fcd20d
import edk2-20190308git89910a39dcfd-6.el8
@@ -1,2 +1,2 @@
|
|
1
|
-
|
2
|
-
|
1
|
+
87a87bbfca0e751b2840f74b0612e2f0dad70535 SOURCES/edk2-89910a39dcfd.tar.xz
|
2
|
+
f0655dec5d8d815956bab417fcdb25e6da7e21b8 SOURCES/openssl-fedora-d2ede125556ac99aa0faa7744c703af3f559094e.tar.xz
|
@@ -1,2 +1,2 @@
|
|
1
|
-
SOURCES/edk2-
|
2
|
-
SOURCES/openssl-fedora-
|
1
|
+
SOURCES/edk2-89910a39dcfd.tar.xz
|
2
|
+
SOURCES/openssl-fedora-d2ede125556ac99aa0faa7744c703af3f559094e.tar.xz
|
@@ -1,8 +1,27 @@
|
|
1
|
-
From
|
1
|
+
From 727c11ecd9f34990312e14f239e6238693619849 Mon Sep 17 00:00:00 2001
|
2
2
|
From: Laszlo Ersek <lersek@redhat.com>
|
3
3
|
Date: Wed, 11 Jun 2014 23:33:33 +0200
|
4
4
|
Subject: advertise OpenSSL on TianoCore splash screen / boot logo (RHEL only)
|
5
5
|
|
6
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
7
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
8
|
+
|
9
|
+
- Upstream edk2 removed the obsoleted network drivers in MdeModulePkg. The
|
10
|
+
OvmfPkg platforms were adapted in commit d2f1f6423bd1 ("OvmfPkg: Replace
|
11
|
+
obsoleted network drivers from platform DSC/FDF.", 2018-11-06). The
|
12
|
+
ArmVirtPkg platforms were adapted in commit 9a67ba261fe9 ("ArmVirtPkg:
|
13
|
+
Replace obsoleted network drivers from platform DSC/FDF.", 2018-12-14).
|
14
|
+
|
15
|
+
Consequently, because the NetworkPkg iSCSI driver requires OpenSSL
|
16
|
+
unconditionally, as explained in
|
17
|
+
<https://bugzilla.tianocore.org/show_bug.cgi?id=1278#c3>, this patch now
|
18
|
+
builds LogoOpenSSLDxe unconditionally, squashing and updating previous
|
19
|
+
downstream commits
|
20
|
+
|
21
|
+
- 8e8ea8811e26 advertise OpenSSL on TianoCore splash screen / boot logo
|
22
|
+
(RHEL only)
|
23
|
+
- 02ed2c501cdd advertise OpenSSL due to IPv6 enablement too (RHEL only)
|
24
|
+
|
6
25
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
26
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
8
27
|
|
@@ -103,71 +122,64 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
103
122
|
(cherry picked from commit 32192c62e289f261f5ce74acee48e5a94561f10b)
|
104
123
|
(cherry picked from commit 33a710cd613c2ca7d534b8401e2f9f2178af05be)
|
105
124
|
(cherry picked from commit 0b2d90347cb016cc71c2de62e941a2a4ab0f35a3)
|
125
|
+
(cherry picked from commit 8e8ea8811e269cdb31103c70fcd91d2dcfb1755d)
|
126
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
106
127
|
---
|
107
|
-
ArmVirtPkg/ArmVirtQemu.dsc |
|
108
|
-
ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc |
|
109
|
-
ArmVirtPkg/ArmVirtQemuKernel.dsc |
|
128
|
+
ArmVirtPkg/ArmVirtQemu.dsc | 2 +-
|
129
|
+
ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc | 2 +-
|
130
|
+
ArmVirtPkg/ArmVirtQemuKernel.dsc | 2 +-
|
110
131
|
MdeModulePkg/Logo/Logo-OpenSSL.bmp | Bin 0 -> 156342 bytes
|
111
|
-
MdeModulePkg/Logo/Logo-OpenSSL.idf | 15
|
112
|
-
MdeModulePkg/Logo/LogoOpenSSLDxe.inf | 61
|
113
|
-
MdeModulePkg/Logo/LogoOpenSSLDxe.uni | 22
|
114
|
-
OvmfPkg/OvmfPkgIa32.dsc |
|
115
|
-
OvmfPkg/OvmfPkgIa32.fdf |
|
116
|
-
OvmfPkg/OvmfPkgIa32X64.dsc |
|
117
|
-
OvmfPkg/OvmfPkgIa32X64.fdf |
|
118
|
-
OvmfPkg/OvmfPkgX64.dsc |
|
119
|
-
OvmfPkg/OvmfPkgX64.fdf |
|
120
|
-
13 files changed,
|
132
|
+
MdeModulePkg/Logo/Logo-OpenSSL.idf | 15 +++++++
|
133
|
+
MdeModulePkg/Logo/LogoOpenSSLDxe.inf | 61 +++++++++++++++++++++++++++
|
134
|
+
MdeModulePkg/Logo/LogoOpenSSLDxe.uni | 22 ++++++++++
|
135
|
+
OvmfPkg/OvmfPkgIa32.dsc | 2 +-
|
136
|
+
OvmfPkg/OvmfPkgIa32.fdf | 2 +-
|
137
|
+
OvmfPkg/OvmfPkgIa32X64.dsc | 2 +-
|
138
|
+
OvmfPkg/OvmfPkgIa32X64.fdf | 2 +-
|
139
|
+
OvmfPkg/OvmfPkgX64.dsc | 2 +-
|
140
|
+
OvmfPkg/OvmfPkgX64.fdf | 2 +-
|
141
|
+
13 files changed, 107 insertions(+), 9 deletions(-)
|
121
142
|
create mode 100644 MdeModulePkg/Logo/Logo-OpenSSL.bmp
|
122
143
|
create mode 100644 MdeModulePkg/Logo/Logo-OpenSSL.idf
|
123
144
|
create mode 100644 MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
124
145
|
create mode 100644 MdeModulePkg/Logo/LogoOpenSSLDxe.uni
|
125
146
|
|
126
147
|
diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
|
127
|
-
index
|
148
|
+
index a77d71bcea..f2e5125494 100644
|
128
149
|
--- a/ArmVirtPkg/ArmVirtQemu.dsc
|
129
150
|
+++ b/ArmVirtPkg/ArmVirtQemu.dsc
|
130
|
-
|
151
|
+
|
131
152
|
MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
|
132
153
|
MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
|
133
154
|
MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
|
134
|
-
|
155
|
+
- MdeModulePkg/Logo/LogoDxe.inf
|
135
156
|
+ MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
136
|
-
+!else
|
137
|
-
MdeModulePkg/Logo/LogoDxe.inf
|
138
|
-
+!endif
|
139
157
|
MdeModulePkg/Application/UiApp/UiApp.inf {
|
140
158
|
<LibraryClasses>
|
141
159
|
NULL|MdeModulePkg/Library/DeviceManagerUiLib/DeviceManagerUiLib.inf
|
142
160
|
diff --git a/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc b/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
|
143
|
-
index
|
161
|
+
index 098d40b61b..ab799ca67f 100644
|
144
162
|
--- a/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
|
145
163
|
+++ b/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
|
146
|
-
@@ -
|
164
|
+
@@ -203,7 +203,7 @@ READ_LOCK_STATUS = TRUE
|
147
165
|
#
|
148
166
|
# TianoCore logo (splash screen)
|
149
167
|
#
|
150
|
-
|
168
|
+
- INF MdeModulePkg/Logo/LogoDxe.inf
|
151
169
|
+ INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
152
|
-
+!else
|
153
|
-
INF MdeModulePkg/Logo/LogoDxe.inf
|
154
|
-
+!endif
|
155
170
|
|
156
171
|
#
|
157
172
|
# Ramdisk support
|
158
173
|
diff --git a/ArmVirtPkg/ArmVirtQemuKernel.dsc b/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
159
|
-
index
|
174
|
+
index 1e5388ae70..d2b3f24394 100644
|
160
175
|
--- a/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
161
176
|
+++ b/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
162
|
-
|
177
|
+
|
163
178
|
MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
|
164
179
|
MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
|
165
180
|
MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
|
166
|
-
|
181
|
+
- MdeModulePkg/Logo/LogoDxe.inf
|
167
182
|
+ MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
168
|
-
+!else
|
169
|
-
MdeModulePkg/Logo/LogoDxe.inf
|
170
|
-
+!endif
|
171
183
|
MdeModulePkg/Application/UiApp/UiApp.inf {
|
172
184
|
<LibraryClasses>
|
173
185
|
NULL|MdeModulePkg/Library/DeviceManagerUiLib/DeviceManagerUiLib.inf
|
@@ -393,7 +405,7 @@ HcmV?d00001
|
|
393
405
|
|
394
406
|
diff --git a/MdeModulePkg/Logo/Logo-OpenSSL.idf b/MdeModulePkg/Logo/Logo-OpenSSL.idf
|
395
407
|
new file mode 100644
|
396
|
-
index
|
408
|
+
index 0000000000..a80de29a63
|
397
409
|
--- /dev/null
|
398
410
|
+++ b/MdeModulePkg/Logo/Logo-OpenSSL.idf
|
399
411
|
|
@@ -414,7 +426,7 @@ index 0000000..a80de29
|
|
414
426
|
+#image IMG_LOGO Logo-OpenSSL.bmp
|
415
427
|
diff --git a/MdeModulePkg/Logo/LogoOpenSSLDxe.inf b/MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
416
428
|
new file mode 100644
|
417
|
-
index
|
429
|
+
index 0000000000..2f79d873e2
|
418
430
|
--- /dev/null
|
419
431
|
+++ b/MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
420
432
|
|
@@ -481,7 +493,7 @@ index 0000000..2f79d87
|
|
481
493
|
+ LogoDxeExtra.uni
|
482
494
|
diff --git a/MdeModulePkg/Logo/LogoOpenSSLDxe.uni b/MdeModulePkg/Logo/LogoOpenSSLDxe.uni
|
483
495
|
new file mode 100644
|
484
|
-
index
|
496
|
+
index 0000000000..7227ac3910
|
485
497
|
--- /dev/null
|
486
498
|
+++ b/MdeModulePkg/Logo/LogoOpenSSLDxe.uni
|
487
499
|
|
@@ -508,101 +520,83 @@ index 0000000..7227ac3
|
|
508
520
|
+#string STR_MODULE_DESCRIPTION #language en-US "This module provides the logo bitmap picture (with OpenSSL advertisment) shown on setup screen, through EDKII Platform Logo protocol."
|
509
521
|
+
|
510
522
|
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
|
511
|
-
index
|
523
|
+
index 5b885590b2..249b1d8dc0 100644
|
512
524
|
--- a/OvmfPkg/OvmfPkgIa32.dsc
|
513
525
|
+++ b/OvmfPkg/OvmfPkgIa32.dsc
|
514
|
-
|
526
|
+
|
515
527
|
NULL|IntelFrameworkModulePkg/Library/LegacyBootManagerLib/LegacyBootManagerLib.inf
|
516
528
|
!endif
|
517
529
|
}
|
518
|
-
|
530
|
+
- MdeModulePkg/Logo/LogoDxe.inf
|
519
531
|
+ MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
520
|
-
+!else
|
521
|
-
MdeModulePkg/Logo/LogoDxe.inf
|
522
|
-
+!endif
|
523
532
|
MdeModulePkg/Application/UiApp/UiApp.inf {
|
524
533
|
<LibraryClasses>
|
525
534
|
NULL|MdeModulePkg/Library/DeviceManagerUiLib/DeviceManagerUiLib.inf
|
526
535
|
diff --git a/OvmfPkg/OvmfPkgIa32.fdf b/OvmfPkg/OvmfPkgIa32.fdf
|
527
|
-
index
|
536
|
+
index 4999403ad7..be3d3b4d14 100644
|
528
537
|
--- a/OvmfPkg/OvmfPkgIa32.fdf
|
529
538
|
+++ b/OvmfPkg/OvmfPkgIa32.fdf
|
530
|
-
@@ -
|
539
|
+
@@ -293,7 +293,7 @@ INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
|
531
|
-
INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
|
532
540
|
!endif
|
541
|
+
INF ShellPkg/Application/Shell/Shell.inf
|
533
542
|
|
534
|
-
|
543
|
+
-INF MdeModulePkg/Logo/LogoDxe.inf
|
535
544
|
+INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
536
|
-
+!else
|
537
|
-
INF MdeModulePkg/Logo/LogoDxe.inf
|
538
|
-
+!endif
|
539
545
|
|
540
546
|
#
|
541
547
|
# Network modules
|
542
548
|
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
|
543
|
-
index
|
549
|
+
index bbf0853ee6..5ec186df4b 100644
|
544
550
|
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
|
545
551
|
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
|
546
|
-
|
552
|
+
|
547
553
|
NULL|IntelFrameworkModulePkg/Library/LegacyBootManagerLib/LegacyBootManagerLib.inf
|
548
554
|
!endif
|
549
555
|
}
|
550
|
-
|
556
|
+
- MdeModulePkg/Logo/LogoDxe.inf
|
551
557
|
+ MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
552
|
-
+!else
|
553
|
-
MdeModulePkg/Logo/LogoDxe.inf
|
554
|
-
+!endif
|
555
558
|
MdeModulePkg/Application/UiApp/UiApp.inf {
|
556
559
|
<LibraryClasses>
|
557
560
|
NULL|MdeModulePkg/Library/DeviceManagerUiLib/DeviceManagerUiLib.inf
|
558
561
|
diff --git a/OvmfPkg/OvmfPkgIa32X64.fdf b/OvmfPkg/OvmfPkgIa32X64.fdf
|
559
|
-
index
|
562
|
+
index d0cc107928..b56160b3bf 100644
|
560
563
|
--- a/OvmfPkg/OvmfPkgIa32X64.fdf
|
561
564
|
+++ b/OvmfPkg/OvmfPkgIa32X64.fdf
|
562
|
-
@@ -
|
565
|
+
@@ -294,7 +294,7 @@ INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
|
563
|
-
INF RuleOverride = BINARY USE = X64 EdkShellBinPkg/FullShell/FullShell.inf
|
564
566
|
!endif
|
567
|
+
INF ShellPkg/Application/Shell/Shell.inf
|
565
568
|
|
566
|
-
|
569
|
+
-INF MdeModulePkg/Logo/LogoDxe.inf
|
567
570
|
+INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
568
|
-
+!else
|
569
|
-
INF MdeModulePkg/Logo/LogoDxe.inf
|
570
|
-
+!endif
|
571
571
|
|
572
572
|
#
|
573
573
|
# Network modules
|
574
574
|
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
|
575
|
-
index
|
575
|
+
index d81460f520..29538ade4d 100644
|
576
576
|
--- a/OvmfPkg/OvmfPkgX64.dsc
|
577
577
|
+++ b/OvmfPkg/OvmfPkgX64.dsc
|
578
|
-
|
578
|
+
|
579
579
|
NULL|IntelFrameworkModulePkg/Library/LegacyBootManagerLib/LegacyBootManagerLib.inf
|
580
580
|
!endif
|
581
581
|
}
|
582
|
-
|
582
|
+
- MdeModulePkg/Logo/LogoDxe.inf
|
583
583
|
+ MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
584
|
-
+!else
|
585
|
-
MdeModulePkg/Logo/LogoDxe.inf
|
586
|
-
+!endif
|
587
584
|
MdeModulePkg/Application/UiApp/UiApp.inf {
|
588
585
|
<LibraryClasses>
|
589
586
|
NULL|MdeModulePkg/Library/DeviceManagerUiLib/DeviceManagerUiLib.inf
|
590
587
|
diff --git a/OvmfPkg/OvmfPkgX64.fdf b/OvmfPkg/OvmfPkgX64.fdf
|
591
|
-
index
|
588
|
+
index d0cc107928..b56160b3bf 100644
|
592
589
|
--- a/OvmfPkg/OvmfPkgX64.fdf
|
593
590
|
+++ b/OvmfPkg/OvmfPkgX64.fdf
|
594
|
-
@@ -
|
591
|
+
@@ -294,7 +294,7 @@ INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
|
595
|
-
INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
|
596
592
|
!endif
|
593
|
+
INF ShellPkg/Application/Shell/Shell.inf
|
597
594
|
|
598
|
-
|
595
|
+
-INF MdeModulePkg/Logo/LogoDxe.inf
|
599
596
|
+INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
600
|
-
+!else
|
601
|
-
INF MdeModulePkg/Logo/LogoDxe.inf
|
602
|
-
+!endif
|
603
597
|
|
604
598
|
#
|
605
599
|
# Network modules
|
606
600
|
--
|
607
|
-
|
601
|
+
2.18.1
|
608
602
|
|
@@ -1,8 +1,13 @@
|
|
1
|
-
From
|
1
|
+
From a1260c9122c95bcbef1efc5eebe11902767813c2 Mon Sep 17 00:00:00 2001
|
2
2
|
From: Laszlo Ersek <lersek@redhat.com>
|
3
3
|
Date: Thu, 20 Feb 2014 22:54:45 +0100
|
4
4
|
Subject: OvmfPkg: increase max debug message length to 512 (RHEL only)
|
5
5
|
|
6
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
7
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
8
|
+
|
9
|
+
- no changes
|
10
|
+
|
6
11
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
12
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
8
13
|
|
@@ -34,12 +39,14 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
34
39
|
(cherry picked from commit 29435a32ec9428720c74c454ce9817662e601fb6)
|
35
40
|
(cherry picked from commit 58e1d1ebb78bfdaf05f4c6e8abf8d4908dfa038a)
|
36
41
|
(cherry picked from commit 1df2c822c996ad767f2f45570ab2686458f7604a)
|
42
|
+
(cherry picked from commit 22c9b4e971c70c69b4adf8eb93133824ccb6426a)
|
43
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
37
44
|
---
|
38
45
|
OvmfPkg/Library/PlatformDebugLibIoPort/DebugLib.c | 2 +-
|
39
46
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
40
47
|
|
41
48
|
diff --git a/OvmfPkg/Library/PlatformDebugLibIoPort/DebugLib.c b/OvmfPkg/Library/PlatformDebugLibIoPort/DebugLib.c
|
42
|
-
index
|
49
|
+
index 36cde54976..c0c4eaee0f 100644
|
43
50
|
--- a/OvmfPkg/Library/PlatformDebugLibIoPort/DebugLib.c
|
44
51
|
+++ b/OvmfPkg/Library/PlatformDebugLibIoPort/DebugLib.c
|
45
52
|
|
@@ -52,5 +59,5 @@ index 36cde54..c0c4eae 100644
|
|
52
59
|
/**
|
53
60
|
Prints a debug message to the debug output device if the specified error level is enabled.
|
54
61
|
--
|
55
|
-
|
62
|
+
2.18.1
|
56
63
|
|
@@ -1,8 +1,13 @@
|
|
1
|
-
From
|
1
|
+
From bd264265a99c60f45cadaa4109a9db59ae218471 Mon Sep 17 00:00:00 2001
|
2
2
|
From: Laszlo Ersek <lersek@redhat.com>
|
3
3
|
Date: Thu, 12 Jun 2014 00:17:59 +0200
|
4
4
|
Subject: OvmfPkg: QemuVideoDxe: enable debug messages in VbeShim (RHEL only)
|
5
5
|
|
6
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
7
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
8
|
+
|
9
|
+
- no changes
|
10
|
+
|
6
11
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
12
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
8
13
|
|
@@ -42,13 +47,15 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
42
47
|
(cherry picked from commit ed45b26dbeadd63dd8f2edf627290957d8bbb3b2)
|
43
48
|
(cherry picked from commit 9a8a034ebc082f86fdbb54dc1303a5059508e14c)
|
44
49
|
(cherry picked from commit 7046d6040181bb0f76a5ebd680e0dc701c895dba)
|
50
|
+
(cherry picked from commit 4dd1cc745bc9a8c8b32b5810b40743fed1e36d7e)
|
51
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
45
52
|
---
|
46
53
|
OvmfPkg/QemuVideoDxe/VbeShim.asm | 2 +-
|
47
|
-
OvmfPkg/QemuVideoDxe/VbeShim.h | 481
|
54
|
+
OvmfPkg/QemuVideoDxe/VbeShim.h | 481 ++++++++++++++++++++-----------
|
48
55
|
2 files changed, 308 insertions(+), 175 deletions(-)
|
49
56
|
|
50
57
|
diff --git a/OvmfPkg/QemuVideoDxe/VbeShim.asm b/OvmfPkg/QemuVideoDxe/VbeShim.asm
|
51
|
-
index
|
58
|
+
index 18fa9209d4..f87ed5cf30 100644
|
52
59
|
--- a/OvmfPkg/QemuVideoDxe/VbeShim.asm
|
53
60
|
+++ b/OvmfPkg/QemuVideoDxe/VbeShim.asm
|
54
61
|
|
@@ -61,7 +68,7 @@ index 18fa920..f87ed5c 100644
|
|
61
68
|
%macro DebugLog 1
|
62
69
|
%ifdef DEBUG
|
63
70
|
diff --git a/OvmfPkg/QemuVideoDxe/VbeShim.h b/OvmfPkg/QemuVideoDxe/VbeShim.h
|
64
|
-
index
|
71
|
+
index cc9b6e14cd..325d6478a1 100644
|
65
72
|
--- a/OvmfPkg/QemuVideoDxe/VbeShim.h
|
66
73
|
+++ b/OvmfPkg/QemuVideoDxe/VbeShim.h
|
67
74
|
@@ -517,185 +517,318 @@ STATIC CONST UINT8 mVbeShim[] = {
|
@@ -558,5 +565,5 @@ index cc9b6e1..325d647 100644
|
|
558
565
|
};
|
559
566
|
#endif
|
560
567
|
--
|
561
|
-
|
568
|
+
2.18.1
|
562
569
|
|
@@ -1,8 +1,13 @@
|
|
1
|
-
From
|
1
|
+
From 4e4e15b80a5b2103eadd495ef4a830d46dd4ed51 Mon Sep 17 00:00:00 2001
|
2
2
|
From: Laszlo Ersek <lersek@redhat.com>
|
3
3
|
Date: Tue, 25 Feb 2014 18:40:35 +0100
|
4
4
|
Subject: MdeModulePkg: TerminalDxe: add other text resolutions (RHEL only)
|
5
5
|
|
6
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
7
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
8
|
+
|
9
|
+
- no change
|
10
|
+
|
6
11
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
12
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
8
13
|
|
@@ -83,12 +88,14 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
83
88
|
(cherry picked from commit 99dc3720ac86059f60156197328cc433603c536e)
|
84
89
|
(cherry picked from commit d2066c1748f885043026c51dec1bc8d6d406ae8f)
|
85
90
|
(cherry picked from commit 1facdd58e946c584a3dc1e5be8f2f837b5a7c621)
|
91
|
+
(cherry picked from commit 28faeb5f94b4866b9da16cf2a1e4e0fc09a26e37)
|
92
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
86
93
|
---
|
87
|
-
.../Universal/Console/TerminalDxe/Terminal.c
|
94
|
+
.../Universal/Console/TerminalDxe/Terminal.c | 41 +++++++++++++++++--
|
88
95
|
1 file changed, 38 insertions(+), 3 deletions(-)
|
89
96
|
|
90
97
|
diff --git a/MdeModulePkg/Universal/Console/TerminalDxe/Terminal.c b/MdeModulePkg/Universal/Console/TerminalDxe/Terminal.c
|
91
|
-
index
|
98
|
+
index 66dd3ad550..78a198379a 100644
|
92
99
|
--- a/MdeModulePkg/Universal/Console/TerminalDxe/Terminal.c
|
93
100
|
+++ b/MdeModulePkg/Universal/Console/TerminalDxe/Terminal.c
|
94
101
|
@@ -113,9 +113,44 @@ TERMINAL_DEV mTerminalDevTemplate = {
|
@@ -140,5 +147,5 @@ index 66dd3ad..78a1983 100644
|
|
140
147
|
// New modes can be added here.
