From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by mx.groups.io with SMTP id smtpd.web09.2973.1668152078347920601 for ; Thu, 10 Nov 2022 23:34:38 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Ol0P+TlK; spf=pass (domain: kernel.org, ip: 139.178.84.217, mailfrom: ardb@kernel.org) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 6549661EBE for ; Fri, 11 Nov 2022 07:34:37 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id CC1F2C43142 for ; Fri, 11 Nov 2022 07:34:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1668152076; bh=krmLtmGHUOK/FPLq7QJgH6iV3haGvdtl0CD2azQl0Rs=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=Ol0P+TlKxTAtBeZoRF0pCvIKJZKhj42szQ3HWnVcLIXDtdRG43zPKjoLgFVUHXcoq 6NjokcAbI6nI7+850OM/ZT/v6V6tBbx39RgiFWJzdTKenPGzSPPvBv6B+exhPKr8v0 PbFzwJQnDQ+5o6HLXlbjwq0Dy+X79Oayb0Mjm8wrHoB9ehfbJMhCYbY1A1J2AXurOI arxTS5WberUs0KJnwoALvnBxof2UZygMtxi5F9zevZizQ/N73wiGBkLhRTgCohIQ/F 0srSyARQJbap2f4yIq2PB5ye7mDO6xrkw5PrO0IOecGTo0IQsnhdV7dY3M/aBmUWp+ eGY87tFBs0ZcA== Received: by mail-lf1-f47.google.com with SMTP id be13so7156486lfb.4 for ; Thu, 10 Nov 2022 23:34:36 -0800 (PST) X-Gm-Message-State: ANoB5plcVO05lARX/qkKU8TAzqz3+qsQkPwm1lHl2eirtuRy7bzg8L0C /HWpFLD/pxfB5AS90SPu9uNzShLzkq9EPhd3Qhw= X-Google-Smtp-Source: AA0mqf5kj7d8jEvVvUg/N0rwDApnrbp8fHbPQxLALUYopH+nlNdfiHOvGR27Z10e85lhfyD9aFCLv4htEAVFUETOfQ8= X-Received: by 2002:ac2:5044:0:b0:4b0:cca8:bdb3 with SMTP id a4-20020ac25044000000b004b0cca8bdb3mr361699lfm.539.1668152074763; Thu, 10 Nov 2022 23:34:34 -0800 (PST) MIME-Version: 1.0 References: <20221110134738.3798618-1-ardb@kernel.org> <172660F4A69E435E.25609@groups.io> <016901d8f581$1d60d060$58227120$@byosoft.com.cn> In-Reply-To: <016901d8f581$1d60d060$58227120$@byosoft.com.cn> From: "Ard Biesheuvel" Date: Fri, 11 Nov 2022 08:34:23 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: =?UTF-8?B?UmU6IFtlZGsyLWRldmVsXSDlm57lpI06IFtQQVRDSCAwLzNdIE9WTUY6IHN1cHBvcnQgRUZJX1JOR19QUk9UT0NPTCB3aXRob3V0IHZpcnRpby1ybmc=?= To: devel@edk2.groups.io, gaoliming@byosoft.com.cn Cc: Rebecca Cran , Pierre Gondois , Leif Lindholm , Sami Mujawar , Gerd Hoffmann , "Jason A . Donenfeld" Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Fri, 11 Nov 2022 at 04:53, gaoliming via groups.io wrote: > > It has been merged at c8fb7240469b5753773da4fa5710b870b790c363 > > Thanks > Liming Thank you. I'll merge the remaining ones after the stable tag has been created. > > -----=E9=82=AE=E4=BB=B6=E5=8E=9F=E4=BB=B6----- > > =E5=8F=91=E4=BB=B6=E4=BA=BA: devel@edk2.groups.io =E4=BB=A3=E8=A1=A8 gaoliming via > > groups.io > > =E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4: 2022=E5=B9=B411=E6=9C=8811=E6=97= =A5 8:42 > > =E6=94=B6=E4=BB=B6=E4=BA=BA: 'Ard Biesheuvel' ; devel@= edk2.groups.io > > =E6=8A=84=E9=80=81: 'Rebecca Cran' ; 'Pierre Gondois= ' > > ; 