public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Ard Biesheuvel" <ard.biesheuvel@linaro.org>
To: Laszlo Ersek <lersek@redhat.com>
Cc: edk2-devel-groups-io <devel@edk2.groups.io>,
	"Igor Mammedov" <imammedo@redhat.com>,
	"Jiewen Yao" <jiewen.yao@intel.com>,
	"Jordan Justen" <jordan.l.justen@intel.com>,
	"Michael Kinney" <michael.d.kinney@intel.com>,
	"Philippe Mathieu-Daudé" <philmd@redhat.com>
Subject: Re: [PATCH v2 10/16] OvmfPkg/CpuHotplugSmm: collect CPUs with events
Date: Mon, 2 Mar 2020 14:58:06 +0100	[thread overview]
Message-ID: <CAKv+Gu-pgvAgM-x3Kw1cLWYhrF6Zp+DKk__ACVrJE0aVwaWdsw@mail.gmail.com> (raw)
In-Reply-To: <20200226221156.29589-11-lersek@redhat.com>

On Wed, 26 Feb 2020 at 23:12, Laszlo Ersek <lersek@redhat.com> wrote:
>
> Call QemuCpuhpCollectApicIds() in the root MMI handler. The APIC IDs of
> the hotplugged CPUs will be used for several purposes in subsequent
> patches.
>
> For calling QemuCpuhpCollectApicIds(), pre-allocate both of its output
> arrays "PluggedApicIds" and "ToUnplugApicIds" in the driver's entry point
> function. The allocation size is dictated by the possible CPU count, which
> we fetch from "CPU_HOT_PLUG_DATA.ArrayLength".
>
> The CPU_HOT_PLUG_DATA structure in SMRAM is an out-of-band information
> channel between this driver and PiSmmCpuDxeSmm, underlying
> EFI_SMM_CPU_SERVICE_PROTOCOL.
>
> In order to consume "CPU_HOT_PLUG_DATA.ArrayLength", extend the driver's
> DEPEX to EFI_SMM_CPU_SERVICE_PROTOCOL. PiSmmCpuDxeSmm stores the address
> of CPU_HOT_PLUG_DATA to "PcdCpuHotPlugDataAddress", before it produces
> EFI_SMM_CPU_SERVICE_PROTOCOL.
>
> Stash the protocol at once, as it will be needed later.
>
> Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
> Cc: Igor Mammedov <imammedo@redhat.com>
> Cc: Jiewen Yao <jiewen.yao@intel.com>
> Cc: Jordan Justen <jordan.l.justen@intel.com>
> Cc: Michael Kinney <michael.d.kinney@intel.com>
> Cc: Philippe Mathieu-Daudé <philmd@redhat.com>
> Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1512
> Signed-off-by: Laszlo Ersek <lersek@redhat.com>
> Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>

Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>

> ---
>
> Notes:
>     v2:
>
>     - Pick up Ard's Acked-by, which is conditional on approval from Intel
>       reviewers on Cc. (I'd like to save Ard the churn of re-acking
>       unmodified patches.)
>
>  OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf |   7 +-
>  OvmfPkg/CpuHotplugSmm/CpuHotplug.c      | 111 +++++++++++++++++++-
>  2 files changed, 115 insertions(+), 3 deletions(-)
>
> diff --git a/OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf b/OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf
> index ab690a9e5e20..31c1ee1c9f6d 100644
> --- a/OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf
> +++ b/OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf
> @@ -11,41 +11,46 @@ [Defines]
>    PI_SPECIFICATION_VERSION   = 0x00010046                            # PI-1.7.0
>    BASE_NAME                  = CpuHotplugSmm
>    FILE_GUID                  = 84EEA114-C6BE-4445-8F90-51D97863E363
>    MODULE_TYPE                = DXE_SMM_DRIVER
>    ENTRY_POINT                = CpuHotplugEntry
>
>  #
>  # The following information is for reference only and not required by the build
>  # tools.
