From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by mx.groups.io with SMTP id smtpd.web11.4988.1623393467945778812 for ; Thu, 10 Jun 2021 23:37:48 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@intel.onmicrosoft.com header.s=selector2-intel-onmicrosoft-com header.b=HVWUC90e; spf=pass (domain: intel.com, ip: 134.134.136.24, mailfrom: min.m.xu@intel.com) IronPort-SDR: yBYeaft3XA/4584Q9IhuxhgiDNu8yYuLW7Kn1YVS4SlKLTvoLYjRhfwsKx4N419+ZGIbr944rc GWoO/YQBgN0g== X-IronPort-AV: E=McAfee;i="6200,9189,10011"; a="205432230" X-IronPort-AV: E=Sophos;i="5.83,265,1616482800"; d="scan'208,217";a="205432230" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jun 2021 23:37:45 -0700 IronPort-SDR: q1I9/AYVhHL5KNuFzOFml0Rcko/Jj0zEAzUR0BtYPDudm7bSoZML6KpHO2M6o5CY+JldC15QYd 7kqGt6CWJkBw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.83,265,1616482800"; d="scan'208,217";a="450662511" Received: from orsmsx605.amr.corp.intel.com ([10.22.229.18]) by fmsmga008.fm.intel.com with ESMTP; 10 Jun 2021 23:37:35 -0700 Received: from orsmsx604.amr.corp.intel.com (10.22.229.17) by ORSMSX605.amr.corp.intel.com (10.22.229.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.4; Thu, 10 Jun 2021 23:37:35 -0700 Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx604.amr.corp.intel.com (10.22.229.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.4 via Frontend Transport; Thu, 10 Jun 2021 23:37:35 -0700 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (104.47.56.170) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2242.4; Thu, 10 Jun 2021 23:37:34 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PUdi1QH73P8ri7YKuXNQ/xM7UQK8IHmauLDTh/qJk1H+n0ko2v+gJjO3B85KUoYxMu8cmpA5VfbvCqzXI8j0yYllUpNeQbtl3YQLdFs335AqULK+Cy77jlzxpe4/BPEstMQj60hY6flsqktqRSm+LJZUhpz9daj+gG1NXTijTdWVDUJiTQK7CTXfGUJutaOqe2QMApz0sPywm0f6J/EKq7XgFzqKrGk927aGiJyO/v370LY7yb1c8+S7H10QbwMT06EVB3/cCzdo1tLYpE6U6efAQ2eNfNlc6zaWROP69fSh6JbJ+hi9bs4lkIAE2nupeaC/BemINGwyXnhAHO/VYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4hLwFnkm3FHpi0TSDxU94Pu6HWakC4JtzcM31kU15jU=; b=RQLi0t3Ssk1oVpNB0jhNE/gkfVgDNfGzNqRsKmBqJmb77mDn64t8puWi0qLZxNphbG3z+2cZEJ0TmJe/A2t6biEnt8PtLCFh2QfT7ZS2F84HMblx+figHILZOmjrkiqZe+VqhTI8hgG1LPH3K1cCHSgi2emOw4aUCnYqh336d6RkpuF3Eg74odiDrIHaIvzlLEHW7PJci4NYUm6r3mAyXf+6KZkBObjHzmFl37kiPRM8/bJcLgVMGE11CuxsgIlnd72DE6MUijYXpdTLiZI34ao7pxFaHUcU6cG1nHpMmSN2elodazzO6H/yFqZ8Xc9YLQ+i4unF252eufx0N1je3g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4hLwFnkm3FHpi0TSDxU94Pu6HWakC4JtzcM31kU15jU=; b=HVWUC90eunxv4fuZUGcykyZX33s5+XdS0y+VrBl4EQkPeHzusx/VKCKGd//dCgbtrndG6AAzDDyHAAl2JrbBvS/3813xQIRyQ4i5O4zk5BXfGprzMgqZHZ65kHXmeR0l/tlMfsjUN+agnV4gyOWFWQedW1I4sC7YSvRVqaKApjU= Received: from PH0PR11MB5064.namprd11.prod.outlook.com (2603:10b6:510:3b::15) by PH0PR11MB4805.namprd11.prod.outlook.com (2603:10b6:510:32::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4219.21; Fri, 11 Jun 2021 06:37:32 +0000 