{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":14094679,"defaultBranch":"cmr","name":"edk2","ownerLogin":"cmruffin","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2013-11-03T22:06:01.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/1076633?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1710467086.0","currentOid":""},"activityList":{"items":[{"before":"cf58f47623c40a66b160face4f04e08efb4c7f5b","after":"98f150a954b35cc74bd87ae355cf35d8c9e1580d","ref":"refs/heads/master","pushedAt":"2024-04-14T00:22:29.000Z","pushType":"push","commitsCount":34,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"MdeModulePkg/AcpiTableDxe: Prefer xDSDT over DSDT when installing tables\n\nAs per ACPI Spec 6.5+ Table 5-9 if xDSDT is available,\nit should be used first. Handle required flow when xDSDT\nis absent or present.\n\nTest: Tested on RISCV64 Qemu platform with xDSDT and booted to\nlinux kernel.\n\nCc: Liming Gao \nCc: Zhiguang Liu \nCc: Dandan Bi \nCc: Pedro Falcato \nSigned-off-by: Dhaval Sharma \nAcked-by: Chasel Chiu \nReviewed-by: Liming Gao ","shortMessageHtmlLink":"MdeModulePkg/AcpiTableDxe: Prefer xDSDT over DSDT when installing tables"}},{"before":"4ff5b34536e13e7006ece14de970132bb40f03cc","after":"515d07a92c12616a836ca20326de84a87fcdede8","ref":"refs/heads/personal/v-chruffin/rsaoaep","pushedAt":"2024-04-04T01:36:48.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions\n\nAdd unit test functions:\nTestVerifyPkcs1v2EncryptInterface()\nTestVerifyRsaOaepEncryptInterface()\nTestVerifyEncrypt()\nTestVerifyDecrypt()\nTestVerifyEncryptDecrypt()\n\nSigned-off-by: Chris Ruffin \nCc: Chris Ruffin \nCc: Jiewen Yao \nCc: Yi Li \nCc: Wenxing Hou ","shortMessageHtmlLink":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions"}},{"before":"ebf17bee859812b4837c61632998cfafc0ab4d4f","after":"4ff5b34536e13e7006ece14de970132bb40f03cc","ref":"refs/heads/personal/v-chruffin/rsaoaep","pushedAt":"2024-03-30T21:13:52.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions\n\nAdd unit test functions:\nTestVerifyPkcs1v2EncryptInterface()\nTestVerifyRsaOaepEncryptInterface()\nTestVerifyEncrypt()\nTestVerifyDecrypt()\nTestVerifyEncryptDecrypt()\n\nSigned-off-by: Chris Ruffin \nCc: Chris Ruffin \nCc: Jiewen Yao \nCc: Yi Li \nCc: Wenxing Hou ","shortMessageHtmlLink":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions"}},{"before":"72c06655e67497b2805814f0abf1e6ed16f0a245","after":"ebf17bee859812b4837c61632998cfafc0ab4d4f","ref":"refs/heads/personal/v-chruffin/rsaoaep","pushedAt":"2024-03-30T18:37:47.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions\n\nAdd unit test functions:\nTestVerifyPkcs1v2Decrypt()\nTestVerifyTestRsaOaepEncrypt()\nTestVerifyTestRsaOaepDecrypt()\n\nSigned-off-by: Chris Ruffin \nCc: Chris Ruffin \nCc: Jiewen Yao \nCc: Yi Li \nCc: Wenxing Hou ","shortMessageHtmlLink":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions"}},{"before":"499697dd02adbc017a57ab3eecaa4fc1213e6af7","after":"72c06655e67497b2805814f0abf1e6ed16f0a245","ref":"refs/heads/personal/v-chruffin/rsaoaep","pushedAt":"2024-03-30T17:58:24.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions\n\nAdd unit test functions:\nTestVerifyPkcs1v2Decrypt()\nTestVerifyTestRsaOaepEncrypt()\nTestVerifyTestRsaOaepDecrypt()\n\nSigned-off-by: Chris Ruffin \nCc: Chris Ruffin \nCc: Jiewen Yao \nCc: Yi Li \nCc: Wenxing Hou ","shortMessageHtmlLink":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions"}},{"before":"55c79c41304023822b5bbe14a2b2594b79d121fd","after":"499697dd02adbc017a57ab3eecaa4fc1213e6af7","ref":"refs/heads/personal/v-chruffin/rsaoaep","pushedAt":"2024-03-30T16:16:34.