>  #
>  # VALID_ARCHITECTURES        = IA32 X64
>  #
>
>  [Sources]
>    ApicId.h
>    CpuHotplug.c
>    QemuCpuhp.c
>    QemuCpuhp.h
>
>  [Packages]
>    MdePkg/MdePkg.dec
>    OvmfPkg/OvmfPkg.dec
> +  UefiCpuPkg/UefiCpuPkg.dec
>
>  [LibraryClasses]
>    BaseLib
>    DebugLib
>    MmServicesTableLib
>    PcdLib
> +  SafeIntLib
>    UefiDriverEntryPoint
>
>  [Protocols]
>    gEfiMmCpuIoProtocolGuid                                           ## CONSUMES
> +  gEfiSmmCpuServiceProtocolGuid                                     ## CONSUMES
>
>  [Pcd]
> +  gUefiCpuPkgTokenSpaceGuid.PcdCpuHotPlugDataAddress                ## CONSUMES
>    gUefiOvmfPkgTokenSpaceGuid.PcdQ35SmramAtDefaultSmbase             ## CONSUMES
>
>  [FeaturePcd]
>    gUefiOvmfPkgTokenSpaceGuid.PcdSmmSmramRequire                     ## CONSUMES
>
>  [Depex]
> -  gEfiMmCpuIoProtocolGuid
> +  gEfiMmCpuIoProtocolGuid AND
> +  gEfiSmmCpuServiceProtocolGuid
> diff --git a/OvmfPkg/CpuHotplugSmm/CpuHotplug.c b/OvmfPkg/CpuHotplugSmm/CpuHotplug.c
> index 5df8c689c63a..42e023cb85c0 100644
> --- a/OvmfPkg/CpuHotplugSmm/CpuHotplug.c
> +++ b/OvmfPkg/CpuHotplugSmm/CpuHotplug.c
> @@ -1,46 +1,76 @@
>  /** @file
>    Root SMI handler for VCPU hotplug SMIs.
>
>    Copyright (c) 2020, Red Hat, Inc.
>
>    SPDX-License-Identifier: BSD-2-Clause-Patent
>  **/
>
> +#include <CpuHotPlugData.h>                  // CPU_HOT_PLUG_DATA
>  #include <IndustryStandard/Q35MchIch9.h>     // ICH9_APM_CNT
>  #include <IndustryStandard/QemuCpuHotplug.h> // QEMU_CPUHP_CMD_GET_PENDING
>  #include <Library/BaseLib.h>                 // CpuDeadLoop()
>  #include <Library/DebugLib.h>                // ASSERT()
>  #include <Library/MmServicesTableLib.h>      // gMmst
>  #include <Library/PcdLib.h>                  // PcdGetBool()
> +#include <Library/SafeIntLib.h>              // SafeUintnSub()
>  #include <Protocol/MmCpuIo.h>                // EFI_MM_CPU_IO_PROTOCOL
> +#include <Protocol/SmmCpuService.h>          // EFI_SMM_CPU_SERVICE_PROTOCOL
>  #include <Uefi/UefiBaseType.h>               // EFI_STATUS
>
> +#include "ApicId.h"                          // APIC_ID
>  #include "QemuCpuhp.h"                       // QemuCpuhpWriteCpuSelector()
>
>  //
>  // We use this protocol for accessing IO Ports.
>  //
>  STATIC EFI_MM_CPU_IO_PROTOCOL *mMmCpuIo;
>  //
> +// The following protocol is used to report the addition or removal of a CPU to
> +// the SMM CPU driver (PiSmmCpuDxeSmm).
> +//
> +STATIC EFI_SMM_CPU_SERVICE_PROTOCOL *mMmCpuService;
> +//
> +// This structure is a communication side-channel between the
> +// EFI_SMM_CPU_SERVICE_PROTOCOL consumer (i.e., this driver) and provider
> +// (i.e., PiSmmCpuDxeSmm).
> +//
> +STATIC CPU_HOT_PLUG_DATA *mCpuHotPlugData;
> +//
> +// SMRAM arrays for fetching the APIC IDs of processors with pending events (of
> +// known event types), for the time of just one MMI.
> +//
> +// The lifetimes of these arrays match that of this driver only because we
> +// don't want to allocate SMRAM at OS runtime, and potentially fail (or
> +// fragment the SMRAM map).
