|
Re: [RFC] EDK II Continuous Integration Phase 1
Mike, as you mentioned we have been working towards enabling a practical and extensible CI for Edk2 using Azure dev ops and the recently added edk2-pytool infrastructure. We have been using similar
Mike, as you mentioned we have been working towards enabling a practical and extensible CI for Edk2 using Azure dev ops and the recently added edk2-pytool infrastructure. We have been using similar
|
By
Sean
·
#96
·
|
|
Re: [edk2-devel] [RFC] EDK II Continuous Integration Phase 1
Hi Michael,
would it make sense to run SCT (using UnixHost and/or qemu) to verify
the high level logic or do you think that would be too much to do for
each PR?
Also, do we want to run all these
Hi Michael,
would it make sense to run SCT (using UnixHost and/or qemu) to verify
the high level logic or do you think that would be too much to do for
each PR?
Also, do we want to run all these
|
By
Michael Zimmermann <sigmaepsilon92@...>
·
#95
·
|
|
Re: [edk2-devel] [RFC] EDK II Continuous Integration Phase 1
Hi Michael,
SCTs are in scope. It is only deciding when they get run
and how much pre-commit execution time developers are
willing to wait for a pass/fail result.
The on-demand testing feature is
Hi Michael,
SCTs are in scope. It is only deciding when they get run
and how much pre-commit execution time developers are
willing to wait for a pass/fail result.
The on-demand testing feature is
|
By
Michael D Kinney
·
#94
·
|
|
[RFC] EDK II Continuous Integration Phase 1
Hello,
This is a proposal for a first step towards continuous
integration for all TianoCore repositories to help
improve to quality of commits and automate testing and
release processes for all EDK
Hello,
This is a proposal for a first step towards continuous
integration for all TianoCore repositories to help
improve to quality of commits and automate testing and
release processes for all EDK
|
By
Michael D Kinney
·
#93
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
That used to be the case (and it is still the default QEMU behavior, if
broadcast SMI is not negotiated). However, OVMF does negotiate broadcast
SMI whenever QEMU offers the feature. Broadcast SMI is
That used to be the case (and it is still the default QEMU behavior, if
broadcast SMI is not negotiated). However, OVMF does negotiate broadcast
SMI whenever QEMU offers the feature. Broadcast SMI is
|
By
Laszlo Ersek
·
#92
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
That helps. Thanks for the quote!
Sounds like a great idea.
I believe this this change may not be cross-compatible between QEMU and
OVMF. OVMF platform code would have to hide the stolen part of the
That helps. Thanks for the quote!
Sounds like a great idea.
I believe this this change may not be cross-compatible between QEMU and
OVMF. OVMF platform code would have to hide the stolen part of the
|
By
Laszlo Ersek
·
#91
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Laszlo Ersek <lersek@...> wrote:
from SDM vol 3:
"
34.5.1 Initial SMM Execution Environment
After saving the current context of the processor, the processor initializes its core registers to
Laszlo Ersek <lersek@...> wrote:
from SDM vol 3:
"
34.5.1 Initial SMM Execution Environment
After saving the current context of the processor, the processor initializes its core registers to
|
By
Igor Mammedov <imammedo@...>
·
#90
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
The TSEG base calculation is not trivial in this environment. The 32-bit
RAM size needs to be read from the CMOS (IO port accesses). Then the
extended TSEG size (if any) needs to be detected from PCI
The TSEG base calculation is not trivial in this environment. The 32-bit
RAM size needs to be read from the CMOS (IO port accesses). Then the
extended TSEG size (if any) needs to be detected from PCI
|
By
Laszlo Ersek
·
#89
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
"Yao, Jiewen" <jiewen.yao@...> wrote:
Here are some ideas I have on the topic.
*) In light of using dedicated SMRAM at 30000 with pre-configured
relocation vector for initial relocation which
"Yao, Jiewen" <jiewen.yao@...> wrote:
Here are some ideas I have on the topic.
*) In light of using dedicated SMRAM at 30000 with pre-configured
relocation vector for initial relocation which
|
By
Igor Mammedov <imammedo@...>
·
#88
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Laszlo Ersek <lersek@...> wrote:
Do we need anything complex in relocation handler, though?