|
141
148
|
//
|
142
149
|
--
|
143
|
-
|
150
|
+
2.18.1
|
144
151
|
|
@@ -1,9 +1,14 @@
|
|
1
|
-
From
|
1
|
+
From cfccb98d13e955beb0b93b4a75a973f30c273ffc Mon Sep 17 00:00:00 2001
|
2
2
|
From: Laszlo Ersek <lersek@redhat.com>
|
3
3
|
Date: Tue, 25 Feb 2014 22:40:01 +0100
|
4
4
|
Subject: MdeModulePkg: TerminalDxe: set xterm resolution on mode change (RH
|
5
5
|
only)
|
6
6
|
|
7
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
8
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
9
|
+
|
10
|
+
- no change
|
11
|
+
|
7
12
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
8
13
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
9
14
|
|
@@ -42,17 +47,19 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
42
47
|
(cherry picked from commit 2909e025db6878723b49644a8a0cf160d07e6444)
|
43
48
|
(cherry picked from commit b9c5c901f25e48d68eef6e78a4abca00e153f574)
|
44
49
|
(cherry picked from commit b7f6115b745de8cbc5214b6ede33c9a8558beb90)
|
50
|
+
(cherry picked from commit 67415982afdc77922aa37496c981adeb4351acdb)
|
51
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
45
52
|
---
|
46
|
-
MdeModulePkg/MdeModulePkg.dec
|
47
|
-
.../
|
48
|
-
.../
|
53
|
+
MdeModulePkg/MdeModulePkg.dec | 4 +++
|
54
|
+
.../Console/TerminalDxe/TerminalConOut.c | 30 +++++++++++++++++++
|
55
|
+
.../Console/TerminalDxe/TerminalDxe.inf | 2 ++
|
49
56
|
3 files changed, 36 insertions(+)
|
50
57
|
|
51
58
|
diff --git a/MdeModulePkg/MdeModulePkg.dec b/MdeModulePkg/MdeModulePkg.dec
|
52
|
-
index
|
59
|
+
index a2130bc439..dcd118ba62 100644
|
53
60
|
--- a/MdeModulePkg/MdeModulePkg.dec
|
54
61
|
+++ b/MdeModulePkg/MdeModulePkg.dec
|
55
|
-
|
62
|
+
|
56
63
|
# @Prompt The address mask when memory encryption is enabled.
|
57
64
|
gEfiMdeModulePkgTokenSpaceGuid.PcdPteMemoryEncryptionAddressOrMask|0x0|UINT64|0x30001047
|
58
65
|
|
@@ -64,7 +71,7 @@ index cc39718..384d901 100644
|
|
64
71
|
## Specify memory size with page number for PEI code when
|
65
72
|
# Loading Module at Fixed Address feature is enabled.
|
66
73
|
diff --git a/MdeModulePkg/Universal/Console/TerminalDxe/TerminalConOut.c b/MdeModulePkg/Universal/Console/TerminalDxe/TerminalConOut.c
|
67
|
-
index
|
74
|
+
index 4d7218e415..295e7641a5 100644
|
68
75
|
--- a/MdeModulePkg/Universal/Console/TerminalDxe/TerminalConOut.c
|
69
76
|
+++ b/MdeModulePkg/Universal/Console/TerminalDxe/TerminalConOut.c
|
70
77
|
@@ -13,6 +13,8 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
@@ -76,10 +83,11 @@ index 5a83431..fbc1e0a 100644
|
|
76
83
|
#include "Terminal.h"
|
77
84
|
|
78
85
|
//
|
79
|
-
@@ -
|
86
|
+
@@ -86,6 +88,16 @@ CHAR16 mSetCursorPositionString[] = { ESC, '[', '0', '0', ';', '0', '0', 'H', 0
|
87
|
+
CHAR16 mCursorForwardString[] = { ESC, '[', '0', '0', 'C', 0 };
|
80
88
|
CHAR16 mCursorBackwardString[] = { ESC, '[', '0', '0', 'D', 0 };
|
81
89
|
|
82
|
-
|
90
|
+
+//
|
83
91
|
+// Note that this is an ASCII format string, taking two INT32 arguments:
|
84
92
|
+// rows, columns.
|
85
93
|
+//
|
@@ -89,10 +97,9 @@ index 5a83431..fbc1e0a 100644
|
|
89
97
|
+#define RESIZE_SEQ_SIZE (sizeof mResizeTextAreaFormatString + 2 * (11 - 2))
|
90
98
|
+
|
91
99
|
+
|
92
|
-
|
100
|
+
//
|
93
101
|
// Body of the ConOut functions
|
94
102
|
//
|
95
|
-
|
96
103
|
@@ -508,6 +520,24 @@ TerminalConOutSetMode (
|
97
104
|
return EFI_DEVICE_ERROR;
|
98
105
|
}
|
@@ -119,7 +126,7 @@ index 5a83431..fbc1e0a 100644
|
|
119
126
|
|
120
127
|
Status = This->ClearScreen (This);
|
121
128
|
diff --git a/MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf b/MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
|
122
|
-
index
|
129
|
+
index 15b4ac1c33..a704bc17e5 100644
|
123
130
|
--- a/MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
|
124
131
|
+++ b/MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
|
125
132
|
|
@@ -139,5 +146,5 @@ index 0780296..bd2ba82 100644
|
|
139
146
|
# [Event]
|
140
147
|
# # Relative timer event set by UnicodeToEfiKey(), used to be one 2 seconds input timeout.
|
141
148
|
--
|
142
|
-
|
149
|
+
2.18.1
|
143
150
|
|
@@ -1,8 +1,13 @@
|
|
1
|
-
From
|
1
|
+
From f9b73437b9b231773c1a20e0c516168817a930a2 Mon Sep 17 00:00:00 2001
|
2
2
|
From: Laszlo Ersek <lersek@redhat.com>
|
3
3
|
Date: Wed, 14 Oct 2015 15:59:06 +0200
|
4
4
|
Subject: OvmfPkg: take PcdResizeXterm from the QEMU command line (RH only)
|
5
5
|
|
6
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
7
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
8
|
+
|
9
|
+
- no change
|
10
|
+
|
6
11
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
12
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
8
13
|
|
@@ -31,6 +36,8 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
31
36
|
(cherry picked from commit 8abc2a6ddad25af7e88dc0cf57d55dfb75fbf92d)
|
32
37
|
(cherry picked from commit b311932d3841c017a0f0fec553edcac365cc2038)
|
33
38
|
(cherry picked from commit 61914fb81cf624c9028d015533b400b2794e52d3)
|
39
|
+
(cherry picked from commit 2ebf3cc2ae99275d63bb6efd3c22dec76251a853)
|
40
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
34
41
|
---
|
35
42
|
OvmfPkg/OvmfPkgIa32.dsc | 1 +
|
36
43
|
OvmfPkg/OvmfPkgIa32X64.dsc | 1 +
|
@@ -40,10 +47,10 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
40
47
|
5 files changed, 5 insertions(+)
|
41
48
|
|
42
49
|
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
|
43
|
-
index
|
50
|
+
index 249b1d8dc0..3f1da66aab 100644
|
44
51
|
--- a/OvmfPkg/OvmfPkgIa32.dsc
|
45
52
|
+++ b/OvmfPkg/OvmfPkgIa32.dsc
|
46
|
-
|
53
|
+
|
47
54
|
# ($(SMM_REQUIRE) == FALSE)
|
48
55
|
gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvStoreReserved|0
|
49
56
|
|
@@ -52,10 +59,10 @@ index a5bb2b0..b577767 100644
|
|
52
59
|
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase|0
|
53
60
|
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase|0
|
54
61
|
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
|
55
|
-
index
|
62
|
+
index 5ec186df4b..9bb0a4cede 100644
|
56
63
|
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
|
57
64
|
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
|
58
|
-
|
65
|
+
|
59
66
|
# ($(SMM_REQUIRE) == FALSE)
|
60
67
|
gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvStoreReserved|0
|
61
68
|
|
@@ -64,10 +71,10 @@ index be8fee9..a6a40be 100644
|
|
64
71
|
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase|0
|
65
72
|
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase|0
|
66
73
|
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
|
67
|
-
index
|
74
|
+
index 29538ade4d..3b7fc5328c 100644
|
68
75
|
--- a/OvmfPkg/OvmfPkgX64.dsc
|
69
76
|
+++ b/OvmfPkg/OvmfPkgX64.dsc
|
70
|
-
|
77
|
+
|
71
78
|
# ($(SMM_REQUIRE) == FALSE)
|
72
79
|
gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvStoreReserved|0
|
73
80
|
|
@@ -76,7 +83,7 @@ index e224b0e..8bd3754 100644
|
|
76
83
|
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase|0
|
77
84
|
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase|0
|
78
85
|
diff --git a/OvmfPkg/PlatformPei/Platform.c b/OvmfPkg/PlatformPei/Platform.c
|
79
|
-
index
|
86
|
+
index 22139a64cb..64b8034117 100644
|
80
87
|
--- a/OvmfPkg/PlatformPei/Platform.c
|
81
88
|
+++ b/OvmfPkg/PlatformPei/Platform.c
|
82
89
|
@@ -670,6 +670,7 @@ InitializePlatform (
|
@@ -86,12 +93,12 @@ index 5a78668..544ac54 100644
|
|
86
93
|
+ UPDATE_BOOLEAN_PCD_FROM_FW_CFG (PcdResizeXterm);
|
87
94
|
}
|
88
95
|
|
89
|
-
|
96
|
+
InstallClearCacheCallback ();
|
90
97
|
diff --git a/OvmfPkg/PlatformPei/PlatformPei.inf b/OvmfPkg/PlatformPei/PlatformPei.inf
|
91
|
-
index
|
98
|
+
index 5c8dd0fe6d..035ce249fe 100644
|
92
99
|
--- a/OvmfPkg/PlatformPei/PlatformPei.inf
|
93
100
|
+++ b/OvmfPkg/PlatformPei/PlatformPei.inf
|
94
|
-
|
101
|
+
|
95
102
|
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize
|
96
103
|
gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvStoreReserved
|
97
104
|
gEfiMdeModulePkgTokenSpaceGuid.PcdPciDisableBusEnumeration
|
@@ -100,5 +107,5 @@ index 30ceb4b..016c067 100644
|
|
100
107
|
gEfiMdeModulePkgTokenSpaceGuid.PcdUse1GPageTable
|
101
108
|
gEfiMdeModulePkgTokenSpaceGuid.PcdSetNxForStack
|
102
109
|
--
|
103
|
-
|
110
|
+
2.18.1
|
104
111
|
|
@@ -1,8 +1,13 @@
|
|
1
|
-
From
|
1
|
+
From f372886be5f1c41677f168be77c484bae5841361 Mon Sep 17 00:00:00 2001
|
2
2
|
From: Laszlo Ersek <lersek@redhat.com>
|
3
3
|
Date: Tue, 12 Apr 2016 20:50:25 +0200
|
4
4
|
Subject: ArmVirtPkg: QemuFwCfgLib: allow UEFI_DRIVER client modules (RH only)
|
5
5
|
|
6
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
7
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
8
|
+
|
9
|
+
- no change
|
10
|
+
|
6
11
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
12
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
8
13
|
|
@@ -28,12 +33,14 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
28
33
|
(cherry picked from commit 5af259a93f4bbee5515ae18638068125e170f2cd)
|
29
34
|
(cherry picked from commit 22b073005af491eef177ef5f80ffe71c1ebabb03)
|
30
35
|
(cherry picked from commit f77f1e7dd6013f918c70e089c95b8f4166085fb9)
|
36
|
+
(cherry picked from commit 762595334aa7ce88412cc77e136db9b41577a699)
|
37
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
31
38
|
---
|
32
39
|
ArmVirtPkg/Library/QemuFwCfgLib/QemuFwCfgLib.inf | 2 +-
|
33
40
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
34
41
|
|
35
42
|
diff --git a/ArmVirtPkg/Library/QemuFwCfgLib/QemuFwCfgLib.inf b/ArmVirtPkg/Library/QemuFwCfgLib/QemuFwCfgLib.inf
|
36
|
-
index
|
43
|
+
index eff4a21650..adf1ff6c6a 100644
|
37
44
|
--- a/ArmVirtPkg/Library/QemuFwCfgLib/QemuFwCfgLib.inf
|
38
45
|
+++ b/ArmVirtPkg/Library/QemuFwCfgLib/QemuFwCfgLib.inf
|
39
46
|
|
@@ -46,5 +53,5 @@ index eff4a21..adf1ff6 100644
|
|
46
53
|
CONSTRUCTOR = QemuFwCfgInitialize
|
47
54
|
|
48
55
|
--
|
49
|
-
|
56
|
+
2.18.1
|
50
57
|
|
@@ -1,8 +1,13 @@
|
|
1
|
-
From
|
1
|
+
From 232fcf06f6b3048b7c2ebd6931f23186b3852f04 Mon Sep 17 00:00:00 2001
|
2
2
|
From: Laszlo Ersek <lersek@redhat.com>
|
3
3
|
Date: Sun, 26 Jul 2015 08:02:50 +0000
|
4
4
|
Subject: ArmVirtPkg: take PcdResizeXterm from the QEMU command line (RH only)
|
5
5
|
|
6
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
7
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
8
|
+
|
9
|
+
- no change
|
10
|
+
|
6
11
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
12
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
8
13
|
|
@@ -33,19 +38,21 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
33
38
|
(cherry picked from commit d4564d39dfdbf74e762af43314005a2c026cb262)
|
34
39
|
(cherry picked from commit c9081ebe3bcd28e5cce4bf58bd8d4fca12f9af7c)
|
35
40
|
(cherry picked from commit 8e92730c8e1cdb642b3b3e680e643ff774a90c65)
|
41
|
+
(cherry picked from commit 9448b6b46267d8d807fac0c648e693171bb34806)
|
42
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
36
43
|
---
|
37
|
-
ArmVirtPkg/ArmVirtQemu.dsc
|
38
|
-
.../TerminalPcdProducerLib.c
|
39
|
-
.../TerminalPcdProducerLib.inf
|
44
|
+
ArmVirtPkg/ArmVirtQemu.dsc | 7 +-
|
45
|
+
.../TerminalPcdProducerLib.c | 87 +++++++++++++++++++
|
46
|
+
.../TerminalPcdProducerLib.inf | 41 +++++++++
|
40
47
|
3 files changed, 134 insertions(+), 1 deletion(-)
|
41
48
|
create mode 100644 ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.c
|
42
49
|
create mode 100644 ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.inf
|
43
50
|
|
44
51
|
diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
|
45
|
-
index
|
52
|
+
index f2e5125494..9fc78d4e0a 100644
|
46
53
|
--- a/ArmVirtPkg/ArmVirtQemu.dsc
|
47
54
|
+++ b/ArmVirtPkg/ArmVirtQemu.dsc
|
48
|
-
|
55
|
+
|
49
56
|
gEfiMdeModulePkgTokenSpaceGuid.PcdSmbiosDocRev|0x0
|
50
57
|
gUefiOvmfPkgTokenSpaceGuid.PcdQemuSmbiosValidated|FALSE
|
51
58
|
|
@@ -54,7 +61,7 @@ index 7331597..4bf94ce 100644
|
|
54
61
|
[PcdsDynamicHii]
|
55
62
|
gArmVirtTokenSpaceGuid.PcdForceNoAcpi|L"ForceNoAcpi"|gArmVirtVariableGuid|0x0|FALSE|NV,BS
|
56
63
|
|
57
|
-
|
64
|
+
|
58
65
|
MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
|
59
66
|
MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
|
60
67
|
MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
|
@@ -68,7 +75,7 @@ index 7331597..4bf94ce 100644
|
|
68
75
|
MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
|
69
76
|
diff --git a/ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.c b/ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.c
|
70
77
|
new file mode 100644
|
71
|
-
index
|
78
|
+
index 0000000000..814ad48199
|
72
79
|
--- /dev/null
|
73
80
|
+++ b/ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.c
|
74
81
|
|
@@ -161,7 +168,7 @@ index 0000000..814ad48
|
|
161
168
|
+}
|
162
169
|
diff --git a/ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.inf b/ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.inf
|
163
170
|
new file mode 100644
|
164
|
-
index
|
171
|
+
index 0000000000..fecb37bcdf
|
165
172
|
--- /dev/null
|
166
173
|
+++ b/ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.inf
|
167
174
|
|
@@ -207,5 +214,5 @@ index 0000000..fecb37b
|
|
207
214
|
+[Pcd]
|
208
215
|
+ gEfiMdeModulePkgTokenSpaceGuid.PcdResizeXterm
|
209
216
|
--
|
210
|
-
|
217
|
+
2.18.1
|
211
218
|
|
@@ -1,9 +1,17 @@
|
|
1
|
-
From
|
1
|
+
From 8628ef1b8d675ebec39d83834abbe3c8c8c42cf4 Mon Sep 17 00:00:00 2001
|
2
2
|
From: Laszlo Ersek <lersek@redhat.com>
|
3
3
|
Date: Tue, 4 Nov 2014 23:02:53 +0100
|
4
4
|
Subject: OvmfPkg: allow exclusion of the shell from the firmware image (RH
|
5
5
|
only)
|
6
6
|
|
7
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
8
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
9
|
+
|
10
|
+
- update the patch against the following upstream commits:
|
11
|
+
- 4b888334d234 ("OvmfPkg: Remove EdkShellBinPkg in FDF", 2018-11-19)
|
12
|
+
- 277a3958d93a ("OvmfPkg: Don't include TftpDynamicCommand in XCODE5
|
13
|
+
tool chain", 2018-11-27)
|
14
|
+
|
7
15
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
8
16
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
9
17
|
|
@@ -70,6 +78,8 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
70
78
|
(cherry picked from commit d9dd9ee42937b2611fe37183cc9ec7f62d946933)
|
71
79
|
(cherry picked from commit 23df46ebbe7b09451d3a05034acd4d3a25e7177b)
|
72
80
|
(cherry picked from commit f0303f71d576c51b01c4ff961b429d0e0e707245)
|
81
|
+
(cherry picked from commit bbd64eb8658e9a33eab4227d9f4e51ad78d9f687)
|
82
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
73
83
|
---
|
74
84
|
OvmfPkg/OvmfPkgIa32.fdf | 2 ++
|
75
85
|
OvmfPkg/OvmfPkgIa32X64.fdf | 2 ++
|
@@ -77,62 +87,56 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
77
87
|
3 files changed, 6 insertions(+)
|
78
88
|
|
79
89
|
diff --git a/OvmfPkg/OvmfPkgIa32.fdf b/OvmfPkg/OvmfPkgIa32.fdf
|
80
|
-
index
|
90
|
+
index be3d3b4d14..a545f7c2a6 100644
|
81
91
|
--- a/OvmfPkg/OvmfPkgIa32.fdf
|
82
92
|
+++ b/OvmfPkg/OvmfPkgIa32.fdf
|
83
|
-
@@ -288,
|
93
|
+
@@ -288,10 +288,12 @@ INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResour
|
84
94
|
INF FatPkg/EnhancedFatDxe/Fat.inf
|
85
95
|
INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
|
86
96
|
|
87
97
|
+!ifndef $(EXCLUDE_SHELL_FROM_FD)
|
88
|
-
!
|
98
|
+
!if $(TOOL_CHAIN_TAG) != "XCODE5"
|
89
99
|
INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
|
90
|
-
INF ShellPkg/Application/Shell/Shell.inf
|
91
|
-
!else
|
92
|
-
INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
|
93
100
|
!endif
|
101
|
+
INF ShellPkg/Application/Shell/Shell.inf
|
94
102
|
+!endif
|
95
103
|
|
96
|
-
!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
97
104
|
INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
105
|
+
|
98
106
|
diff --git a/OvmfPkg/OvmfPkgIa32X64.fdf b/OvmfPkg/OvmfPkgIa32X64.fdf
|
99
|
-
index
|
107
|
+
index b56160b3bf..fe24e86b92 100644
|
100
108
|
--- a/OvmfPkg/OvmfPkgIa32X64.fdf
|
101
109
|
+++ b/OvmfPkg/OvmfPkgIa32X64.fdf
|
102
|
-
@@ -289,
|
110
|
+
@@ -289,10 +289,12 @@ INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResour
|
103
111
|
INF FatPkg/EnhancedFatDxe/Fat.inf
|
104
112
|
INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
|
105
113
|
|
106
114
|
+!ifndef $(EXCLUDE_SHELL_FROM_FD)
|
107
|
-
!
|
115
|
+
!if $(TOOL_CHAIN_TAG) != "XCODE5"
|
108
116
|
INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
|
109
|
-
INF ShellPkg/Application/Shell/Shell.inf
|
110
|
-
!else
|
111
|
-
INF RuleOverride = BINARY USE = X64 EdkShellBinPkg/FullShell/FullShell.inf
|
112
117
|
!endif
|
118
|
+
INF ShellPkg/Application/Shell/Shell.inf
|
113
119
|
+!endif
|
114
120
|
|
115
|
-
!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
116
121
|
INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
122
|
+
|
117
123
|
diff --git a/OvmfPkg/OvmfPkgX64.fdf b/OvmfPkg/OvmfPkgX64.fdf
|
118
|
-
index
|
124
|
+
index b56160b3bf..fe24e86b92 100644
|
119
125
|
--- a/OvmfPkg/OvmfPkgX64.fdf
|
120
126
|
+++ b/OvmfPkg/OvmfPkgX64.fdf
|
121
|
-
@@ -289,
|
127
|
+
@@ -289,10 +289,12 @@ INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResour
|
122
128
|
INF FatPkg/EnhancedFatDxe/Fat.inf
|
123
129
|
INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
|
124
130
|
|
125
131
|
+!ifndef $(EXCLUDE_SHELL_FROM_FD)
|
126
|
-
!
