|
Re: UEFI terminal console keyboard type extend for Putty
Liming,
All the three types will be introduced.
By the way, fix one typo 'F4' for VT400 map key should be 'ESC [ 1 4 ~'.
Thanks,
Zhichao
Sent: Friday, September 6, 2019 3:51 PM
To: Gao, Zhichao
Liming,
All the three types will be introduced.
By the way, fix one typo 'F4' for VT400 map key should be 'ESC [ 1 4 ~'.
Thanks,
Zhichao
Sent: Friday, September 6, 2019 3:51 PM
To: Gao, Zhichao
|
By
Gao, Zhichao
·
#121
·
|
|
Re: UEFI terminal console keyboard type extend for Putty
Zhichao:
One clarification. What terminal type will be introduced? Xterm, VT400 and Linux?
Thanks
Liming
Sent: Friday, September 06, 2019 12:56 PM
To: rfc@edk2.groups.io
Cc: devel@edk2.groups.io;
Zhichao:
One clarification. What terminal type will be introduced? Xterm, VT400 and Linux?
Thanks
Liming
Sent: Friday, September 06, 2019 12:56 PM
To: rfc@edk2.groups.io
Cc: devel@edk2.groups.io;
|
By
Liming Gao
·
#120
·
|
|
UEFI terminal console keyboard type extend for Putty
Hi everyone,
Putty is a popular terminal console software in windows and it support various types of terminal keyboard type. I would like to add most of the type support. Here is the key map info.
Hi everyone,
Putty is a popular terminal console software in windows and it support various types of terminal keyboard type. I would like to add most of the type support. Here is the key map info.
|
By
Gao, Zhichao
·
#119
·
|
|
[PATCH] q35: lpc: allow to lock down 128K RAM at default SMBASE address
lpc already has SMI negotiation feature, extend it by adding
optin ICH9_LPC_SMI_F_LOCKED_SMBASE_BIT to supported features.
Writing this bit into "etc/smi/requested-features" fw_cfg file,
tells QEMU
lpc already has SMI negotiation feature, extend it by adding
optin ICH9_LPC_SMI_F_LOCKED_SMBASE_BIT to supported features.
Writing this bit into "etc/smi/requested-features" fw_cfg file,
tells QEMU
|
By
Igor Mammedov <imammedo@...>
·
#118
·
|
|
Re: [Qemu-devel] [edk2-rfc] [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Laszlo Ersek <lersek@...> wrote:
I guess we at point where patch is better then words, I'll send one as reply here shortly.
I've just implemented subset of above (opened, closed+locked).
I
Laszlo Ersek <lersek@...> wrote:
I guess we at point where patch is better then words, I'll send one as reply here shortly.
I've just implemented subset of above (opened, closed+locked).
I
|
By
Igor Mammedov <imammedo@...>
·
#117
·
|
|
Re: [Qemu-devel] [edk2-rfc] [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
I think TSEG-like behavior is between these two. That is, I believe we
should have explicit open/close/lock operations. And, when the range is
closed (meaning, closed+unlocked, or closed+locked), then
I think TSEG-like behavior is between these two. That is, I believe we
should have explicit open/close/lock operations. And, when the range is
closed (meaning, closed+unlocked, or closed+locked), then
|
By
Laszlo Ersek
·
#116
·
|
|
Re: [edk2-devel] [RFC] EDK II Continuous Integration Phase 1
In other projects I've worked on, patch owners initiate the pre-commit
build/test, and either comment on the review (ideally with link to the
results) about its status, or have the CI system comment
In other projects I've worked on, patch owners initiate the pre-commit
build/test, and either comment on the review (ideally with link to the
results) about its status, or have the CI system comment
|
By
rebecca@...
·
#115
·
|
|
Re: [Qemu-devel] [edk2-rfc] [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Laszlo Ersek <lersek@...> wrote:
yep, I'm looking at it from theoretical perspective so far,
but what could be done in reality might be limited.
it could be stolen RAM + black hole like
Laszlo Ersek <lersek@...> wrote:
yep, I'm looking at it from theoretical perspective so far,
but what could be done in reality might be limited.
it could be stolen RAM + black hole like
|
By
Igor Mammedov <imammedo@...>
·
#114
·
|
|
Re: [Qemu-devel] [edk2-rfc] [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Laszlo Ersek <lersek@...> wrote:
currently there is no SMRAM at 0x30000, so all access falls through
into RAM address space and we are about to change that.
but firmware doesn't have to use
Laszlo Ersek <lersek@...> wrote:
currently there is no SMRAM at 0x30000, so all access falls through
into RAM address space and we are about to change that.
but firmware doesn't have to use
|
By
Igor Mammedov <imammedo@...>
·
#113
·
|
|
Re: [edk2-devel] [RFC] EDK II Continuous Integration Phase 1
I'll let Mike respond.
