[PATCH 1/1] OvmfPkg/XenHypercallLib: Fix naming of AArch64
Anthony PERARD
From: Anthony PERARD <anthony.perard@...>
Fix path to follow naming convention of "AArch64", and allow the path in "Maintainers.txt" to work as expected. REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3982 Signed-off-by: Anthony PERARD <anthony.perard@...> --- Cc: Ard Biesheuvel <ardb+tianocore@...> Cc: Jiewen Yao <jiewen.yao@...> Cc: Jordan Justen <jordan.l.justen@...> Cc: Gerd Hoffmann <kraxel@...> Cc: Julien Grall <julien@...> --- OvmfPkg/Library/XenHypercallLib/XenHypercallLib.inf | 2 +- .../Library/XenHypercallLib/{Aarch64 => AArch64}/Hypercall.S | 0 2 files changed, 1 insertion(+), 1 deletion(-) rename OvmfPkg/Library/XenHypercallLib/{Aarch64 => AArch64}/Hypercall.S (100%) diff --git a/OvmfPkg/Library/XenHypercallLib/XenHypercallLib.inf b/OvmfPkg/Library/XenHypercallLib/XenHypercallLib.inf index 32ae73f7aac5..edb77872391c 100644 --- a/OvmfPkg/Library/XenHypercallLib/XenHypercallLib.inf +++ b/OvmfPkg/Library/XenHypercallLib/XenHypercallLib.inf @@ -42,7 +42,7 @@ [Sources.ARM] Arm/Hypercall.S [Sources.AARCH64] - Aarch64/Hypercall.S + AArch64/Hypercall.S [Sources] XenHypercall.c diff --git a/OvmfPkg/Library/XenHypercallLib/Aarch64/Hypercall.S b/OvmfPkg/Library/XenHypercallLib/AArch64/Hypercall.S similarity index 100% rename from OvmfPkg/Library/XenHypercallLib/Aarch64/Hypercall.S rename to OvmfPkg/Library/XenHypercallLib/AArch64/Hypercall.S -- Anthony PERARD
|
|
[PATCH] BaseTools/VolInfo: Parse EFI_SECTION_FREEFORM_SUBTYPE_GUID header
Konstantin Aladyshev
Print 'SubtypeGuid' field from the EFI_FREEFORM_SUBTYPE_GUID_SECTION
structure. This value describes the raw data inside the section. Signed-off-by: Konstantin Aladyshev <aladyshev22@...> --- BaseTools/Source/C/VolInfo/VolInfo.c | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/BaseTools/Source/C/VolInfo/VolInfo.c b/BaseTools/Source/C/VolI= nfo/VolInfo.c index a78a7e7976..4628e756d7 100644 --- a/BaseTools/Source/C/VolInfo/VolInfo.c +++ b/BaseTools/Source/C/VolInfo/VolInfo.c @@ -1806,12 +1806,20 @@ Returns: break;=0D =0D case EFI_SECTION_COMPATIBILITY16:=0D - case EFI_SECTION_FREEFORM_SUBTYPE_GUID:=0D //=0D // Section does not contain any further header information.=0D //=0D break;=0D =0D + case EFI_SECTION_FREEFORM_SUBTYPE_GUID:=0D + printf (" Guid: ");=0D + if (SectionHeaderLen =3D=3D sizeof (EFI_COMMON_SECTION_HEADER))=0D + PrintGuid (&((EFI_FREEFORM_SUBTYPE_GUID_SECTION *)Ptr)->SubTypeGui= d);=0D + else=0D + PrintGuid (&((EFI_FREEFORM_SUBTYPE_GUID_SECTION2 *)Ptr)->SubTypeGu= id);=0D + printf ("\n");=0D + break;=0D +=0D case EFI_SECTION_PEI_DEPEX:=0D case EFI_SECTION_DXE_DEPEX:=0D case EFI_SECTION_SMM_DEPEX:=0D --=20 2.25.1
|
|
Re: [PATCH v1 4/6] DynamicTablesPkg: DynamicTableManagerDxe: Added check for installed tables
Sami Mujawar
Hi Kun,
Thank you for this patch. I have some minor suggestions marked inline as [SAMI], otherwise this patch looks good to me. With that updated. Reviewed-by: Sami Mujawar <sami.mujawar@...> Regards, Sami Mujawar On 19/07/2022 01:22 am, Kun Qin wrote: REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3997[SAMI] Can thie include statement above be alphabetically ordered, please? [SAMI] Please add EFI_NOT_FOUND as a return type if an ACPI table with the requested signature is not found or if the ACPI SDT protocol is not installed. [SAMI] Please update the function documentation header to reflect the EFI_ALREADY_STARTED error code.