From what I'd imagine, minimum handler should
1: get address of TSEG, possibly read it from
Laszlo Ersek <lersek@...> wrote:
Do we need anything complex in relocation handler, though?
From what I'd imagine, minimum handler should
1: get address of TSEG, possibly read it from
|
By
Igor Mammedov <imammedo@...>
·
#87
·
|
|
Re: [POC Seabios PATCH] seabios: use isolated SMM address space for relocation
OK, I then misunderstood the purpose of this demo. I thought you were
not supposed to be able to read it from either location in non-SMM mode.
Thanks for the explanation.
-boris
OK, I then misunderstood the purpose of this demo. I thought you were
not supposed to be able to read it from either location in non-SMM mode.
Thanks for the explanation.
-boris
|
By
Boris Ostrovsky <boris.ostrovsky@...>
·
#86
·
|
|
Re: [POC Seabios PATCH] seabios: use isolated SMM address space for relocation
Boris Ostrovsky <boris.ostrovsky@...> wrote:
^^^ reads using 0x30000 base in non-SMM mode
^^^ reads from SMRAM temporarily aliased at 0xa0000 in non-SMM mode
^^^ reads using 0x30000 base in
Boris Ostrovsky <boris.ostrovsky@...> wrote:
^^^ reads using 0x30000 base in non-SMM mode
^^^ reads from SMRAM temporarily aliased at 0xa0000 in non-SMM mode
^^^ reads using 0x30000 base in
|
By
Igor Mammedov <imammedo@...>
·
#85
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
"without a stack" looks very risky to me. Even if we manage to implement
the guest code initially, we'll be trapped without a stack, should we
ever need to add more complex stuff there.
I expressed
"without a stack" looks very risky to me. Even if we manage to implement
the guest code initially, we'll be trapped without a stack, should we
ever need to add more complex stuff there.
I expressed
|
By
Laszlo Ersek
·
#84
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
It would be great if you could check.
If real hardware does it at the chipset level, we will probably use
Igor's suggestion of aliasing A-seg to 3000:0000. Before starting the
new CPU, the SMI
It would be great if you could check.
If real hardware does it at the chipset level, we will probably use
Igor's suggestion of aliasing A-seg to 3000:0000. Before starting the
new CPU, the SMI
|
By
Paolo Bonzini <pbonzini@...>
·
#83
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Actually there is also an SMBASE MSR, even though in current silicon
it's read-only and its use is theoretically limited to SMM-transfer
monitors. If that MSR could be made accessible somehow outside
Actually there is also an SMBASE MSR, even though in current silicon
it's read-only and its use is theoretically limited to SMM-transfer
monitors. If that MSR could be made accessible somehow outside
|
By
Paolo Bonzini <pbonzini@...>
·
#82
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
I give my thought.
Paolo may add more.
I give my thought.
Paolo may add more.
|
By
Yao, Jiewen
·
#81
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Hi Jiewen,
If a hot add CPU needs to run any code before the
first SMI, I would recommend is only executes code
from a write protected FLASH range without a stack
and then wait for the first
Hi Jiewen,
If a hot add CPU needs to run any code before the
first SMI, I would recommend is only executes code
from a write protected FLASH range without a stack
and then wait for the first
|
By
Michael D Kinney
·
#80
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
(1) Sorry, my _DMA quote was a detour from QEMU -- I wondered how a
physical machine with actual RAM at 0x30000, and also chipset level
protection against DMA to/from that RAM range, would expose the
(1) Sorry, my _DMA quote was a detour from QEMU -- I wondered how a
physical machine with actual RAM at 0x30000, and also chipset level
protection against DMA to/from that RAM range, would expose the
|
By
Laszlo Ersek
·
#79
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Thank you Mike!
That is good reference on the real hardware behavior. (Glad it is public.)
For threat model, the unique part in virtual environment is temp RAM.
The temp RAM in real platform is per
Thank you Mike!
That is good reference on the real hardware behavior. (Glad it is public.)
For threat model, the unique part in virtual environment is temp RAM.
The temp RAM in real platform is per
|
By
Yao, Jiewen
·
#78
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Paolo,
I find the following links related to the discussions here
along with one example feature called
Paolo,
I find the following links related to the discussions here
along with one example feature called
|
By
Michael D Kinney
·
#77
·
|