Received: from PH0PR11MB5064.namprd11.prod.outlook.com ([fe80::b4be:3994:dd4d:7b9d]) by PH0PR11MB5064.namprd11.prod.outlook.com ([fe80::b4be:3994:dd4d:7b9d%8]) with mapi id 15.20.4195.030; Fri, 11 Jun 2021 06:37:32 +0000 From: "Min Xu" To: "devel@edk2.groups.io" , "Xu, Min M" , "Yao, Jiewen" , "rfc@edk2.groups.io" CC: "jejb@linux.ibm.com" , Laszlo Ersek , Brijesh Singh , Tom Lendacky , "erdemaktas@google.com" , "cho@microsoft.com" , "bret.barkelew@microsoft.com" , Jon Lange , Karen Noel , Paolo Bonzini , Nathaniel McCallum , "Dr. David Alan Gilbert" , Ademar de Souza Reis Jr. Subject: Re: [edk2-rfc] [edk2-devel] RFC: design review for TDVF in OVMF Thread-Topic: [edk2-rfc] [edk2-devel] RFC: design review for TDVF in OVMF Thread-Index: AddYf4DUPECuZ9ubQaOwhq0M0PgYbAFyHmpgABBrYkA= Date: Fri, 11 Jun 2021 06:37:32 +0000 Message-ID: References: <168759329436FBCF.5845@groups.io> In-Reply-To: <168759329436FBCF.5845@groups.io> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-reaction: no-action dlp-version: 11.5.1.3 authentication-results: edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=none action=none header.from=intel.com; x-originating-ip: [192.198.143.25] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: f6d5c9ce-afea-4c3a-8a2c-08d92ca3643c x-ms-traffictypediagnostic: PH0PR11MB4805: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: +GpjElHIR5I66JPt+yKqz6N5oN3YD4DO+b94/3q8Ygje/R/DDOhJumgE6/2TyNAGGpKFQH7q3pP8SdPRze41Vkev9UJ8Zgd+PUQruyd9YJ/0w/32j16p3JPGz2x1iT0vjTJhe5QECo/Tz9YIM0SN3pZeizOCYZgLOukwP8CytFZGXvhFd19EEjcwmJIs+3vM+quhOlUlrKTXM0SxZCsCWoa5bRvQTog0qsLhrcGz8uSQnydGKiEhYRgPSEVWAYs/t+KkQ+Qhe1fvduo/mQjT48ep8fJV6ctSmQtLo5PT6id/42IE/pOZHHaGNXeadweSWTNlZ4pFB4e2L9Y+2ogA3xfo0cgnNOOxfVjAQ8OTazBX6zRtOFTKCKPadTp/NsrvEzTyu20p1f16vOZCD/OFKOtfCJo7bzjYJa6K0FFo8geE58n6TK6indJFX0JI2F5vZZ2JjjKOiBIcChf9ng/+GwtVpf9cSY6Y71gzVRMxBEY41v7myVqwpJNqpl+83lNfhx8H3UzY0YpHcp1PdP9C7tSIYq9U69KCCgf8xZVN/1L3AQZdgbN6SUrj9m1CzOk96+68njRj/4bi+QujN5xakGaCb4hi3NX/Y8BJpx1kPN3mUc/z0bJcNpoAS+sA3TsM8glOHJ57su3UWjkWUPG8HmaglWkYfXf/HXfoaQnImIKyP5quFfEaDtKw+Aa7nSZ+PZpaIc5MaAoxvyOuJTm1EmajEp81zWLjIl4ZmKzRxclak7mB+zLPo+i2xSkVhcdc x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR11MB5064.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(396003)(39860400002)(346002)(376002)(366004)(136003)(316002)(7696005)(54906003)(110136005)(2906002)(86362001)(55016002)(71200400001)(6506007)(38100700002)(966005)(5660300002)(66946007)(122000001)(33656002)(478600001)(7416002)(66556008)(66446008)(8676002)(52536014)(26005)(8936002)(45080400002)(4326008)(186003)(66476007)(9686003)(76116006)(83380400001)(64756008)(53546011)(76236003)(166002);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?ON7GVXrICWRpxmGXwbJgWf9XqVVS+K8XcrQN7P23wkQWQWzoit0UHzNk/Itc?= =?us-ascii?Q?2aGWSpDt1FWC7BKlcluhtBlAFpxwgboKu+0gnkjVZHSgewRuRcqDX44k2wiv?= =?us-ascii?Q?k59PNoCjMLpuW7Q61b8Vu35yU++Y113LeQaqqUZINy9+mS9PRzFbtWRxjDEg?