[snip]// Check if mandatory ACPI tables are present. Status = VerifyMandatoryTablesArePresent ( AcpiTableInfo, AcpiTableCount ); if (EFI_ERROR (Status)) { DEBUG (( DEBUG_ERROR, "ERROR: Failed to find mandatory ACPI Table(s)." " Status = %r\n", Status )); [SAMI] Is it possible to update the error reporting to reflect the EFI_ALREADY_STARTED error type, please? Please also update the function documentation header for ProcessAcpiTables(). return Status; } [/snip] [SAMI] Should the DEPEX section be updated to relect the dependency on the SDT protocol?
|
|
Re: [PATCH v1 3/6] DynamicTablesPkg: DynamicPlatRepoLib: Adding more token fixers
Sami Mujawar
Hi Kun,
toggle quoted messageShow quoted text
Thank you for this patch. These changes look good to me. Reviewed-by: Sami Mujawar <sami.mujawar@...> Regards, Sami Mujawar
On 19/07/2022 01:22 am, Kun Qin wrote:
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3996
|
|
Re: [PATCH] EmulatorPkg/PosixFileSystem: Add NULL check on memory allocation
Ni, Ray
Reviewed-by: Ray Ni <ray.ni@...>
toggle quoted messageShow quoted text
-----Original Message-----
|
|
Re: [PATCH v1 2/6] DynamicTablesPkg: DynamicPlatRepoLib: Fix incorrect dereferencing
Sami Mujawar
Hi Kun,
toggle quoted messageShow quoted text
Thank you for this fix. This patch looks good to me. Reviewed-by: Sami Mujawar <sami.mujawar@...> Regards, Sami Mujawar
On 19/07/2022 01:22 am, Kun Qin wrote:
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3996
|
|
Re: [PATCH v1 1/6] DynamicTablesPkg: DynamicPlatRepoLib: Added MemoryAllocationLib to inf
Sami Mujawar
Hi Kun,
toggle quoted messageShow quoted text
Thank you for this patch. This change looks good to me. Reviewed-by: Sami Mujawar <sami.mujawar@...> Regards, Sami Mujawar
On 19/07/2022 01:22 am, Kun Qin wrote:
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3996
|
|
[PATCH 2/2] UefiPayloadPkg: Load Boot Logo into ACPI table
Sean Rhodes
This will allow the OS to display the logo whilst booting.
Cc: Guo Dong <guo.dong@...> Cc: Ray Ni <ray.ni@...> Signed-off-by: Sean Rhodes <sean@...> --- UefiPayloadPkg/UefiPayloadPkg.dsc | 6 ++++++ UefiPayloadPkg/UefiPayloadPkg.fdf | 2 ++ 2 files changed, 8 insertions(+) diff --git a/UefiPayloadPkg/UefiPayloadPkg.dsc b/UefiPayloadPkg/UefiPayload= Pkg.dsc index bdafe8ae99..f9459f24f8 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dsc +++ b/UefiPayloadPkg/UefiPayloadPkg.dsc @@ -287,6 +287,10 @@ VmgExitLib|UefiCpuPkg/Library/VmgExitLibNull/VmgExitLibNull.inf=0D ReportStatusCodeLib|MdeModulePkg/Library/DxeReportStatusCodeLib/DxeRepor= tStatusCodeLib.inf=0D =0D +[LibraryClasses.common]=0D + SafeIntLib|MdePkg/Library/BaseSafeIntLib/BaseSafeIntLib.inf=0D + BmpSupportLib|MdeModulePkg/Library/BaseBmpSupportLib/BaseBmpSupportLib.i= nf=0D +=0D [LibraryClasses.common.SEC]=0D HobLib|UefiPayloadPkg/Library/PayloadEntryHobLib/HobLib.inf=0D PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf=0D @@ -656,6 +660,8 @@ # ACPI Support=0D #=0D MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf=0D + MdeModulePkg/Universal/Acpi/AcpiPlatformDxe/AcpiPlatformDxe.inf=0D + MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsRes= ourceTableDxe.inf=0D =0D #=0D # PCI Support=0D diff --git a/UefiPayloadPkg/UefiPayloadPkg.fdf b/UefiPayloadPkg/UefiPayload= Pkg.fdf index 6d54bb0e13..e6970fceae 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.fdf +++ b/UefiPayloadPkg/UefiPayloadPkg.fdf @@ -243,6 +243,8 @@ INF MdeModulePkg/Bus/Usb/UsbMouseDxe/UsbMouseDxe.inf # ACPI Support=0D #=0D INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf=0D +INF MdeModulePkg/Universal/Acpi/AcpiPlatformDxe/AcpiPlatformDxe.inf=0D +INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphics= ResourceTableDxe.inf=0D =0D #=0D # UEFI network modules=0D --=20 2.34.1
|
|
[PATCH 1/2] UefiPayloadPkg: Enable Boot Logo
Sean Rhodes
Cc: Guo Dong <guo.dong@...>
Cc: Ray Ni <ray.ni@...> Signed-off-by: Sean Rhodes <sean@...> --- .../Library/PlatformBootManagerLib/PlatformBootManager.c | 5 +++++ .../PlatformBootManagerLib/PlatformBootManagerLib.inf | 1 + UefiPayloadPkg/UefiPayloadPkg.dsc | 6 ++++++ UefiPayloadPkg/UefiPayloadPkg.fdf | 4 ++++ 4 files changed, 16 insertions(+) diff --git a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootMana= ger.c b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c index b360e29dfe..2fadd3f130 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c @@ -252,6 +252,11 @@ PlatformBootManagerAfterConsole ( Black.Blue =3D Black.Green =3D Black.Red =3D Black.Reserved =3D 0;=0D White.Blue =3D White.Green =3D White.Red =3D White.Reserved =3D 0xFF;=0D =0D + if (&gEdkiiPlatformLogoProtocolGuid) {=0D + gST->ConOut->ClearScreen (gST->ConOut);=0D + BootLogoEnableLogo ();=0D + }=0D +=0D EfiBootManagerConnectAll ();=0D EfiBootManagerRefreshAllBootOption ();=0D =0D diff --git a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootMana= gerLib.inf b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootMana= gerLib.inf index 9f58c460cd..7ec93420f2 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.= inf +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.= inf @@ -39,6 +39,7 @@ UefiRuntimeServicesTableLib=0D UefiLib=0D UefiBootManagerLib=0D + BootLogoLib=0D PcdLib=0D DxeServicesLib=0D MemoryAllocationLib=0D diff --git a/UefiPayloadPkg/UefiPayloadPkg.dsc b/UefiPayloadPkg/UefiPayload= Pkg.dsc index 5e947526b7..bdafe8ae99 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dsc +++ b/UefiPayloadPkg/UefiPayloadPkg.dsc @@ -40,6 +40,7 @@ DEFINE SD_ENABLE =3D TRUE=0D DEFINE PS2_MOUSE_ENABLE =3D TRUE=0D DEFINE SD_MMC_TIMEOUT =3D 1000000=0D + DEFINE BOOTSPLASH_IMAGE =3D FALSE=0D =0D #=0D # NULL: NullMemoryTestDxe=0D @@ -221,6 +222,7 @@ CapsuleLib|MdeModulePkg/Library/DxeCapsuleLibNull/DxeCapsuleLibNull.inf= =0D SecurityManagementLib|MdeModulePkg/Library/DxeSecurityManagementLib/DxeS= ecurityManagementLib.inf=0D UefiBootManagerLib|MdeModulePkg/Library/UefiBootManagerLib/UefiBootManag= erLib.inf=0D + BootLogoLib|MdeModulePkg/Library/BootLogoLib/BootLogoLib.inf=0D CustomizedDisplayLib|MdeModulePkg/Library/CustomizedDisplayLib/Customize= dDisplayLib.inf=0D FrameBufferBltLib|MdeModulePkg/Library/FrameBufferBltLib/FrameBufferBltL= ib.inf=0D =0D @@ -419,6 +421,7 @@ =0D gUefiPayloadPkgTokenSpaceGuid.PcdDispatchModuleAbove4GMemory|$(ABOVE_4G_= MEMORY)=0D gUefiPayloadPkgTokenSpaceGuid.PcdBootManagerEscape|$(BOOT_MANAGER_ESCAPE= )=0D +=0D gEfiMdePkgTokenSpaceGuid.PcdMaximumUnicodeStringLength|1800000=0D =0D gEfiCryptoPkgTokenSpaceGuid.PcdCryptoServiceFamilyEnable.HmacSha256.Fami= ly | PCD_CRYPTO_SERVICE_ENABLE_FAMILY=0D @@ -593,6 +596,9 @@ !endif=0D UefiCpuPkg/CpuDxe/CpuDxe.inf=0D MdeModulePkg/Universal/BdsDxe/BdsDxe.inf=0D +!if $(BOOTSPLASH_IMAGE)=0D + MdeModulePkg/Logo/LogoDxe.inf=0D +!endif=0D MdeModulePkg/Application/UiApp/UiApp.inf {=0D <LibraryClasses>=0D NULL|MdeModulePkg/Library/DeviceManagerUiLib/DeviceManagerUiLib.inf= =0D diff --git a/UefiPayloadPkg/UefiPayloadPkg.fdf b/UefiPayloadPkg/UefiPayload= Pkg.fdf index 5c055e61b3..6d54bb0e13 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.fdf +++ b/UefiPayloadPkg/UefiPayloadPkg.fdf @@ -163,6 +163,10 @@ INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf INF UefiPayloadPkg/BlSupportDxe/BlSupportDxe.inf=0D =0D INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf=0D +!if $(BOOTSPLASH_IMAGE)=0D +INF MdeModulePkg/Logo/LogoDxe.inf=0D +!endif=0D +=0D #=0D # PCI Support=0D #=0D --=20 2.34.1
|
|
[PATCH v1-resend 1/1] ShellPkg: Add revision check for DSDT Header on Arm
Edward Pickup <edward.pickup@...>
Bugzilla: 3995 (https://bugzilla.tianocore.org/show_bug.cgi?id=3995)
ACPI 6.4 spec states that if the revision field in the DSDT header is less than 2, then all integers are restricted in width to 32 bits, including in SSDTs. Arm Base boot requirements state that platforms must conform to ACPI 6.3 or later, and that legacy tables are not supported. Adds a check for this field and raise warning if revision is less than 2 on arm. Signed-off-by: Edward Pickup <edward.pickup@...> --- The changes can be seen at https://github.com/edpickup/edk2/tree/2073_add_DSDT_revision_check_v1_resend Notes: v1: - Resending with rebase and bugzilla id - No code changes since previous submit. Ref: https://edk2.groups.io/g/devel/message/89378 ShellPkg/Library/UefiShellAcpiViewCommandLib/Parsers/Dsdt/DsdtParser.c | 18 +++++++++++++++++- 1 file changed, 17 insertions(+), 1 deletion(-) diff --git a/ShellPkg/Library/UefiShellAcpiViewCommandLib/Parsers/Dsdt/DsdtParser.c b/ShellPkg/Library/UefiShellAcpiViewCommandLib/Parsers/Dsdt/DsdtParser.c index e75e4622239ed03b171adc92d32b5eeb75a8edef..7f30a8409bb711d4edf77ed04319c628ef8aea73 100644 --- a/ShellPkg/Library/UefiShellAcpiViewCommandLib/Parsers/Dsdt/DsdtParser.c +++ b/ShellPkg/Library/UefiShellAcpiViewCommandLib/Parsers/Dsdt/DsdtParser.c @@ -1,7 +1,7 @@ /** @file DSDT table parser - Copyright (c) 2016 - 2018, ARM Limited. All rights reserved. + Copyright (c) 2016 - 2022, ARM Limited. All rights reserved. SPDX-License-Identifier: BSD-2-Clause-Patent @par Reference(s): @@ -39,4 +39,20 @@ ParseAcpiDsdt ( } DumpAcpiHeader (Ptr); + + // As per 19.6.29 in the version 6.4 of the ACPI spec, a revision less than 2 + // restricts integers to 32 bit width. This may not be intended, raise a + // warning + #if defined (MDE_CPU_AARCH64) || defined (MDE_CPU_ARM) + if (AcpiTableRevision < 2) { + IncrementWarningCount (); + Print ( + L"WARNING: DSDT Table Revision less than 2. Integer width restricted to " + L"32 bits. Table Revision = %d.\n", + AcpiTableRevision + ); + return; + } + + #endif } -- Guid("CE165669-3EF3-493F-B85D-6190EE5B9759")
