From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from walk.intel-email.com (walk.intel-email.com [101.227.64.242]) by mx.groups.io with SMTP id smtpd.web08.309.1668127315137091229 for ; Thu, 10 Nov 2022 16:41:55 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@byosoft.com.cn header.s=cloud-union header.b=Mk90yJXC; spf=pass (domain: byosoft.com.cn, ip: 101.227.64.242, mailfrom: gaoliming@byosoft.com.cn) Received: from walk.intel-email.com (localhost [127.0.0.1]) by walk.intel-email.com (Postfix) with ESMTP id EAF7ECD1F683 for ; Fri, 11 Nov 2022 08:41:52 +0800 (CST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=byosoft.com.cn; s=cloud-union; t=1668127313; bh=XLsUOsdp+JIK0iDlqgMW1rTRKmM1gIPTXa5eboyIJ+k=; h=From:To:Cc:References:In-Reply-To:Subject:Date; b=Mk90yJXCITZX/zF0G1S+nBZHa+O8F0S/uUj0N9i2Ah/eWyTDm3L4mNE3PXnwYaP06 TskFhiPXYkvnk6QQ8LSSEkXosXjILTStAfPlkCXUUG4Nh51zobi3wAiQTZaVVA7NSM Y+8COb6cu39+tOK3PJUx+cTknPq3NMwrfh7vtBsI= Received: from localhost (localhost [127.0.0.1]) by walk.intel-email.com (Postfix) with ESMTP id E6CF8CD1F6DA for ; Fri, 11 Nov 2022 08:41:52 +0800 (CST) Received: from walk.intel-email.com (localhost [127.0.0.1]) by walk.intel-email.com (Postfix) with ESMTP id BCCA6CD1F6BA for ; Fri, 11 Nov 2022 08:41:52 +0800 (CST) Authentication-Results: walk.intel-email.com; none Received: from mail.byosoft.com.cn (mail.byosoft.com.cn [58.240.74.242]) by walk.intel-email.com (Postfix) with SMTP id 46F90CD1F688 for ; Fri, 11 Nov 2022 08:41:49 +0800 (CST) Received: from DESKTOPS6D0PVI ([58.246.60.130]) (envelope-sender ) by 192.168.6.13 with ESMTP for ; Fri, 11 Nov 2022 08:41:40 +0800 X-WM-Sender: gaoliming@byosoft.com.cn X-Originating-IP: 58.246.60.130 X-WM-AuthFlag: YES X-WM-AuthUser: gaoliming@byosoft.com.cn From: "gaoliming" To: "'Ard Biesheuvel'" , Cc: "'Rebecca Cran'" , "'Pierre Gondois'" , "'Leif Lindholm'" , "'Sami Mujawar'" , "'Gerd Hoffmann'" , "'Jason A . Donenfeld'" References: <20221110134738.3798618-1-ardb@kernel.org> In-Reply-To: <20221110134738.3798618-1-ardb@kernel.org> Subject: =?UTF-8?B?5Zue5aSNOiBbUEFUQ0ggMC8zXSBPVk1GOiBzdXBwb3J0IEVGSV9STkdfUFJPVE9DT0wgd2l0aG91dCB2aXJ0aW8tcm5n?= Date: Fri, 11 Nov 2022 08:41:42 +0800 Message-ID: <00de01d8f566$5e842ee0$1b8c8ca0$@byosoft.com.cn> MIME-Version: 1.0 X-Mailer: Microsoft Outlook 16.0 Thread-Index: AQHQOjmFg/tx3IWZqHkFKqMjCxgigK5KWA/Q Sender: "gaoliming" Content-Type: text/plain; charset="gb2312" Content-Transfer-Encoding: quoted-printable Content-Language: zh-cn Ard: The first patch is the bug fix. I agree to merge it for this stable = tag. I will help merge it today.=20 Thanks Liming > -----=D3=CA=BC=FE=D4=AD=BC=FE----- > =B7=A2=BC=FE=C8=CB: Ard Biesheuvel > =B7=A2=CB=CD=CA=B1=BC=E4: 2022=C4=EA11=D4=C210=C8=D5 21:48 > =CA=D5=BC=FE=C8=CB: devel@edk2.groups.io > =B3=AD=CB=CD: Ard Biesheuvel ; Liming Gao > ; Rebecca Cran ; Pierre > Gondois ; Leif Lindholm > ; Sami Mujawar ; > Gerd Hoffmann ; Jason A . Donenfeld > > =D6=F7=CC=E2: [PATCH 0/3] OVMF: support EFI_RNG_PROTOCOL without = virtio-rng >=20 > Currently, we only expose EFI_RNG_PROTOCOL when running under QEMU if > it >=20 > exposes a virtio-rng device. This means that generic EFI apps or >=20 > loaders have no access to an entropy source if this device is >=20 > unavailable, unless they implement their own arch-specific handling to >=20 > figure out whether any CPU instructions or monitor calls can be used >=20 > instead. >=20 >=20 >=20 > So let's wire those up as EFI_RNG_PROTOCOL implementations as well, >=20 > using the existing drivers and libraries. >=20 >=20 >=20 > First patch is a bugfix - Liming, mind if I merge that right away? >=20 > Thanks. >=20 >=20 >=20 > Cc: Liming Gao >=20 > Cc: Rebecca Cran >=20 > Cc: Pierre Gondois >=20 > Cc: Leif Lindholm >=20 > Cc: Sami Mujawar >=20 > Cc: Gerd Hoffmann >=20 > Cc: Jason A. Donenfeld >=20 >=20 >=20 > Ard Biesheuvel (3): >=20 > ArmPkg/ArmTrngLib: Fix incorrect GUID reference in DEBUG() output >=20 > ArmVirtPkg/ArmVirtQemu: Expose TRNG hypercall via RngDxe if >=20 > implemented >=20 > OvmfPkg/OvmfX86: Enable RDRAND based EFI_RNG_PROTOCOL > implementation >=20 >=20 >=20 > ArmPkg/Library/ArmTrngLib/ArmTrngLib.c | 2 +- >=20 > ArmVirtPkg/ArmVirtQemu.dsc | 11 +++++++++++ >=20 > ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc | 5 +++++ >=20 > ArmVirtPkg/ArmVirtQemuKernel.dsc | 11 +++++++++++ >=20 > OvmfPkg/OvmfPkgIa32.dsc | 1 + >=20 > OvmfPkg/OvmfPkgIa32.fdf | 1 + >=20 > OvmfPkg/OvmfPkgIa32X64.dsc | 1 + >=20 > OvmfPkg/OvmfPkgIa32X64.fdf | 1 + >=20 > OvmfPkg/OvmfPkgX64.dsc | 1 + >=20 > OvmfPkg/OvmfPkgX64.fdf | 1 + >=20 > 10 files changed, 34 insertions(+), 1 deletion(-) >=20 >=20 >=20 > -- >=20 > 2.35.1 >=20 >=20