= =?us-ascii?Q?xg3PjUcXzRfB9uGvmI377m3NbATBeHMF7Vm4pS/mP+8AMGdvpvPxWV1yMRGi?= =?us-ascii?Q?lJKSUAgmu/LY17zE/17lnfWzp+O5TtrXPXJltSU7tJs9Um6cswje6ONAS0F0?= =?us-ascii?Q?ELICF3V3kAr6XU7ONzccC6w3BXbTwVQj42JgQ9IbJ6HqY05CZ7FnHrjijRzt?= =?us-ascii?Q?vCmkmbgu3zzhsOPNYKPGlsf8yngu9haj4G+3culfIDL6u++8ngh8szM7ligR?= =?us-ascii?Q?EwDvAuw94tTCm0i9gAMAIWnFC1P4eVN8BRS/NHaCt00S28dF71c4c9xQeNyx?= =?us-ascii?Q?AzodKxO1F/Yd+R06zplAS8jcrDfC9u+q/e4Fi6a1CSd9a52xDCKOFfvEfNtk?= =?us-ascii?Q?n0wjxXmLfORiDSW6GZyWC/q3LlhqGpMfCsZHlNty5Tgn34FETJhQYIRAbkcy?= =?us-ascii?Q?thCDHkzzGPJ0khCsIH7H21JjQBmGxyaoG6N0bs3nrxrdfTH63nvK+FD+88Qk?= =?us-ascii?Q?mECWjJdujoSW7cRiGGJvG1l+WZrxfS/bzoqaBQpKZR1xFVp4AyMjlfJyEzQF?= =?us-ascii?Q?TwloMlW99wgppcRnqhap52qdDv7dg6tkhchD+76Lu9+4IPwkYitqFWvw66Qw?= =?us-ascii?Q?2pjxi23Vp0f3mTXDvlmhidlrxztUtlXNzX9+OQ9eyCRMoQKCbzN5COzn1KTA?= =?us-ascii?Q?cnLC5UbE6dB1QsexjkSKejoOS5riwgeSz+hAbhyi4ZerMo4YCelNTMpa5rMs?= =?us-ascii?Q?mfFXWSF+NMNRX6eLs7zixM7791iQLv37dH+5oleQsxOLokvlm+N2QiwnqiGV?= =?us-ascii?Q?BJFXCoVxXKCJGez8I2Gq0CwNbkDrRtwlz76apf3WAkYftoAKXldbFediT08L?= =?us-ascii?Q?fSFfn+rNQQMvEdXrfbPNns9rCjfiMaicW2rW3OV+F4gVzTo8qZzhmmV87G7V?= =?us-ascii?Q?z8ePlXxuTtBzNDySa+saLmxd8XmOaQj7b76vBS1w2Bu0p007BqrnaQkY6/m7?= =?us-ascii?Q?vXMkWNE1fFmQQ8HgLfwsjQOMX735lUX6egGaAjug6b826USJjLp3IiFt9g9L?= =?us-ascii?Q?jXty6s3LJqD2bPtHvJ9/34Az2yUgn1d3KrIYlGidlvOBMjjvLKOvXwh86oDA?= =?us-ascii?Q?YVi0S6l/6yMHbblMUDTWzde39DIs2tG9o6dYnWMU4Sz9kr/nkO5CNvwDe3cj?= =?us-ascii?Q?PXZXZmWp0JrFCaSEwKcZ+4Py?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB5064.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: f6d5c9ce-afea-4c3a-8a2c-08d92ca3643c X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Jun 2021 06:37:32.0943 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: rjiE/BIww5VTBBZqAQb1y6hU4KdQYHIIkkQfZcEsDCHJgmYDEVl63HAuguTiy1acduse1sm4JypPuixOy8nSBg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB4805 Return-Path: min.m.xu@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: multipart/alternative; boundary="_000_PH0PR11MB506473EFD3D5FF95ADD6CC1CC5349PH0PR11MB5064namp_" --_000_PH0PR11MB506473EFD3D5FF95ADD6CC1CC5349PH0PR11MB5064namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable In today's TianoCore Design Meeting we reviewed the Overview Section (from = slide 1 to 20). Thanks much for the valuable feedbacks and comments. The me= eting minutes will be sent out soon. To address the concerns of the *one binary* solution in previous discussio= n, we propose 2 Configurations for TDVF to upstream. (slide 6 - 8) Config-A: * Merge the *basic* TDVF feature to existing OvmfX64Pkg.dsc. (Align wi= th existing SEV) * Threat model: VMM is NOT out of TCB. (We don't make things worse.) * The OvmfX64Pkg.dsc includes SEV/TDX/normal OVMF basic boot capabilit= y. The final binary can run on SEV/TDX/normal OVMF * No changes to existing OvmfPkgX64 image layout. * No need to add additional