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions\n\nAdd unit test functions:\nTestVerifyPkcs1v2Decrypt()\nTestVerifyTestRsaOaepEncrypt()\nTestVerifyTestRsaOaepDecrypt()\n\nSigned-off-by: Chris Ruffin \nCc: Chris Ruffin \nCc: Jiewen Yao \nCc: Yi Li \nCc: Wenxing Hou ","shortMessageHtmlLink":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions"}},{"before":"d588bd5144c5ca6e25440f8d886481e17ffda850","after":"55c79c41304023822b5bbe14a2b2594b79d121fd","ref":"refs/heads/personal/v-chruffin/rsaoaep","pushedAt":"2024-03-25T16:00:08.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions\n\nAdd unit test functions:\nTestVerifyPkcs1v2Decrypt()\nTestVerifyTestRsaOaepEncrypt()\nTestVerifyTestRsaOaepDecrypt()\n\nSigned-off-by: Chris Ruffin \nCc: Chris Ruffin \nCc: Jiewen Yao \nCc: Yi Li \nCc: Wenxing Hou ","shortMessageHtmlLink":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions"}},{"before":"e8f5415f5af23ee6b7ee68a3196c9dc999d38355","after":"d588bd5144c5ca6e25440f8d886481e17ffda850","ref":"refs/heads/personal/v-chruffin/rsaoaep","pushedAt":"2024-03-25T11:07:09.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions\n\nAdd unit test functions:\nTestVerifyPkcs1v2Decrypt()\nTestVerifyTestRsaOaepEncrypt()\nTestVerifyTestRsaOaepDecrypt()\n\nSigned-off-by: Chris Ruffin \nCc: Jiewen Yao \nCc: Yi Li \nCc: Wenxing Hou ","shortMessageHtmlLink":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions"}},{"before":"3840c35e34d1c992268092b6366e26f2acc55a75","after":"cf58f47623c40a66b160face4f04e08efb4c7f5b","ref":"refs/heads/master","pushedAt":"2024-03-25T11:06:19.000Z","pushType":"push","commitsCount":6,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"ShellPkg/Acpiview: Adds ACPI WSMT Table parse\n\nAdds WSMT parse to the UefiShellAcpiViewCommandLib library.\n\nCc: Zhichao Gao \nCc: Pierre Gondois \nSigned-off-by: Abdul Lateef Attar \nReviewed-by: Pierre Gondois \nReviewed-by: Zhichao Gao ","shortMessageHtmlLink":"ShellPkg/Acpiview: Adds ACPI WSMT Table parse"}},{"before":"2cfc18db31caaf9cc669005f5f095560abfb51a3","after":"e8f5415f5af23ee6b7ee68a3196c9dc999d38355","ref":"refs/heads/personal/v-chruffin/rsaoaep","pushedAt":"2024-03-20T01:28:37.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions\n\nAdd unit test functions:\nTestVerifyPkcs1v2Decrypt()\nTestVerifyTestRsaOaepEncrypt()\nTestVerifyTestRsaOaepDecrypt()\n\nSigned-off-by: Chris Ruffin \nCc: Jiewen Yao \nCc: Yi Li \nCc: Wenxing Hou ","shortMessageHtmlLink":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions"}},{"before":"ece77e4047c36ddd177949e81d548bda244ea8a7","after":"3840c35e34d1c992268092b6366e26f2acc55a75","ref":"refs/heads/master","pushedAt":"2024-03-16T20:59:22.000Z","pushType":"push","commitsCount":10000,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"IntelFsp2WrapperPkg: Error handling of FspmWrapperInit()\n\nREF: https://bugzilla.tianocore.org/show_bug.cgi?id=4701\n\nThe error handling of FspmWrapperInit() is limited to ASSERT\nstatements only, which only works in debug builds, but not in\nrelease builds.\nFix the issue by enhancing the error handling of FspmWrapperInit()\nto cover both debug builds and release builds.\n\nCc: Ashraf Ali S \nCc: Chasel Chiu \nCc: Chen Gang C \nCc: Duggapu Chinni B \nCc: Nate DeSimone \nCc: Ray Ni \nCc: Star Zeng \nCc: Susovan Mohapatra \nCc: Ted Kuo \nSigned-off-by: Du Lin \nReviewed-by: Ashraf Ali S \nReviewed-by: Chen Gang C \nReviewed-by: Ray Ni ","shortMessageHtmlLink":"IntelFsp2WrapperPkg: Error handling of FspmWrapperInit()"}},{"before":"2cfc18db31caaf9cc669005f5f095560abfb51a3","after":null,"ref":"refs/heads/personal/v-chruffin/absolute-shared-crypto","pushedAt":"2024-03-15T01:44:46.