> +//
> +// These arrays provide room for ("possible CPU count" minus one) APIC IDs
> +// each, as we don't expect every possible CPU to appear, or disappear, in a
> +// single MMI. The numbers of used (populated) elements in the arrays are
> +// determined on every MMI separately.
> +//
> +STATIC APIC_ID *mPluggedApicIds;
> +STATIC APIC_ID *mToUnplugApicIds;
> +//
>  // Represents the registration of the CPU Hotplug MMI handler.
>  //
>  STATIC EFI_HANDLE mDispatchHandle;
>
>
>  /**
>    CPU Hotplug MMI handler function.
>
>    This is a root MMI handler.
>
>    @param[in] DispatchHandle      The unique handle assigned to this handler by
>                                   EFI_MM_SYSTEM_TABLE.MmiHandlerRegister().
>
>    @param[in] Context             Context passed in by
>                                   EFI_MM_SYSTEM_TABLE.MmiManage(). Due to
>                                   CpuHotplugMmi() being a root MMI handler,
>                                   Context is ASSERT()ed to be NULL.
>
>    @param[in,out] CommBuffer      Ignored, due to CpuHotplugMmi() being a root
>                                   MMI handler.
>
>    @param[in,out] CommBufferSize  Ignored, due to CpuHotplugMmi() being a root
> @@ -65,162 +95,239 @@ STATIC EFI_HANDLE mDispatchHandle;
>                                                but other handlers should still
>                                                be called.
>
>    @retval EFI_WARN_INTERRUPT_SOURCE_PENDING   The MMI source is still pending,
>                                                and other handlers should still
>                                                be called.
>
>    @retval EFI_INTERRUPT_PENDING               The MMI source could not be
>                                                quiesced.
>  **/
>  STATIC
>  EFI_STATUS
>  EFIAPI
>  CpuHotplugMmi (
>    IN EFI_HANDLE DispatchHandle,
>    IN CONST VOID *Context        OPTIONAL,
>    IN OUT VOID   *CommBuffer     OPTIONAL,
>    IN OUT UINTN  *CommBufferSize OPTIONAL
>    )
>  {
>    EFI_STATUS Status;
>    UINT8      ApmControl;
> +  UINT32     PluggedCount;
> +  UINT32     ToUnplugCount;
>
>    //
>    // Assert that we are entering this function due to our root MMI handler
>    // registration.
>    //
>    ASSERT (DispatchHandle == mDispatchHandle);
>    //
>    // When MmiManage() is invoked to process root MMI handlers, the caller (the
>    // MM Core) is expected to pass in a NULL Context. MmiManage() then passes
>    // the same NULL Context to individual handlers.
>    //
>    ASSERT (Context == NULL);
>    //
>    // Read the MMI command value from the APM Control Port, to see if this is an
>    // MMI we should care about.
>    //
>    Status = mMmCpuIo->Io.Read (mMmCpuIo, MM_IO_UINT8, ICH9_APM_CNT, 1,
>                            &ApmControl);
>    if (EFI_ERROR (Status)) {
>      DEBUG ((DEBUG_ERROR, "%a: failed to read ICH9_APM_CNT: %r\n", __FUNCTION__,
>        Status));
>      //
>      // We couldn't even determine if the MMI was for us or not.
>      //
>      goto Fatal;
>    }
>
>    if (ApmControl != ICH9_APM_CNT_CPU_HOTPLUG) {
>      //
>      // The MMI is not for us.
>      //
>      return EFI_WARN_INTERRUPT_SOURCE_QUIESCED;
>    }
>
> +  //
> +  // Collect the CPUs with pending events.
> +  //
> +  Status = QemuCpuhpCollectApicIds (
> +             mMmCpuIo,
> +             mCpuHotPlugData->ArrayLength,     // PossibleCpuCount
> +             mCpuHotPlugData->ArrayLength - 1, // ApicIdCount
> +             mPluggedApicIds,
> +             &PluggedCount,
> +             mToUnplugApicIds,
> +             &ToUnplugCount
> +             );
> +  if (EFI_ERROR (Status)) {
> +    goto Fatal;
> +  }
> +  if (ToUnplugCount > 0) {
> +    DEBUG ((DEBUG_ERROR, "%a: hot-unplug is not supported yet\n",
> +      __FUNCTION__));
> +    goto Fatal;
> +  }
> +
>    //
>    // We've handled this MMI.
