From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from walk.intel-email.com (walk.intel-email.com [101.227.64.242]) by mx.groups.io with SMTP id smtpd.web08.1786.1668138802290764382 for ; Thu, 10 Nov 2022 19:53:23 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@byosoft.com.cn header.s=cloud-union header.b=nCXwrExG; spf=pass (domain: byosoft.com.cn, ip: 101.227.64.242, mailfrom: gaoliming@byosoft.com.cn) Received: from walk.intel-email.com (localhost [127.0.0.1]) by walk.intel-email.com (Postfix) with ESMTP id 22232CD1F6D0 for ; Fri, 11 Nov 2022 11:53:19 +0800 (CST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=byosoft.com.cn; s=cloud-union; t=1668138799; bh=X4wr7lauXmV/z75rarU5+l+/ard9DnUNFXDMRd25+dc=; h=From:To:Cc:References:In-Reply-To:Subject:Date; b=nCXwrExGSFI6z+LFBG1KoIG56b72uXPuZcZdaZ5uoXP6/cTxdgP0g+B+m1DXfPRRX 05W3daI90r+Ff3K3G11jItthCQhytJxt8ZDOqij/HF4pRnlq0pzr/Pzjg//ZizhAXY qRDaDrAbGJtVQSmpJmXEuUBqNlmUKP5eqB+WB6pw= Received: from localhost (localhost [127.0.0.1]) by walk.intel-email.com (Postfix) with ESMTP id 1EFEACD1F6CA for ; Fri, 11 Nov 2022 11:53:19 +0800 (CST) Received: from walk.intel-email.com (localhost [127.0.0.1]) by walk.intel-email.com (Postfix) with ESMTP id E9138CD1F688 for ; Fri, 11 Nov 2022 11:53:18 +0800 (CST) Authentication-Results: walk.intel-email.com; none Received: from mail.byosoft.com.cn (mail.byosoft.com.cn [58.240.74.242]) by walk.intel-email.com (Postfix) with SMTP id 8916BCD1F6B8 for ; Fri, 11 Nov 2022 11:53:16 +0800 (CST) Received: from DESKTOPS6D0PVI ([58.246.60.130]) (envelope-sender ) by 192.168.6.13 with ESMTP for ; Fri, 11 Nov 2022 11:53:07 +0800 X-WM-Sender: gaoliming@byosoft.com.cn X-Originating-IP: 58.246.60.130 X-WM-AuthFlag: YES X-WM-AuthUser: gaoliming@byosoft.com.cn From: "gaoliming" To: , , "'Ard Biesheuvel'" Cc: "'Rebecca Cran'" , "'Pierre Gondois'" , "'Leif Lindholm'" , "'Sami Mujawar'" , "'Gerd Hoffmann'" , "'Jason A . Donenfeld'" References: <20221110134738.3798618-1-ardb@kernel.org> <172660F4A69E435E.25609@groups.io> In-Reply-To: <172660F4A69E435E.25609@groups.io> Subject: =?UTF-8?B?5Zue5aSNOiBbZWRrMi1kZXZlbF0g5Zue5aSNOiBbUEFUQ0ggMC8zXSBPVk1GOiBzdXBwb3J0IEVGSV9STkdfUFJPVE9DT0wgd2l0aG91dCB2aXJ0aW8tcm5n?= Date: Fri, 11 Nov 2022 11:53:09 +0800 Message-ID: <016901d8f581$1d60d060$58227120$@byosoft.com.cn> MIME-Version: 1.0 X-Mailer: Microsoft Outlook 16.0 Thread-Index: AQHQOjmFg/tx3IWZqHkFKqMjCxgigAGe20wLrj2W2cA= Sender: "gaoliming" Content-Type: text/plain; charset="gb2312" Content-Transfer-Encoding: quoted-printable Content-Language: zh-cn It has been merged at c8fb7240469b5753773da4fa5710b870b790c363 Thanks Liming > -----=D3=CA=BC=FE=D4=AD=BC=FE----- > =B7=A2=BC=FE=C8=CB: devel@edk2.groups.io =B4=FA=B1= =ED gaoliming via > groups.io > =B7=A2=CB=CD=CA=B1=BC=E4: 2022=C4=EA11=D4=C211=C8=D5 8:42 > =CA=D5=BC=FE=C8=CB: 'Ard Biesheuvel' ; devel@edk2.groups= .io > =B3=AD=CB=CD: 'Rebecca Cran' ; 'Pierre Gondois' > ; 'Leif Lindholm' ; > 'Sami Mujawar' ; 'Gerd Hoffmann' > ; 'Jason A . Donenfeld' > =D6=F7=CC=E2: [edk2-devel] =BB=D8=B8=B4: [PATCH 0/3] OVMF: support EFI_RN= G_PROTOCOL > without virtio-rng >=20 > Ard: > The first patch is the bug fix. I agree to merge it for this stable tag= . I > will help merge it today. >=20 > Thanks > Liming > > -----=D3=CA=BC=FE=D4=AD=BC=FE----- > > =B7=A2=BC=FE=C8=CB: Ard Biesheuvel > > =B7=A2=CB=CD=CA=B1=BC=E4: 2022=C4=EA11=D4=C210=C8=D5 21:48 > > =CA=D5=BC=FE=C8=CB: devel@edk2.groups.io > > =B3=AD=CB=CD: Ard Biesheuvel ; Liming Gao > > ; Rebecca Cran ; Pierre > > Gondois ; Leif Lindholm > > ; Sami Mujawar ; > > Gerd Hoffmann ; Jason A . Donenfeld > > > > =D6=F7=CC=E2: [PATCH 0/3] OVMF: support EFI_RNG_PROTOCOL without virtio= -rng > > > > Currently, we only expose EFI_RNG_PROTOCOL when running under QEMU > if > > it > > > > exposes a virtio-rng device. This means that generic EFI apps or > > > > loaders have no access to an entropy source if this device is > > > > unavailable, unless they implement their own arch-specific handling to > > > > figure out whether any CPU instructions or monitor calls can be used > > > > instead. > > > > > > > > So let's wire those up as EFI_RNG_PROTOCOL implementations as well, > > > > using the existing drivers and libraries. > > > > > > > > First patch is a bugfix - Liming, mind if I merge that right away? > > > > Thanks. > > > > > > > > Cc: Liming Gao > > > > Cc: Rebecca Cran > > > > Cc: Pierre Gondois > > > > Cc: Leif Lindholm > > > > Cc: Sami Mujawar > > > > Cc: Gerd Hoffmann > > > > Cc: Jason A. Donenfeld > > > > > > > > Ard Biesheuvel (3): > > > > ArmPkg/ArmTrngLib: Fix incorrect GUID reference in DEBUG() output > > > > ArmVirtPkg/ArmVirtQemu: Expose TRNG hypercall via RngDxe if > > > > implemented > > > > OvmfPkg/OvmfX86: Enable RDRAND based EFI_RNG_PROTOCOL > > implementation > > > > > > > > ArmPkg/Library/ArmTrngLib/ArmTrngLib.c | 2 +- > > > > ArmVirtPkg/ArmVirtQemu.dsc | 11 +++++++++++ > > > > ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc | 5 +++++ > > > > ArmVirtPkg/ArmVirtQemuKernel.dsc | 11 +++++++++++ > > > > OvmfPkg/OvmfPkgIa32.dsc | 1 + > > > > OvmfPkg/OvmfPkgIa32.fdf | 1 + > > > > OvmfPkg/OvmfPkgIa32X64.dsc | 1 + > > > > OvmfPkg/OvmfPkgIa32X64.fdf | 1 + > > > > OvmfPkg/OvmfPkgX64.dsc | 1 + > > > > OvmfPkg/OvmfPkgX64.fdf | 1 + > > > > 10 files changed, 34 insertions(+), 1 deletion(-) > > > > > > > > -- > > > > 2.35.1 > > > > >=20 >=20 >=20 >=20 >=20 >=20 >=20