|
|
Re: [PATCH V2 3/8] EmbeddedPkg: Add AllocateRuntimePages in PrePiMemoryAllocationLib
Min Xu
Hi, Leif/Ard/Abner/Daniel
toggle quoted messageShow quoted text
Since you're maintainers/reviewers of EmbeddedPkg. Do you have any comments to this patch? Thanks Min
-----Original Message-----
|
|
Re: [PATCH V4 0/8] Enable secure-boot when lauch OVMF with -bios parameter
Gerd Hoffmann
On Wed, Jul 20, 2022 at 06:38:32AM +0000, Xu, Min M wrote:
Hi, GerdWith this in place it should be possible to allow secure boot builds for AmdSev and Microvm, that is something I plan to try for additional verification. Havn't found the time to to so, and most likely wouldn't before my summer vacation (starting next week and ending after soft freeze). Have to drop that ball I guess ... From looking at the code this all looks sane. Acked-by: Gerd Hoffmann <kraxel@...> take care, Gerd
|
|
Re: [PATCH v3 0/3] DynamicTablesPkg: Pcie generation updates
Sami Mujawar
Merged as f0064ac3afa2..19a87683654a
Thanks. Regards, Sami Mujawar
|
|
How to handle USBIO operation during FmpDxe update capsule flow?
gordontcp@...
Hi all,
The error message is
My questions are:
Thanks!
|
|
Re: [PATCH] UefiPayloadPkg: Fix RelaAddress type always mismatch in if condition
Lu, James
Hi Ray,
toggle quoted messageShow quoted text
Any comment on this patch? Thanks, James
-----Original Message-----
From: Lu, James <james.lu@...> Sent: Monday, July 11, 2022 1:06 PM To: devel@edk2.groups.io Cc: Lu, James <james.lu@...>; Ni, Ray <ray.ni@...>; Dong, Guo <guo.dong@...>; Guo, Gua <gua.guo@...> Subject: [PATCH] UefiPayloadPkg: Fix RelaAddress type always mismatch in if condition From: James Lu <james.lu@...> REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3984 Under function RolocateElfDynamic() in Elf32Lib.c if (RelaAddress == MAX_UINT64) is always FALSE while RelaAddress is UINT32 Fix is to modify if condition check to "if (RelaAddress == MAX_UINT32)" Cc: Ray Ni <ray.ni@...> Cc: Guo Dong <guo.dong@...> Cc: Gua Guo <gua.guo@...> Signed-off-by: James Lu <james.lu@...> --- UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf32Lib.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf32Lib.c b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf32Lib.c index b002c4b9cf..cb915e7142 100644 --- a/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf32Lib.c +++ b/UefiPayloadPkg/PayloadLoaderPeim/ElfLib/Elf32Lib.c @@ -292,7 +292,7 @@ RelocateElf32Dynamic ( } } - if (RelaAddress == MAX_UINT64) {+ if (RelaAddress == MAX_UINT32) { ASSERT (RelaCount == 0); ASSERT (RelaEntrySize == 0); ASSERT (RelaSize == 0);-- 2.26.2.windows.1
|
|
Re: [PATCH V4 0/8] Enable secure-boot when lauch OVMF with -bios parameter
Min Xu
Hi, Gerd
toggle quoted messageShow quoted text
Do you have any comments to this patch-set? Thanks Min