security features if they do not exist tod= ay * No need to remove features if they exist today. * RTMR is not supported * PEI phase is NOT skipped in either Td or Non-Td Config-B: * Add a standalone IntelTdx.dsc to a TDX specific directory for a *ful= l* feature TDVF. (Align with existing SEV) * Threat model: VMM is out of TCB. (We need necessary change to preven= t attack from VMM) * IntelTdx.dsc includes TDX/normal OVMF basic boot capability. The fin= al binary can run on TDX/normal OVMF * It might eventually merge with AmdSev.dsc, but NOT at this point of = time. And we don't know when it will happen. We need sync with AMD in the c= ommunity, after both of us think the solutions are mature to merge. * Need to add necessary security feature as mandatory requirement, suc= h as RTMR based Trusted Boot support * Need to remove unnecessary attack surfaces, such as network stack. From: devel@edk2.groups.io On Behalf Of Min Xu Sent: Friday, June 11, 2021 6:30 AM To: devel@edk2.groups.io; Yao, Jiewen ; rfc@edk2.gro= ups.io Cc: jejb@linux.ibm.com; Laszlo Ersek ; Brijesh Singh ; Tom Lendacky ; erdemaktas@g= oogle.com; cho@microsoft.com; bret.barkelew@microsoft.com; Jon Lange ; Karen Noel ; Paolo Bonzini ; Nathaniel McCallum ; Dr. David Alan Gilbe= rt ; Ademar de Souza Reis Jr. Subject: Re: [edk2-rfc] [edk2-devel] RFC: design review for TDVF in OVMF Hi, All Thanks much for the valuable comments and discussion about the design. We have updated the slides (v0.9) in below link. If some comments or conce= rns are not answered/addressed in the new slides, please don't hesitate to = tell us. We do want to answer/address all the comments/concerns. But to be = honest it is a rather complicated one and we appreciate your feedbacks. https://edk2.groups.io/g/devel/files/Designs/2021/0611/TDVF_Design_Review%= 28v0.9%29.pptx Thanks much! Xu Min From: devel@edk2.groups.io > On Behalf Of Yao, Jiewen Sent: Thursday, June 3, 2021 9:51 PM To: rfc@edk2.groups.io; devel@edk2.groups.io Cc: jejb@linux.ibm.com; Laszlo Ersek >; Brijesh Singh >; Tom Lendacky >; erdemaktas@google.com; cho@microsoft.com; bret.barkelew@microsoft.= com; Jon Lange >; Karen Noel >; Paolo Bonzini >; = Nathaniel McCallum >; D= r. David Alan Gilbert >; Ad= emar de Souza Reis Jr. > Subject: [edk2-rfc] [edk2-devel] RFC: design review for TDVF in OVMF Hi, All We plan to do a design review for TDVF in OVMF package. The TDVF Design slides for TinaoCore Design Review Meeting (Jun 11) is now= available in blow link: https://edk2.groups.io/g/devel/files/Designs/2021/= 0611. The Bugzilla is https://bugzilla.tianocore.org/show_bug.cgi?id=3D3429 You can have an offline review first. You comments will be warmly welcomed= and we will continuously update the slides based on the feedbacks. Thank you Yao Jiewen --_000_PH0PR11MB506473EFD3D5FF95ADD6CC1CC5349PH0PR11MB5064namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