>    //
>    return EFI_SUCCESS;
>
>  Fatal:
>    ASSERT (FALSE);
>    CpuDeadLoop ();
>    //
>    // We couldn't handle this MMI.
>    //
>    return EFI_INTERRUPT_PENDING;
>  }
>
>
>  //
>  // Entry point function of this driver.
>  //
>  EFI_STATUS
>  EFIAPI
>  CpuHotplugEntry (
>    IN EFI_HANDLE       ImageHandle,
>    IN EFI_SYSTEM_TABLE *SystemTable
>    )
>  {
>    EFI_STATUS Status;
> +  UINTN      Size;
>
>    //
>    // This module should only be included when SMM support is required.
>    //
>    ASSERT (FeaturePcdGet (PcdSmmSmramRequire));
>    //
>    // This driver depends on the dynamically detected "SMRAM at default SMBASE"
>    // feature.
>    //
>    if (!PcdGetBool (PcdQ35SmramAtDefaultSmbase)) {
>      return EFI_UNSUPPORTED;
>    }
>
>    //
>    // Errors from here on are fatal; we cannot allow the boot to proceed if we
>    // can't set up this driver to handle CPU hotplug.
>    //
>    // First, collect the protocols needed later. All of these protocols are
>    // listed in our module DEPEX.
>    //
>    Status = gMmst->MmLocateProtocol (&gEfiMmCpuIoProtocolGuid,
>                      NULL /* Registration */, (VOID **)&mMmCpuIo);
>    if (EFI_ERROR (Status)) {
>      DEBUG ((DEBUG_ERROR, "%a: locate MmCpuIo: %r\n", __FUNCTION__, Status));
>      goto Fatal;
>    }
> +  Status = gMmst->MmLocateProtocol (&gEfiSmmCpuServiceProtocolGuid,
> +                    NULL /* Registration */, (VOID **)&mMmCpuService);
> +  if (EFI_ERROR (Status)) {
> +    DEBUG ((DEBUG_ERROR, "%a: locate MmCpuService: %r\n", __FUNCTION__,
> +      Status));
> +    goto Fatal;
> +  }
> +
> +  //
> +  // Our DEPEX on EFI_SMM_CPU_SERVICE_PROTOCOL guarantees that PiSmmCpuDxeSmm
> +  // has pointed PcdCpuHotPlugDataAddress to CPU_HOT_PLUG_DATA in SMRAM.
> +  //
> +  mCpuHotPlugData = (VOID *)(UINTN)PcdGet64 (PcdCpuHotPlugDataAddress);
> +  if (mCpuHotPlugData == NULL) {
> +    Status = EFI_NOT_FOUND;
> +    DEBUG ((DEBUG_ERROR, "%a: CPU_HOT_PLUG_DATA: %r\n", __FUNCTION__, Status));
> +    goto Fatal;
> +  }
> +  //
> +  // If the possible CPU count is 1, there's nothing for this driver to do.
> +  //
> +  if (mCpuHotPlugData->ArrayLength == 1) {
> +    return EFI_UNSUPPORTED;
> +  }
> +  //
> +  // Allocate the data structures that depend on the possible CPU count.
> +  //
> +  if (RETURN_ERROR (SafeUintnSub (mCpuHotPlugData->ArrayLength, 1, &Size)) ||
> +      RETURN_ERROR (SafeUintnMult (sizeof (APIC_ID), Size, &Size))) {
> +    Status = EFI_ABORTED;
> +    DEBUG ((DEBUG_ERROR, "%a: invalid CPU_HOT_PLUG_DATA\n", __FUNCTION__));
> +    goto Fatal;
> +  }
> +  Status = gMmst->MmAllocatePool (EfiRuntimeServicesData, Size,
> +                    (VOID **)&mPluggedApicIds);
> +  if (EFI_ERROR (Status)) {
> +    DEBUG ((DEBUG_ERROR, "%a: MmAllocatePool(): %r\n", __FUNCTION__, Status));
> +    goto Fatal;
> +  }
> +  Status = gMmst->MmAllocatePool (EfiRuntimeServicesData, Size,
> +                    (VOID **)&mToUnplugApicIds);
> +  if (EFI_ERROR (Status)) {
> +    DEBUG ((DEBUG_ERROR, "%a: MmAllocatePool(): %r\n", __FUNCTION__, Status));
> +    goto ReleasePluggedApicIds;
> +  }
>
>    //
>    // Sanity-check the CPU hotplug interface.