-----Original Message-----
|
|
Re: [PATCH] VirtualKeyboardFeaturePkg: Pre OS virtual keyboard touch are not working with I2C touch panel
Dandan Bi
Reviewed-by: Dandan Bi <dandan.bi@...>
toggle quoted messageShow quoted text
-----Original Message-----
From: Thangaraj, KalaiyarasanX <kalaiyarasanx.thangaraj@...> Sent: Tuesday, July 19, 2022 5:23 PM To: devel@edk2.groups.io Cc: Thangaraj, KalaiyarasanX <kalaiyarasanx.thangaraj@...>; Bi, Dandan <dandan.bi@...>; Gao, Liming <gaoliming@...>; Pethaiyan, Madhan <madhan.pethaiyan@...>; Esakkithevar, Kathappan <kathappan.esakkithevar@...>; Balaji, Madhusudhan <madhusudhan.balaji@...> Subject: [PATCH] VirtualKeyboardFeaturePkg: Pre OS virtual keyboard touch are not working with I2C touch panel Vktimer event Task Priority Level changed to TPL_CALLBACK from TPL_NOTIFY to fix Virtual Keyboard touch slowness issues and touch not working issues Cc: Dandan Bi <dandan.bi@...> Cc: Liming Gao <gaoliming@...> Cc: Madhan Pethaiyan <madhan.pethaiyan@...> Cc: Kathappan Esakkithevar <kathappan.esakkithevar@...> Cc: Madhusudhan Balaji <madhusudhan.balaji@...> Signed-off-by: KalaiyarasanX Thangaraj <kalaiyarasanx.thangaraj@...> --- Features/Intel/UserInterface/VirtualKeyboardFeaturePkg/VirtualKeyboardDxe/Keyboard.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Features/Intel/UserInterface/VirtualKeyboardFeaturePkg/VirtualKeyboardDxe/Keyboard.c b/Features/Intel/UserInterface/VirtualKeyboardFeaturePkg/VirtualKeyboardDxe/Keyboard.c index 84c3a06f68..2b1216746b 100644 --- a/Features/Intel/UserInterface/VirtualKeyboardFeaturePkg/VirtualKeyboardDxe/Keyboard.c +++ b/Features/Intel/UserInterface/VirtualKeyboardFeaturePkg/VirtualKeyb +++ oardDxe/Keyboard.c @@ -759,7 +759,7 @@ VkApiStart ( Status = gBS->CreateEvent ( EVT_TIMER | EVT_NOTIFY_SIGNAL, - TPL_VK_SYNC, + TPL_CALLBACK, VkTimer, (VOID *)VkContext, &(VkContext->TimerEvent) -- 2.26.2.windows.1
|
|
Event: TianoCore Bug Triage - APAC / NAMO - 07/19/2022
#cal-reminder
Group Notification <noreply@...>
Reminder: TianoCore Bug Triage - APAC / NAMO When: Where: Organizer: Liming Gao gaoliming@... Description: TianoCore Bug Triage - APAC / NAMO Hosted by Liming Gao
________________________________________________________________________________ Microsoft Teams meeting Join on your computer or mobile app Click here to join the meeting Join with a video conferencing device Video Conference ID: 116 062 094 0 Alternate VTC dialing instructions Or call in (audio only) +1 916-245-6934,,77463821# United States, Sacramento Phone Conference ID: 774 638 21#
|
|
Re: [Patch V2 1/1] BaseTools: remove directly calling for gcc command
Ni, Ray
Does every cc support dumpversion?
thanks,
ray
From: devel@edk2.groups.io <devel@edk2.groups.io> on behalf of Yuwei Chen <yuwei.chen@...>
Sent: Wednesday, July 20, 2022 8:21:45 AM To: devel@edk2.groups.io <devel@edk2.groups.io> Cc: Feng, Bob C <bob.c.feng@...>; Gao, Liming <gaoliming@...> Subject: [edk2-devel] [Patch V2 1/1] BaseTools: remove directly calling for gcc command In some environment, the directly calling for gcc is not supported.