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"}},{"before":null,"after":"2cfc18db31caaf9cc669005f5f095560abfb51a3","ref":"refs/heads/personal/v-chruffin/rsaoaep","pushedAt":"2024-03-15T01:44:14.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions\n\nAdd unit test functions:\nTestVerifyPkcs1v2Decrypt()\nTestVerifyTestRsaOaepEncrypt()\nTestVerifyTestRsaOaepDecrypt()\n\nSigned-off-by: Chris Ruffin \nCc: Jiewen Yao \nCc: Yi Li \nCc: Wenxing Hou ","shortMessageHtmlLink":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions"}},{"before":"f07a0ad0e98cf134791f09c079f548c453e34e0f","after":"2cfc18db31caaf9cc669005f5f095560abfb51a3","ref":"refs/heads/personal/v-chruffin/absolute-shared-crypto","pushedAt":"2024-03-14T22:27:45.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions\n\nAdd unit test functions:\nTestVerifyPkcs1v2Decrypt()\nTestVerifyTestRsaOaepEncrypt()\nTestVerifyTestRsaOaepDecrypt()\n\nSigned-off-by: Chris Ruffin \nCc: Jiewen Yao \nCc: Yi Li \nCc: Wenxing Hou ","shortMessageHtmlLink":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions"}},{"before":"e72f53070c650e96bcf2b00e8ceebd908c674123","after":"f07a0ad0e98cf134791f09c079f548c453e34e0f","ref":"refs/heads/personal/v-chruffin/absolute-shared-crypto","pushedAt":"2024-03-14T20:08:29.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions\n\nAdd unit test functions:\nTestVerifyPkcs1v2Decrypt()\nTestVerifyTestRsaOaepEncrypt()\nTestVerifyTestRsaOaepDecrypt()\n\nSigned-off-by: Chris Ruffin \nCc: Jiewen Yao \nCc: Yi Li \nCc: Wenxing Hou ","shortMessageHtmlLink":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions"}},{"before":"73e0250daf1264e960a39c4ec56ff711be8cd152","after":"e72f53070c650e96bcf2b00e8ceebd908c674123","ref":"refs/heads/personal/v-chruffin/absolute-shared-crypto","pushedAt":"2024-03-14T19:16:54.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions\n\nAdd unit test functions:\nTestVerifyPkcs1v2Decrypt()\nTestVerifyTestRsaOaepEncrypt()\nTestVerifyTestRsaOaepDecrypt()\n\nSigned-off-by: Chris Ruffin \nCc: Jiewen Yao \nCc: Yi Li \nCc: Wenxing Hou ","shortMessageHtmlLink":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions"}},{"before":"b9d9deda799d46055679994b0bd0e7d369459d85","after":"73e0250daf1264e960a39c4ec56ff711be8cd152","ref":"refs/heads/personal/v-chruffin/absolute-shared-crypto","pushedAt":"2024-03-14T18:45:55.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions\n\nAdd unit test functions:\nTestVerifyPkcs1v2Decrypt()\nTestVerifyTestRsaOaepEncrypt()\nTestVerifyTestRsaOaepDecrypt()\n\nSigned-off-by: Chris Ruffin \nCc: Jiewen Yao \nCc: Yi Li \nCc: Wenxing Hou ","shortMessageHtmlLink":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions"}},{"before":null,"after":"b9d9deda799d46055679994b0bd0e7d369459d85","ref":"refs/heads/personal/v-chruffin/absolute-shared-crypto","pushedAt":"2024-03-14T17:54:51.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions\n\nAdd unit test functions:\nTestVerifyPkcs1v2Decrypt()\nTestVerifyTestRsaOaepEncrypt()\nTestVerifyTestRsaOaepDecrypt()\n\nSigned-off-by: Chris Ruffin ","shortMessageHtmlLink":"CryptoPkg/BaseCryptLibUnitTest: add unit test functions"}},{"before":"06a155473419f7ba0e3fd29a9c5dafe99d19c43c","after":"e7486b50646d6a645706b61d2f8d74b3dca23ce0","ref":"refs/heads/cmr","pushedAt":"2024-03-14T17:54:22.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"cmruffin","name":"Chris Ruffin","path":"/cmruffin","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1076633?s=80&v=4"},"commit":{"message":"MdeModulePkg: DxeCore: Do Not Apply Guards to Unsupported Types\n\nCurrently, there are multiple issues when page or pool guards are\nallocated for runtime memory regions that are aligned to\nnon-EFI_PAGE_SIZE alignments. Multiple other issues have been fixed for\nthese same systems (notably ARM64 which has a 64k runtime page\nallocation granularity) recently. The heap guard system is only built to\nsupport 4k guard pages and 4k alignment.\n\nToday, the address returned to a caller of AllocatePages will not be\naligned correctly to the runtime page allocation granularity, because\nthe heap guard system does not take non-4k alignment requirements into\nconsideration.\n\nHowever, even with this bug fixed, the Memory Allocation Table cannot be\nproduced and an OS with a larger than 4k page granularity will not have\naligned memory regions because the guard pages are reported as part of\nthe same memory allocation. So what would have been, on an ARM64 system,\na 64k runtime memory allocation is actually a 72k memory allocation as\ntracked by the Page.c code because the guard pages are tracked as part\nof the same allocation. This is a core function of the current heap\nguard architecture.\n\nThis could also be fixed with rearchitecting the heap guard system to\nrespect alignment requirements and shift the guard pages inside of the\nouter rounded allocation or by having guard pages be the runtime\ngranularity. Both of these approaches have issues. In the former case,\nwe break UEFI spec 2.10 section 2.3.6 for AARCH64, which states that\neach 64k page for runtime memory regions may not have mixed memory\nattributes, which pushing the guard pages inside would create. In the\nlatter case, an immense amount of memory is wasted to support such large\nguard pages, and with pool guard many systems could not support an\nadditional 128k allocation for all runtime memory.\n\nThe simpler and safer solution is to disallow page and pool guards for\nruntime memory allocations for systems that have a runtime granularity\ngreater than the EFI_PAGE_SIZE (4k). The usefulness of such guards is\nlimited, as OSes do not map guard pages today, so there is only boot\ntime protection of these ranges. This also prevents other bugs from\nbeing exposed by using guards for regions that have a non-4k alignment\nrequirement, as again, multiple have cropped up because the heap guard\nsystem was not built to support it.\n\nThis patch adds both a static assert to ensure that either the runtime\ngranularity is the EFI_PAGE_SIZE or that the PCD bits are not set to\nenable heap guard for runtime memory regions. It also adds a check in\nthe page and pool allocation system to ensure that at runtime we are not\nallocating a runtime region and attempt to guard it (the PCDs are close\nto being removed in favor of dynamic heap guard configurations).\n\nBZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4674\nGithub PR: https://github.com/tianocore/edk2/pull/5382\n\nCc: Leif Lindholm \nCc: Ard Biesheuvel \nCc: Sami Mujawar \nCc: Liming Gao \n\nSigned-off-by: Oliver Smith-Denny \nReviewed-by: Liming Gao ","shortMessageHtmlLink":"MdeModulePkg: DxeCore: Do Not Apply Guards to Unsupported Types"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEL_84jAA","startCursor":null,"endCursor":null}},"title":"Activity ยท cmruffin/edk2"}