|
132
|
+
!if $(TOOL_CHAIN_TAG) != "XCODE5"
|
127
133
|
INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
|
128
|
-
INF ShellPkg/Application/Shell/Shell.inf
|
129
|
-
!else
|
130
|
-
INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
|
131
134
|
!endif
|
135
|
+
INF ShellPkg/Application/Shell/Shell.inf
|
132
136
|
+!endif
|
133
137
|
|
134
|
-
!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
135
138
|
INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
139
|
+
|
136
140
|
--
|
137
|
-
|
141
|
+
2.18.1
|
138
142
|
|
@@ -1,9 +1,14 @@
|
|
1
|
-
From
|
1
|
+
From 60737ccca40e6b4f11da438892c862b254dbfac9 Mon Sep 17 00:00:00 2001
|
2
2
|
From: Laszlo Ersek <lersek@redhat.com>
|
3
3
|
Date: Tue, 4 Nov 2014 23:02:55 +0100
|
4
4
|
Subject: OvmfPkg: EnrollDefaultKeys: application for enrolling default keys
|
5
5
|
(RH only)
|
6
6
|
|
7
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
8
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
9
|
+
|
10
|
+
- no change
|
11
|
+
|
7
12
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
8
13
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
9
14
|
|
@@ -214,19 +219,21 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
214
219
|
(cherry picked from commit c0b2615a9c0b4a4be1bffe45681a32915449279d)
|
215
220
|
(cherry picked from commit 92424de98ffaf1fa81e6346949b1d2b5f9a637ca)
|
216
221
|
(cherry picked from commit 98c91b36997e3afc4192449263182fbdcc771a1a)
|
222
|
+
(cherry picked from commit b59ee7769814e207c917615af78c7428bdf3b450)
|
223
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
217
224
|
---
|
218
|
-
OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c
|
219
|
-
|
220
|
-
OvmfPkg/OvmfPkgIa32.dsc
|
221
|
-
OvmfPkg/OvmfPkgIa32X64.dsc
|
222
|
-
OvmfPkg/OvmfPkgX64.dsc
|
225
|
+
OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c | 1015 +++++++++++++++++
|
226
|
+
.../EnrollDefaultKeys/EnrollDefaultKeys.inf | 52 +
|
227
|
+
OvmfPkg/OvmfPkgIa32.dsc | 4 +
|
228
|
+
OvmfPkg/OvmfPkgIa32X64.dsc | 4 +
|
229
|
+
OvmfPkg/OvmfPkgX64.dsc | 4 +
|
223
230
|
5 files changed, 1079 insertions(+)
|
224
231
|
create mode 100644 OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c
|
225
232
|
create mode 100644 OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf
|
226
233
|
|
227
234
|
diff --git a/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c
|
228
235
|
new file mode 100644
|
229
|
-
index
|
236
|
+
index 0000000000..dd413df12d
|
230
237
|
--- /dev/null
|
231
238
|
+++ b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c
|
232
239
|
|
@@ -1247,7 +1254,7 @@ index 0000000..dd413df
|
|
1247
1254
|
+}
|
1248
1255
|
diff --git a/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf
|
1249
1256
|
new file mode 100644
|
1250
|
-
index
|
1257
|
+
index 0000000000..0ad86a2843
|
1251
1258
|
--- /dev/null
|
1252
1259
|
+++ b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf
|
1253
1260
|
|
@@ -1304,10 +1311,10 @@ index 0000000..0ad86a2
|
|
1304
1311
|
+ UefiLib
|
1305
1312
|
+ UefiRuntimeServicesTableLib
|
1306
1313
|
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
|
1307
|
-
index
|
1314
|
+
index 3f1da66aab..bc75e03d47 100644
|
1308
1315
|
--- a/OvmfPkg/OvmfPkgIa32.dsc
|
1309
1316
|
+++ b/OvmfPkg/OvmfPkgIa32.dsc
|
1310
|
-
|
1317
|
+
|
1311
1318
|
|
1312
1319
|
!if $(SECURE_BOOT_ENABLE) == TRUE
|
1313
1320
|
SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
|
@@ -1319,10 +1326,10 @@ index b577767..4d268c9 100644
|
|
1319
1326
|
|
1320
1327
|
OvmfPkg/PlatformDxe/Platform.inf
|
1321
1328
|
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
|
1322
|
-
index
|
1329
|
+
index 9bb0a4cede..f630737662 100644
|
1323
1330
|
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
|
1324
1331
|
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
|
1325
|
-
|
1332
|
+
|
1326
1333
|
|
1327
1334
|
!if $(SECURE_BOOT_ENABLE) == TRUE
|
1328
1335
|
SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
|
@@ -1334,10 +1341,10 @@ index a6a40be..6836622 100644
|
|
1334
1341
|
|
1335
1342
|
OvmfPkg/PlatformDxe/Platform.inf
|
1336
1343
|
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
|
1337
|
-
index
|
1344
|
+
index 3b7fc5328c..ac70a0cac1 100644
|
1338
1345
|
--- a/OvmfPkg/OvmfPkgX64.dsc
|
1339
1346
|
+++ b/OvmfPkg/OvmfPkgX64.dsc
|
1340
|
-
|
1347
|
+
|
1341
1348
|
|
1342
1349
|
!if $(SECURE_BOOT_ENABLE) == TRUE
|
1343
1350
|
SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
|
@@ -1349,5 +1356,5 @@ index 8bd3754..0b3008f 100644
|
|
1349
1356
|
|
1350
1357
|
OvmfPkg/PlatformDxe/Platform.inf
|
1351
1358
|
--
|
1352
|
-
|
1359
|
+
2.18.1
|
1353
1360
|
|
@@ -1,8 +1,13 @@
|
|
1
|
-
From
|
1
|
+
From c3f07e323e76856f1b42ea7b8c598ba3201c28a2 Mon Sep 17 00:00:00 2001
|
2
2
|
From: Laszlo Ersek <lersek@redhat.com>
|
3
3
|
Date: Wed, 14 Oct 2015 13:49:43 +0200
|
4
4
|
Subject: ArmPlatformPkg: introduce fixed PCD for early hello message (RH only)
|
5
5
|
|
6
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
7
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
8
|
+
|
9
|
+
- no change
|
10
|
+
|
6
11
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
12
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
8
13
|
|
@@ -42,15 +47,17 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
42
47
|
(cherry picked from commit 20b1f1cbd0590aa71c6d99d35e23cf08e0707750)
|
43
48
|
(cherry picked from commit 6734b88cf7abcaf42632e3d2fc469b2169dd2f16)
|
44
49
|
(cherry picked from commit ef77da632559e9baa1c69869e4cbea377068ef27)
|
50
|
+
(cherry picked from commit 58755c51d3252312d80cbcb97928d71199c2f5e1)
|
51
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
45
52
|
---
|
46
53
|
ArmPlatformPkg/ArmPlatformPkg.dec | 7 +++++++
|
47
54
|
1 file changed, 7 insertions(+)
|
48
55
|
|
49
56
|
diff --git a/ArmPlatformPkg/ArmPlatformPkg.dec b/ArmPlatformPkg/ArmPlatformPkg.dec
|
50
|
-
index
|
57
|
+
index 44c00bd0c1..40c8ec3251 100644
|
51
58
|
--- a/ArmPlatformPkg/ArmPlatformPkg.dec
|
52
59
|
+++ b/ArmPlatformPkg/ArmPlatformPkg.dec
|
53
|
-
|
60
|
+
|
54
61
|
## If set, this will swap settings for HDLCD RED_SELECT and BLUE_SELECT registers
|
55
62
|
gArmPlatformTokenSpaceGuid.PcdArmHdLcdSwapBlueRedSelect|FALSE|BOOLEAN|0x00000045
|
56
63
|
|
@@ -65,5 +72,5 @@ index dff4598..3c5c6c7 100644
|
|
65
72
|
## PL031 RealTimeClock
|
66
73
|
gArmPlatformTokenSpaceGuid.PcdPL031RtcBase|0x0|UINT32|0x00000024
|
67
74
|
--
|
68
|
-
|
75
|
+
2.18.1
|
69
76
|
|
@@ -1,9 +1,14 @@
|
|
1
|
-
From
|
1
|
+
From bb71490fdda3b38fa9f071d281b863f9b64363bf Mon Sep 17 00:00:00 2001
|
2
2
|
From: Laszlo Ersek <lersek@redhat.com>
|
3
3
|
Date: Wed, 14 Oct 2015 13:59:20 +0200
|
4
4
|
Subject: ArmPlatformPkg: PrePeiCore: write early hello message to the serial
|
5
5
|
port (RH)
|
6
6
|
|
7
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
8
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
9
|
+
|
10
|
+
- no change
|
11
|
+
|
7
12
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
8
13
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
9
14
|
|
@@ -40,6 +45,8 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
40
45
|
(cherry picked from commit 742e5bf6d5ce5a1e73879d6e5c0dd00feda7a9ac)
|
41
46
|
(cherry picked from commit 93d69eb9393cf05af90676253875c59c1bec67fd)
|
42
47
|
(cherry picked from commit 638594083b191f84f5d9333eb6147a31570f5a5a)
|
48
|
+
(cherry picked from commit f4b7aae411d88b2b83f85d20ef06a4032a57e7de)
|
49
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
43
50
|
---
|
44
51
|
ArmPlatformPkg/PrePeiCore/MainMPCore.c | 5 +++++
|
45
52
|
ArmPlatformPkg/PrePeiCore/MainUniCore.c | 5 +++++
|
@@ -49,7 +56,7 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
49
56
|
5 files changed, 15 insertions(+)
|
50
57
|
|
51
58
|
diff --git a/ArmPlatformPkg/PrePeiCore/MainMPCore.c b/ArmPlatformPkg/PrePeiCore/MainMPCore.c
|
52
|
-
index
|
59
|
+
index dc47adbaff..cbd72232c7 100644
|
53
60
|
--- a/ArmPlatformPkg/PrePeiCore/MainMPCore.c
|
54
61
|
+++ b/ArmPlatformPkg/PrePeiCore/MainMPCore.c
|
55
62
|
@@ -117,6 +117,11 @@ PrimaryMain (
|
@@ -65,7 +72,7 @@ index dc47adb..cbd7223 100644
|
|
65
72
|
|
66
73
|
// Enable the GIC Distributor
|
67
74
|
diff --git a/ArmPlatformPkg/PrePeiCore/MainUniCore.c b/ArmPlatformPkg/PrePeiCore/MainUniCore.c
|
68
|
-
index
|
75
|
+
index 134a469427..af39fc017c 100644
|
69
76
|
--- a/ArmPlatformPkg/PrePeiCore/MainUniCore.c
|
70
77
|
+++ b/ArmPlatformPkg/PrePeiCore/MainUniCore.c
|
71
78
|
@@ -35,6 +35,11 @@ PrimaryMain (
|
@@ -81,7 +88,7 @@ index 134a469..af39fc0 100644
|
|
81
88
|
|
82
89
|
// Adjust the Temporary Ram as the new Ppi List (Common + Platform Ppi Lists) is created at
|
83
90
|
diff --git a/ArmPlatformPkg/PrePeiCore/PrePeiCore.h b/ArmPlatformPkg/PrePeiCore/PrePeiCore.h
|
84
|
-
index
|
91
|
+
index 160894620c..bf843d7768 100644
|
85
92
|
--- a/ArmPlatformPkg/PrePeiCore/PrePeiCore.h
|
86
93
|
+++ b/ArmPlatformPkg/PrePeiCore/PrePeiCore.h
|
87
94
|
|
@@ -93,7 +100,7 @@ index 1608946..bf843d7 100644
|
|
93
100
|
#include <PiPei.h>
|
94
101
|
#include <Ppi/TemporaryRamSupport.h>
|
95
102
|
diff --git a/ArmPlatformPkg/PrePeiCore/PrePeiCoreMPCore.inf b/ArmPlatformPkg/PrePeiCore/PrePeiCoreMPCore.inf
|
96
|
-
index
|
103
|
+
index e3a31fa7c6..1bc0c45420 100644
|
97
104
|
--- a/ArmPlatformPkg/PrePeiCore/PrePeiCoreMPCore.inf
|
98
105
|
+++ b/ArmPlatformPkg/PrePeiCore/PrePeiCoreMPCore.inf
|
99
106
|
|
@@ -106,7 +113,7 @@ index e3a31fa..1bc0c45 100644
|
|
106
113
|
gArmTokenSpaceGuid.PcdGicInterruptInterfaceBase
|
107
114
|
gArmTokenSpaceGuid.PcdGicSgiIntId
|
108
115
|
diff --git a/ArmPlatformPkg/PrePeiCore/PrePeiCoreUniCore.inf b/ArmPlatformPkg/PrePeiCore/PrePeiCoreUniCore.inf
|
109
|
-
index
|
116
|
+
index ec83cec2d8..b100820491 100644
|
110
117
|
--- a/ArmPlatformPkg/PrePeiCore/PrePeiCoreUniCore.inf
|
111
118
|
+++ b/ArmPlatformPkg/PrePeiCore/PrePeiCoreUniCore.inf
|
112
119
|
|
@@ -117,5 +124,5 @@ index ec83cec..b100820 100644
|
|
117
124
|
+
|
118
125
|
gEfiMdeModulePkgTokenSpaceGuid.PcdInitValueInTempStack
|
119
126
|
--
|
120
|
-
|
127
|
+
2.18.1
|
121
128
|
|
@@ -1,8 +1,14 @@
|
|
1
|
-
From
|
1
|
+
From fb2032bbea7e02c426855cf86a323556d493fd8a Mon Sep 17 00:00:00 2001
|
2
2
|
From: Laszlo Ersek <lersek@redhat.com>
|
3
3
|
Date: Wed, 14 Oct 2015 14:07:17 +0200
|
4
4
|
Subject: ArmVirtPkg: set early hello message (RH only)
|
5
5
|
|
6
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
7
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
8
|
+
|
9
|
+
- resolve context conflict with upstream commit eaa1e98ae31d ("ArmVirtPkg:
|
10
|
+
don't set PcdCoreCount", 2019-02-13)
|
11
|
+
|
6
12
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
13
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
8
14
|
|
@@ -34,22 +40,24 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
|
34
40
|
(cherry picked from commit 179df76dbb0d199bd905236e98775b4059c6502a)
|
35
41
|
(cherry picked from commit ce3f59d0710c24c162d5222bbf5cd7e36180c80c)
|
36
42
|
(cherry picked from commit c201a8e6ae28d75f7ba581828b533c3b26fa7f18)
|
43
|
+
(cherry picked from commit 2d4db6ec70e004cd9ac147615d17033bee5d3b18)
|
44
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
37
45
|
---
|
38
46
|
ArmVirtPkg/ArmVirtQemu.dsc | 1 +
|
39
47
|
1 file changed, 1 insertion(+)
|
40
48
|
|
41
49
|
diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
|
42
|
-
index
|
50
|
+
index 9fc78d4e0a..a4cd66b846 100644
|
43
51
|
--- a/ArmVirtPkg/ArmVirtQemu.dsc
|
44
52
|
+++ b/ArmVirtPkg/ArmVirtQemu.dsc
|
45
|
-
|
46
|
-
gEfiMdeModulePkgTokenSpaceGuid.
|
53
|
+
|
54
|
+
gEfiMdeModulePkgTokenSpaceGuid.PcdTurnOffUsbLegacySupport|TRUE
|
47
55
|
|
48
56
|
[PcdsFixedAtBuild.common]
|
49
57
|
+ gArmPlatformTokenSpaceGuid.PcdEarlyHelloMessage|"UEFI firmware starting.\r\n"
|
50
|
-
gArmPlatformTokenSpaceGuid.PcdCoreCount|1
|
51
58
|
!if $(ARCH) == AARCH64
|
52
59
|
gArmTokenSpaceGuid.PcdVFPEnabled|1
|
60
|
+
!endif
|
53
61
|
--
|
54
|
-
|
62
|
+
2.18.1
|
55
63
|
|
@@ -1,8 +1,13 @@
|
|
1
|
-
From
|
1
|
+
From 7e6d5dc4078c64be6d55d8fc3317c59a91507a50 Mon Sep 17 00:00:00 2001
|
2
2
|
From: Paolo Bonzini <pbonzini@redhat.com>
|
3
3
|
Date: Tue, 21 Nov 2017 00:57:45 +0100
|
4
4
|
Subject: OvmfPkg: enable DEBUG_VERBOSE (RHEL only)
|
5
5
|
|
6
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
7
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
8
|
+
|
9
|
+
- no change
|
10
|
+
|
6
11
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
12
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
8
13
|
|
@@ -32,6 +37,8 @@ Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
32
37
|
(this patch was previously applied as commit 78d3ed73172b5738e32d2b0bc03f7984b9584117)
|
33
38
|
(cherry picked from commit 7aeeaabc9871f657e65d2b99d81011b4964a1ce9)
|
34
39
|
(cherry picked from commit a0617a6be1a80966099ddceb010f89202a79ee76)
|
40
|
+
(cherry picked from commit 759bd3f591e2db699bdef4c7ea4e97c908e7f027)
|
41
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
35
42
|
---
|
36
43
|
OvmfPkg/OvmfPkgIa32.dsc | 2 +-
|
37
44
|
OvmfPkg/OvmfPkgIa32X64.dsc | 2 +-
|
@@ -39,10 +46,10 @@ Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
39
46
|
3 files changed, 3 insertions(+), 3 deletions(-)
|
40
47
|
|
41
48
|
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
|
42
|
-
index
|
49
|
+
index bc75e03d47..8093e6f000 100644
|
43
50
|
--- a/OvmfPkg/OvmfPkgIa32.dsc
|
44
51
|
+++ b/OvmfPkg/OvmfPkgIa32.dsc
|
45
|
-
|
52
|
+
|
46
53
|
# DEBUG_VERBOSE 0x00400000 // Detailed debug messages that may
|
47
54
|
# // significantly impact boot performance
|
48
55
|
# DEBUG_ERROR 0x80000000 // Error
|
@@ -52,10 +59,10 @@ index 4d268c9..57bf021 100644
|
|
52
59
|
!ifdef $(SOURCE_DEBUG_ENABLE)
|
53
60
|
gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x17
|
54
61
|
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
|
55
|
-
index
|
62
|
+
index f630737662..eca9b4e6db 100644
|
56
63
|
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
|
57
64
|
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
|
58
|
-
|
65
|
+
|
59
66
|
# DEBUG_VERBOSE 0x00400000 // Detailed debug messages that may
|
60
67
|
# // significantly impact boot performance
|
61
68
|
# DEBUG_ERROR 0x80000000 // Error
|
@@ -65,10 +72,10 @@ index 6836622..0e87c8f 100644
|
|
65
72
|
!ifdef $(SOURCE_DEBUG_ENABLE)
|
66
73
|
gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x17
|
67
74
|
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
|
68
|
-
index
|
75
|
+
index ac70a0cac1..3ff9a3181e 100644
|
69
76
|
--- a/OvmfPkg/OvmfPkgX64.dsc
|
70
77
|
+++ b/OvmfPkg/OvmfPkgX64.dsc
|
71
|
-
|
78
|
+
|
72
79
|
# DEBUG_VERBOSE 0x00400000 // Detailed debug messages that may
|
73
80
|
# // significantly impact boot performance
|
74
81
|
# DEBUG_ERROR 0x80000000 // Error
|
@@ -78,5 +85,5 @@ index 0b3008f..38ba204 100644
|
|
78
85
|
!ifdef $(SOURCE_DEBUG_ENABLE)
|
79
86
|
gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x17
|
80
87
|
--
|
81
|
-
|
88
|
+
2.18.1
|
82
89
|
|
@@ -1,7 +1,19 @@
|
|
1
|
-
From
|
1
|
+
From b06b87f8ffd4fed4ef7eacb13689a9b6d111f850 Mon Sep 17 00:00:00 2001
|
2
2
|
From: Paolo Bonzini <pbonzini@redhat.com>
|
3
3
|
Date: Tue, 21 Nov 2017 00:57:46 +0100
|
4
|
-
Subject: OvmfPkg: silence
|
4
|
+
Subject: OvmfPkg: silence DEBUG_VERBOSE (0x00400000) in
|
5
|
+
QemuVideoDxe/QemuRamfbDxe (RH)
|
6
|
+
|
7
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
8
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
9
|
+
|
10
|
+
- Upstream commit 1d25ff51af5c ("OvmfPkg: add QemuRamfbDxe", 2018-06-14)
|
11
|
+
introduced another GOP driver that consumes FrameBufferBltLib, and
|
12
|
+
thereby produces a large number of (mostly useless) debug messages at
|
13
|
+
the DEBUG_VERBOSE level. Extend the patch to suppress those messages in
|
14
|
+
both QemuVideoDxe and QemuRamfbDxe; update the subject accordingly.
|
15
|
+
QemuRamfbDxe itself doesn't log anything at the VERBOSE level (see also
|
16
|
+
the original commit message at the bottom of this downstream patch).
|
5
17
|
|
6
18
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
19
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
@@ -42,60 +54,77 @@ Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
42
54
|
(this patch was previously applied as commit 9b0d031dee7e823f6717bab73e422fbc6f0a6c52)
|
43
55
|
(cherry picked from commit 9122d5f2e8d8d289064d1e1700cb61964d9931f3)
|
44
56
|
(cherry picked from commit 7eb3be1d4ccafc26c11fe5afb95cc12b250ce6f0)
|
57
|
+
(cherry picked from commit bd650684712fb840dbcda5d6eaee065bd9e91fa1)
|
58
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
45
59
|
---
|
46
|
-
OvmfPkg/OvmfPkgIa32.dsc |
|
47
|
-
OvmfPkg/OvmfPkgIa32X64.dsc |
|
48
|
-
OvmfPkg/OvmfPkgX64.dsc |
|
49
|
-
3 files changed,
|
60
|
+
OvmfPkg/OvmfPkgIa32.dsc | 10 ++++++++--
|
61
|
+
OvmfPkg/OvmfPkgIa32X64.dsc | 10 ++++++++--
|
62
|
+
OvmfPkg/OvmfPkgX64.dsc | 10 ++++++++--
|
63
|
+
3 files changed, 24 insertions(+), 6 deletions(-)
|
50
64
|
|
51
65
|
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
|
52
|
-
index
|
66
|
+
index 8093e6f000..8f1cf80fe6 100644
|
53
67
|
--- a/OvmfPkg/OvmfPkgIa32.dsc
|
54
68
|
+++ b/OvmfPkg/OvmfPkgIa32.dsc
|
55
|
-
|
69
|
+
|
56
70
|
MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
|
57
71
|
MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
|
58
72
|
|
59
73
|
- OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
|
74
|
+
- OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
|
60
75
|
+ OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf {
|
61
76
|
+ <PcdsFixedAtBuild>
|
62
77
|
+ gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
|
63
78
|
+ }
|
79
|
+
+ OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf {
|
80
|
+
+ <PcdsFixedAtBuild>
|
81
|
+
+ gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
|
82
|
+
+ }
|
64
83
|
OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
|
65
84
|
|
66
85
|
#
|
67
86
|
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
|
68
|
-
index
|
87
|
+
index eca9b4e6db..62d6d6c406 100644
|
69
88
|
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
|
70
89
|
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
|
71
|
-
|
90
|
+
|
72
91
|
MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
|
73
92
|
MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
|
74
93
|
|
75
94
|
- OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
|
95
|
+
- OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
|
76
96
|
+ OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf {
|
77
97
|
+ <PcdsFixedAtBuild>
|
78
98
|
+ gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
|
79
99
|
+ }
|
100
|
+
+ OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf {
|
101
|
+
+ <PcdsFixedAtBuild>
|
102
|
+
+ gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
|
103
|
+
+ }
|
80
104
|
OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
|
81
105
|
|
82
106
|
#
|
83
107
|
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
|
84
|
-
index
|
108
|
+
index 3ff9a3181e..992b141113 100644
|
85
109
|
--- a/OvmfPkg/OvmfPkgX64.dsc
|
86
110
|
+++ b/OvmfPkg/OvmfPkgX64.dsc
|
87
|
-
|
111
|
+
|
88
112
|
MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
|
89
113
|
MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
|
90
114
|
|
91
115
|
- OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
|
116
|
+
- OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
|
92
117
|
+ OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf {
|
93
118
|
+ <PcdsFixedAtBuild>
|
94
119
|
+ gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
|
95
120
|
+ }
|
121
|
+
+ OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf {
|
122
|
+
+ <PcdsFixedAtBuild>
|
123
|
+
+ gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
|
124
|
+
+ }
|
96
125
|
OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
|
97
126
|
|
98
127
|
#
|
99
128
|
--
|
100
|
-
|
129
|
+
2.18.1
|
101
130
|
|
@@ -0,0 +1,64 @@
|
|
1
|
+
From 76b4ac28e975bd63c25db903a1d42c47b38cc756 Mon Sep 17 00:00:00 2001
|
2
|
+
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
+
Date: Wed, 27 Jan 2016 03:05:18 +0100
|
4
|
+
Subject: ArmVirtPkg: silence DEBUG_VERBOSE (0x00400000) in QemuRamfbDxe (RH
|
5
|
+
only)
|
6
|
+
|
7
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
8
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
9
|
+
|
10
|
+
- new patch, due to upstream commit c64688f36a8b ("ArmVirtPkg: add
|
11
|
+
QemuRamfbDxe", 2018-06-14)
|
12
|
+
|
13
|
+
QemuRamfbDxe uses FrameBufferLib. The FrameBufferBltLib instance added in
|
14
|
+
commit b1ca386074bd ("MdeModulePkg: Add FrameBufferBltLib library
|
15
|
+
instance") logs many messages on the VERBOSE level; for example, a normal
|
16
|
+
boot with ArmVirtQemu[Kernel] can produce 500+ "VideoFill" messages,
|
17
|
+
dependent on the progress bar, when the VERBOSE bit is set in
|
18
|
+
PcdDebugPrintErrorLevel.
|
19
|
+
|
20
|
+
QemuRamfbDxe itself doesn't log anything at the VERBOSE level, so we lose
|
21
|
+
none of its messages this way.
