From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [63.128.21.124]) by mx.groups.io with SMTP id smtpd.web10.9811.1601972709849399303 for ; Tue, 06 Oct 2020 01:25:10 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=a2R9lqJE; spf=pass (domain: redhat.com, ip: 63.128.21.124, mailfrom: lersek@redhat.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1601972709; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=IvayVRfW8FxiKWatHCcTb9MSw7HviAF0FwuUGusDlpo=; b=a2R9lqJE0dApXQ6nP4vbaS+eFqAEO9AcvM6a2EKjswgEWDrH46meS3NqcjsImfAG75FuO4 o6OnCdZrB1vKR/Eawq3Eyd5mKVvqT7icqjbNHkn7uNaeiLaVrBnAurq5vsgT3Eg48ZJJ/S Bd7TV+GOJmv2ob10uD7f0psWLpOJ8Sk= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-280-iRzjz0r9MH2rDMeNu413nQ-1; Tue, 06 Oct 2020 04:25:05 -0400 X-MC-Unique: iRzjz0r9MH2rDMeNu413nQ-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 8E33118A8224; Tue, 6 Oct 2020 08:25:03 +0000 (UTC) Received: from lacos-laptop-7.usersys.redhat.com (ovpn-112-235.ams2.redhat.com [10.36.112.235]) by smtp.corp.redhat.com (Postfix) with ESMTP id 25C487369B; Tue, 6 Oct 2020 08:25:00 +0000 (UTC) Subject: Re: [edk2-devel] [PATCH v1 1/1] UefipayloadPkg: Protect coreboot tables To: Marcello Sylvester Bauer Cc: devel@edk2.groups.io, "Desimone, Nathaniel L" , "Zeng, Star" , "Leif Lindholm (Nuvia address)" , Andrew Fish , Michael Kinney , Maurice Ma , Dong Guo , "You, Benjamin" References: <20200708120125.24344-1-marcello.bauer@9elements.com> <20200708120125.24344-2-marcello.bauer@9elements.com> <65d39699-fc22-8362-ddb3-8c04e7129f5a@redhat.com> From: "Laszlo Ersek" Message-ID: <9eea4b23-f8b1-8c30-3a49-71dec8ce9789@redhat.com> Date: Tue, 6 Oct 2020 10:25:00 +0200 MIME-Version: 1.0 In-Reply-To: X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=lersek@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Hi Marcello, On 10/05/20 17:34, Marcello Sylvester Bauer wrote: > On Thu, Oct 1, 2020 at 12:24 PM Laszlo Ersek wrote: > >> On 09/14/20 19:32, Guo Dong wrote: >>> >>> OK. Let me merge this patch firstly. /Guo >> >> The PR at failed 17 days >> ago and there have been no updates since, as far as I can tell. I've >> closed the PR for now. >> >> Thanks >> Laszlo >> > > "Mergify / Rule: Automatically merge a PR when all required checks pass and > 'push' label is present (merge)" is > the only that failed, because mergify thinks it has no rights to update the > base branch (tianocore/master). > I don't understand why. What should I do? I don't know -- I've seen this issue before, and it seems like a bug in github / mergify. In some cases, when all of the other checks pass, this check suddenly flips to "OK" as well, and then the series is merged. I'm now actually tempted to merge this patch for you (in Guo Dong's absence). However, Guo Dong never posted an Acked-by or Reviewed-by to the list, while reviewing this patch. So I cannot merge the patch for you. ... In fact, the commit that Guo Dong tried to merge: https://github.com/tianocore/edk2/pull/924/commits/3f61e8ba9750d66430835fe5812c4329a1f4c2ec doesn't even have any kind of R-b or A-b feedback tag in the commit message. Guo Dong only edited the PR description -- that's where he added his R-b. That is a complete failure of the development process, and it's *just as well* that the PR failed -- for whatever reason. One of the UefiPayloadPkg maintainers (Maurice Ma, Guo Dong, Benjamin You) needs to approve the patch ON THE LIST, and then any maintainer with push access can merge the patch for you. Sorry about this mess, Laszlo > > Thanks > Marcello > >>> >>> From: Marcello Sylvester Bauer >>> Sent: Monday, September 14, 2020 2:00 AM >>> To: Dong, Guo >>> Cc: devel@edk2.groups.io; Ma, Maurice ; Desimone, >> Nathaniel L ; Zeng, Star < >> star.zeng@intel.com> >>> Subject: Re: [edk2-devel] [PATCH v1 1/1] UefipayloadPkg: Protect >> coreboot tables >>> >>> Hi Guo, >>> >>> Sounds like a good proposal, but it would be great to merge this change >> temporarily. >>> In some cases of the current implementation edk2 does override the >> memory area, where the coreboot table pointer is located. >>> Therefore the kernel and cbmem tool is not able to locate the tables >> anymore. >>> >>> Thanks, >>> Marcello >>> >>> On