This patch fixes the issue. Cc: Bob Feng <bob.c.feng@...> Cc: Liming Gao <gaoliming@...> Signed-off-by: Yuwei Chen <yuwei.chen@...> --- BaseTools/Source/C/DevicePath/GNUmakefile | 13 ++++++++----- 1 file changed, 8 insertions(+), 5 deletions(-) diff --git a/BaseTools/Source/C/DevicePath/GNUmakefile b/BaseTools/Source/C/DevicePath/GNUmakefile old mode 100644 new mode 100755 index c217674345b1..5944e80bd2b4 --- a/BaseTools/Source/C/DevicePath/GNUmakefile +++ b/BaseTools/Source/C/DevicePath/GNUmakefile @@ -13,12 +13,15 @@ OBJECTS = DevicePath.o UefiDevicePathLib.o DevicePathFromText.o DevicePathUtili include $(MAKEROOT)/Makefiles/app.makefile -GCCVERSION = $(shell gcc -dumpversion | awk -F'.' '{print $$1}') +GCCVERSION=0 +ifneq ($(CXX), gcc) + GCCVERSION = $(shell $(CXX) -dumpversion | awk -F'.' '{print $$1}') +endif ifneq ("$(GCCVERSION)", "5") -ifneq ($(CXX), llvm) -# gcc 12 trips over device path handling -BUILD_CFLAGS += -Wno-error=stringop-overflow -endif + ifneq ($(CXX), llvm) + # gcc 12 trips over device path handling + BUILD_CFLAGS += -Wno-error=stringop-overflow + endif endif LIBS = -lCommon -- 2.27.0.windows.1
|
|
Re: [edk2-platforms][PATCH V2 1/1] MinPlatformPkg: Add missing FV PCD
Reviewed-by: Nate DeSimone <nathaniel.l.desimone@...>
toggle quoted messageShow quoted text
-----Original Message-----
From: Oram, Isaac W <isaac.w.oram@...> Sent: Monday, July 18, 2022 5:15 PM To: devel@edk2.groups.io Cc: Oram, Isaac W <isaac.w.oram@...>; Chiu, Chasel <chasel.chiu@...>; Desimone, Nathaniel L <nathaniel.l.desimone@...>; Dong, Eric <eric.dong@...>; Gao, Liming <gaoliming@...> Subject: [edk2-devel][edk2-platforms][PATCH V2 1/1] MinPlatformPkg: Add missing FV PCD Add missing PCD for BSP FV Base/Size/Offsets. Cc: Chasel Chiu <chasel.chiu@...> Cc: Nate DeSimone <nathaniel.l.desimone@...> Cc: Eric Dong <eric.dong@...> Cc: Liming Gao <gaoliming@...> Signed-off-by: Isaac Oram <isaac.w.oram@...> --- Platform/Intel/MinPlatformPkg/MinPlatformPkg.dec | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/Platform/Intel/MinPlatformPkg/MinPlatformPkg.dec b/Platform/Intel/MinPlatformPkg/MinPlatformPkg.dec index 68ab1d702d..76da6f35ae 100644 --- a/Platform/Intel/MinPlatformPkg/MinPlatformPkg.dec +++ b/Platform/Intel/MinPlatformPkg/MinPlatformPkg.dec @@ -230,9 +230,17 @@ gMinPlatformPkgTokenSpaceGuid.PcdFlashFvPreMemoryBase|0x00000000|UINT32|0x20000004 gMinPlatformPkgTokenSpaceGuid.PcdFlashFvPreMemorySize|0x00000000|UINT32|0x20000005 gMinPlatformPkgTokenSpaceGuid.PcdFlashFvPreMemoryOffset|0x00000000|UINT32|0x20000006 + gMinPlatformPkgTokenSpaceGuid.PcdFlashFvBspPreMemorySize|0x00000000|UINT32|0x20000030 + gMinPlatformPkgTokenSpaceGuid.PcdFlashFvBspPreMemoryBase|0x00000000|UINT32|0x20000031 + gMinPlatformPkgTokenSpaceGuid.PcdFlashFvBspPreMemoryOffset|0x00000000|UINT32|0x20000032 + gMinPlatformPkgTokenSpaceGuid.PcdFlashFvPostMemoryBase|0x00000000|UINT32|0x20000007 gMinPlatformPkgTokenSpaceGuid.PcdFlashFvPostMemorySize|0x00000000|UINT32|0x20000008 gMinPlatformPkgTokenSpaceGuid.PcdFlashFvPostMemoryOffset|0x00000000|UINT32|0x20000009 + gMinPlatformPkgTokenSpaceGuid.PcdFlashFvBspSize|0x00000000|UINT32|0x20000033 + gMinPlatformPkgTokenSpaceGuid.PcdFlashFvBspBase|0x00000000|UINT32|0x20000034 + gMinPlatformPkgTokenSpaceGuid.PcdFlashFvBspOffset|0x00000000|UINT32|0x20000035 + gMinPlatformPkgTokenSpaceGuid.PcdFlashFvUefiBootBase|0x00000000|UINT32|0x2000000A gMinPlatformPkgTokenSpaceGuid.PcdFlashFvUefiBootSize|0x00000000|UINT32|0x2000000B gMinPlatformPkgTokenSpaceGuid.PcdFlashFvUefiBootOffset|0x00000000|UINT32|0x2000000C -- 2.36.1.windows.1
|
|