'Leif Lindholm' ; > > 'Sami Mujawar' ; 'Gerd Hoffmann' > > ; 'Jason A . Donenfeld' > > =E4=B8=BB=E9=A2=98: [edk2-devel] =E5=9B=9E=E5=A4=8D: [PATCH 0/3] OVMF: = support EFI_RNG_PROTOCOL > > without virtio-rng > > > > Ard: > > The first patch is the bug fix. I agree to merge it for this stable t= ag. > I > > will help merge it today. > > > > Thanks > > Liming > > > -----=E9=82=AE=E4=BB=B6=E5=8E=9F=E4=BB=B6----- > > > =E5=8F=91=E4=BB=B6=E4=BA=BA: Ard Biesheuvel > > > =E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4: 2022=E5=B9=B411=E6=9C=8810=E6= =97=A5 21:48 > > > =E6=94=B6=E4=BB=B6=E4=BA=BA: devel@edk2.groups.io > > > =E6=8A=84=E9=80=81: Ard Biesheuvel ; Liming Gao > > > ; Rebecca Cran ; Pierre > > > Gondois ; Leif Lindholm > > > ; Sami Mujawar ; > > > Gerd Hoffmann ; Jason A . Donenfeld > > > > > > =E4=B8=BB=E9=A2=98: [PATCH 0/3] OVMF: support EFI_RNG_PROTOCOL withou= t virtio-rng > > > > > > Currently, we only expose EFI_RNG_PROTOCOL when running under QEMU > > if > > > it > > > > > > exposes a virtio-rng device. This means that generic EFI apps or > > > > > > loaders have no access to an entropy source if this device is > > > > > > unavailable, unless they implement their own arch-specific handling t= o > > > > > > figure out whether any CPU instructions or monitor calls can be used > > > > > > instead. > > > > > > > > > > > > So let's wire those up as EFI_RNG_PROTOCOL implementations as well, > > > > > > using the existing drivers and libraries. > > > > > > > > > > > > First patch is a bugfix - Liming, mind if I merge that right away? > > > > > > Thanks. > > > > > > > > > > > > Cc: Liming Gao > > > > > > Cc: Rebecca Cran > > > > > > Cc: Pierre Gondois > > > > > > Cc: Leif Lindholm > > > > > > Cc: Sami Mujawar > > > > > > Cc: Gerd Hoffmann > > > > > > Cc: Jason A. Donenfeld > > > > > > > > > > > > Ard Biesheuvel (3): > > > > > > ArmPkg/ArmTrngLib: Fix incorrect GUID reference in DEBUG() output > > > > > > ArmVirtPkg/ArmVirtQemu: Expose TRNG hypercall via RngDxe if > > > > > > implemented > > > > > > OvmfPkg/OvmfX86: Enable RDRAND based EFI_RNG_PROTOCOL > > > implementation > > > > > > > > > > > > ArmPkg/Library/ArmTrngLib/ArmTrngLib.c | 2 +- > > > > > > ArmVirtPkg/ArmVirtQemu.dsc | 11 +++++++++++ > > > > > > ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc | 5 +++++ > > > > > > ArmVirtPkg/ArmVirtQemuKernel.dsc | 11 +++++++++++ > > > > > > OvmfPkg/OvmfPkgIa32.dsc | 1 + > > > > > > OvmfPkg/OvmfPkgIa32.fdf | 1 + > > > > > > OvmfPkg/OvmfPkgIa32X64.dsc | 1 + > > > > > > OvmfPkg/OvmfPkgIa32X64.fdf | 1 + > > > > > > OvmfPkg/OvmfPkgX64.dsc | 1 + > > > > > > OvmfPkg/OvmfPkgX64.fdf | 1 + > > > > > > 10 files changed, 34 insertions(+), 1 deletion(-) > > > > > > > > > > > > -- > > > > > > 2.35.1 > > > > > > > > > > > > > > > > > > > > > > > > > >=20 > >