>    //
>    // Both of the following features are part of QEMU 5.0, introduced primarily
>    // in commit range 3e08b2b9cb64..3a61c8db9d25:
>    //
>    // (a) the QEMU_CPUHP_CMD_GET_ARCH_ID command of the modern CPU hotplug
>    //     interface,
>    //
>    // (b) the "SMRAM at default SMBASE" feature.
>    //
>    // From these, (b) is restricted to 5.0+ machine type versions, while (a)
>    // does not depend on machine type version. Because we ensured the stricter
>    // condition (b) through PcdQ35SmramAtDefaultSmbase above, the (a)
>    // QEMU_CPUHP_CMD_GET_ARCH_ID command must now be available too. While we
>    // can't verify the presence of precisely that command, we can still verify
>    // (sanity-check) that the modern interface is active, at least.
>    //
>    // Consult the "Typical usecases | Detecting and enabling modern CPU hotplug
>    // interface" section in QEMU's "docs/specs/acpi_cpu_hotplug.txt", on the
>    // following.
>    //
>    QemuCpuhpWriteCpuSelector (mMmCpuIo, 0);
>    QemuCpuhpWriteCpuSelector (mMmCpuIo, 0);
>    QemuCpuhpWriteCommand (mMmCpuIo, QEMU_CPUHP_CMD_GET_PENDING);
>    if (QemuCpuhpReadCommandData2 (mMmCpuIo) != 0) {
>      Status = EFI_NOT_FOUND;
>      DEBUG ((DEBUG_ERROR, "%a: modern CPU hotplug interface: %r\n",
>        __FUNCTION__, Status));
> -    goto Fatal;
> +    goto ReleaseToUnplugApicIds;
>    }
>
>    //
>    // Register the handler for the CPU Hotplug MMI.
>    //
>    Status = gMmst->MmiHandlerRegister (
>                      CpuHotplugMmi,
>                      NULL,            // HandlerType: root MMI handler
>                      &mDispatchHandle
>                      );
>    if (EFI_ERROR (Status)) {
>      DEBUG ((DEBUG_ERROR, "%a: MmiHandlerRegister(): %r\n", __FUNCTION__,
>        Status));
> -    goto Fatal;
> +    goto ReleaseToUnplugApicIds;
>    }
>
>    return EFI_SUCCESS;
>
> +ReleaseToUnplugApicIds:
> +  gMmst->MmFreePool (mToUnplugApicIds);
> +  mToUnplugApicIds = NULL;
> +
> +ReleasePluggedApicIds:
> +  gMmst->MmFreePool (mPluggedApicIds);
> +  mPluggedApicIds = NULL;
> +
>  Fatal:
>    ASSERT (FALSE);
>    CpuDeadLoop ();
>    return Status;
>  }
> --
> 2.19.1.3.g30247aa5d201
>
>

  reply	other threads:[~2020-03-02 13:58 UTC|newest]

Thread overview: 53+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-02-26 22:11 [PATCH v2 00/16] OvmfPkg: support VCPU hotplug with -D SMM_REQUIRE Laszlo Ersek
2020-02-26 22:11 ` [PATCH v2 01/16] MdeModulePkg/PiSmmCore: log SMM image start failure Laszlo Ersek
2020-03-02 12:47   ` [edk2-devel] " Laszlo Ersek
2020-03-02 12:55     ` Liming Gao
2020-03-02 13:46   ` Philippe Mathieu-Daudé
2020-03-03  0:46   ` Dong, Eric
2020-02-26 22:11 ` [PATCH v2 02/16] UefiCpuPkg/PiSmmCpuDxeSmm: fix S3 Resume for CPU hotplug Laszlo Ersek
2020-02-28  3:05   ` [edk2-devel] " Dong, Eric
2020-02-28 10:50     ` Laszlo Ersek
2020-03-04 12:23     ` Laszlo Ersek