|
22
|
+
|
23
|
+
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
24
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
25
|
+
---
|
26
|
+
ArmVirtPkg/ArmVirtQemu.dsc | 5 ++++-
|
27
|
+
ArmVirtPkg/ArmVirtQemuKernel.dsc | 5 ++++-
|
28
|
+
2 files changed, 8 insertions(+), 2 deletions(-)
|
29
|
+
|
30
|
+
diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
|
31
|
+
index a4cd66b846..aac4094665 100644
|
32
|
+
--- a/ArmVirtPkg/ArmVirtQemu.dsc
|
33
|
+
+++ b/ArmVirtPkg/ArmVirtQemu.dsc
|
34
|
+
|
35
|
+
#
|
36
|
+
# Video support
|
37
|
+
#
|
38
|
+
- OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
|
39
|
+
+ OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf {
|
40
|
+
+ <PcdsFixedAtBuild>
|
41
|
+
+ gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
|
42
|
+
+ }
|
43
|
+
OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
|
44
|
+
OvmfPkg/PlatformDxe/Platform.inf
|
45
|
+
|
46
|
+
diff --git a/ArmVirtPkg/ArmVirtQemuKernel.dsc b/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
47
|
+
index d2b3f24394..c9a635e80b 100644
|
48
|
+
--- a/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
49
|
+
+++ b/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
50
|
+
|
51
|
+
#
|
52
|
+
# Video support
|
53
|
+
#
|
54
|
+
- OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
|
55
|
+
+ OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf {
|
56
|
+
+ <PcdsFixedAtBuild>
|
57
|
+
+ gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
|
58
|
+
+ }
|
59
|
+
OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
|
60
|
+
OvmfPkg/PlatformDxe/Platform.inf
|
61
|
+
|
62
|
+
--
|
63
|
+
2.18.1
|
64
|
+
|
@@ -1,222 +0,0 @@
|
|
1
|
-
From fca819227b23a4d0597e3da42d7edce1da8fb0f4 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Tue, 15 May 2018 12:40:05 +0200
|
4
|
-
Subject: OvmfPkg/PlatformBootManagerLib: connect consoles unconditionally
|
5
|
-
|
6
|
-
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
|
-
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
8
|
-
|
9
|
-
- reorder the rebase changelog in the commit message so that it reads like
|
10
|
-
a blog: place more recent entries near the top
|
11
|
-
- no changes to the patch body
|
12
|
-
|
13
|
-
Message-id: <20180515104005.12265-2-lersek@redhat.com>
|
14
|
-
Patchwork-id: 80268
|
15
|
-
O-Subject: [RHEL-7.6 ovmf PATCH 1/1] OvmfPkg/PlatformBootManagerLib: connect
|
16
|
-
consoles unconditionally
|
17
|
-
Bugzilla: 1577546
|
18
|
-
Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
|
19
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
20
|
-
|
21
|
-
If both ConIn and ConOut exist, but ConIn references none of the PS/2
|
22
|
-
keyboard, the USB wild-card keyboard, and any serial ports, then
|
23
|
-
PlatformInitializeConsole() currently allows the boot to proceed without
|
24
|
-
any input devices at all. This makes for a bad user experience -- the
|
25
|
-
firmware menu could only be entered through OsIndications, set by a guest
|
26
|
-
OS.
|
27
|
-
|
28
|
-
Do what ArmVirtQemu does already, namely connect the consoles, and add
|
29
|
-
them to ConIn / ConOut / ErrOut, unconditionally. (The underlying
|
30
|
-
EfiBootManagerUpdateConsoleVariable() function checks for duplicates.)
|
31
|
-
|
32
|
-
The issue used to be masked by the EfiBootManagerConnectAll() call that
|
33
|
-
got conditionalized in commit 245c643cc8b7.
|
34
|
-
|
35
|
-
This patch is best viewed with "git show -b -W".
|
36
|
-
|
37
|
-
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
38
|
-
Cc: Jordan Justen <jordan.l.justen@intel.com>
|
39
|
-
Fixes: 245c643cc8b73240c3b88cb55b2911b285a8c10d
|
40
|
-
Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1577546
|
41
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
42
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
43
|
-
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
44
|
-
(cherry picked from commit f803c03cc2e0b6b0b0bed447a97ea2c61b04ed82)
|
45
|
-
(cherry picked from commit 3e05bfc48cd7b2cf4c1cbfc1d0cd2572338fad1e)
|
46
|
-
---
|
47
|
-
.../Library/PlatformBootManagerLib/BdsPlatform.c | 127 +++++++--------------
|
48
|
-
1 file changed, 44 insertions(+), 83 deletions(-)
|
49
|
-
|
50
|
-
diff --git a/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c b/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c
|
51
|
-
index 862fa6eb..004b753 100644
|
52
|
-
--- a/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c
|
53
|
-
+++ b/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c
|
54
|
-
@@ -26,7 +26,6 @@ VOID *mEfiDevPathNotifyReg;
|
55
|
-
EFI_EVENT mEfiDevPathEvent;
|
56
|
-
VOID *mEmuVariableEventReg;
|
57
|
-
EFI_EVENT mEmuVariableEvent;
|
58
|
-
-BOOLEAN mDetectVgaOnly;
|
59
|
-
UINT16 mHostBridgeDevId;
|
60
|
-
|
61
|
-
//
|
62
|
-
@@ -830,35 +829,33 @@ DetectAndPreparePlatformPciDevicePath (
|
63
|
-
);
|
64
|
-
ASSERT_EFI_ERROR (Status);
|
65
|
-
|
66
|
-
- if (!mDetectVgaOnly) {
|
67
|
-
+ //
|
68
|
-
+ // Here we decide whether it is LPC Bridge
|
69
|
-
+ //
|
70
|
-
+ if ((IS_PCI_LPC (Pci)) ||
|
71
|
-
+ ((IS_PCI_ISA_PDECODE (Pci)) &&
|
72
|
-
+ (Pci->Hdr.VendorId == 0x8086) &&
|
73
|
-
+ (Pci->Hdr.DeviceId == 0x7000)
|
74
|
-
+ )
|
75
|
-
+ ) {
|
76
|
-
//
|
77
|
-
- // Here we decide whether it is LPC Bridge
|
78
|
-
+ // Add IsaKeyboard to ConIn,
|
79
|
-
+ // add IsaSerial to ConOut, ConIn, ErrOut
|
80
|
-
//
|
81
|
-
- if ((IS_PCI_LPC (Pci)) ||
|
82
|
-
- ((IS_PCI_ISA_PDECODE (Pci)) &&
|
83
|
-
- (Pci->Hdr.VendorId == 0x8086) &&
|
84
|
-
- (Pci->Hdr.DeviceId == 0x7000)
|
85
|
-
- )
|
86
|
-
- ) {
|
87
|
-
- //
|
88
|
-
- // Add IsaKeyboard to ConIn,
|
89
|
-
- // add IsaSerial to ConOut, ConIn, ErrOut
|
90
|
-
- //
|
91
|
-
- DEBUG ((EFI_D_INFO, "Found LPC Bridge device\n"));
|
92
|
-
- PrepareLpcBridgeDevicePath (Handle);
|
93
|
-
- return EFI_SUCCESS;
|
94
|
-
- }
|
95
|
-
+ DEBUG ((EFI_D_INFO, "Found LPC Bridge device\n"));
|
96
|
-
+ PrepareLpcBridgeDevicePath (Handle);
|
97
|
-
+ return EFI_SUCCESS;
|
98
|
-
+ }
|
99
|
-
+ //
|
100
|
-
+ // Here we decide which Serial device to enable in PCI bus
|
101
|
-
+ //
|
102
|
-
+ if (IS_PCI_16550SERIAL (Pci)) {
|
103
|
-
//
|
104
|
-
- // Here we decide which Serial device to enable in PCI bus
|
105
|
-
+ // Add them to ConOut, ConIn, ErrOut.
|
106
|
-
//
|
107
|
-
- if (IS_PCI_16550SERIAL (Pci)) {
|
108
|
-
- //
|
109
|
-
- // Add them to ConOut, ConIn, ErrOut.
|
110
|
-
- //
|
111
|
-
- DEBUG ((EFI_D_INFO, "Found PCI 16550 SERIAL device\n"));
|
112
|
-
- PreparePciSerialDevicePath (Handle);
|
113
|
-
- return EFI_SUCCESS;
|
114
|
-
- }
|
115
|
-
+ DEBUG ((EFI_D_INFO, "Found PCI 16550 SERIAL device\n"));
|
116
|
-
+ PreparePciSerialDevicePath (Handle);
|
117
|
-
+ return EFI_SUCCESS;
|
118
|
-
}
|
119
|
-
|
120
|
-
//
|
121
|
-
@@ -878,26 +875,6 @@ DetectAndPreparePlatformPciDevicePath (
|
122
|
-
|
123
|
-
|
124
|
-
/**
|
125
|
-
- Do platform specific PCI Device check and add them to ConOut, ConIn, ErrOut
|
126
|
-
-
|
127
|
-
- @param[in] DetectVgaOnly - Only detect VGA device if it's TRUE.
|
128
|
-
-
|
129
|
-
- @retval EFI_SUCCESS - PCI Device check and Console variable update
|
130
|
-
- successfully.
|
131
|
-
- @retval EFI_STATUS - PCI Device check or Console variable update fail.
|
132
|
-
-
|
133
|
-
-**/
|
134
|
-
-EFI_STATUS
|
135
|
-
-DetectAndPreparePlatformPciDevicePaths (
|
136
|
-
- BOOLEAN DetectVgaOnly
|
137
|
-
- )
|
138
|
-
-{
|
139
|
-
- mDetectVgaOnly = DetectVgaOnly;
|
140
|
-
- return VisitAllPciInstances (DetectAndPreparePlatformPciDevicePath);
|
141
|
-
-}
|
142
|
-
-
|
143
|
-
-
|
144
|
-
-/**
|
145
|
-
Connect the predefined platform default console device.
|
146
|
-
|
147
|
-
Always try to find and enable PCI display devices.
|
148
|
-
@@ -910,50 +887,34 @@ PlatformInitializeConsole (
|
149
|
-
)
|
150
|
-
{
|
151
|
-
UINTN Index;
|
152
|
-
- EFI_DEVICE_PATH_PROTOCOL *VarConout;
|
153
|
-
- EFI_DEVICE_PATH_PROTOCOL *VarConin;
|
154
|
-
|
155
|
-
//
|
156
|
-
- // Connect RootBridge
|
157
|
-
+ // Do platform specific PCI Device check and add them to ConOut, ConIn,
|
158
|
-
+ // ErrOut
|
159
|
-
//
|
160
|
-
- GetEfiGlobalVariable2 (EFI_CON_OUT_VARIABLE_NAME, (VOID **) &VarConout,
|
161
|
-
- NULL);
|
162
|
-
- GetEfiGlobalVariable2 (EFI_CON_IN_VARIABLE_NAME, (VOID **) &VarConin, NULL);
|
163
|
-
-
|
164
|
-
- if (VarConout == NULL || VarConin == NULL) {
|
165
|
-
- //
|
166
|
-
- // Do platform specific PCI Device check and add them to ConOut, ConIn,
|
167
|
-
- // ErrOut
|
168
|
-
- //
|
169
|
-
- DetectAndPreparePlatformPciDevicePaths (FALSE);
|
170
|
-
+ VisitAllPciInstances (DetectAndPreparePlatformPciDevicePath);
|
171
|
-
|
172
|
-
+ //
|
173
|
-
+ // Have chance to connect the platform default console,
|
174
|
-
+ // the platform default console is the minimum device group
|
175
|
-
+ // the platform should support
|
176
|
-
+ //
|
177
|
-
+ for (Index = 0; PlatformConsole[Index].DevicePath != NULL; ++Index) {
|
178
|
-
//
|
179
|
-
- // Have chance to connect the platform default console,
|
180
|
-
- // the platform default console is the minimum device group
|
181
|
-
- // the platform should support
|
182
|
-
+ // Update the console variable with the connect type
|
183
|
-
//
|
184
|
-
- for (Index = 0; PlatformConsole[Index].DevicePath != NULL; ++Index) {
|
185
|
-
- //
|
186
|
-
- // Update the console variable with the connect type
|
187
|
-
- //
|
188
|
-
- if ((PlatformConsole[Index].ConnectType & CONSOLE_IN) == CONSOLE_IN) {
|
189
|
-
- EfiBootManagerUpdateConsoleVariable (ConIn,
|
190
|
-
- PlatformConsole[Index].DevicePath, NULL);
|
191
|
-
- }
|
192
|
-
- if ((PlatformConsole[Index].ConnectType & CONSOLE_OUT) == CONSOLE_OUT) {
|
193
|
-
- EfiBootManagerUpdateConsoleVariable (ConOut,
|
194
|
-
- PlatformConsole[Index].DevicePath, NULL);
|
195
|
-
- }
|
196
|
-
- if ((PlatformConsole[Index].ConnectType & STD_ERROR) == STD_ERROR) {
|
197
|
-
- EfiBootManagerUpdateConsoleVariable (ErrOut,
|
198
|
-
- PlatformConsole[Index].DevicePath, NULL);
|
199
|
-
- }
|
200
|
-
+ if ((PlatformConsole[Index].ConnectType & CONSOLE_IN) == CONSOLE_IN) {
|
201
|
-
+ EfiBootManagerUpdateConsoleVariable (ConIn,
|
202
|
-
+ PlatformConsole[Index].DevicePath, NULL);
|
203
|
-
+ }
|
204
|
-
+ if ((PlatformConsole[Index].ConnectType & CONSOLE_OUT) == CONSOLE_OUT) {
|
205
|
-
+ EfiBootManagerUpdateConsoleVariable (ConOut,
|
206
|
-
+ PlatformConsole[Index].DevicePath, NULL);
|
207
|
-
+ }
|
208
|
-
+ if ((PlatformConsole[Index].ConnectType & STD_ERROR) == STD_ERROR) {
|
209
|
-
+ EfiBootManagerUpdateConsoleVariable (ErrOut,
|
210
|
-
+ PlatformConsole[Index].DevicePath, NULL);
|
211
|
-
}
|
212
|
-
- } else {
|
213
|
-
- //
|
214
|
-
- // Only detect VGA device and add them to ConOut
|
215
|
-
- //
|
216
|
-
- DetectAndPreparePlatformPciDevicePaths (TRUE);
|
217
|
-
}
|
218
|
-
}
|
219
|
-
|
220
|
-
--
|
221
|
-
1.8.3.1
|
222
|
-
|
@@ -1,9 +1,14 @@
|
|
1
|
-
From
|
1
|
+
From 58bba429b9ec7b78109940ef945d0dc93f3cd958 Mon Sep 17 00:00:00 2001
|
2
2
|
From: Paolo Bonzini <pbonzini@redhat.com>
|
3
3
|
Date: Tue, 21 Nov 2017 00:57:47 +0100
|
4
4
|
Subject: OvmfPkg: silence EFI_D_VERBOSE (0x00400000) in NvmExpressDxe (RH
|
5
5
|
only)
|
6
6
|
|
7
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
8
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
9
|
+
|
10
|
+
- no change
|
11
|
+
|
7
12
|
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
8
13
|
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
9
14
|
|
@@ -33,6 +38,8 @@ Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
33
38
|
(this patch was previously applied as commit 5f432837b9c60c2929b13dda1a1b488d5c3a6d2f)
|
34
39
|
(cherry picked from commit 33e00146eb878588ad1395d7b1ae38f401729da4)
|
35
40
|
(cherry picked from commit bd10cabcfcb1bc9a32b05062f4ee3792e27bc2d8)
|
41
|
+
(cherry picked from commit 5a27af700f49e00608f232f618dedd7bf5e9b3e6)
|
42
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
36
43
|
---
|
37
44
|
OvmfPkg/OvmfPkgIa32.dsc | 5 ++++-
|
38
45
|
OvmfPkg/OvmfPkgIa32X64.dsc | 5 ++++-
|
@@ -40,10 +47,10 @@ Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
40
47
|
3 files changed, 12 insertions(+), 3 deletions(-)
|
41
48
|
|
42
49
|
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
|
43
|
-
index
|
50
|
+
index 8f1cf80fe6..bbf5e38274 100644
|
44
51
|
--- a/OvmfPkg/OvmfPkgIa32.dsc
|
45
52
|
+++ b/OvmfPkg/OvmfPkgIa32.dsc
|
46
|
-
|
53
|
+
|
47
54
|
OvmfPkg/SataControllerDxe/SataControllerDxe.inf
|
48
55
|
MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf
|
49
56
|
MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf
|
@@ -56,10 +63,10 @@ index 2b2e874..f6d7833 100644
|
|
56
63
|
MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
|
57
64
|
MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
|
58
65
|
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
|
59
|
-
index
|
66
|
+
index 62d6d6c406..3ec1b916e7 100644
|
60
67
|
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
|
61
68
|
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
|
62
|
-
|
69
|
+
|
63
70
|
OvmfPkg/SataControllerDxe/SataControllerDxe.inf
|
64
71
|
MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf
|
65
72
|
MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf
|
@@ -72,10 +79,10 @@ index 892cc5e..d6e628b 100644
|
|
72
79
|
MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
|
73
80
|
MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
|
74
81
|
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
|
75
|
-
index
|
82
|
+
index 992b141113..ea54b4b8e8 100644
|
76
83
|
--- a/OvmfPkg/OvmfPkgX64.dsc
|
77
84
|
+++ b/OvmfPkg/OvmfPkgX64.dsc
|
78
|
-
|
85
|
+
|
79
86
|
OvmfPkg/SataControllerDxe/SataControllerDxe.inf
|
80
87
|
MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf
|
81
88
|
MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf
|
@@ -88,5 +95,5 @@ index e7cb582..a9fe89c 100644
|
|
88
95
|
MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
|
89
96
|
MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
|
90
97
|
--
|
91
|
-
|
98
|
+
2.18.1
|
92
99
|
|
@@ -1,215 +0,0 @@
|
|
1
|
-
From 402cfd944f9a6764daec96aef9eec4d2393c3a90 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Fri, 18 May 2018 21:40:23 +0200
|
4
|
-
Subject: ArmVirtPkg/PlatformBootManagerLib: connect Virtio RNG devices again
|
5
|
-
|
6
|
-
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
|
-
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
8
|
-
|
9
|
-
- reorder the rebase changelog in the commit message so that it reads like
|
10
|
-
a blog: place more recent entries near the top
|
11
|
-
- no changes to the patch body
|
12
|
-
|
13
|
-
Message-id: <20180518194024.30614-2-lersek@redhat.com>
|
14
|
-
Patchwork-id: 80426
|
15
|
-
O-Subject: [RHEL-7.6 ovmf PATCH 1/2] ArmVirtPkg/PlatformBootManagerLib: connect
|
16
|
-
Virtio RNG devices again
|
17
|
-
Bugzilla: 1579518
|
18
|
-
Acked-by: Thomas Huth <thuth@redhat.com>
|
19
|
-
Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
|
20
|
-
|
21
|
-
Virtio RNG devices are never boot devices, so in commit ff1d0fbfbaec we
|
22
|
-
stopped connecting them. This is a problem because an OS boot loader may
|
23
|
-
depend on EFI_RNG_PROTOCOL to seed the OS's RNG.
|
24
|
-
|
25
|
-
Connect Virtio RNG devices again. And, while commit ff1d0fbfbaec removed
|
26
|
-
that from PlatformBootManagerAfterConsole(), reintroduce it now to
|
27
|
-
PlatformBootManagerBeforeConsole() -- this way Driver#### options launched
|
28
|
-
between both functions may access EFI_RNG_PROTOCOL too.
|
29
|
-
|
30
|
-
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
31
|
-
Fixes: ff1d0fbfbaec55038ccf888759588fa4e21516f4
|
32
|
-
Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1579518
|
33
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
34
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
35
|
-
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
36
|
-
(cherry picked from commit c4add6b6e971e0bb3f276ed3636a083e782e96cc)
|
37
|
-
(cherry picked from commit 1d33f4bb28e1aa2c4d62979596140c22677a2e9f)
|
38
|
-
---
|
39
|
-
.../Library/PlatformBootManagerLib/PlatformBm.c | 129 +++++++++++++++++++++
|
40
|
-
.../PlatformBootManagerLib.inf | 1 +
|
41
|
-
2 files changed, 130 insertions(+)
|
42
|
-
|
43
|
-
diff --git a/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBm.c b/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBm.c
|
44
|
-
index 5d5e51d..62cce6a 100644
|
45
|
-
--- a/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBm.c
|
46
|
-
+++ b/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBm.c
|
47
|
-
|
48
|
-
**/
|
49
|
-
|
50
|
-
#include <IndustryStandard/Pci22.h>
|
51
|
-
+#include <IndustryStandard/Virtio095.h>
|
52
|
-
#include <Library/BootLogoLib.h>
|
53
|
-
#include <Library/DevicePathLib.h>
|
54
|
-
#include <Library/PcdLib.h>
|
55
|
-
|
56
|
-
#include <Protocol/LoadedImage.h>
|
57
|
-
#include <Protocol/PciIo.h>
|
58
|
-
#include <Protocol/PciRootBridgeIo.h>
|
59
|
-
+#include <Protocol/VirtioDevice.h>
|
60
|
-
#include <Guid/EventGroup.h>
|
61
|
-
#include <Guid/RootBridgesConnectedEventGroup.h>
|
62
|
-
|
63
|
-
@@ -261,6 +263,121 @@ IsPciDisplay (
|
64
|
-
|
65
|
-
|
66
|
-
/**
|
67
|
-
+ This FILTER_FUNCTION checks if a handle corresponds to a Virtio RNG device at
|
68
|
-
+ the VIRTIO_DEVICE_PROTOCOL level.
|
69
|
-
+**/
|
70
|
-
+STATIC
|
71
|
-
+BOOLEAN
|
72
|
-
+EFIAPI
|
73
|
-
+IsVirtioRng (
|
74
|
-
+ IN EFI_HANDLE Handle,
|
75
|
-
+ IN CONST CHAR16 *ReportText
|
76
|
-
+ )
|
77
|
-
+{
|
78
|
-
+ EFI_STATUS Status;
|
79
|
-
+ VIRTIO_DEVICE_PROTOCOL *VirtIo;
|
80
|
-
+
|
81
|
-
+ Status = gBS->HandleProtocol (Handle, &gVirtioDeviceProtocolGuid,
|
82
|
-
+ (VOID**)&VirtIo);
|
83
|
-
+ if (EFI_ERROR (Status)) {
|
84
|
-
+ return FALSE;
|
85
|
-
+ }
|
86
|
-
+ return (BOOLEAN)(VirtIo->SubSystemDeviceId ==
|
87
|
-
+ VIRTIO_SUBSYSTEM_ENTROPY_SOURCE);
|
88
|
-
+}
|
89
|
-
+
|
90
|
-
+
|
91
|
-
+/**
|
92
|
-
+ This FILTER_FUNCTION checks if a handle corresponds to a Virtio RNG device at
|
93
|
-
+ the EFI_PCI_IO_PROTOCOL level.
|
94
|
-
+**/
|
95
|
-
+STATIC
|
96
|
-
+BOOLEAN
|
97
|
-
+EFIAPI
|
98
|
-
+IsVirtioPciRng (
|
99
|
-
+ IN EFI_HANDLE Handle,
|
100
|
-
+ IN CONST CHAR16 *ReportText
|
101
|
-
+ )
|
102
|
-
+{
|
103
|
-
+ EFI_STATUS Status;
|
104
|
-
+ EFI_PCI_IO_PROTOCOL *PciIo;
|
105
|
-
+ UINT16 VendorId;
|
106
|
-
+ UINT16 DeviceId;
|
107
|
-
+ UINT8 RevisionId;
|
108
|
-
+ BOOLEAN Virtio10;
|
109
|
-
+ UINT16 SubsystemId;
|
110
|
-
+
|
111
|
-
+ Status = gBS->HandleProtocol (Handle, &gEfiPciIoProtocolGuid,
|
112
|
-
+ (VOID**)&PciIo);
|
113
|
-
+ if (EFI_ERROR (Status)) {
|
114
|
-
+ return FALSE;
|
115
|
-
+ }
|
116
|
-
+
|
117
|
-
+ //
|
118
|
-
+ // Read and check VendorId.
