From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-ot1-f50.google.com (mail-ot1-f50.google.com [209.85.210.50]) by mx.groups.io with SMTP id smtpd.web11.2790.1648069594260024945 for ; Wed, 23 Mar 2022 14:06:34 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=M4ZhXI4b; spf=pass (domain: gmail.com, ip: 209.85.210.50, mailfrom: kingsumos@gmail.com) Received: by mail-ot1-f50.google.com with SMTP id x8-20020a9d6288000000b005b22c373759so1940484otk.8 for ; Wed, 23 Mar 2022 14:06:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=F4rQ5ZgfDTHpa5FZskR6tWa5aDmRkRG8prK/3baexFQ=; b=M4ZhXI4bOvKh4AmX4kokfSRgkoJoPgu3MQbl+UyADGcY62yz3+9BdX+hKLevMp+MYP Bgj+DYv3NFwcXdGA1+nL65q3slNyAd6i0n+q3SOivFem9rFJL3i86yWvA/lOtsr1ncPB 8ky1PfNJZk3eoDZcJH2s46A7eC51JQ3PHh8Sq0+Bvq5x+ZvwCqCyiB+UVUW+YpNPX37F FABeA73wUf+Wi+KW2pXgXbPvJBXcJkA++2zyVE/B+SHamXYeLXS0kkLrIWQ1VGlrjS+L K1Ugz/y8yaV3F4dLDaMdPy5AemGDjmCb7MtJ2fnJr4omjSaMCA6nRXedwfAIkhUKVC/1 hLwg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=F4rQ5ZgfDTHpa5FZskR6tWa5aDmRkRG8prK/3baexFQ=; b=S/i5tlkJahyJIETCqRBc7C9KrcCypqWmWOaZic1hgvhTrxe+yciieZ33KsSRLTHac/ rrkrWCed6R8EmgyCqpE1gltNuw9SFeHkXanbSH0s2stcQpXf7Z6xgQPb3A5doSk0hsko +jPifhCBSsFnDHfeFUMuH9vKRw9TNLllV+ynyp5bYmyXcwjJEqCOelB05hJAAk+97mMT barEoLdE83h/vEwvClm4yAMYxo8/DLBauz6lxXit5mKmtYpOZaHI23jqcl40bPFuxqh1 X7HBaW96fmWIF8NUXoWy6tIsPX7/HY5WsE+qtj837Q4c7Q+GcAH64nBKPaoGrEpxcUpC lgQQ== X-Gm-Message-State: AOAM530qgmIWwknharxT+V/9YIExWUWD6T2//LcWXRXxE595Lo7VXYjk cNnSqCuhqUBuGKGw+B+jQkfltJjbbaBTIsZPJNgjw7ioP4I= X-Google-Smtp-Source: ABdhPJzHeRl1WMcNakGRw+SQ3i+MInnYOLnD1ODbGh0O0OwZDPArLiwDWSPX+j6Ik7xqXjxaKJoeqxL+UdoLEH90VjU= X-Received: by 2002:a9d:2084:0:b0:5cd:9dd9:ed87 with SMTP id x4-20020a9d2084000000b005cd9dd9ed87mr847715ota.237.1648069593500; Wed, 23 Mar 2022 14:06:33 -0700 (PDT) MIME-Version: 1.0 References: <6952.1648065135281733577@groups.io> In-Reply-To: <6952.1648065135281733577@groups.io> From: "King Sumo" Date: Wed, 23 Mar 2022 18:06:22 -0300 Message-ID: Subject: Re: [edk2-devel] [PATCH 5/5] UefiPayloadPkg: Add support for Firmware Volume Block Protocol To: devel@edk2.groups.io, sean@starlabs.systems Cc: Guo Dong Content-Type: multipart/alternative; boundary="000000000000af8ea605dae91a2c" --000000000000af8ea605dae91a2c Content-Type: text/plain; charset="UTF-8" Looks like for Guo's patch SMMSTORE driver is not needed since it implements a SpiFlashLib for accessing the SPI Flash controller (via hardware sequencer) of Intel CPU targets... But this is for Universal Payload only right? I guess coreboot supports only the non-universal mode. This stuff was tested only in SBL right? On Wed, Mar 23, 2022 at 4:52 PM Sean Rhodes wrote: > Hey Guo > > To have the parselib and not SMMSTORE support is a bit of a paradox; > coreboot isn't fully functional without one. I think moving this and any > subsequent patches into edk2-platforms will inevitably lead to forks, which > isn't beneficial to anyone. > > Is there any method (or ideally exception ;) ) you can suggest for > allowing bootloader specific patches? > > Many thanks > > Sean > > > --000000000000af8ea605dae91a2c Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Looks like for Guo's patch SMMSTORE driver is not need= ed since it implements a=C2=A0SpiFlashLib for accessing the SPI Flash contr= oller (via hardware sequencer) of Intel CPU targets...
But this is for = Universal Payload only right? I guess coreboot supports only the non-univer= sal mode.
This stuff was tested only in SBL right?
On Wed, M= ar 23, 2022 at 4:52 PM Sean Rhodes <sean@starlabs.systems> wrote:
=
Hey Guo

To h= ave the parselib and not SMMSTORE support is a bit of a paradox; coreboot i= sn't fully functional without one. I think moving this and any subseque= nt patches into edk2-platforms will inevitably lead to forks, which isn'= ;t beneficial to anyone.

Is there any method (or ideally exception ;= ) ) you can suggest for allowing bootloader specific patches?

Many t= hanks

Sean =20

--000000000000af8ea605dae91a2c--