|
[edk2-platforms][PATCH V3 6/6] Platform/Sgi: add SMMU and timer entries to memory description table
Add PCDs for base address and address space size for generic timer and SMMU controllers. Use those PCDs to add platform memory map entries. The ServerReady SBSA tests, when executed, accesses these co
Add PCDs for base address and address space size for generic timer and SMMU controllers. Use those PCDs to add platform memory map entries. The ServerReady SBSA tests, when executed, accesses these co
|
By Pranav Madhu
·
|
|
[edk2-platforms][PATCH V3 5/6] Platform/Sgi: define PCD for timer interrupt numbers
The generic timer and watchdog timer interrupt numbers on the RD-N2 platform is different than those on the other platforms supported by SgiPkg. So in order to reuse the existing GTDT ACPI table for a
The generic timer and watchdog timer interrupt numbers on the RD-N2 platform is different than those on the other platforms supported by SgiPkg. So in order to reuse the existing GTDT ACPI table for a
|
By Pranav Madhu
·
|
|
[edk2-platforms][PATCH V3 4/6] Platform/Sgi: update ACPI table revision
Fix the ACPI DSDT/SSDT table version numbers. As per ACPI 6.3 specification, the DSDT/SSDT table should use version 2 instead of 1. In addition to this, update 'PcdAcpiExposedTableVersions' to avoid b
Fix the ACPI DSDT/SSDT table version numbers. As per ACPI 6.3 specification, the DSDT/SSDT table should use version 2 instead of 1. In addition to this, update 'PcdAcpiExposedTableVersions' to avoid b
|
By Pranav Madhu
·
|
|
[edk2-platforms][PATCH V3 3/6] Platform/Sgi: fix CPU acpi-id for RD-V1-MC platform
Fix the incorrect ACPI _UID (Unique ID) object for CPU devices listed for the RD-V1-MC platform. Signed-off-by: Pranav Madhu <pranav.madhu@...> Reviewed-by: Sami Mujawar <sami.mujawar@...> --- Platfor
Fix the incorrect ACPI _UID (Unique ID) object for CPU devices listed for the RD-V1-MC platform. Signed-off-by: Pranav Madhu <pranav.madhu@...> Reviewed-by: Sami Mujawar <sami.mujawar@...> --- Platfor
|
By Pranav Madhu
·
|
|
[edk2-platforms][PATCH V3 2/6] Platform/Sgi: fix the list of CPU devices on RD-V1-MC platform
RD-V1-MC platform has four CPUs in each of its four coherently connected chips. So remove a incorrect CPU device entry in DSDT table that lists a additional non-existent CPU. Signed-off-by: Pranav Mad
RD-V1-MC platform has four CPUs in each of its four coherently connected chips. So remove a incorrect CPU device entry in DSDT table that lists a additional non-existent CPU. Signed-off-by: Pranav Mad
|
By Pranav Madhu
·
|
|
[edk2-platforms][PATCH V3 1/6] Platform/Sgi: include SSDT table for RD-V1 platform
Ssdt ACPI table in SgiPkg describes the PCIe controller and the root complex resources. Include this table for RD-V1 and RD-V1-MC platforms. Signed-off-by: Pranav Madhu <pranav.madhu@...> Reviewed-by:
Ssdt ACPI table in SgiPkg describes the PCIe controller and the root complex resources. Include this table for RD-V1 and RD-V1-MC platforms. Signed-off-by: Pranav Madhu <pranav.madhu@...> Reviewed-by:
|
By Pranav Madhu
·
|
|
[EXTERNAL] Re: [edk2-devel] [GSoC proposal] Secure Image Loader
As always, we volunteer the UEFI Talkbox Discord for conversations of this nature. 😉 https://discord.gg/cuqjER3Juw - Bret
As always, we volunteer the UEFI Talkbox Discord for conversations of this nature. 😉 https://discord.gg/cuqjER3Juw - Bret
|
By Bret Barkelew
·
|
|
[EXTERNAL] [edk2-devel] Build Failed for QEMU35Pkg 3 messages
Bret, If I understand correctly the CI list is the recommended versions, but not the required versions. Do we have any concept of the required versions? I guess we could put a python assert to enforce
Bret, If I understand correctly the CI list is the recommended versions, but not the required versions. Do we have any concept of the required versions? I guess we could put a python assert to enforce
|
By Andrew Fish
·
|
|
[PATCH v1 1/1] UefiCpuPkg: PiSmmCpuDxeSmm: Check buffer size before accessing 4 messages
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3283 Current SMM Save State routine does not check the number of bytes to be read, when it comse to read IO_INFO, before casting the incoming buffer
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3283 Current SMM Save State routine does not check the number of bytes to be read, when it comse to read IO_INFO, before casting the incoming buffer
|
By Kun Qin
·
|
|
[PATCH v1 1/1] MdeModulePkg: Initialize temp variable in VarCheckPolicyLib 3 messages
DumpVariablePolicy() will return EFI_INVALID_PARAMETER if the Buffer pointer is NULL and the indirect Size is anything but 0. Since this TempSize was not being initialized it is very likely that this
DumpVariablePolicy() will return EFI_INVALID_PARAMETER if the Buffer pointer is NULL and the indirect Size is anything but 0. Since this TempSize was not being initialized it is very likely that this
|
By Bret Barkelew
·
|
|
[PATCH] IntelSiliconPkg/ShadowMicrocode: Fix build failure 2 messages
