Skip to content

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Feb 24, 2025

Bumps lcov-cobertura from 2.0.2 to 2.1.1.

Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Note
Automatic rebases have been disabled on this pull request as it has been open for over 30 days.

miczyg1 and others added 30 commits June 15, 2024 15:31
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
…turesStrings.uni: fix incorrect min timeout in helptext

Signed-off-by: Michał Kopeć <michal.kopec@3mdeb.com>
…ch other

Signed-off-by: Michał Kopeć <michal.kopec@3mdeb.com>
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
… name

Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
…n NETWORK_ENABLE

Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
MdeModulePkg:
 * add defines
 * add PcdDetectPs2KbOnCmdAck

DasharoPayloadPkg:
 * detect PS/2 keyboard by sending it an "echo" command if
   Dasharo/Ps2Controller is enabled or doesn't exist
 * remove PS/2 from ConIn if the variable exists and the keyboard is not
   connected or is disabled
…c: refresh logo after popup

Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Fixing one confusing debug message in
DasharoPayloadPkg/Library/SmmStoreLib/SmmStore.c in the process.

Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
…row for selected item and better contrast

Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
…vars are not populated but network boot is enabled

Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Signed-off-by: Kacper Stojek <kacper.stojek@3mdeb.com>
…ticatedVariableGuid as header

Signed-off-by: Michał Kopeć <michal.kopec@3mdeb.com>
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Signed-off-by: Karol Zmyslowski <karol.zmyslowski@3mdeb.com>
Signed-off-by: Michał Kopeć <michal.kopec@3mdeb.com>
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
…c: add more debug logs

Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
…c: reorganize Boot Manager registration

Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
…2 detection

Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Signed-off-by: Michał Kopeć <michal.kopec@3mdeb.com>
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
SergiiDmytruk and others added 26 commits December 19, 2024 17:45
Such strings include, for example, coreboot version information.

Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
Part of functions of the library are left unimplemented (return
EFI_UNSUPPORTED) the rest use information about current firmware
obtained from CBMEM and SMMSTOREv2 to perform flashing.

Flashing is slightly optimized: FmpDeviceSetImageWithStatus() first
reads a block and checks that it differs from the new contents before
initiating erase and write.

Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
…s HAP-disabled

HAP-disabled ME doesn't do anything, including writing to system flash,
which is what we need for a firmware update that relies on a warm reset.
coreboot assumes that HECI/soft-disabled state of ME isn't as good as
HMRFPO and switches to HMRFPO doing a global reset which loses in-RAM
capsules.

Checking variable's value should be enough, if somebody manually set it to
an invalid value, the update there will be a reboot without a capsule
update.  A more reliable solution would be to pass this information from
coreboot.

Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
…psules

Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
coreboot flash map data parsing library.

There is a small amount of code, so modify it to mostly look like EDK
code.

Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
This is a preparation for moving data from current image.

Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
Introduce and integrate MergeFirmwareImages() which will perform the
migration.

Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
The code is imported in its essentially unchanged form (although large
chunks of unused code were removed).  There is a header which maps C
symbols to their equivalents in EDK2 to make the code work without
modifications.

Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
Returning an error from this function can disable useful functionality
like capsule updates because progress bar treats such errors as fatal...

Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
The information is stored in CBFS files with known names.

Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
Simple EFI variables driver as a library.

Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
Instead of copying whole SMMSTORE region.

Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
…s bar

Position and size of progress bar produced by
DisplayUpdateProgressLibGraphics depends on the size of boot logo.
As the logo can be customized by users, a dummy logo with determinable
dimensions, depending on the size of current GOP mode, is created to
make progress bar appear always in the same place.

Signed-off-by: Krystian Hebel <krystian.hebel@3mdeb.com>
Project page: https://gitlab.com/bztsrc/scalable-font2

Signed-off-by: Krystian Hebel <krystian.hebel@3mdeb.com>
Signed-off-by: Krystian Hebel <krystian.hebel@3mdeb.com>
…errors

Reasoning for ignoring errors is that this driver gives only
informational output, and failure to do so shouldn't abort
the update process.

Signed-off-by: Krystian Hebel <krystian.hebel@3mdeb.com>
Previously, the code chose the highest non-reserved RAM region below
4G mark, regardless of its size. If the memory is fragmented, this
may result in failed memory allocation further down the line. Skip
regions smaller than PeiMemSize as defined in BlPeiEntryPoint.

In some cases, it isn't possible to differentiate between structures
in RAM (e.g. coreboot tables) and memory reserved by System Agent (e.g.
TSEG, GSM) based on memory region type. Both are reported as reserved
memory and they may even be combined into one region, but their caching
methods must be different. Because of that, MTRR setting code is no
longer called at this point. This depends on coreboot setting memory
caching attributes properly, which it already does.

Signed-off-by: Krystian Hebel <krystian.hebel@3mdeb.com>
This is required for initializing capsule update process from Linux's
capsule_loader.

It also fixes the possibility for putting the device in infinite FUM
loop by creating the variable with runtime access. SetVariable() in
WarnIfFirmwareUpdateMode() used to remove the variable failed because
of mismatched attributes.

According to UEFI specification,

> If a preexisting variable is rewritten with no access attributes
> specified, the variable will be deleted.

This is exactly what is needed. The other way to delete a variable is
to specify matching attributes and set the size of a variable as 0.

Signed-off-by: Krystian Hebel <krystian.hebel@3mdeb.com>
The MTRRs have already been programmed by FSB (coreboot).

Change-Id: I8c6e7657b789edac8ee83a89318209a598712db8
Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
Signed-off-by: Sergii Dmytruk <sergii.dmytruk@3mdeb.com>
…version

Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
…reshold

For some reason the CPU Throttling Threshold dsiplayed negative value when
user changed CPU throttling, exited Power Management Options menu, went back
to front page and then entered Power Management Options menu again.

Always calculate the threshold based on PCD and current throttling offset
value. Add interactive flag to the options and patch the value in the
callback.

Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
Bumps [lcov-cobertura](https://eriwen.github.io/lcov-to-cobertura-xml/) from 2.0.2 to 2.1.1.

---
updated-dependencies:
- dependency-name: lcov-cobertura
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file python Pull requests that update Python code labels Feb 24, 2025
@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Feb 24, 2025

Dependabot tried to add @makubacki, @mdkinney and @spbrogan as reviewers to this PR, but received the following error from GitHub:

POST https://api.github.com/repos/Dasharo/edk2/pulls/211/requested_reviewers: 422 - Reviews may only be requested from collaborators. One or more of the users or teams you specified is not a collaborator of the Dasharo/edk2 repository. // See: https://docs.github.com/rest/pulls/review-requests#request-reviewers-for-a-pull-request

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file python Pull requests that update Python code

Projects

None yet

Development

Successfully merging this pull request may close these issues.