|
119
|
-
+ //
|
120
|
-
+ Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint16, PCI_VENDOR_ID_OFFSET,
|
121
|
-
+ 1, &VendorId);
|
122
|
-
+ if (EFI_ERROR (Status)) {
|
123
|
-
+ goto PciError;
|
124
|
-
+ }
|
125
|
-
+ if (VendorId != VIRTIO_VENDOR_ID) {
|
126
|
-
+ return FALSE;
|
127
|
-
+ }
|
128
|
-
+
|
129
|
-
+ //
|
130
|
-
+ // Read DeviceId and RevisionId.
|
131
|
-
+ //
|
132
|
-
+ Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint16, PCI_DEVICE_ID_OFFSET,
|
133
|
-
+ 1, &DeviceId);
|
134
|
-
+ if (EFI_ERROR (Status)) {
|
135
|
-
+ goto PciError;
|
136
|
-
+ }
|
137
|
-
+ Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint8, PCI_REVISION_ID_OFFSET,
|
138
|
-
+ 1, &RevisionId);
|
139
|
-
+ if (EFI_ERROR (Status)) {
|
140
|
-
+ goto PciError;
|
141
|
-
+ }
|
142
|
-
+
|
143
|
-
+ //
|
144
|
-
+ // From DeviceId and RevisionId, determine whether the device is a
|
145
|
-
+ // modern-only Virtio 1.0 device. In case of Virtio 1.0, DeviceId can
|
146
|
-
+ // immediately be restricted to VIRTIO_SUBSYSTEM_ENTROPY_SOURCE, and
|
147
|
-
+ // SubsystemId will only play a sanity-check role. Otherwise, DeviceId can
|
148
|
-
+ // only be sanity-checked, and SubsystemId will decide.
|
149
|
-
+ //
|
150
|
-
+ if (DeviceId == 0x1040 + VIRTIO_SUBSYSTEM_ENTROPY_SOURCE &&
|
151
|
-
+ RevisionId >= 0x01) {
|
152
|
-
+ Virtio10 = TRUE;
|
153
|
-
+ } else if (DeviceId >= 0x1000 && DeviceId <= 0x103F && RevisionId == 0x00) {
|
154
|
-
+ Virtio10 = FALSE;
|
155
|
-
+ } else {
|
156
|
-
+ return FALSE;
|
157
|
-
+ }
|
158
|
-
+
|
159
|
-
+ //
|
160
|
-
+ // Read and check SubsystemId as dictated by Virtio10.
|
161
|
-
+ //
|
162
|
-
+ Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint16,
|
163
|
-
+ PCI_SUBSYSTEM_ID_OFFSET, 1, &SubsystemId);
|
164
|
-
+ if (EFI_ERROR (Status)) {
|
165
|
-
+ goto PciError;
|
166
|
-
+ }
|
167
|
-
+ if (Virtio10 && SubsystemId >= 0x40) {
|
168
|
-
+ return TRUE;
|
169
|
-
+ }
|
170
|
-
+ if (!Virtio10 && SubsystemId == VIRTIO_SUBSYSTEM_ENTROPY_SOURCE) {
|
171
|
-
+ return TRUE;
|
172
|
-
+ }
|
173
|
-
+ return FALSE;
|
174
|
-
+
|
175
|
-
+PciError:
|
176
|
-
+ DEBUG ((DEBUG_ERROR, "%a: %s: %r\n", __FUNCTION__, ReportText, Status));
|
177
|
-
+ return FALSE;
|
178
|
-
+}
|
179
|
-
+
|
180
|
-
+
|
181
|
-
+/**
|
182
|
-
This CALLBACK_FUNCTION attempts to connect a handle non-recursively, asking
|
183
|
-
the matching driver to produce all first-level child handles.
|
184
|
-
**/
|
185
|
-
@@ -644,6 +761,18 @@ PlatformBootManagerBeforeConsole (
|
186
|
-
// Register platform-specific boot options and keyboard shortcuts.
|
187
|
-
//
|
188
|
-
PlatformRegisterOptionsAndKeys ();
|
189
|
-
+
|
190
|
-
+ //
|
191
|
-
+ // At this point, VIRTIO_DEVICE_PROTOCOL instances exist only for Virtio MMIO
|
192
|
-
+ // transports. Install EFI_RNG_PROTOCOL instances on Virtio MMIO RNG devices.
|
193
|
-
+ //
|
194
|
-
+ FilterAndProcess (&gVirtioDeviceProtocolGuid, IsVirtioRng, Connect);
|
195
|
-
+
|
196
|
-
+ //
|
197
|
-
+ // Install both VIRTIO_DEVICE_PROTOCOL and (dependent) EFI_RNG_PROTOCOL
|
198
|
-
+ // instances on Virtio PCI RNG devices.
|
199
|
-
+ //
|
200
|
-
+ FilterAndProcess (&gEfiPciIoProtocolGuid, IsVirtioPciRng, Connect);
|
201
|
-
}
|
202
|
-
|
203
|
-
/**
|
204
|
-
diff --git a/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.inf b/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.inf
|
205
|
-
index 1e22f8b..d6c1ef9 100644
|
206
|
-
--- a/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.inf
|
207
|
-
+++ b/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.inf
|
208
|
-
|
209
|
-
gEfiLoadedImageProtocolGuid
|
210
|
-
gEfiPciRootBridgeIoProtocolGuid
|
211
|
-
gEfiSimpleFileSystemProtocolGuid
|
212
|
-
+ gVirtioDeviceProtocolGuid
|
213
|
-
--
|
214
|
-
1.8.3.1
|
215
|
-
|
@@ -1,188 +0,0 @@
|
|
1
|
-
From 3f2be5f30bbd996473e7336b29ac43795d999676 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Fri, 18 May 2018 21:40:24 +0200
|
4
|
-
Subject: OvmfPkg/PlatformBootManagerLib: connect Virtio RNG devices again
|
5
|
-
|
6
|
-
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
|
-
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
8
|
-
|
9
|
-
- reorder the rebase changelog in the commit message so that it reads like
|
10
|
-
a blog: place more recent entries near the top
|
11
|
-
- no changes to the patch body
|
12
|
-
|
13
|
-
Message-id: <20180518194024.30614-3-lersek@redhat.com>
|
14
|
-
Patchwork-id: 80427
|
15
|
-
O-Subject: [RHEL-7.6 ovmf PATCH 2/2] OvmfPkg/PlatformBootManagerLib: connect
|
16
|
-
Virtio RNG devices again
|
17
|
-
Bugzilla: 1579518
|
18
|
-
Acked-by: Thomas Huth <thuth@redhat.com>
|
19
|
-
Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
|
20
|
-
|
21
|
-
Virtio RNG devices are never boot devices, so in commit 245c643cc8b7 we
|
22
|
-
stopped connecting them. This is a problem because an OS boot loader may
|
23
|
-
depend on EFI_RNG_PROTOCOL to seed the OS's RNG.
|
24
|
-
|
25
|
-
Connect Virtio RNG devices again. And, while commit 245c643cc8b7 removed
|
26
|
-
that from PlatformBootManagerAfterConsole(), reintroduce it now to
|
27
|
-
PlatformBootManagerBeforeConsole() -- this way Driver#### options launched
|
28
|
-
between both functions may access EFI_RNG_PROTOCOL too.
|
29
|
-
|
30
|
-
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
31
|
-
Cc: Jordan Justen <jordan.l.justen@intel.com>
|
32
|
-
Fixes: 245c643cc8b73240c3b88cb55b2911b285a8c10d
|
33
|
-
Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1579518
|
34
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
35
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
36
|
-
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
37
|
-
(cherry picked from commit 7ebad830d6ab61f0395f6f4bae4156664bbd8086)
|
38
|
-
(cherry picked from commit 4c7e315ccb97dd7c3dc7f38e22b84ffbc4df90e3)
|
39
|
-
---
|
40
|
-
.../Library/PlatformBootManagerLib/BdsPlatform.c | 105 +++++++++++++++++++++
|
41
|
-
.../Library/PlatformBootManagerLib/BdsPlatform.h | 1 +
|
42
|
-
2 files changed, 106 insertions(+)
|
43
|
-
|
44
|
-
diff --git a/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c b/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c
|
45
|
-
index 004b753..5d4d323 100644
|
46
|
-
--- a/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c
|
47
|
-
+++ b/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c
|
48
|
-
@@ -319,6 +319,15 @@ ConnectRootBridge (
|
49
|
-
);
|
50
|
-
|
51
|
-
STATIC
|
52
|
-
+EFI_STATUS
|
53
|
-
+EFIAPI
|
54
|
-
+ConnectVirtioPciRng (
|
55
|
-
+ IN EFI_HANDLE Handle,
|
56
|
-
+ IN VOID *Instance,
|
57
|
-
+ IN VOID *Context
|
58
|
-
+ );
|
59
|
-
+
|
60
|
-
+STATIC
|
61
|
-
VOID
|
62
|
-
SaveS3BootScript (
|
63
|
-
VOID
|
64
|
-
@@ -399,6 +408,13 @@ PlatformBootManagerBeforeConsole (
|
65
|
-
ASSERT_RETURN_ERROR (PcdStatus);
|
66
|
-
|
67
|
-
PlatformRegisterOptionsAndKeys ();
|
68
|
-
+
|
69
|
-
+ //
|
70
|
-
+ // Install both VIRTIO_DEVICE_PROTOCOL and (dependent) EFI_RNG_PROTOCOL
|
71
|
-
+ // instances on Virtio PCI RNG devices.
|
72
|
-
+ //
|
73
|
-
+ VisitAllInstancesOfProtocol (&gEfiPciIoProtocolGuid, ConnectVirtioPciRng,
|
74
|
-
+ NULL);
|
75
|
-
}
|
76
|
-
|
77
|
-
|
78
|
-
@@ -427,6 +443,95 @@ ConnectRootBridge (
|
79
|
-
}
|
80
|
-
|
81
|
-
|
82
|
-
+STATIC
|
83
|
-
+EFI_STATUS
|
84
|
-
+EFIAPI
|
85
|
-
+ConnectVirtioPciRng (
|
86
|
-
+ IN EFI_HANDLE Handle,
|
87
|
-
+ IN VOID *Instance,
|
88
|
-
+ IN VOID *Context
|
89
|
-
+ )
|
90
|
-
+{
|
91
|
-
+ EFI_PCI_IO_PROTOCOL *PciIo;
|
92
|
-
+ EFI_STATUS Status;
|
93
|
-
+ UINT16 VendorId;
|
94
|
-
+ UINT16 DeviceId;
|
95
|
-
+ UINT8 RevisionId;
|
96
|
-
+ BOOLEAN Virtio10;
|
97
|
-
+ UINT16 SubsystemId;
|
98
|
-
+
|
99
|
-
+ PciIo = Instance;
|
100
|
-
+
|
101
|
-
+ //
|
102
|
-
+ // Read and check VendorId.
|
103
|
-
+ //
|
104
|
-
+ Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint16, PCI_VENDOR_ID_OFFSET,
|
105
|
-
+ 1, &VendorId);
|
106
|
-
+ if (EFI_ERROR (Status)) {
|
107
|
-
+ goto Error;
|
108
|
-
+ }
|
109
|
-
+ if (VendorId != VIRTIO_VENDOR_ID) {
|
110
|
-
+ return EFI_SUCCESS;
|
111
|
-
+ }
|
112
|
-
+
|
113
|
-
+ //
|
114
|
-
+ // Read DeviceId and RevisionId.
|
115
|
-
+ //
|
116
|
-
+ Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint16, PCI_DEVICE_ID_OFFSET,
|
117
|
-
+ 1, &DeviceId);
|
118
|
-
+ if (EFI_ERROR (Status)) {
|
119
|
-
+ goto Error;
|
120
|
-
+ }
|
121
|
-
+ Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint8, PCI_REVISION_ID_OFFSET,
|
122
|
-
+ 1, &RevisionId);
|
123
|
-
+ if (EFI_ERROR (Status)) {
|
124
|
-
+ goto Error;
|
125
|
-
+ }
|
126
|
-
+
|
127
|
-
+ //
|
128
|
-
+ // From DeviceId and RevisionId, determine whether the device is a
|
129
|
-
+ // modern-only Virtio 1.0 device. In case of Virtio 1.0, DeviceId can
|
130
|
-
+ // immediately be restricted to VIRTIO_SUBSYSTEM_ENTROPY_SOURCE, and
|
131
|
-
+ // SubsystemId will only play a sanity-check role. Otherwise, DeviceId can
|
132
|
-
+ // only be sanity-checked, and SubsystemId will decide.
|
133
|
-
+ //
|
134
|
-
+ if (DeviceId == 0x1040 + VIRTIO_SUBSYSTEM_ENTROPY_SOURCE &&
|
135
|
-
+ RevisionId >= 0x01) {
|
136
|
-
+ Virtio10 = TRUE;
|
137
|
-
+ } else if (DeviceId >= 0x1000 && DeviceId <= 0x103F && RevisionId == 0x00) {
|
138
|
-
+ Virtio10 = FALSE;
|
139
|
-
+ } else {
|
140
|
-
+ return EFI_SUCCESS;
|
141
|
-
+ }
|
142
|
-
+
|
143
|
-
+ //
|
144
|
-
+ // Read and check SubsystemId as dictated by Virtio10.
|
145
|
-
+ //
|
146
|
-
+ Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint16,
|
147
|
-
+ PCI_SUBSYSTEM_ID_OFFSET, 1, &SubsystemId);
|
148
|
-
+ if (EFI_ERROR (Status)) {
|
149
|
-
+ goto Error;
|
150
|
-
+ }
|
151
|
-
+ if ((Virtio10 && SubsystemId >= 0x40) ||
|
152
|
-
+ (!Virtio10 && SubsystemId == VIRTIO_SUBSYSTEM_ENTROPY_SOURCE)) {
|
153
|
-
+ Status = gBS->ConnectController (
|
154
|
-
+ Handle, // ControllerHandle
|
155
|
-
+ NULL, // DriverImageHandle -- connect all drivers
|
156
|
-
+ NULL, // RemainingDevicePath -- produce all child handles
|
157
|
-
+ FALSE // Recursive -- don't follow child handles
|
158
|
-
+ );
|
159
|
-
+ if (EFI_ERROR (Status)) {
|
160
|
-
+ goto Error;
|
161
|
-
+ }
|
162
|
-
+ }
|
163
|
-
+ return EFI_SUCCESS;
|
164
|
-
+
|
165
|
-
+Error:
|
166
|
-
+ DEBUG ((DEBUG_ERROR, "%a: %r\n", __FUNCTION__, Status));
|
167
|
-
+ return Status;
|
168
|
-
+}
|
169
|
-
+
|
170
|
-
+
|
171
|
-
/**
|
172
|
-
Add IsaKeyboard to ConIn; add IsaSerial to ConOut, ConIn, ErrOut.
|
173
|
-
|
174
|
-
diff --git a/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.h b/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.h
|
175
|
-
index 97ffbb5..4948ca6 100644
|
176
|
-
--- a/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.h
|
177
|
-
+++ b/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.h
|
178
|
-
@@ -30,6 +30,7 @@ Abstract:
|
179
|
-
#include <IndustryStandard/Acpi.h>
|
180
|
-
#include <IndustryStandard/SmBios.h>
|
181
|
-
#include <IndustryStandard/PeImage.h>
|
182
|
-
+#include <IndustryStandard/Virtio095.h>
|
183
|
-
|
184
|
-
#include <Library/DebugLib.h>
|
185
|
-
#include <Library/BaseMemoryLib.h>
|
186
|
-
--
|
187
|
-
1.8.3.1
|
188
|
-
|
@@ -0,0 +1,59 @@
|
|
1
|
+
From d382b66affafe06c7e470e0a2dffbd3634b363f1 Mon Sep 17 00:00:00 2001
|
2
|
+
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
+
Date: Tue, 19 Mar 2019 15:48:34 +0100
|
4
|
+
Subject: Downgrade CryptoPkg INF files to OpenSSL 1.1.0i (RH only)
|
5
|
+
|
6
|
+
Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
|
7
|
+
RHEL-8.1/20190308-89910a39dcfd rebase:
|
8
|
+
|
9
|
+
- new patch, due to upstream commit a18f784cfdbe ("Upgrade OpenSSL to
|
10
|
+
1.1.0j", 2018-12-21)
|
11
|
+
|
12
|
+
Upstream commit a18f784cfdbe (see above) advanced the OpenSSL git
|
13
|
+
submodule from upstream OpenSSL commit d4e4bd2a8163 ("Prepare for 1.1.0h
|
14
|
+
release", 2018-03-27) to upstream OpenSSL commit 74f2d9c1ec5f ("Prepare
|
15
|
+
for 1.1.0j release", 2018-11-20). Meaning, upstream edk2 skipped 1.1.0i.
|
16
|
+
|
17
|
+
However, Fedora 28 only offers 1.1.0i at this point (and it will not be
|
18
|
+
rebased again until 1.1.0k is released). Therefore hunks in the upstream
|
19
|
+
CryptoPkg commit that relate specifically to 1.1.0j have to be backed out.
|
20
|
+
|
21
|
+
The only such hunks are the "crypto/getenv.c" additions to the INF files.
|
22
|
+
The related upstream OpenSSL change was commit 1abdf08284af ("Use
|
23
|
+
secure_getenv(3) when available.", 2018-09-24), part of tag
|
24
|
+
"OpenSSL_1_1_0j".
|
25
|
+
|
26
|
+
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
27
|
+
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
28
|
+
---
|
29
|
+
CryptoPkg/Library/OpensslLib/OpensslLib.inf | 1 -
|
30
|
+
CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf | 1 -
|
31
|
+
2 files changed, 2 deletions(-)
|
32
|
+
|
33
|
+
diff --git a/CryptoPkg/Library/OpensslLib/OpensslLib.inf b/CryptoPkg/Library/OpensslLib/OpensslLib.inf
|
34
|
+
index 6162d29143..fcb8bfddde 100644
|
35
|
+
--- a/CryptoPkg/Library/OpensslLib/OpensslLib.inf
|
36
|
+
+++ b/CryptoPkg/Library/OpensslLib/OpensslLib.inf
|
37
|
+
|
38
|
+
$(OPENSSL_PATH)/crypto/evp/pmeth_lib.c
|
39
|
+
$(OPENSSL_PATH)/crypto/evp/scrypt.c
|
40
|
+
$(OPENSSL_PATH)/crypto/ex_data.c
|
41
|
+
- $(OPENSSL_PATH)/crypto/getenv.c
|
42
|
+
$(OPENSSL_PATH)/crypto/hmac/hm_ameth.c
|
43
|
+
$(OPENSSL_PATH)/crypto/hmac/hm_pmeth.c
|
44
|
+
$(OPENSSL_PATH)/crypto/hmac/hmac.c
|
45
|
+
diff --git a/CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf b/CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf
|
46
|
+
index b04bf62b4e..99ff89da0e 100644
|
47
|
+
--- a/CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf
|
48
|
+
+++ b/CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf
|
49
|
+
|
50
|
+
$(OPENSSL_PATH)/crypto/evp/pmeth_lib.c
|
51
|
+
$(OPENSSL_PATH)/crypto/evp/scrypt.c
|
52
|
+
$(OPENSSL_PATH)/crypto/ex_data.c
|
53
|
+
- $(OPENSSL_PATH)/crypto/getenv.c
|
54
|
+
$(OPENSSL_PATH)/crypto/hmac/hm_ameth.c
|
55
|
+
$(OPENSSL_PATH)/crypto/hmac/hm_pmeth.c
|
56
|
+
$(OPENSSL_PATH)/crypto/hmac/hmac.c
|
57
|
+
--
|
58
|
+
2.18.1
|
59
|
+
|
@@ -1,73 +0,0 @@
|
|
1
|
-
From 7ef29963526aa451b1101e4b92e47d3028c9035a Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Fri, 18 May 2018 19:20:32 +0200
|
4
|
-
Subject: BaseTools/tools_def: add "-fno-unwind-tables" to GCC_AARCH64_CC_FLAGS
|
5
|
-
|
6
|
-
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
|
7
|
-
RHEL-8.0/20180508-ee3198e672e2 rebase:
|
8
|
-
|
9
|
-
- reorder the rebase changelog in the commit message so that it reads like
|
10
|
-
a blog: place more recent entries near the top
|
11
|
-
|
12
|
-
- in RHEL-8.0 Alpha, this patch was applied downstream-only, for fixing
|
13
|
-
RHBZ#1579525. Since then, the patch has been upstreamed, and now it is
|
14
|
-
cherry-picked from upstream.
|
15
|
-
|
16
|
-
The ElfConvert routines in GenFw don't handle the ".eh_frame" ELF section
|
17
|
-
emitted by gcc. For this reason, Leif disabled the generation of that
|
18
|
-
section for AARCH64 with "-fno-asynchronous-unwind-tables" in commit
|
19
|
-
28e80befa4fe [1], and Ard did the same for IA32 and X64 in commit
|
20
|
-
26ecc55c027d [2]. (The CLANG38 toolchain received the same flag at its
|
21
|
-
inception, in commit 6f756db5ea05 [3].)
|
22
|
-
|
23
|
-
However, ".eh_frame" is back now; in upstream gcc commit 9cbee213b579 [4]
|
24
|
-
(part of tag "gcc-8_1_0-release"), both "-fasynchronous-unwind-tables" and
|
25
|
-
"-funwind-tables" were made the default for AARCH64. (The patch author
|
26
|
-
described the effects on the gcc mailing list [5].) We have to counter the
|
27
|
-
latter flag with "-fno-unwind-tables", otherwise GenFw chokes on
|
28
|
-
".eh_frame" again (triggered for example on Fedora 28).
|
29
|
-
|
30
|
-
"-f[no-]unwind-tables" goes back to at least gcc-4.4 [6], so it's safe to
|
31
|
-
add to GCC_AARCH64_CC_FLAGS.