Tue, Sep 8, 2020 at 11:40 PM Dong, Guo > guo.dong@intel.com>> wrote: >>> >>> Hi Marcello, >>> >>> In the UEFI payload, we should not hardcoded any memory usage. It means >> UEFI payload should use the memory map whatever reported from the >> bootloader. I plan to remove this hardcoded memory usage soon. >>> Before that, it is OK for me to merge this change if you want. >>> BTW, did you see any issue with current implement? >>> >>> Thanks, >>> Guo >>> >>>> -----Original Message----- >>>> From: devel@edk2.groups.io < >> devel@edk2.groups.io> On Behalf Of Marcello >>>> Sylvester Bauer >>>> Sent: Wednesday, July 8, 2020 5:01 AM >>>> To: devel@edk2.groups.io >>>> Cc: Ma, Maurice >; >> Desimone, Nathaniel L >>>> >; >> Zeng, Star > >>>> Subject: [edk2-devel] [PATCH v1 1/1] UefipayloadPkg: Protect coreboot >> tables >>>> >>>> From: Patrick Rudolph > patrick.rudolph@9elements.com>> >>>> >>>> Signed-off-by: Patrick Rudolph > patrick.rudolph@9elements.com>> >>>> Signed-off-by: Marcello Sylvester Bauer > > >>>> Cc: Maurice Ma > >>>> Cc: Nate DeSimone > nathaniel.l.desimone@intel.com>> >>>> Cc: Star Zeng > >>>> --- >>>> UefiPayloadPkg/BlSupportPei/BlSupportPei.c | 26 ++++++++++++++------ >>>> 1 file changed, 19 insertions(+), 7 deletions(-) >>>> >>>> diff --git a/UefiPayloadPkg/BlSupportPei/BlSupportPei.c >>>> b/UefiPayloadPkg/BlSupportPei/BlSupportPei.c >>>> index 22972453117a..b3ff065a537e 100644 >>>> --- a/UefiPayloadPkg/BlSupportPei/BlSupportPei.c >>>> +++ b/UefiPayloadPkg/BlSupportPei/BlSupportPei.c >>>> @@ -390,24 +390,36 @@ BlPeiEntryPoint ( >>>> EFI_PEI_GRAPHICS_DEVICE_INFO_HOB GfxDeviceInfo; >>>> >>>> EFI_PEI_GRAPHICS_DEVICE_INFO_HOB *NewGfxDeviceInfo; >>>> >>>> >>>> >>>> - >>>> >>>> - // >>>> >>>> - // Report lower 640KB of RAM. Attribute EFI_RESOURCE_ATTRIBUTE_TESTED >>>> >>>> - // is intentionally omitted to prevent erasing of the coreboot header >>>> >>>> - // record before it is processed by ParseMemoryInfo. >>>> >>>> + // Report lower 640KB of RAM. >>>> >>>> + // Mark memory as reserved to keep coreboot header in place. >>>> >>>> // >>>> >>>> BuildResourceDescriptorHob ( >>>> >>>> - EFI_RESOURCE_SYSTEM_MEMORY, >>>> >>>> + EFI_RESOURCE_MEMORY_RESERVED, >>>> >>>> ( >>>> >>>> EFI_RESOURCE_ATTRIBUTE_PRESENT | >>>> >>>> EFI_RESOURCE_ATTRIBUTE_INITIALIZED | >>>> >>>> + EFI_RESOURCE_ATTRIBUTE_TESTED | >>>> >>>> EFI_RESOURCE_ATTRIBUTE_UNCACHEABLE | >>>> >>>> EFI_RESOURCE_ATTRIBUTE_WRITE_COMBINEABLE | >>>> >>>> EFI_RESOURCE_ATTRIBUTE_WRITE_THROUGH_CACHEABLE | >>>> >>>> EFI_RESOURCE_ATTRIBUTE_WRITE_BACK_CACHEABLE >>>> >>>> ), >>>> >>>> (EFI_PHYSICAL_ADDRESS)(0), >>>> >>>> - (UINT64)(0xA0000) >>>> >>>> + (UINT64)(0x1000) >>>> >>>> + ); >>>> >>>> + >>>> >>>> + BuildResourceDescriptorHob ( >>>> >>>> + EFI_RESOURCE_SYSTEM_MEMORY, >>>> >>>> + ( >>>> >>>> + EFI_RESOURCE_ATTRIBUTE_PRESENT | >>>> >>>> + EFI_RESOURCE_ATTRIBUTE_INITIALIZED | >>>> >>>> + EFI_RESOURCE_ATTRIBUTE_UNCACHEABLE | >>>> >>>> + EFI_RESOURCE_ATTRIBUTE_WRITE_COMBINEABLE | >>>> >>>> + EFI_RESOURCE_ATTRIBUTE_WRITE_THROUGH_CACHEABLE | >>>> >>>> + EFI_RESOURCE_ATTRIBUTE_WRITE_BACK_CACHEABLE >>>> >>>> + ), >>>> >>>> + (EFI_PHYSICAL_ADDRESS)(0x1000), >>>> >>>> + (UINT64)(0x9F000) >>>> >>>> ); >>>> >>>> >>>> >>>> BuildResourceDescriptorHob ( >>>> >>>> -- >>>> 2.27.0 >>>> >>>> >>>> -=-=-=-=-=-= >>>> Groups.io Links: You receive all messages sent to this group. >>>> >>>> View/Reply Online (#62229): >> https://edk2.groups.io/g/devel/message/62229 >>>> Mute This Topic: https://groups.io/mt/75374752/1781375 >>>> Group Owner: devel+owner@edk2.groups.io> devel%2Bowner@edk2.groups.io> >>>> Unsubscribe: https://edk2.groups.io/g/devel/unsub [guo.dong@intel.com >> ] >>>> -=-=-=-=-=-= >>> >>> >>> -- >>> [Marcello Sylvester Bauer] >>> >>> [http://static.9elements.com/logo-signature.png] >>> 9elements Agency GmbH, Kortumstraße 19-21, 44787 Bochum, Germany >>> Email: [DEINE EMAIL ADDRESSE]< >> https://static.9elements.com/email_signatur.html> >>> Phone: +49 234 68 94 188 >>> Mobile: +49 1722847618 >>> >>> Sitz der Gesellschaft: Bochum >>> Handelsregister: Amtsgericht Bochum, HRB 17519 >>> Geschäftsführung: Sebastian Deutsch, Eray Basar >>> >>> Datenschutzhinweise nach Art. 13 DSGVO >>> >>> >>> >> >> >