2020-03-04 14:36       ` Dong, Eric
2020-02-26 22:11 ` [PATCH v2 03/16] OvmfPkg: clone SmmCpuPlatformHookLib from UefiCpuPkg Laszlo Ersek
2020-03-02 13:27   ` Ard Biesheuvel
2020-03-02 13:49   ` Philippe Mathieu-Daudé
2020-02-26 22:11 ` [PATCH v2 04/16] OvmfPkg: enable SMM Monarch Election in PiSmmCpuDxeSmm Laszlo Ersek
2020-03-02 13:32   ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 05/16] OvmfPkg: enable CPU hotplug support " Laszlo Ersek
2020-03-02 13:33   ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 06/16] OvmfPkg/CpuHotplugSmm: introduce skeleton for CPU Hotplug SMM driver Laszlo Ersek
2020-03-02 13:44   ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 07/16] OvmfPkg/CpuHotplugSmm: add hotplug register block helper functions Laszlo Ersek
2020-03-02 13:24   ` Philippe Mathieu-Daudé
2020-03-02 13:45   ` [edk2-devel] " Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 08/16] OvmfPkg/CpuHotplugSmm: define the QEMU_CPUHP_CMD_GET_ARCH_ID macro Laszlo Ersek
2020-03-02 13:22   ` Philippe Mathieu-Daudé
2020-03-02 13:45   ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 09/16] OvmfPkg/CpuHotplugSmm: add function for collecting CPUs with events Laszlo Ersek
2020-03-02 13:49   ` Ard Biesheuvel
2020-03-02 20:34   ` Philippe Mathieu-Daudé
2020-03-03 10:31     ` Laszlo Ersek
2020-02-26 22:11 ` [PATCH v2 10/16] OvmfPkg/CpuHotplugSmm: collect " Laszlo Ersek
2020-03-02 13:58   ` Ard Biesheuvel [this message]
2020-02-26 22:11 ` [PATCH v2 11/16] OvmfPkg/CpuHotplugSmm: introduce Post-SMM Pen for hot-added CPUs Laszlo Ersek
2020-03-02 14:02   ` [edk2-devel] " Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 12/16] OvmfPkg/CpuHotplugSmm: introduce First SMI Handler " Laszlo Ersek
2020-03-02 14:03   ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 13/16] OvmfPkg/CpuHotplugSmm: complete root MMI handler for CPU hotplug Laszlo Ersek
2020-03-02 14:05   ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 14/16] OvmfPkg: clone CpuS3DataDxe from UefiCpuPkg Laszlo Ersek
2020-03-02 13:44   ` Philippe Mathieu-Daudé
2020-03-02 14:06   ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 15/16] OvmfPkg/CpuS3DataDxe: superficial cleanups Laszlo Ersek
2020-03-02 13:25   ` Philippe Mathieu-Daudé
2020-03-02 14:06   ` Ard Biesheuvel
2020-02-26 22:11 ` [PATCH v2 16/16] OvmfPkg/CpuS3DataDxe: enable S3 resume after CPU hotplug Laszlo Ersek
2020-03-02 14:16   ` Ard Biesheuvel
2020-03-02 15:46 ` [edk2-devel] [PATCH v2 00/16] OvmfPkg: support VCPU hotplug with -D SMM_REQUIRE Boris Ostrovsky
2020-03-02 19:22   ` Laszlo Ersek
2020-03-02 19:59 ` Laszlo Ersek
2020-03-04 13:29   ` Philippe Mathieu-Daudé
2020-03-04 18:09     ` Laszlo Ersek
2020-03-04 12:29 ` Laszlo Ersek
2020-03-05  8:32   ` Laszlo Ersek

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAKv+Gu-pgvAgM-x3Kw1cLWYhrF6Zp+DKk__ACVrJE0aVwaWdsw@mail.gmail.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox