[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v4 3/8] x86/EFI: retrieve EDID


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Wed, 6 Apr 2022 14:34:19 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=dkEt8Hq2s5G1yKfv6nnn+BAJnkQ/ANrkC9KsdGfg4BI=; b=mTsiLD70eXW7tWkkcXFfcNgUiyhcnp9eZNXnfmRNY4091QPCVwCMhJKT1yPTWG7MPxBWVRbb5TTizBd8vOLNIkq98Ae9VqgaTXJ1p9DieqJ4eLlVwICr4a1+OTEt02z9mX+LBubS+xmuBh13TEnDEMTLiich4wmf3tWSzcoHPQGkanaeP+nv1KqQfhfl9ljG0Vfd3ymmHG7WaPR0Q4OAnK0aZlPTaAKv44dleyDF2vzVa4k5pzruBz4Db6ECbHAe8F6bY+96SsEPsSSUOjObeN2XuU2z7zOoBCm3h8S8Ur+TGA1/hIYj68sLSPz6SGIWm/hGlJOmiFAQQqrN2LyhwA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Ms6+Nv7QobBCiRjzcD47Cm4JUoHoIN+V7+cTCZHJpB40ZtOtUhnAhex71E7ZKQvy8Pi/uZGdAVBcwPOWyvRuv0WCz9mrqeaBviGmhkZM7jat8mMXNezFttz81VhlGbM6d6P4x6eyjROByKOP7MoFVjkJhVY5uBIQj4Ww1Hqh7jRHW8Si4KInWV8e/PJtAkrfqjS4eUsMcpl1JjqJDEFGshB8rxsygbmS3i7s956qBpddlUhWHVwlHj4PF4qOCqNZ4oQ8yZGu6NbPFuA2bsL2H8RB5JIBLj2eES4D3aR8+DM/cqSeH8gN589wiU1b9P31rQ/tlx15eEtn8I27UMjbjA==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Volodymyr Babchuk <volodymyr_babchuk@xxxxxxxx>
  • Delivery-date: Wed, 06 Apr 2022 14:34:57 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHYROQkwx+joMfjCkSw++1xXxejZKzi/QIA
  • Thread-topic: [PATCH v4 3/8] x86/EFI: retrieve EDID

Hi Jan,

> On 31 Mar 2022, at 10:45, Jan Beulich <jbeulich@xxxxxxxx> wrote:
> 
> When booting directly from EFI, obtaining this information from EFI is
> the only possible way. And even when booting with a boot loader
> interposed, it's more clean not to use legacy BIOS calls for this
> purpose. (The downside being that there are no "capabilities" that we
> can retrieve the EFI way.)
> 
> To achieve this we need to propagate the handle used to obtain the
> EFI_GRAPHICS_OUTPUT_PROTOCOL instance for further obtaining an
> EFI_EDID_*_PROTOCOL instance, which has been part of the spec since 2.5.
> 
> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>

Acked-by: Bertrand Marquis <bertrand.marquis@xxxxxxx> #arm

Cheers
Bertrand




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.