|
32
|
-
|
33
|
-
[1] https://github.com/tianocore/edk2/commit/28e80befa4fe
|
34
|
-
[2] https://github.com/tianocore/edk2/commit/26ecc55c027d
|
35
|
-
[3] https://github.com/tianocore/edk2/commit/6f756db5ea05
|
36
|
-
[4] https://gcc.gnu.org/git/?p=gcc.git;a=commitdiff;h=9cbee213b579
|
37
|
-
[5] http://mid.mail-archive.com/7b28c03a-c032-6cec-c127-1c12cbe98eeb@foss.arm.com
|
38
|
-
[6] https://gcc.gnu.org/onlinedocs/gcc-4.4.7/gcc/Code-Gen-Options.html
|
39
|
-
|
40
|
-
Cc: "Danilo C. L. de Paula" <ddepaula@redhat.com>
|
41
|
-
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
42
|
-
Cc: Cole Robinson <crobinso@redhat.com>
|
43
|
-
Cc: Gerd Hoffmann <kraxel@redhat.com>
|
44
|
-
Cc: Leif Lindholm <leif.lindholm@linaro.org>
|
45
|
-
Cc: Liming Gao <liming.gao@intel.com>
|
46
|
-
Cc: Paolo Bonzini <pbonzini@redhat.com>
|
47
|
-
Cc: Yonghong Zhu <yonghong.zhu@intel.com>
|
48
|
-
Reported-by: "Danilo C. L. de Paula" <ddepaula@redhat.com>
|
49
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
50
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
51
|
-
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
52
|
-
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
53
|
-
(cherry picked from commit cbf00651eda6818ca3c76115b8a18e3f6b23eef4)
|
54
|
-
---
|
55
|
-
BaseTools/Conf/tools_def.template | 2 +-
|
56
|
-
1 file changed, 1 insertion(+), 1 deletion(-)
|
57
|
-
|
58
|
-
diff --git a/BaseTools/Conf/tools_def.template b/BaseTools/Conf/tools_def.template
|
59
|
-
index 03d7000..9429033 100755
|
60
|
-
--- a/BaseTools/Conf/tools_def.template
|
61
|
-
+++ b/BaseTools/Conf/tools_def.template
|
62
|
-
@@ -4537,7 +4537,7 @@ DEFINE GCC_X64_CC_FLAGS = DEF(GCC_ALL_CC_FLAGS) -mno-red-zone -Wno-ad
|
63
|
-
DEFINE GCC_IPF_CC_FLAGS = DEF(GCC_ALL_CC_FLAGS) -minline-int-divide-min-latency
|
64
|
-
DEFINE GCC_ARM_CC_FLAGS = DEF(GCC_ALL_CC_FLAGS) -mlittle-endian -mabi=aapcs -fno-short-enums -funsigned-char -ffunction-sections -fdata-sections -fomit-frame-pointer -Wno-address -mthumb -mfloat-abi=soft -fno-pic -fno-pie
|
65
|
-
DEFINE GCC_ARM_CC_XIPFLAGS = -mno-unaligned-access
|
66
|
-
-DEFINE GCC_AARCH64_CC_FLAGS = DEF(GCC_ALL_CC_FLAGS) -mlittle-endian -fno-short-enums -fverbose-asm -funsigned-char -ffunction-sections -fdata-sections -Wno-address -fno-asynchronous-unwind-tables -fno-pic -fno-pie -ffixed-x18
|
67
|
-
+DEFINE GCC_AARCH64_CC_FLAGS = DEF(GCC_ALL_CC_FLAGS) -mlittle-endian -fno-short-enums -fverbose-asm -funsigned-char -ffunction-sections -fdata-sections -Wno-address -fno-asynchronous-unwind-tables -fno-unwind-tables -fno-pic -fno-pie -ffixed-x18
|
68
|
-
DEFINE GCC_AARCH64_CC_XIPFLAGS = -mstrict-align -mgeneral-regs-only
|
69
|
-
DEFINE GCC_DLINK_FLAGS_COMMON = -nostdlib --pie
|
70
|
-
DEFINE GCC_DLINK2_FLAGS_COMMON = -Wl,--script=$(EDK_TOOLS_PATH)/Scripts/GccBase.lds
|
71
|
-
--
|
72
|
-
1.8.3.1
|
73
|
-
|
@@ -0,0 +1,63 @@
|
|
1
|
+
From 11a1c8085b0edccd3a304f704f47ec5d8ee6255d Mon Sep 17 00:00:00 2001
|
2
|
+
From: Philippe Mathieu-Daude <philmd@redhat.com>
|
3
|
+
Date: Thu, 1 Aug 2019 20:43:49 +0200
|
4
|
+
Subject: [PATCH 3/3] ArmPkg: DebugPeCoffExtraActionLib: debugger commands are
|
5
|
+
not errors
|
6
|
+
|
7
|
+
Message-id: <20190801184349.28512-4-philmd@redhat.com>
|
8
|
+
Patchwork-id: 89860
|
9
|
+
O-Subject: [RHEL-8.1.0 edk2 PATCH v4 3/3] ArmPkg: DebugPeCoffExtraActionLib:
|
10
|
+
debugger commands are not errors
|
11
|
+
Bugzilla: 1714446
|
12
|
+
Acked-by: Andrew Jones <drjones@redhat.com>
|
13
|
+
Acked-by: Laszlo Ersek <lersek@redhat.com>
|
14
|
+
|
15
|
+
In commit 1fce963d89f3e we reduced the level of information printed
|
16
|
+
by PeCoffLoaderRelocateImageExtraAction() but we did not update the
|
17
|
+
similar PeCoffLoaderUnloadImageExtraAction() function.
|
18
|
+
|
19
|
+
PeCoffLoaderUnloadImageExtraAction() prints helpful debugger commands
|
20
|
+
for source level debugging. These messages should not be printed on the
|
21
|
+
EFI_D_ERROR level; they don't report errors. Change the debug level
|
22
|
+
(bitmask, actually) to DEBUG_LOAD | DEBUG_INFO, because the messages are
|
23
|
+
printed in relation to image loading, and they are informative.
|
24
|
+
|
25
|
+
Cc: Leif Lindholm <leif.lindholm@linaro.org>
|
26
|
+
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
27
|
+
Reported-by: Andrew Jones <drjones@redhat.com>
|
28
|
+
Suggested-by: Laszlo Ersek <lersek@redhat.com>
|
29
|
+
Signed-off-by: Philippe Mathieu-Daude <philmd@redhat.com>
|
30
|
+
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
|
31
|
+
Reviewed-by: Leif Lindholm <leif.lindholm@linaro.org>
|
32
|
+
(cherry picked from commit a6cd7fbac494ed3b2386db1f2a8b1a73f399e940)
|
33
|
+
Signed-off-by: Philippe Mathieu-Daude <philmd@redhat.com>
|
34
|
+
---
|
35
|
+
.../Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.c | 8 ++++----
|
36
|
+
1 file changed, 4 insertions(+), 4 deletions(-)
|
37
|
+
|
38
|
+
diff --git a/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.c b/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.c
|
39
|
+
index f298e58..895198f 100644
|
40
|
+
--- a/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.c
|
41
|
+
+++ b/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.c
|
42
|
+
@@ -128,14 +128,14 @@ PeCoffLoaderUnloadImageExtraAction (
|
43
|
+
if (ImageContext->PdbPointer) {
|
44
|
+
#ifdef __CC_ARM
|
45
|
+
// Print out the command for the RVD debugger to load symbols for this image
|
46
|
+
- DEBUG ((EFI_D_ERROR, "unload symbols_only %a\n", DeCygwinPathIfNeeded (ImageContext->PdbPointer, Temp, sizeof (Temp))));
|
47
|
+
+ DEBUG ((DEBUG_LOAD | DEBUG_INFO, "unload symbols_only %a\n", DeCygwinPathIfNeeded (ImageContext->PdbPointer, Temp, sizeof (Temp))));
|
48
|
+
#elif __GNUC__
|
49
|
+
// This may not work correctly if you generate PE/COFF directlyas then the Offset would not be required
|
50
|
+
- DEBUG ((EFI_D_ERROR, "remove-symbol-file %a 0x%08x\n", DeCygwinPathIfNeeded (ImageContext->PdbPointer, Temp, sizeof (Temp)), (UINTN)(ImageContext->ImageAddress + ImageContext->SizeOfHeaders)));
|
51
|
+
+ DEBUG ((DEBUG_LOAD | DEBUG_INFO, "remove-symbol-file %a 0x%08x\n", DeCygwinPathIfNeeded (ImageContext->PdbPointer, Temp, sizeof (Temp)), (UINTN)(ImageContext->ImageAddress + ImageContext->SizeOfHeaders)));
|
52
|
+
#else
|
53
|
+
- DEBUG ((EFI_D_ERROR, "Unloading %a\n", ImageContext->PdbPointer));
|
54
|
+
+ DEBUG ((DEBUG_LOAD | DEBUG_INFO, "Unloading %a\n", ImageContext->PdbPointer));
|
55
|
+
#endif
|
56
|
+
} else {
|
57
|
+
- DEBUG ((EFI_D_ERROR, "Unloading driver at 0x%11p\n", (VOID *)(UINTN) ImageContext->ImageAddress));
|
58
|
+
+ DEBUG ((DEBUG_LOAD | DEBUG_INFO, "Unloading driver at 0x%11p\n", (VOID *)(UINTN) ImageContext->ImageAddress));
|
59
|
+
}
|
60
|
+
}
|
61
|
+
--
|
62
|
+
1.8.3.1
|
63
|
+
|
@@ -1,197 +0,0 @@
|
|
1
|
-
From eff60320e87dcda19a50de4f1ac05af4a5e1b133 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Wed, 18 Jul 2018 00:18:19 +0200
|
4
|
-
Subject: [PATCH 3/6] ArmVirtPkg/ArmVirtQemu: enable the IPv6 stack
|
5
|
-
|
6
|
-
Message-id: <20180717221822.13110-3-lersek@redhat.com>
|
7
|
-
Patchwork-id: 81375
|
8
|
-
O-Subject: [RHEL8/virt212 edk2 PATCH 2/5] ArmVirtPkg/ArmVirtQemu: enable the
|
9
|
-
IPv6 stack
|
10
|
-
Bugzilla: 1536627
|
11
|
-
Acked-by: Paolo Bonzini <pbonzini@redhat.com>
|
12
|
-
Acked-by: Wei Huang <wei@redhat.com>
|
13
|
-
|
14
|
-
Add the IPv6 stack to ArmVirtQemu with a cumulative port of the following
|
15
|
-
OvmfPkg commits:
|
16
|
-
|
17
|
-
* 36c6413f76e5 "OvmfPkg: enable the IPv6 support", 2014-12-19
|
18
|
-
|
19
|
-
* 96302b80d90e "OvmfPkg: Enable Network2 Shell Commands for IPv6",
|
20
|
-
2016-03-08
|
21
|
-
|
22
|
-
* 6d0f8941bdc2 "OvmfPkg: always resolve OpenSslLib, IntrinsicLib and
|
23
|
-
BaseCryptLib", 2017-01-17
|
24
|
-
|
25
|
-
* 32e22f20c985 "OvmfPkg: correct the IScsiDxe module included for the IPv6
|
26
|
-
stack", 2017-01-17
|
27
|
-
|
28
|
-
The IPv6-enabled IScsiDxe driver depends on BaseCryptLib, and the
|
29
|
-
"CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf" instance depends on
|
30
|
-
IntrinsicLib and OpensslLib. This is why commit 6d0f8941bdc2 is relevant.
|
31
|
-
|
32
|
-
However, unlike in OvmfPkg, in ArmVirtPkg we'll precisely track the
|
33
|
-
firmware features that require these library classes. (The OvmfPkg
|
34
|
-
discussion was quite complex, and the OvmfPkg solution was a compromise:
|
35
|
-
<http://mid.mail-archive.com/1484569332-13440-1-git-send-email-jiaxin.wu@intel.com>.)
|
36
|
-
|
37
|
-
The ArmVirtXen platform is not extended with the relevant drivers because
|
38
|
-
currently it doesn't include any networking support.
|
39
|
-
|
40
|
-
Cc: Julien Grall <julien.grall@linaro.org>
|
41
|
-
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1007
|
42
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
43
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
44
|
-
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
45
|
-
(cherry picked from commit ae08ea246fe9b4a4e05b7ee6cdbd5b0fa38f3f69)
|
46
|
-
---
|
47
|
-
ArmVirtPkg/ArmVirt.dsc.inc | 18 +++++++++++++++---
|
48
|
-
ArmVirtPkg/ArmVirtQemu.dsc | 13 ++++++++++++-
|
49
|
-
ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc | 12 +++++++++++-
|
50
|
-
ArmVirtPkg/ArmVirtQemuKernel.dsc | 13 ++++++++++++-
|
51
|
-
4 files changed, 50 insertions(+), 6 deletions(-)
|
52
|
-
|
53
|
-
diff --git a/ArmVirtPkg/ArmVirt.dsc.inc b/ArmVirtPkg/ArmVirt.dsc.inc
|
54
|
-
index 2bb8860..f031e81 100644
|
55
|
-
--- a/ArmVirtPkg/ArmVirt.dsc.inc
|
56
|
-
+++ b/ArmVirtPkg/ArmVirt.dsc.inc
|
57
|
-
|
58
|
-
DpcLib|MdeModulePkg/Library/DxeDpcLib/DxeDpcLib.inf
|
59
|
-
UdpIoLib|MdeModulePkg/Library/DxeUdpIoLib/DxeUdpIoLib.inf
|
60
|
-
IpIoLib|MdeModulePkg/Library/DxeIpIoLib/DxeIpIoLib.inf
|
61
|
-
+!if $(NETWORK_IP6_ENABLE) == TRUE
|
62
|
-
+ TcpIoLib|MdeModulePkg/Library/DxeTcpIoLib/DxeTcpIoLib.inf
|
63
|
-
+!endif
|
64
|
-
!if $(HTTP_BOOT_ENABLE) == TRUE
|
65
|
-
HttpLib|MdeModulePkg/Library/DxeHttpLib/DxeHttpLib.inf
|
66
|
-
!endif
|
67
|
-
|
68
|
-
XenIoMmioLib|OvmfPkg/Library/XenIoMmioLib/XenIoMmioLib.inf
|
69
|
-
|
70
|
-
#
|
71
|
-
- # Secure Boot dependencies
|
72
|
-
+ # CryptoPkg libraries needed by multiple firmware features
|
73
|
-
#
|
74
|
-
-!if $(SECURE_BOOT_ENABLE) == TRUE
|
75
|
-
+!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE)
|
76
|
-
IntrinsicLib|CryptoPkg/Library/IntrinsicLib/IntrinsicLib.inf
|
77
|
-
OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf
|
78
|
-
+ BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf
|
79
|
-
+!endif
|
80
|
-
+
|
81
|
-
+ #
|
82
|
-
+ # Secure Boot dependencies
|
83
|
-
+ #
|
84
|
-
+!if $(SECURE_BOOT_ENABLE) == TRUE
|
85
|
-
TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
|
86
|
-
AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf
|
87
|
-
- BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf
|
88
|
-
|
89
|
-
# re-use the UserPhysicalPresent() dummy implementation from the ovmf tree
|
90
|
-
PlatformSecureLib|OvmfPkg/Library/PlatformSecureLib/PlatformSecureLib.inf
|
91
|
-
|
92
|
-
NULL|ShellPkg/Library/UefiShellDebug1CommandsLib/UefiShellDebug1CommandsLib.inf
|
93
|
-
NULL|ShellPkg/Library/UefiShellInstall1CommandsLib/UefiShellInstall1CommandsLib.inf
|
94
|
-
NULL|ShellPkg/Library/UefiShellNetwork1CommandsLib/UefiShellNetwork1CommandsLib.inf
|
95
|
-
+!if $(NETWORK_IP6_ENABLE) == TRUE
|
96
|
-
+ NULL|ShellPkg/Library/UefiShellNetwork2CommandsLib/UefiShellNetwork2CommandsLib.inf
|
97
|
-
+!endif
|
98
|
-
HandleParsingLib|ShellPkg/Library/UefiHandleParsingLib/UefiHandleParsingLib.inf
|
99
|
-
PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf
|
100
|
-
BcfgCommandLib|ShellPkg/Library/UefiShellBcfgCommandLib/UefiShellBcfgCommandLib.inf
|
101
|
-
diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
|
102
|
-
index bb9d7c8..41ff17d 100644
|
103
|
-
--- a/ArmVirtPkg/ArmVirtQemu.dsc
|
104
|
-
+++ b/ArmVirtPkg/ArmVirtQemu.dsc
|
105
|
-
|
106
|
-
# -D FLAG=VALUE
|
107
|
-
#
|
108
|
-
DEFINE SECURE_BOOT_ENABLE = FALSE
|
109
|
-
+ DEFINE NETWORK_IP6_ENABLE = FALSE
|
110
|
-
DEFINE HTTP_BOOT_ENABLE = FALSE
|
111
|
-
|
112
|
-
!include ArmVirtPkg/ArmVirt.dsc.inc
|
113
|
-
|
114
|
-
MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf
|
115
|
-
MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf
|
116
|
-
MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf
|
117
|
-
- MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
|
118
|
-
MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf
|
119
|
-
+!if $(NETWORK_IP6_ENABLE) == TRUE
|
120
|
-
+ NetworkPkg/Ip6Dxe/Ip6Dxe.inf
|
121
|
-
+ NetworkPkg/TcpDxe/TcpDxe.inf
|
122
|
-
+ NetworkPkg/Udp6Dxe/Udp6Dxe.inf
|
123
|
-
+ NetworkPkg/Dhcp6Dxe/Dhcp6Dxe.inf
|
124
|
-
+ NetworkPkg/Mtftp6Dxe/Mtftp6Dxe.inf
|
125
|
-
+ NetworkPkg/UefiPxeBcDxe/UefiPxeBcDxe.inf
|
126
|
-
+ NetworkPkg/IScsiDxe/IScsiDxe.inf
|
127
|
-
+!else
|
128
|
-
+ MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
|
129
|
-
MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf
|
130
|
-
MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf
|
131
|
-
+!endif
|
132
|
-
!if $(HTTP_BOOT_ENABLE) == TRUE
|
133
|
-
NetworkPkg/DnsDxe/DnsDxe.inf
|
134
|
-
NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf
|
135
|
-
diff --git a/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc b/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
|
136
|
-
index 8941b7f..82d9cbd 100644
|
137
|
-
--- a/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
|
138
|
-
+++ b/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
|
139
|
-
@@ -125,10 +125,20 @@ READ_LOCK_STATUS = TRUE
|
140
|
-
INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf
|
141
|
-
INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf
|
142
|
-
INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf
|
143
|
-
- INF MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
|
144
|
-
INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf
|
145
|
-
+!if $(NETWORK_IP6_ENABLE) == TRUE
|
146
|
-
+ INF NetworkPkg/Ip6Dxe/Ip6Dxe.inf
|
147
|
-
+ INF NetworkPkg/TcpDxe/TcpDxe.inf
|
148
|
-
+ INF NetworkPkg/Udp6Dxe/Udp6Dxe.inf
|
149
|
-
+ INF NetworkPkg/Dhcp6Dxe/Dhcp6Dxe.inf
|
150
|
-
+ INF NetworkPkg/Mtftp6Dxe/Mtftp6Dxe.inf
|
151
|
-
+ INF NetworkPkg/UefiPxeBcDxe/UefiPxeBcDxe.inf
|
152
|
-
+ INF NetworkPkg/IScsiDxe/IScsiDxe.inf
|
153
|
-
+!else
|
154
|
-
+ INF MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
|
155
|
-
INF MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf
|
156
|
-
INF MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf
|
157
|
-
+!endif
|
158
|
-
!if $(HTTP_BOOT_ENABLE) == TRUE
|
159
|
-
INF NetworkPkg/DnsDxe/DnsDxe.inf
|
160
|
-
INF NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf
|
161
|
-
diff --git a/ArmVirtPkg/ArmVirtQemuKernel.dsc b/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
162
|
-
index 9027805..83fc12f 100644
|
163
|
-
--- a/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
164
|
-
+++ b/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
165
|
-
|
166
|
-
# -D FLAG=VALUE
|
167
|
-
#
|
168
|
-
DEFINE SECURE_BOOT_ENABLE = FALSE
|
169
|
-
+ DEFINE NETWORK_IP6_ENABLE = FALSE
|
170
|
-
DEFINE HTTP_BOOT_ENABLE = FALSE
|
171
|
-
|
172
|
-
!include ArmVirtPkg/ArmVirt.dsc.inc
|
173
|
-
|
174
|
-
MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf
|
175
|
-
MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf
|
176
|
-
MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf
|
177
|
-
- MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
|
178
|
-
MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf
|
179
|
-
+!if $(NETWORK_IP6_ENABLE) == TRUE
|
180
|
-
+ NetworkPkg/Ip6Dxe/Ip6Dxe.inf
|
181
|
-
+ NetworkPkg/TcpDxe/TcpDxe.inf
|
182
|
-
+ NetworkPkg/Udp6Dxe/Udp6Dxe.inf
|
183
|
-
+ NetworkPkg/Dhcp6Dxe/Dhcp6Dxe.inf
|
184
|
-
+ NetworkPkg/Mtftp6Dxe/Mtftp6Dxe.inf
|
185
|
-
+ NetworkPkg/UefiPxeBcDxe/UefiPxeBcDxe.inf
|
186
|
-
+ NetworkPkg/IScsiDxe/IScsiDxe.inf
|
187
|
-
+!else
|
188
|
-
+ MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
|
189
|
-
MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf
|
190
|
-
MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf
|
191
|
-
+!endif
|
192
|
-
!if $(HTTP_BOOT_ENABLE) == TRUE
|
193
|
-
NetworkPkg/DnsDxe/DnsDxe.inf
|
194
|
-
NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf
|
195
|
-
--
|
196
|
-
1.8.3.1
|
197
|
-
|
@@ -0,0 +1,57 @@
|
|
1
|
+
From 5a216abaa737195327235e37563b18a6bf2a74dc Mon Sep 17 00:00:00 2001
|
2
|
+
From: Philippe Mathieu-Daude <philmd@redhat.com>
|
3
|
+
Date: Thu, 1 Aug 2019 20:43:47 +0200
|
4
|
+
Subject: [PATCH 1/3] ArmVirtPkg: silence DEBUG_VERBOSE masking ~0x00400000 in
|
5
|
+
QemuRamfbDxe (RH only)
|
6
|
+
|
7
|
+
Message-id: <20190801184349.28512-2-philmd@redhat.com>
|
8
|
+
Patchwork-id: 89859
|
9
|
+
O-Subject: [RHEL-8.1.0 edk2 PATCH v4 1/3] ArmVirtPkg: silence DEBUG_VERBOSE
|
10
|
+
masking ~0x00400000 in QemuRamfbDxe (RH only)
|
11
|
+
Bugzilla: 1714446
|
12
|
+
Acked-by: Andrew Jones <drjones@redhat.com>
|
13
|
+
Acked-by: Laszlo Ersek <lersek@redhat.com>
|
14
|
+
|
15
|
+
Commit 76b4ac28e975 introduced a regression, while trying to only clear
|
16
|
+
the DEBUG_VERBOSE bit, it also unconditionally sets other bits, normally
|
17
|
+
kept clear in the "silent" build.
|
18
|
+
|
19
|
+
Fix the macro by masking the cleared bits out.
|
20
|
+
|
21
|
+
Reported-by: Andrew Jones <drjones@redhat.com>
|
22
|
+
Suggested-by: Laszlo Ersek <lersek@redhat.com>
|
23
|
+
Signed-off-by: Philippe Mathieu-Daude <philmd@redhat.com>
|
24
|
+
---
|
25
|
+
ArmVirtPkg/ArmVirtQemu.dsc | 2 +-
|
26
|
+
ArmVirtPkg/ArmVirtQemuKernel.dsc | 2 +-
|
27
|
+
2 files changed, 2 insertions(+), 2 deletions(-)
|
28
|
+
|
29
|
+
diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
|
30
|
+
index aac4094..a44477f 100644
|
31
|
+
--- a/ArmVirtPkg/ArmVirtQemu.dsc
|
32
|
+
+++ b/ArmVirtPkg/ArmVirtQemu.dsc
|
33
|
+
|
34
|
+
#
|
35
|
+
OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf {
|
36
|
+
<PcdsFixedAtBuild>
|
37
|
+
- gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
|
38
|
+
+ gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|($(DEBUG_PRINT_ERROR_LEVEL)) & 0xFFBFFFFF
|
39
|
+
}
|
40
|
+
OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
|
41
|
+
OvmfPkg/PlatformDxe/Platform.inf
|
42
|
+
diff --git a/ArmVirtPkg/ArmVirtQemuKernel.dsc b/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
43
|
+
index c9a635e..d28ac52 100644
|
44
|
+
--- a/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
45
|
+
+++ b/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
46
|
+
|
47
|
+
#
|
48
|
+
OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf {
|
49
|
+
<PcdsFixedAtBuild>
|
50
|
+
- gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
|
51
|
+
+ gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|($(DEBUG_PRINT_ERROR_LEVEL)) & 0xFFBFFFFF
|
52
|
+
}
|
53
|
+
OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
|
54
|
+
OvmfPkg/PlatformDxe/Platform.inf
|
55
|
+
--
|
56
|
+
1.8.3.1
|
57
|
+
|
@@ -1,76 +0,0 @@
|
|
1
|
-
From c51468996553e70659b85a24cbdad61a27dac952 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Wed, 18 Jul 2018 00:18:18 +0200
|
4
|
-
Subject: [PATCH 2/6] ArmVirtPkg: unify HttpLib resolutions in
|
5
|
-
"ArmVirt.dsc.inc"
|
6
|
-
|
7
|
-
Message-id: <20180717221822.13110-2-lersek@redhat.com>
|
8
|
-
Patchwork-id: 81376
|
9
|
-
O-Subject: [RHEL8/virt212 edk2 PATCH 1/5] ArmVirtPkg: unify HttpLib resolutions
|
10
|
-
in "ArmVirt.dsc.inc"
|
11
|
-
Bugzilla: 1536627
|
12
|
-
Acked-by: Paolo Bonzini <pbonzini@redhat.com>
|
13
|
-
Acked-by: Wei Huang <wei@redhat.com>
|
14
|
-
|
15
|
-
We already resolve a number of networking-related library classes in
|
16
|
-
ArmVirt.dsc.inc; follow suit with HttpLib.