The commit 7e4c6f982a0accd5aa86337b46d20199db989aeb updated ShadowMicrocode module to consume MicrocodeLib. But the change caused the build failure. The patch fixed the build failure and also verified
The commit 7e4c6f982a0accd5aa86337b46d20199db989aeb updated ShadowMicrocode module to consume MicrocodeLib. But the change caused the build failure. The patch fixed the build failure and also verified
|
By Ni, Ray
·
|
|
[PATCH v1 1/1] Fix AsmReadMsr64() and AsmWriteMsr64() with GCC toolchain
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3325 1. AsmReadMsr64() in X64/GccInlinePriv.c AsmReadMsr64 can return uninitialized value if FilterBeforeMsrRead returns False. This causes build er
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3325 1. AsmReadMsr64() in X64/GccInlinePriv.c AsmReadMsr64 can return uninitialized value if FilterBeforeMsrRead returns False. This causes build er
|
By Takuto Naito
·
|
|
[PATCH v1 0/1] Fix AsmReadMsr64() and AsmWriteMsr64() with GCC toolchain
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3325 This patch fixes the problems of AsmReadMsr64/AsmWriteMsr64 for the GCC toolchain introduced when RegisterFilterLib support was added. Patch v1
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3325 This patch fixes the problems of AsmReadMsr64/AsmWriteMsr64 for the GCC toolchain introduced when RegisterFilterLib support was added. Patch v1
|
By Takuto Naito
·
|
|
[PATCH v3 5/7] OvmfPkg/XenPlatformPei: Map extra physical address
Some information available in a Xen guest can be mapped anywhere in the physical address space and they don't need to be backed by RAM. For example, the shared info page. While it's easier to put thos
Some information available in a Xen guest can be mapped anywhere in the physical address space and they don't need to be backed by RAM. For example, the shared info page. While it's easier to put thos
|
By Anthony PERARD
·
|
|
[PATCH v3 3/7] OvmfPkg/IndustryStandard/Xen: Apply EDK2 coding style to XEN_VCPU_TIME_INFO
We are going to use new fields from the Xen headers. Apply the EDK2 coding style so that the code that is going to use it doesn't look out of place. Ref: https://bugzilla.tianocore.org/show_bug.cgi?id
We are going to use new fields from the Xen headers. Apply the EDK2 coding style so that the code that is going to use it doesn't look out of place. Ref: https://bugzilla.tianocore.org/show_bug.cgi?id
|
By Anthony PERARD
·
|
|
[PATCH v3 2/7] MdePkg: Allow PcdFSBClock to by Dynamic
We are going to want to change the value of PcdFSBClock at run time in OvmfXen, so move it to the PcdsDynamic section. Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=2490 Signed-off-by: Anthony P
We are going to want to change the value of PcdFSBClock at run time in OvmfXen, so move it to the PcdsDynamic section. Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=2490 Signed-off-by: Anthony P
|
By Anthony PERARD
·
|
|
[PATCH v3 1/7] OvmfPkg/XenResetVector: Silent a warning from nasm
To avoid nasm generating a warning, replace the macro by the value expected to be stored in eax. Ia32/XenPVHMain.asm:76: warning: dword data exceeds bounds Reported-by: Laszlo Ersek <lersek@...> Signe
To avoid nasm generating a warning, replace the macro by the value expected to be stored in eax. Ia32/XenPVHMain.asm:76: warning: dword data exceeds bounds Reported-by: Laszlo Ersek <lersek@...> Signe
|
By Anthony PERARD
·
|
|
[edk2-platforms][PATCH V2 6/6] Platform/Sgi: add SMMU and timer entries to memory description table 2 messages
Add PCDs for base address and address space size for generic timer and SMMU controllers. Use those PCDs to add platform memory map entries. The ServerReady SBSA tests, when executed, accesses these co
Add PCDs for base address and address space size for generic timer and SMMU controllers. Use those PCDs to add platform memory map entries. The ServerReady SBSA tests, when executed, accesses these co
|
By Pranav Madhu
·
|
|
[edk2-platforms][PATCH V2 5/6] Platform/Sgi: define PCD for timer interrupt numbers 2 messages
The generic timer and watchdog timer interrupt numbers on the RD-N2 platform is different than those on the other platforms supported by SgiPkg. So in order to reuse the existing GTDT ACPI table for a
The generic timer and watchdog timer interrupt numbers on the RD-N2 platform is different than those on the other platforms supported by SgiPkg. So in order to reuse the existing GTDT ACPI table for a
|
By Pranav Madhu
·
|
|
[edk2-platforms][PATCH V2 3/6] Platform/Sgi: fix CPU acpi-id for RD-V1-MC platform 2 messages
Fix the incorrect ACPI _UID (Unique ID) object for CPU devices listed for the RD-V1-MC platform. Signed-off-by: Pranav Madhu <pranav.madhu@...> --- Platform/ARM/SgiPkg/AcpiTables/RdV1Mc/Madt.aslc | 24
Fix the incorrect ACPI _UID (Unique ID) object for CPU devices listed for the RD-V1-MC platform. Signed-off-by: Pranav Madhu <pranav.madhu@...> --- Platform/ARM/SgiPkg/AcpiTables/RdV1Mc/Madt.aslc | 24
|
By Pranav Madhu
·
|