In today’s TianoCore Design Meeting we review= ed the Overview Section (from slide 1 to 20). Thanks much for the valuable = feedbacks and comments. The meeting minutes will be sent out soon.

 

To address the concerns of the *one binary* solutio= n in previous discussion, we propose 2 Configurations for TDVF to upstream.= (slide 6 - 8)

 

Config-A:

  • Merge the *basic* TDVF feature to existing OvmfX64Pkg.dsc. (Align wi= th existing SEV)
  • Threat model: VMM is NOT out of TCB. (We don’t= make things worse.)
  • The OvmfX64Pkg.dsc includes SEV/TDX/normal OVMF basi= c boot capability. The final binary can run on SEV/TDX/normal OVMF
  • No changes to existing OvmfPkgX64 image layout.
  • No need to add additional security features if they do not exist tod= ay
  • No need to remove features if they exist today.
  • RTMR is not supported
  • PEI phase is N= OT skipped in either Td or Non-Td

        =

Config-B:

  • Add a standalone IntelTdx.dsc to a TDX specific directory for a *ful= l* feature TDVF. (Align with existing SEV)
  • Threat model: VMM is out of TCB. (We need necessary = change to prevent attack from VMM)
  • IntelTdx.dsc includ= es TDX/normal OVMF basic boot capability. The final binary can run on TDX/n= ormal OVMF
  • It might eventually merge with AmdSev.dsc, = but NOT at this point of time. And we don’t know when it will happen.= We need sync with AMD in the community, after both of us think the solutions are mature to merge.
  • Need to add necessary= security feature as mandatory requirement, such as RTMR based Trusted Boot= support
  • Need to remove unnecessary attack surfaces, s= uch as network stack.

 

 

From: devel@edk2.groups.io <devel@edk2.gr= oups.io> On Behalf Of Min Xu
Sent: Friday, June 11, 2021 6:30 AM
To: devel@edk2.groups.io; Yao, Jiewen <jiewen.yao@intel.com>;= rfc@edk2.groups.io
Cc: jejb@linux.ibm.com; Laszlo Ersek <lersek@redhat.com>; Bri= jesh Singh <brijesh.singh@amd.com>; Tom Lendacky <thomas.lendacky@= amd.com>; erdemaktas@google.com; cho@microsoft.com; bret.barkelew@micros= oft.com; Jon Lange <jlange@microsoft.com>; Karen Noel <knoel@redhat.com>; Paolo Bonzini <pbonzini@redhat.com>; Nath= aniel McCallum <npmccallum@redhat.com>; Dr. David Alan Gilbert <dg= ilbert@redhat.com>; Ademar de Souza Reis Jr. <areis@redhat.com> Subject: Re: [edk2-rfc] [edk2-devel] RFC: design review for TDVF in= OVMF

 

Hi, All

Thanks much for the valuable comments and discussio= n about the design.

We have updated the slides (v0.9) in below link. If= some comments or concerns are not answered/addressed in the new slides, pl= ease don’t hesitate to tell us. We do want to answer/address all the = comments/concerns. But to be honest it is a rather complicated one and we appreciate your feedbacks.

https://edk2.groups.io/g/= devel/files/Designs/2021/0611/TDVF_Design_Review%28v0.9%29.pptx

 

Thanks much!

 

Xu Min

 

 

From: devel@edk2.groups.io <deve= l@edk2.groups.io> On Behalf Of Yao, Jiewen
Sent: Thursday, June 3, 2021 9:51 PM
To: rfc@edk2.groups.io; <= a href=3D"mailto:devel@edk2.groups.io"> devel@edk2.groups.io
Cc: jejb@linux.ibm.com; L= aszlo Ersek <lersek@redhat.com&= gt;; Brijesh Singh <brijesh.sin= gh@amd.com>; Tom Lendacky <thomas.lendacky@amd.com>; erdemaktas@google.com; cho@microsoft.com; bret= .barkelew@microsoft.com; Jon Lange <jlange@microsoft.com>; Karen Noel <knoel@redhat.com>; Paolo Bonzini <pbonzini@redhat.com>; N= athaniel McCallum <npmccallum@r= edhat.com>; Dr. David Alan Gilbert <dgilbert@redhat.com>; Ademar de Souza Reis Jr. <areis@redhat.com>
Subject: [edk2-rfc] [edk2-devel] RFC: design review for TDVF in OVM= F

 

Hi, All

We plan to do a design review for TDVF in OVMF pack= age.

 

The TDVF Design slides for TinaoCore Design Revi= ew Meeting (Jun 11) is now available in blow link: https:/= /edk2.groups.io/g/devel/files/Designs/2021/0611.

The Bugzilla is https://bugzilla.tianocore.org/show_bug.cgi?id=3D3429

 

You can have an offline review first. You commen= ts will be warmly welcomed and we will continuously update the slides based= on the feedbacks.

 

Thank you

Yao Jiewen

 

 

 

--_000_PH0PR11MB506473EFD3D5FF95ADD6CC1CC5349PH0PR11MB5064namp_--