the native word size will not be able to store "the maximum size of a
Hi Mike,
How can sizeof(size_t) != sizeof(UINTN)? It seems to be quite a stretch to interpret the standard in a way that the native word size will not be able to store "the maximum size of a
|
By
Pedro Falcato
·
#91123
·
|
|
Re: [PATCH v2] MdePkg/BasePrintLib: Add %z specifier
Hi Pedro,
This is an interesting feature.
It is backwards compatible since you are adding a format specifier to the PrintLib class.
There is a 2nd lib instance that needs to be updated, and that is
Hi Pedro,
This is an interesting feature.
It is backwards compatible since you are adding a format specifier to the PrintLib class.
There is a 2nd lib instance that needs to be updated, and that is
|
By
Michael D Kinney
·
#91122
·
|
|
Re: [PATCH v3 00/11] Enhance Secure Boot Variable Libraries
Hi Jiewen,
Yes, the "https://github.com/kuqin12/edk2/tree/secure_boot_enhance_v3" is the branch I generate these patch series. And they have not been changed after sending
Hi Jiewen,
Yes, the "https://github.com/kuqin12/edk2/tree/secure_boot_enhance_v3" is the branch I generate these patch series. And they have not been changed after sending
|
By
Kun Qin
·
#91121
·
|
|
Re: [PATCH v4 1/8] MdePkg: IORT header update for IORT Rev E.d spec
On Wed, Jul 6, 2022 at 02:57 AM, Sami Mujawar wrote:
-#define EFI_ACPI_IO_REMAPPING_TABLE_REVISION 0x0
+#define EFI_ACPI_IO_REMAPPING_TABLE_REV0 0x0
+#define EFI_ACPI_IO_REMAPPING_TABLE_REV5 0x5Based
On Wed, Jul 6, 2022 at 02:57 AM, Sami Mujawar wrote:
-#define EFI_ACPI_IO_REMAPPING_TABLE_REVISION 0x0
+#define EFI_ACPI_IO_REMAPPING_TABLE_REV0 0x0
+#define EFI_ACPI_IO_REMAPPING_TABLE_REV5 0x5Based
|
By
Sami Mujawar
·
#91120
·
|
|
Re: [PATCH edk2-platforms v2 03/11] Platform/ARM: SGI: Update for IORT revision macro renaming
Hi Sami,
Yes, that would also be okay.
Thanks.
Hi Sami,
Yes, that would also be okay.
Thanks.
|
By
Thomas Abraham
·
#91119
·
|
|
Re: [PATCH v1 1/1] DynamicTablesPkg: Add support to specify FADT minor revision
Hi Pierre,
Thank you for bringing this up.
As it stands the NXP platform would be using ACPI 6.4 which is the default case, and this patch will not change that. So, downgrading this to ACPI 6.2 may
Hi Pierre,
Thank you for bringing this up.
As it stands the NXP platform would be using ACPI 6.4 which is the default case, and this patch will not change that. So, downgrading this to ACPI 6.2 may
|
By
Sami Mujawar
·
#91118
·
|
|
Re: [PATCH edk2-platforms v2 03/11] Platform/ARM: SGI: Update for IORT revision macro renaming
Hi Thomas,
Please find my response inline marked [SAMI].
Regards,
Sami Mujawar
[SAMI] I checked the edk2 code base and apparenlty the protocol versioning follows the scheme you mention above. As
Hi Thomas,
Please find my response inline marked [SAMI].
Regards,
Sami Mujawar
[SAMI] I checked the edk2 code base and apparenlty the protocol versioning follows the scheme you mention above. As
|
By
Sami Mujawar
·
#91117
·
|
|
Re: [PATCH v1 1/1] DynamicTablesPkg: Add support to specify FADT minor revision
Hello Sami,
The only configuration manager not using ACPI 6.4 tables is at:
Platform/NXP/ConfigurationManagerPkg/ConfigurationManagerDxe/ConfigurationManager.c
I think the minor version of its FADT
Hello Sami,
The only configuration manager not using ACPI 6.4 tables is at:
Platform/NXP/ConfigurationManagerPkg/ConfigurationManagerDxe/ConfigurationManager.c
I think the minor version of its FADT
|
By
PierreGondois
·
#91116
·
|
|
Re: [edk2][PATCH V3 1/1] ArmPlatformPkg/PrePeiCore: Explicitly invoke constructor for SEC phase
Reviewed-by: Thomas Abraham <thomas.abraham@...>
Tested-by: Thomas Abraham <thomas.abraham@...>
Thanks.
Reviewed-by: Thomas Abraham <thomas.abraham@...>
Tested-by: Thomas Abraham <thomas.abraham@...>
Thanks.
|
By
Thomas Abraham
·
#91115
·
|
|
Re: [PATCH edk2-platforms v2 03/11] Platform/ARM: SGI: Update for IORT revision macro renaming
nit: Should this have been EFI_ACPI_IO_REMAPPING_TABLE_REVISION_0 to better align with all the other table revision macros?
Reviewed-by: Thomas Abraham <thomas.abraham@...>
Thanks.
nit: Should this have been EFI_ACPI_IO_REMAPPING_TABLE_REVISION_0 to better align with all the other table revision macros?
Reviewed-by: Thomas Abraham <thomas.abraham@...>
Thanks.
|
By
Thomas Abraham
·
#91114
·
|
|
[edk2][PATCH V3 1/1] ArmPlatformPkg/PrePeiCore: Explicitly invoke constructor for SEC phase
Invoke the constructor in the SEC phase to call into initialization
functions associated with libraries linked with this particular module.
For instance, PrePeiCore's CEntryPoint function calls
Invoke the constructor in the SEC phase to call into initialization
functions associated with libraries linked with this particular module.
For instance, PrePeiCore's CEntryPoint function calls
|
By
Rohit Mathew
·
#91113
·
|
|
Re: [PATCH v2] UefiPayloadPkg: Add macro to support selective driver in UPL
Reviewed-by: Lean Sheng Tan<sheng.tan@...>
Reviewed-by: Lean Sheng Tan<sheng.tan@...>
|
By
Sheng Lean Tan
·
#91112
·
|
|
[PATCH v2] UefiCpuPkg: Fix nasm warning "signed byte value exceeds"
Currently, "push byte %[Vector]" causes nasm warning when Vector is larger
than 0x7F. This is because push accepts a signed value, and byte means
signed int8. Maximum signed int8 is 0x7F.
When Vector
Currently, "push byte %[Vector]" causes nasm warning when Vector is larger
than 0x7F. This is because push accepts a signed value, and byte means
signed int8. Maximum signed int8 is 0x7F.
When Vector
|
By
Zhiguang Liu
·
#91111
·
|