|
17
|
-
|
18
|
-
Cc: Julien Grall <julien.grall@linaro.org>
|
19
|
-
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1007
|
20
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
21
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
22
|
-
Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
23
|
-
(cherry picked from commit 77b702bfa4947caaa6b4b04730820d91bdf07b03)
|
24
|
-
---
|
25
|
-
ArmVirtPkg/ArmVirt.dsc.inc | 3 +++
|
26
|
-
ArmVirtPkg/ArmVirtQemu.dsc | 4 ----
|
27
|
-
ArmVirtPkg/ArmVirtQemuKernel.dsc | 4 ----
|
28
|
-
3 files changed, 3 insertions(+), 8 deletions(-)
|
29
|
-
|
30
|
-
diff --git a/ArmVirtPkg/ArmVirt.dsc.inc b/ArmVirtPkg/ArmVirt.dsc.inc
|
31
|
-
index 35bccb3d..2bb8860 100644
|
32
|
-
--- a/ArmVirtPkg/ArmVirt.dsc.inc
|
33
|
-
+++ b/ArmVirtPkg/ArmVirt.dsc.inc
|
34
|
-
|
35
|
-
DpcLib|MdeModulePkg/Library/DxeDpcLib/DxeDpcLib.inf
|
36
|
-
UdpIoLib|MdeModulePkg/Library/DxeUdpIoLib/DxeUdpIoLib.inf
|
37
|
-
IpIoLib|MdeModulePkg/Library/DxeIpIoLib/DxeIpIoLib.inf
|
38
|
-
+!if $(HTTP_BOOT_ENABLE) == TRUE
|
39
|
-
+ HttpLib|MdeModulePkg/Library/DxeHttpLib/DxeHttpLib.inf
|
40
|
-
+!endif
|
41
|
-
|
42
|
-
#
|
43
|
-
# It is not possible to prevent the ARM compiler from inserting calls to intrinsic functions.
|
44
|
-
diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
|
45
|
-
index 035b729..bb9d7c8 100644
|
46
|
-
--- a/ArmVirtPkg/ArmVirtQemu.dsc
|
47
|
-
+++ b/ArmVirtPkg/ArmVirtQemu.dsc
|
48
|
-
|
49
|
-
PciSegmentLib|MdePkg/Library/BasePciSegmentLibPci/BasePciSegmentLibPci.inf
|
50
|
-
PciHostBridgeLib|ArmVirtPkg/Library/FdtPciHostBridgeLib/FdtPciHostBridgeLib.inf
|
51
|
-
|
52
|
-
-!if $(HTTP_BOOT_ENABLE) == TRUE
|
53
|
-
- HttpLib|MdeModulePkg/Library/DxeHttpLib/DxeHttpLib.inf
|
54
|
-
-!endif
|
55
|
-
-
|
56
|
-
[LibraryClasses.common.PEIM]
|
57
|
-
ArmVirtMemInfoLib|ArmVirtPkg/Library/QemuVirtMemInfoLib/QemuVirtMemInfoPeiLib.inf
|
58
|
-
|
59
|
-
diff --git a/ArmVirtPkg/ArmVirtQemuKernel.dsc b/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
60
|
-
index 1981aae..9027805 100644
|
61
|
-
--- a/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
62
|
-
+++ b/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
63
|
-
|
64
|
-
PciSegmentLib|MdePkg/Library/BasePciSegmentLibPci/BasePciSegmentLibPci.inf
|
65
|
-
PciHostBridgeLib|ArmVirtPkg/Library/FdtPciHostBridgeLib/FdtPciHostBridgeLib.inf
|
66
|
-
|
67
|
-
-!if $(HTTP_BOOT_ENABLE) == TRUE
|
68
|
-
- HttpLib|MdeModulePkg/Library/DxeHttpLib/DxeHttpLib.inf
|
69
|
-
-!endif
|
70
|
-
-
|
71
|
-
[LibraryClasses.common.UEFI_DRIVER]
|
72
|
-
UefiScsiLib|MdePkg/Library/UefiScsiLib/UefiScsiLib.inf
|
73
|
-
|
74
|
-
--
|
75
|
-
1.8.3.1
|
76
|
-
|
@@ -1,273 +0,0 @@
|
|
1
|
-
From 29c394f110b1f769e629e8775874261e33d4abd9 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Wed, 24 Oct 2018 21:03:45 +0200
|
4
|
-
Subject: [PATCH 4/4] BaseTools: Add more checker in Decompress algorithm to
|
5
|
-
access the valid buffer (CVE FIX)
|
6
|
-
|
7
|
-
Message-id: <20181024190345.15288-5-lersek@redhat.com>
|
8
|
-
Patchwork-id: 82886
|
9
|
-
O-Subject: [RHEL8 edk2 PATCH 4/4] BaseTools: Add more checker in Decompress
|
10
|
-
algorithm to access the valid buffer (CVE FIX)
|
11
|
-
Bugzilla: 1641445
|
12
|
-
1641453
|
13
|
-
1641464
|
14
|
-
1641469
|
15
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
16
|
-
Acked-by: Thomas Huth <thuth@redhat.com>
|
17
|
-
|
18
|
-
From: Liming Gao <liming.gao@intel.com>
|
19
|
-
|
20
|
-
--v-- RHEL8 note start --v--
|
21
|
-
|
22
|
-
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641445
|
23
|
-
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641453
|
24
|
-
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641464
|
25
|
-
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641469
|
26
|
-
|
27
|
-
Unfortunately, the upstream patch series was not structured according to
|
28
|
-
the CVE reports. This patch contributes to fixing:
|
29
|
-
|
30
|
-
- CVE-2017-5731
|
31
|
-
- CVE-2017-5733
|
32
|
-
- CVE-2017-5734
|
33
|
-
- CVE-2017-5735
|
34
|
-
|
35
|
-
but not CVE-2017-5732 (contrarily to the upstream commit message). The
|
36
|
-
best I could achieve up-stream was to get the "CVE FIX" expression into
|
37
|
-
the subject, and a whole-sale dump of the CVEs into the body. I had not
|
38
|
-
been invited to the original (off-list, embargoed) analysis and review.
|
39
|
-
|
40
|
-
The differences that "git-backport-diff" reports as "functional" for this
|
41
|
-
backport aren't actually functional differences. They are due to
|
42
|
-
downstream lacking two upstream commits:
|
43
|
-
|
44
|
-
- f7496d717357 ("BaseTools: Clean up source files", 2018-07-09), with the
|
45
|
-
"usual" diffstat "289 files changed, 10645 insertions(+), 10645
|
46
|
-
deletions(-)";
|
47
|
-
|
48
|
-
- more importantly, 472eb3b89682 ("BaseTools: Add --uefi option to enable
|
49
|
-
UefiCompress method", 2018-10-13).
|
50
|
-
|
51
|
-
(Side note: in upstream, commit 472eb3b89682 was incorrectly reverted as
|
52
|
-
part of 1ccc4d895dd8 ("Revert BaseTools: PYTHON3 migration", 2018-10-15),
|
53
|
-
but then it was re-applied in f1400101a732.)
|
54
|
-
|
55
|
-
In commit 472eb3b89682, the "UEFI" compression/decompression method was
|
56
|
-
added to BaseTools, beyond the original "Tiano" method. This caused the
|
57
|
-
Tiano method to be indented more deeply, in the main() function of
|
58
|
-
"TianoCompress.c". (Also the original Decompress() function was renamed to
|
59
|
-
TDecompress().) The CVE fix applies to the "Tiano" method, which RHEL8
|
60
|
-
does have, but at a different nesting level. Therefore the changes have
|
61
|
-
been backported manually, and the difference in indentation is also why
|
62
|
-
"git-backport-diff" thinks the changes are functional.
|
63
|
-
|
64
|
-
This backport, once applied, can be diffed against the upstream tree more
|
65
|
-
easily as follows:
|
66
|
-
|
67
|
-
git diff -b HEAD..041d89bc0f01 -- \
|
68
|
-
BaseTools/Source/C/Common/Decompress.c \
|
69
|
-
BaseTools/Source/C/TianoCompress/TianoCompress.c
|
70
|
-
|
71
|
-
--^-- RHEL8 note end --^--
|
72
|
-
|
73
|
-
Fix CVE-2017-5731,CVE-2017-5732,CVE-2017-5733,CVE-2017-5734,CVE-2017-5735
|
74
|
-
https://bugzilla.tianocore.org/show_bug.cgi?id=686
|
75
|
-
|
76
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
77
|
-
Signed-off-by: Holtsclaw Brent <brent.holtsclaw@intel.com>
|
78
|
-
Signed-off-by: Liming Gao <liming.gao@intel.com>
|
79
|
-
Reviewed-by: Star Zeng <star.zeng@intel.com>
|
80
|
-
Acked-by: Laszlo Ersek <lersek@redhat.com>
|
81
|
-
(cherry picked from commit 041d89bc0f0119df37a5fce1d0f16495ff905089)
|
82
|
-
---
|
83
|
-
BaseTools/Source/C/Common/Decompress.c | 23 +++++++++++++++++++--
|
84
|
-
BaseTools/Source/C/TianoCompress/TianoCompress.c | 26 +++++++++++++++++++++++-
|
85
|
-
2 files changed, 46 insertions(+), 3 deletions(-)
|
86
|
-
|
87
|
-
diff --git a/BaseTools/Source/C/Common/Decompress.c b/BaseTools/Source/C/Common/Decompress.c
|
88
|
-
index 8f1afb4..bdc10f5 100644
|
89
|
-
--- a/BaseTools/Source/C/Common/Decompress.c
|
90
|
-
+++ b/BaseTools/Source/C/Common/Decompress.c
|
91
|
-
@@ -194,12 +194,16 @@ Returns:
|
92
|
-
UINT16 Avail;
|
93
|
-
UINT16 NextCode;
|
94
|
-
UINT16 Mask;
|
95
|
-
+ UINT16 MaxTableLength;
|
96
|
-
|
97
|
-
for (Index = 1; Index <= 16; Index++) {
|
98
|
-
Count[Index] = 0;
|
99
|
-
}
|
100
|
-
|
101
|
-
for (Index = 0; Index < NumOfChar; Index++) {
|
102
|
-
+ if (BitLen[Index] > 16) {
|
103
|
-
+ return (UINT16) BAD_TABLE;
|
104
|
-
+ }
|
105
|
-
Count[BitLen[Index]]++;
|
106
|
-
}
|
107
|
-
|
108
|
-
@@ -237,6 +241,7 @@ Returns:
|
109
|
-
|
110
|
-
Avail = NumOfChar;
|
111
|
-
Mask = (UINT16) (1U << (15 - TableBits));
|
112
|
-
+ MaxTableLength = (UINT16) (1U << TableBits);
|
113
|
-
|
114
|
-
for (Char = 0; Char < NumOfChar; Char++) {
|
115
|
-
|
116
|
-
@@ -250,6 +255,9 @@ Returns:
|
117
|
-
if (Len <= TableBits) {
|
118
|
-
|
119
|
-
for (Index = Start[Len]; Index < NextCode; Index++) {
|
120
|
-
+ if (Index >= MaxTableLength) {
|
121
|
-
+ return (UINT16) BAD_TABLE;
|
122
|
-
+ }
|
123
|
-
Table[Index] = Char;
|
124
|
-
}
|
125
|
-
|
126
|
-
@@ -643,10 +651,14 @@ Returns: (VOID)
|
127
|
-
|
128
|
-
BytesRemain--;
|
129
|
-
while ((INT16) (BytesRemain) >= 0) {
|
130
|
-
- Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
|
131
|
-
if (Sd->mOutBuf >= Sd->mOrigSize) {
|
132
|
-
return ;
|
133
|
-
}
|
134
|
-
+ if (DataIdx >= Sd->mOrigSize) {
|
135
|
-
+ Sd->mBadTableFlag = (UINT16) BAD_TABLE;
|
136
|
-
+ return ;
|
137
|
-
+ }
|
138
|
-
+ Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
|
139
|
-
|
140
|
-
BytesRemain--;
|
141
|
-
}
|
142
|
-
@@ -684,6 +696,7 @@ Returns:
|
143
|
-
--*/
|
144
|
-
{
|
145
|
-
UINT8 *Src;
|
146
|
-
+ UINT32 CompSize;
|
147
|
-
|
148
|
-
*ScratchSize = sizeof (SCRATCH_DATA);
|
149
|
-
|
150
|
-
@@ -692,7 +705,13 @@ Returns:
|
151
|
-
return EFI_INVALID_PARAMETER;
|
152
|
-
}
|
153
|
-
|
154
|
-
+ CompSize = Src[0] + (Src[1] << 8) + (Src[2] << 16) + (Src[3] << 24);
|
155
|
-
*DstSize = Src[4] + (Src[5] << 8) + (Src[6] << 16) + (Src[7] << 24);
|
156
|
-
+
|
157
|
-
+ if (SrcSize < CompSize + 8 || (CompSize + 8) < 8) {
|
158
|
-
+ return EFI_INVALID_PARAMETER;
|
159
|
-
+ }
|
160
|
-
+
|
161
|
-
return EFI_SUCCESS;
|
162
|
-
}
|
163
|
-
|
164
|
-
@@ -752,7 +771,7 @@ Returns:
|
165
|
-
CompSize = Src[0] + (Src[1] << 8) + (Src[2] << 16) + (Src[3] << 24);
|
166
|
-
OrigSize = Src[4] + (Src[5] << 8) + (Src[6] << 16) + (Src[7] << 24);
|
167
|
-
|
168
|
-
- if (SrcSize < CompSize + 8) {
|
169
|
-
+ if (SrcSize < CompSize + 8 || (CompSize + 8) < 8) {
|
170
|
-
return EFI_INVALID_PARAMETER;
|
171
|
-
}
|
172
|
-
|
173
|
-
diff --git a/BaseTools/Source/C/TianoCompress/TianoCompress.c b/BaseTools/Source/C/TianoCompress/TianoCompress.c
|
174
|
-
index 046fb36..d07fd9e 100644
|
175
|
-
--- a/BaseTools/Source/C/TianoCompress/TianoCompress.c
|
176
|
-
+++ b/BaseTools/Source/C/TianoCompress/TianoCompress.c
|
177
|
-
@@ -1753,6 +1753,7 @@ Returns:
|
178
|
-
SCRATCH_DATA *Scratch;
|
179
|
-
UINT8 *Src;
|
180
|
-
UINT32 OrigSize;
|
181
|
-
+ UINT32 CompSize;
|
182
|
-
|
183
|
-
SetUtilityName(UTILITY_NAME);
|
184
|
-
|
185
|
-
@@ -1761,6 +1762,7 @@ Returns:
|
186
|
-
OutBuffer = NULL;
|
187
|
-
Scratch = NULL;
|
188
|
-
OrigSize = 0;
|
189
|
-
+ CompSize = 0;
|
190
|
-
InputLength = 0;
|
191
|
-
InputFileName = NULL;
|
192
|
-
OutputFileName = NULL;
|
193
|
-
@@ -1979,15 +1981,24 @@ Returns:
|
194
|
-
if (DebugMode) {
|
195
|
-
DebugMsg(UTILITY_NAME, 0, DebugLevel, "Decoding\n", NULL);
|
196
|
-
}
|
197
|
-
+ if (InputLength < 8){
|
198
|
-
+ Error (NULL, 0, 3000, "Invalid", "The input file %s is too small.", InputFileName);
|
199
|
-
+ goto ERROR;
|
200
|
-
+ }
|
201
|
-
//
|
202
|
-
// Get Compressed file original size
|
203
|
-
//
|
204
|
-
Src = (UINT8 *)FileBuffer;
|
205
|
-
OrigSize = Src[4] + (Src[5] << 8) + (Src[6] << 16) + (Src[7] << 24);
|
206
|
-
+ CompSize = Src[0] + (Src[1] << 8) + (Src[2] <<16) + (Src[3] <<24);
|
207
|
-
|
208
|
-
//
|
209
|
-
// Allocate OutputBuffer
|
210
|
-
//
|
211
|
-
+ if (InputLength < CompSize + 8 || (CompSize + 8) < 8) {
|
212
|
-
+ Error (NULL, 0, 3000, "Invalid", "The input file %s data is invalid.", InputFileName);
|
213
|
-
+ goto ERROR;
|
214
|
-
+ }
|
215
|
-
OutBuffer = (UINT8 *)malloc(OrigSize);
|
216
|
-
if (OutBuffer == NULL) {
|
217
|
-
Error (NULL, 0, 4001, "Resource:", "Memory cannot be allocated!");
|
218
|
-
@@ -2171,12 +2182,16 @@ Returns:
|
219
|
-
UINT16 Mask;
|
220
|
-
UINT16 WordOfStart;
|
221
|
-
UINT16 WordOfCount;
|
222
|
-
+ UINT16 MaxTableLength;
|
223
|
-
|
224
|
-
for (Index = 0; Index <= 16; Index++) {
|
225
|
-
Count[Index] = 0;
|
226
|
-
}
|
227
|
-
|
228
|
-
for (Index = 0; Index < NumOfChar; Index++) {
|
229
|
-
+ if (BitLen[Index] > 16) {
|
230
|
-
+ return (UINT16) BAD_TABLE;
|
231
|
-
+ }
|
232
|
-
Count[BitLen[Index]]++;
|
233
|
-
}
|
234
|
-
|
235
|
-
@@ -2220,6 +2235,7 @@ Returns:
|
236
|
-
|
237
|
-
Avail = NumOfChar;
|
238
|
-
Mask = (UINT16) (1U << (15 - TableBits));
|
239
|
-
+ MaxTableLength = (UINT16) (1U << TableBits);
|
240
|
-
|
241
|
-
for (Char = 0; Char < NumOfChar; Char++) {
|
242
|
-
|
243
|
-
@@ -2233,6 +2249,9 @@ Returns:
|
244
|
-
if (Len <= TableBits) {
|
245
|
-
|
246
|
-
for (Index = Start[Len]; Index < NextCode; Index++) {
|
247
|
-
+ if (Index >= MaxTableLength) {
|
248
|
-
+ return (UINT16) BAD_TABLE;
|
249
|
-
+ }
|
250
|
-
Table[Index] = Char;
|
251
|
-
}
|
252
|
-
|
253
|
-
@@ -2617,11 +2636,16 @@ Returns: (VOID)
|
254
|
-
DataIdx = Sd->mOutBuf - DecodeP (Sd) - 1;
|
255
|
-
|
256
|
-
BytesRemain--;
|
257
|
-
+
|
258
|
-
while ((INT16) (BytesRemain) >= 0) {
|
259
|
-
- Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
|
260
|
-
if (Sd->mOutBuf >= Sd->mOrigSize) {
|
261
|
-
goto Done ;
|
262
|
-
}
|
263
|
-
+ if (DataIdx >= Sd->mOrigSize) {
|
264
|
-
+ Sd->mBadTableFlag = (UINT16) BAD_TABLE;
|
265
|
-
+ goto Done ;
|
266
|
-
+ }
|
267
|
-
+ Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
|
268
|
-
|
269
|
-
BytesRemain--;
|
270
|
-
}
|
271
|
-
--
|
272
|
-
1.8.3.1
|
273
|
-
|
@@ -1,73 +0,0 @@
|
|
1
|
-
From 115cf260ac54a6793a184227d6ae6bfe3da74a56 Mon Sep 17 00:00:00 2001
|
2
|
-
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philmd@redhat.com>
|
3
|
-
Date: Wed, 9 Jan 2019 17:10:05 +0100
|
4
|
-
Subject: [PATCH 1/4] BaseTools: Fix UEFI and Tiano Decompression logic issue
|
5
|
-
MIME-Version: 1.0
|
6
|
-
Content-Type: text/plain; charset=UTF-8
|
7
|
-
Content-Transfer-Encoding: 8bit
|
8
|
-
|
9
|
-
Message-id: <20190109161007.3471-2-philmd@redhat.com>
|
10
|
-
Patchwork-id: 83924
|
11
|
-
O-Subject: [RHEL8 edk2 PATCH 1/3] BaseTools: Fix UEFI and Tiano Decompression
|
12
|
-
logic issue
|
13
|
-
Bugzilla: 1662184
|
14
|
-
Acked-by: Laszlo Ersek <lersek@redhat.com>
|
15
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
16
|
-
|
17
|
-
From: Liming Gao <liming.gao@intel.com>
|
18
|
-
|
19
|
-
https://bugzilla.tianocore.org/show_bug.cgi?id=1317
|
20
|
-
|
21
|
-
This is a regression issue caused by 041d89bc0f0119df37a5fce1d0f16495ff905089.
|
22
|
-
In Decode() function, once mOutBuf is fully filled, Decode() should return.
|
23
|
-
Current logic misses the checker of mOutBuf after while() loop.
|
24
|
-
|
25
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
26
|
-
Signed-off-by: Liming Gao <liming.gao@intel.com>
|
27
|
-
Cc: Yonghong Zhu <yonghong.zhu@intel.com>
|
28
|
-
Reviewed-by: Yonghong Zhu <yonghong.zhu@intel.com>
|
29
|
-
(cherry picked from commit 5e45a1fdcfbf9b2b389122eb97475148594625f8)
|
30
|
-
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
|
31
|
-
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
32
|
-
---
|
33
|
-
BaseTools/Source/C/Common/Decompress.c | 6 ++++++
|
34
|
-
BaseTools/Source/C/TianoCompress/TianoCompress.c | 6 ++++++
|
35
|
-
2 files changed, 12 insertions(+)
|
36
|
-
|
37
|
-
diff --git a/BaseTools/Source/C/Common/Decompress.c b/BaseTools/Source/C/Common/Decompress.c
|
38
|
-
index bdc10f5..af76f67 100644
|
39
|
-
--- a/BaseTools/Source/C/Common/Decompress.c
|
40
|
-
+++ b/BaseTools/Source/C/Common/Decompress.c
|
41
|
-
@@ -662,6 +662,12 @@ Returns: (VOID)
|
42
|
-
|
43
|
-
BytesRemain--;
|
44
|
-
}
|
45
|
-
+ //
|
46
|
-
+ // Once mOutBuf is fully filled, directly return
|
47
|
-
+ //
|
48
|
-
+ if (Sd->mOutBuf >= Sd->mOrigSize) {
|
49
|
-
+ return ;
|
50
|
-
+ }
|
51
|
-
}
|
52
|
-
}
|
53
|
-
|
54
|
-
diff --git a/BaseTools/Source/C/TianoCompress/TianoCompress.c b/BaseTools/Source/C/TianoCompress/TianoCompress.c
|
55
|
-
index d07fd9e..369f7b3 100644
|
56
|
-
--- a/BaseTools/Source/C/TianoCompress/TianoCompress.c
|
57
|
-
+++ b/BaseTools/Source/C/TianoCompress/TianoCompress.c
|
58
|
-
@@ -2649,6 +2649,12 @@ Returns: (VOID)
|
59
|
-
|
60
|
-
BytesRemain--;
|
61
|
-
}
|
62
|
-
+ //
|
63
|
-
+ // Once mOutBuf is fully filled, directly return
|
64
|
-
+ //
|
65
|
-
+ if (Sd->mOutBuf >= Sd->mOrigSize) {
|
66
|
-
+ goto Done ;
|
67
|
-
+ }
|
68
|
-
}
|
69
|
-
}
|
70
|
-
|
71
|
-
--
|
72
|
-
1.8.3.1
|
73
|
-
|
@@ -1,98 +0,0 @@
|
|
1
|
-
From bd8f7996e759b1aa2549efc6062dbed8ac9b8dcb Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Wed, 29 Aug 2018 17:12:00 +0200
|
4
|
-
Subject: [PATCH 3/7] BaseTools/Source/C: split "-O2" to BUILD_OPTFLAGS
|
5
|
-
|
6
|
-
Message-id: <20180829151204.26958-4-lersek@redhat.com>
|
7
|
-
Patchwork-id: 81961
|
8
|
-
O-Subject: [RHEL8/virt212 edk2 PATCH 3/7] BaseTools/Source/C: split "-O2" to
|
9
|
-
BUILD_OPTFLAGS
|
10
|
-
Bugzilla: 1607906
|
11
|
-
Acked-by: Thomas Huth <thuth@redhat.com>
|
12
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
13
|
-
|
14
|
-
The option "-O2" is not a preprocessor flag, but a code generation
|
15
|
-
(compilation) flag. Move it from BUILD_CPPFLAGS to BUILD_CFLAGS and
|
16
|
-
BUILD_CXXFLAGS.