Thanks
Laszlo
I'll let Mike respond.
Thanks
Laszlo
|
By
Laszlo Ersek
·
#112
·
|
|
Re: [Qemu-devel] [edk2-rfc] [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
I'm sure you are *technically* right, but you seem to be assuming that I
can modify or rearrange anything I want in edk2. :)
If we can solve the above in OVMF platform code, that's great. If
I'm sure you are *technically* right, but you seem to be assuming that I
can modify or rearrange anything I want in edk2. :)
If we can solve the above in OVMF platform code, that's great. If
|
By
Laszlo Ersek
·
#111
·
|
|
Re: [edk2-devel] [RFC] EDK II Continuous Integration Phase 1
Laszlo/Mike,
The idea that the maintainer must create the PR is fighting the optimized github PR flow. Github and PRs process is optimized for letting everyone contribute from "their" fork while
Laszlo/Mike,
The idea that the maintainer must create the PR is fighting the optimized github PR flow. Github and PRs process is optimized for letting everyone contribute from "their" fork while
|
By
Sean
·
#110
·
|
|
Re: [edk2-devel] [RFC] EDK II Continuous Integration Phase 1
I believe this can work if:
- the submitter has a github account
- the maintainer knows the submitter's account name
- the maintainer manually subscribes the submitter to the PR
(I have never tried
I believe this can work if:
- the submitter has a github account
- the maintainer knows the submitter's account name
- the maintainer manually subscribes the submitter to the PR
(I have never tried
|
By
Laszlo Ersek
·
#109
·
|
|
Re: [edk2-devel] [RFC] EDK II Continuous Integration Phase 1
By
Ni, Ray
·
#108
·
|
|
Re: [edk2-devel] [RFC] EDK II Continuous Integration Phase 1
I don't see this as a huge change, relative to the current process.
Before, it's always been up to the subsys maintainer to apply & rebase
the patches locally, pick up the feedback tags, and run at
I don't see this as a huge change, relative to the current process.
Before, it's always been up to the subsys maintainer to apply & rebase
the patches locally, pick up the feedback tags, and run at
|
By
Laszlo Ersek
·
#107
·
|
|
Re: [edk2-devel] [RFC] EDK II Continuous Integration Phase 1
Can someone draw a flow chart of who does what to help clarify?
It sounds like maintainers are going to be the very important bridges between CI system and the patch owners (developers). Important it
Can someone draw a flow chart of who does what to help clarify?
It sounds like maintainers are going to be the very important bridges between CI system and the patch owners (developers). Important it
|
By
Ni, Ray
·
#106
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
This sounds convincing enough, for the hotplugged CPU; thanks.
So now my concern is with step (01). While preparing for the initial
relocation (of cold-plugged CPUs), the code assumes the memory at
This sounds convincing enough, for the hotplugged CPU; thanks.
So now my concern is with step (01). While preparing for the initial
relocation (of cold-plugged CPUs), the code assumes the memory at
|
By
Laszlo Ersek
·
#105
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Laszlo Ersek <lersek@...> wrote:
It sure can but this way it won't get access to privileged SMRAM
so OS can't subvert firmware.
The next time SMI broadcast is sent the CPU will use SMI handler
Laszlo Ersek <lersek@...> wrote:
It sure can but this way it won't get access to privileged SMRAM
so OS can't subvert firmware.
The next time SMI broadcast is sent the CPU will use SMI handler
|
By
Igor Mammedov <imammedo@...>
·
#104
·
|
|
Re: [RFC] EDK II Continuous Integration Phase 1
Sorry, I was thinking the evaluation I was doing was having the entire
CI run in Jenkins, not only the boot testing. I don't have the array of
hardware you'd want for boot testing, just mostly large
Sorry, I was thinking the evaluation I was doing was having the entire
CI run in Jenkins, not only the boot testing. I don't have the array of
hardware you'd want for boot testing, just mostly large
|
By
rebecca@...
·
#103
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
In step (03), it is the OS that handles the SCI; it transfers control to
ACPI. The AML can write to IO port 0xB2 only because the OS allows it.
If the OS decides to omit that step, and sends an
In step (03), it is the OS that handles the SCI; it transfers control to
ACPI. The AML can write to IO port 0xB2 only because the OS allows it.
If the OS decides to omit that step, and sends an
|
By
Laszlo Ersek
·
#102
·
|