|
17
|
-
|
18
|
-
Because "VfrCompile/GNUmakefile" uses "-O2" through BUILD_CPPFLAGS, and
|
19
|
-
because it doesn't use BUILD_CXXFLAGS, we have to introduce BUILD_OPTFLAGS
|
20
|
-
separately, so that "VfrCompile/GNUmakefile" can continue using just this
|
21
|
-
flag.
|
22
|
-
|
23
|
-
This patch doesn't change behavior.
|
24
|
-
|
25
|
-
Cc: Liming Gao <liming.gao@intel.com>
|
26
|
-
Cc: Yonghong Zhu <yonghong.zhu@intel.com>
|
27
|
-
Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1540244
|
28
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
29
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
30
|
-
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
31
|
-
(cherry picked from commit b8a66170264395edeaa61e6d22930a58e576a685)
|
32
|
-
---
|
33
|
-
BaseTools/Source/C/Makefiles/header.makefile | 6 +++++-
|
34
|
-
BaseTools/Source/C/VfrCompile/GNUmakefile | 11 +++++++----
|
35
|
-
2 files changed, 12 insertions(+), 5 deletions(-)
|
36
|
-
|
37
|
-
diff --git a/BaseTools/Source/C/Makefiles/header.makefile b/BaseTools/Source/C/Makefiles/header.makefile
|
38
|
-
index 08421ba..498c6cf 100644
|
39
|
-
--- a/BaseTools/Source/C/Makefiles/header.makefile
|
40
|
-
+++ b/BaseTools/Source/C/Makefiles/header.makefile
|
41
|
-
@@ -68,7 +68,8 @@ $(error Bad HOST_ARCH)
|
42
|
-
endif
|
43
|
-
|
44
|
-
INCLUDE = $(TOOL_INCLUDE) -I $(MAKEROOT) -I $(MAKEROOT)/Include/Common -I $(MAKEROOT)/Include/ -I $(MAKEROOT)/Include/IndustryStandard -I $(MAKEROOT)/Common/ -I .. -I . $(ARCH_INCLUDE)
|
45
|
-
-BUILD_CPPFLAGS = $(INCLUDE) -O2
|
46
|
-
+BUILD_CPPFLAGS = $(INCLUDE)
|
47
|
-
+BUILD_OPTFLAGS = -O2
|
48
|
-
ifeq ($(DARWIN),Darwin)
|
49
|
-
# assume clang or clang compatible flags on OS X
|
50
|
-
BUILD_CFLAGS = -MD -fshort-wchar -fno-strict-aliasing -Wall -Werror -Wno-deprecated-declarations -Wno-self-assign -Wno-unused-result -nostdlib -g
|
51
|
-
@@ -91,6 +92,9 @@ ifeq ($(DARWIN),Darwin)
|
52
|
-
endif
|
53
|
-
endif
|
54
|
-
|
55
|
-
+# keep BUILD_OPTFLAGS last
|
56
|
-
+BUILD_CFLAGS += $(BUILD_OPTFLAGS)
|
57
|
-
+BUILD_CXXFLAGS += $(BUILD_OPTFLAGS)
|
58
|
-
|
59
|
-
.PHONY: all
|
60
|
-
.PHONY: install
|
61
|
-
diff --git a/BaseTools/Source/C/VfrCompile/GNUmakefile b/BaseTools/Source/C/VfrCompile/GNUmakefile
|
62
|
-
index c4ec61a..bbe562c 100644
|
63
|
-
--- a/BaseTools/Source/C/VfrCompile/GNUmakefile
|
64
|
-
+++ b/BaseTools/Source/C/VfrCompile/GNUmakefile
|
65
|
-
@@ -25,6 +25,9 @@ OBJECTS = AParser.o DLexerBase.o ATokenBuffer.o EfiVfrParser.o VfrLexer.o VfrSyn
|
66
|
-
|
67
|
-
VFR_CPPFLAGS = -DPCCTS_USE_NAMESPACE_STD $(BUILD_CPPFLAGS)
|
68
|
-
|
69
|
-
+# keep BUILD_OPTFLAGS last
|
70
|
-
+VFR_CXXFLAGS = $(BUILD_OPTFLAGS)
|
71
|
-
+
|
72
|
-
LINKER = $(BUILD_CXX)
|
73
|
-
|
74
|
-
EXTRA_CLEAN_OBJECTS = EfiVfrParser.cpp EfiVfrParser.h VfrParser.dlg VfrTokens.h VfrLexer.cpp VfrLexer.h VfrSyntax.cpp tokens.h
|
75
|
-
@@ -58,16 +61,16 @@ Pccts/dlg/dlg:
|
76
|
-
BIN_DIR='.' $(MAKE) -C Pccts/dlg
|
77
|
-
|
78
|
-
ATokenBuffer.o: Pccts/h/ATokenBuffer.cpp
|
79
|
-
- $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $? -o $@
|
80
|
-
+ $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $(VFR_CXXFLAGS) $? -o $@
|
81
|
-
|
82
|
-
DLexerBase.o: Pccts/h/DLexerBase.cpp
|
83
|
-
- $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $? -o $@
|
84
|
-
+ $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $(VFR_CXXFLAGS) $? -o $@
|
85
|
-
|
86
|
-
AParser.o: Pccts/h/AParser.cpp
|
87
|
-
- $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $? -o $@
|
88
|
-
+ $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $(VFR_CXXFLAGS) $? -o $@
|
89
|
-
|
90
|
-
VfrSyntax.o: VfrSyntax.cpp
|
91
|
-
- $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $? -o $@
|
92
|
-
+ $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $(VFR_CXXFLAGS) $? -o $@
|
93
|
-
|
94
|
-
clean: localClean
|
95
|
-
|
96
|
-
--
|
97
|
-
1.8.3.1
|
98
|
-
|
@@ -1,46 +0,0 @@
|
|
1
|
-
From 7ad1348d09a32c467229ee8bef98a09e47b5a708 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Wed, 29 Aug 2018 17:12:02 +0200
|
4
|
-
Subject: [PATCH 5/7] BaseTools/Source/C: take EXTRA_LDFLAGS from the caller
|
5
|
-
|
6
|
-
Message-id: <20180829151204.26958-6-lersek@redhat.com>
|
7
|
-
Patchwork-id: 81965
|
8
|
-
O-Subject: [RHEL8/virt212 edk2 PATCH 5/7] BaseTools/Source/C: take EXTRA_LDFLAGS
|
9
|
-
from the caller
|
10
|
-
Bugzilla: 1607906
|
11
|
-
Acked-by: Thomas Huth <thuth@redhat.com>
|
12
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
13
|
-
|
14
|
-
Allow the caller of the top-level makefile either to set EXTRA_LDFLAGS in
|
15
|
-
the environment or to pass EXTRA_LDFLAGS as a macro definition on the
|
16
|
-
command line. EXTRA_LDFLAGS extends (and potentially overrides) default
|
17
|
-
link-editing flags set in the makefiles.
|
18
|
-
|
19
|
-
Cc: Liming Gao <liming.gao@intel.com>
|
20
|
-
Cc: Yonghong Zhu <yonghong.zhu@intel.com>
|
21
|
-
Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1540244
|
22
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
23
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
24
|
-
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
25
|
-
(cherry picked from commit 81502cee20ac4046f08bb4aec754c7091c8808dc)
|
26
|
-
---
|
27
|
-
BaseTools/Source/C/Makefiles/header.makefile | 3 +++
|
28
|
-
1 file changed, 3 insertions(+)
|
29
|
-
|
30
|
-
diff --git a/BaseTools/Source/C/Makefiles/header.makefile b/BaseTools/Source/C/Makefiles/header.makefile
|
31
|
-
index 1b4cad5..7f283d6 100644
|
32
|
-
--- a/BaseTools/Source/C/Makefiles/header.makefile
|
33
|
-
+++ b/BaseTools/Source/C/Makefiles/header.makefile
|
34
|
-
@@ -99,6 +99,9 @@ endif
|
35
|
-
BUILD_CFLAGS += $(BUILD_OPTFLAGS)
|
36
|
-
BUILD_CXXFLAGS += $(BUILD_OPTFLAGS)
|
37
|
-
|
38
|
-
+# keep EXTRA_LDFLAGS last
|
39
|
-
+BUILD_LFLAGS += $(EXTRA_LDFLAGS)
|
40
|
-
+
|
41
|
-
.PHONY: all
|
42
|
-
.PHONY: install
|
43
|
-
.PHONY: clean
|
44
|
-
--
|
45
|
-
1.8.3.1
|
46
|
-
|
@@ -1,48 +0,0 @@
|
|
1
|
-
From c8f78f5ef3463ffb63d26879d858327aba934d12 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Wed, 29 Aug 2018 17:12:01 +0200
|
4
|
-
Subject: [PATCH 4/7] BaseTools/Source/C: take EXTRA_OPTFLAGS from the caller
|
5
|
-
|
6
|
-
Message-id: <20180829151204.26958-5-lersek@redhat.com>
|
7
|
-
Patchwork-id: 81966
|
8
|
-
O-Subject: [RHEL8/virt212 edk2 PATCH 4/7] BaseTools/Source/C: take
|
9
|
-
EXTRA_OPTFLAGS from the caller
|
10
|
-
Bugzilla: 1607906
|
11
|
-
Acked-by: Thomas Huth <thuth@redhat.com>
|
12
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
13
|
-
|
14
|
-
Allow the caller of the top-level makefile either to set EXTRA_OPTFLAGS in
|
15
|
-
the environment or to pass EXTRA_OPTFLAGS as a macro definition on the
|
16
|
-
command line. EXTRA_OPTFLAGS extends (and potentially overrides) default C
|
17
|
-
compilation flags set in the makefiles.
|
18
|
-
|
19
|
-
Cc: Liming Gao <liming.gao@intel.com>
|
20
|
-
Cc: Yonghong Zhu <yonghong.zhu@intel.com>
|
21
|
-
Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1540244
|
22
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
23
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
24
|
-
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
25
|
-
(cherry picked from commit b0ca5dae78ff71397a8ef568f1914da7668ff5a9)
|
26
|
-
---
|
27
|
-
BaseTools/Source/C/Makefiles/header.makefile | 5 ++++-
|
28
|
-
1 file changed, 4 insertions(+), 1 deletion(-)
|
29
|
-
|
30
|
-
diff --git a/BaseTools/Source/C/Makefiles/header.makefile b/BaseTools/Source/C/Makefiles/header.makefile
|
31
|
-
index 498c6cf..1b4cad5 100644
|
32
|
-
--- a/BaseTools/Source/C/Makefiles/header.makefile
|
33
|
-
+++ b/BaseTools/Source/C/Makefiles/header.makefile
|
34
|
-
@@ -69,7 +69,10 @@ endif
|
35
|
-
|
36
|
-
INCLUDE = $(TOOL_INCLUDE) -I $(MAKEROOT) -I $(MAKEROOT)/Include/Common -I $(MAKEROOT)/Include/ -I $(MAKEROOT)/Include/IndustryStandard -I $(MAKEROOT)/Common/ -I .. -I . $(ARCH_INCLUDE)
|
37
|
-
BUILD_CPPFLAGS = $(INCLUDE)
|
38
|
-
-BUILD_OPTFLAGS = -O2
|
39
|
-
+
|
40
|
-
+# keep EXTRA_OPTFLAGS last
|
41
|
-
+BUILD_OPTFLAGS = -O2 $(EXTRA_OPTFLAGS)
|
42
|
-
+
|
43
|
-
ifeq ($(DARWIN),Darwin)
|
44
|
-
# assume clang or clang compatible flags on OS X
|
45
|
-
BUILD_CFLAGS = -MD -fshort-wchar -fno-strict-aliasing -Wall -Werror -Wno-deprecated-declarations -Wno-self-assign -Wno-unused-result -nostdlib -g
|
46
|
-
--
|
47
|
-
1.8.3.1
|
48
|
-
|
@@ -1,80 +0,0 @@
|
|
1
|
-
From 5825a1b2507e195c40a8655e18c5485c00513445 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Wed, 29 Aug 2018 17:12:03 +0200
|
4
|
-
Subject: [PATCH 6/7] BaseTools/VfrCompile: honor EXTRA_LDFLAGS
|
5
|
-
|
6
|
-
Message-id: <20180829151204.26958-7-lersek@redhat.com>
|
7
|
-
Patchwork-id: 81963
|
8
|
-
O-Subject: [RHEL8/virt212 edk2 PATCH 6/7] BaseTools/VfrCompile: honor
|
9
|
-
EXTRA_LDFLAGS
|
10
|
-
Bugzilla: 1607906
|
11
|
-
Acked-by: Thomas Huth <thuth@redhat.com>
|
12
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
13
|
-
|
14
|
-
In commit 81502cee20ac ("BaseTools/Source/C: take EXTRA_LDFLAGS from the
|
15
|
-
caller", 2018-08-16), I missed that "VfrCompile/GNUmakefile" does not use
|
16
|
-
BUILD_LFLAGS in the APPLICATION linking rule, unlike "app.makefile" does.
|
17
|
-
Instead, "VfrCompile/GNUmakefile" uses the (undefined) LFLAGS macro.
|
18
|
-
Therefore commit 81502cee20ac did not cover the linking step of
|
19
|
-
VfrCompile.
|
20
|
-
|
21
|
-
Thankfully, the structure of the linking rules is the same, between
|
22
|
-
"app.makefile" and "VfrCompile/GNUmakefile". Rename the undefined LFLAGS
|
23
|
-
macro in "VfrCompile/GNUmakefile" to VFR_LFLAGS (for consistency with
|
24
|
-
VFR_CXXFLAGS), and set it to EXTRA_LDFLAGS.
|
25
|
-
|
26
|
-
As a result, we have:
|
27
|
-
|
28
|
-
| compilation | linking
|
29
|
-
-----------+--------------------------------+----------------------
|
30
|
-
VfrCompile | VFR_CXXFLAGS = | VFR_LFLAGS =
|
31
|
-
| BUILD_OPTFLAGS = | EXTRA_LDFLAGS
|
32
|
-
| '-O2' + EXTRA_OPTFLAGS |
|
33
|
-
-----------+--------------------------------+----------------------
|
34
|
-
other apps | BUILD_CFLAGS/BUILD_CXXFLAGS = | BUILD_LFLAGS =
|
35
|
-
| [...] + BUILD_OPTFLAGS = | [...] + EXTRA_LDFLAGS
|
36
|
-
| [...] + '-O2' + EXTRA_OPTFLAGS |
|
37
|
-
|
38
|
-
This table shows
|
39
|
-
- that the VfrCompile compilation and linking flags are always a subset of
|
40
|
-
the corresponding flags used by the other apps,
|
41
|
-
- and that the EXTRA flags are always at the end.
|
42
|
-
|
43
|
-
Cc: Liming Gao <liming.gao@intel.com>
|
44
|
-
Cc: Yonghong Zhu <yonghong.zhu@intel.com>
|
45
|
-
Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1540244
|
46
|
-
Fixes: 81502cee20ac4046f08bb4aec754c7091c8808dc
|
47
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
48
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
49
|
-
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
50
|
-
(cherry picked from commit aa4e0df1f0c7ffdff07d7e382c9da89cbe207cdb)
|
51
|
-
---
|
52
|
-
BaseTools/Source/C/VfrCompile/GNUmakefile | 5 ++++-
|
53
|
-
1 file changed, 4 insertions(+), 1 deletion(-)
|
54
|
-
|
55
|
-
diff --git a/BaseTools/Source/C/VfrCompile/GNUmakefile b/BaseTools/Source/C/VfrCompile/GNUmakefile
|
56
|
-
index bbe562c..9273589 100644
|
57
|
-
--- a/BaseTools/Source/C/VfrCompile/GNUmakefile
|
58
|
-
+++ b/BaseTools/Source/C/VfrCompile/GNUmakefile
|
59
|
-
@@ -28,6 +28,9 @@ VFR_CPPFLAGS = -DPCCTS_USE_NAMESPACE_STD $(BUILD_CPPFLAGS)
|
60
|
-
# keep BUILD_OPTFLAGS last
|
61
|
-
VFR_CXXFLAGS = $(BUILD_OPTFLAGS)
|
62
|
-
|
63
|
-
+# keep EXTRA_LDFLAGS last
|
64
|
-
+VFR_LFLAGS = $(EXTRA_LDFLAGS)
|
65
|
-
+
|
66
|
-
LINKER = $(BUILD_CXX)
|
67
|
-
|
68
|
-
EXTRA_CLEAN_OBJECTS = EfiVfrParser.cpp EfiVfrParser.h VfrParser.dlg VfrTokens.h VfrLexer.cpp VfrLexer.h VfrSyntax.cpp tokens.h
|
69
|
-
@@ -42,7 +45,7 @@ APPLICATION = $(MAKEROOT)/bin/$(APPNAME)
|
70
|
-
all: $(MAKEROOT)/bin $(APPLICATION)
|
71
|
-
|
72
|
-
$(APPLICATION): $(OBJECTS)
|
73
|
-
- $(LINKER) -o $(APPLICATION) $(LFLAGS) $(OBJECTS) -L$(MAKEROOT)/libs $(LIBS)
|
74
|
-
+ $(LINKER) -o $(APPLICATION) $(VFR_LFLAGS) $(OBJECTS) -L$(MAKEROOT)/libs $(LIBS)
|
75
|
-
|
76
|
-
VfrCompiler.o: ../Include/Common/BuildVersion.h
|
77
|
-
|
78
|
-
--
|
79
|
-
1.8.3.1
|
80
|
-
|
@@ -1,46 +0,0 @@
|
|
1
|
-
From 5898a7a6403bb5ff73fc27a39f9c64b746089cb1 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Wed, 29 Aug 2018 17:11:58 +0200
|
4
|
-
Subject: [PATCH 1/7] BaseTools/footer.makefile: expand BUILD_CFLAGS last for C
|
5
|
-
files too
|
6
|
-
|
7
|
-
Message-id: <20180829151204.26958-2-lersek@redhat.com>
|
8
|
-
Patchwork-id: 81962
|
9
|
-
O-Subject: [RHEL8/virt212 edk2 PATCH 1/7] BaseTools/footer.makefile: expand
|
10
|
-
BUILD_CFLAGS last for C files too
|
11
|
-
Bugzilla: 1607906
|
12
|
-
Acked-by: Thomas Huth <thuth@redhat.com>
|
13
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
14
|
-
|
15
|
-
BUILD_CPPFLAGS should be expanded before BUILD_CFLAGS. (The rule for C++
|
16
|
-
source files already does this, with BUILD_CPPFLAGS and BUILD_CXXFLAGS.)
|
17
|
-
|
18
|
-
This patch doesn't change behavior.
|
19
|
-
|
20
|
-
Cc: Liming Gao <liming.gao@intel.com>
|
21
|
-
Cc: Yonghong Zhu <yonghong.zhu@intel.com>
|
22
|
-
Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1540244
|
23
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
24
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
25
|
-
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
26
|
-
(cherry picked from commit 67983484a4430c5f82bb5f1397e010c759136321)
|
27
|
-
---
|
28
|
-
BaseTools/Source/C/Makefiles/footer.makefile | 2 +-
|
29
|
-
1 file changed, 1 insertion(+), 1 deletion(-)
|
30
|
-
|
31
|
-
diff --git a/BaseTools/Source/C/Makefiles/footer.makefile b/BaseTools/Source/C/Makefiles/footer.makefile
|
32
|
-
index 0926aa9..5bda9e4 100644
|
33
|
-
--- a/BaseTools/Source/C/Makefiles/footer.makefile
|
34
|
-
+++ b/BaseTools/Source/C/Makefiles/footer.makefile
|
35
|
-
@@ -24,7 +24,7 @@ $(LIBRARY): $(OBJECTS)
|
36
|
-
$(BUILD_AR) crs $@ $^
|
37
|
-
|
38
|
-
%.o : %.c
|
39
|
-
- $(BUILD_CC) -c $(BUILD_CFLAGS) $(BUILD_CPPFLAGS) $< -o $@
|
40
|
-
+ $(BUILD_CC) -c $(BUILD_CPPFLAGS) $(BUILD_CFLAGS) $< -o $@
|
41
|
-
|
42
|
-
%.o : %.cpp
|
43
|
-
$(BUILD_CXX) -c $(BUILD_CPPFLAGS) $(BUILD_CXXFLAGS) $< -o $@
|
44
|
-
--
|
45
|
-
1.8.3.1
|
46
|
-
|
@@ -1,51 +0,0 @@
|
|
1
|
-
From e7091299a079fd0405f01276f35838884b4c06b5 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Wed, 29 Aug 2018 17:11:59 +0200
|
4
|
-
Subject: [PATCH 2/7] BaseTools/header.makefile: remove "-c" from BUILD_CFLAGS
|
5
|
-
|
6
|
-
Message-id: <20180829151204.26958-3-lersek@redhat.com>
|
7
|
-
Patchwork-id: 81964
|
8
|
-
O-Subject: [RHEL8/virt212 edk2 PATCH 2/7] BaseTools/header.makefile: remove "-c"
|
9
|
-
from BUILD_CFLAGS
|
10
|
-
Bugzilla: 1607906
|
11
|
-
Acked-by: Thomas Huth <thuth@redhat.com>
|
12
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
13
|
-
|
14
|
-
Option "-c" is a mode selection flag (choosing between compiling and
|
15
|
-
linking); it should not be in BUILD_CFLAGS, which applies only to
|
16
|
-
compiling anyway. The compilation rule for C source files, in
|
17
|
-
"footer.makefile", already includes "-c" -- currently we have double "-c"
|
18
|
-
options.
|
19
|
-
|
20
|
-
This patch doesn't change behavior.
|
21
|
-
|
22
|
-
Cc: Liming Gao <liming.gao@intel.com>
|
23
|
-
Cc: Yonghong Zhu <yonghong.zhu@intel.com>
|
24
|
-
Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1540244
|
25
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
26
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
27
|
-
Reviewed-by: Liming Gao <liming.gao@intel.com>
|
28
|
-
(cherry picked from commit 03252ae287c4a61983b3793ff71baeabe2ff3df7)
|
29
|
-
---
|
30
|
-
BaseTools/Source/C/Makefiles/header.makefile | 4 ++--
|
31
|
-
1 file changed, 2 insertions(+), 2 deletions(-)
|
32
|
-
|
33
|
-
diff --git a/BaseTools/Source/C/Makefiles/header.makefile b/BaseTools/Source/C/Makefiles/header.makefile
|
34
|
-
index db43677..08421ba 100644
|
35
|
-
--- a/BaseTools/Source/C/Makefiles/header.makefile
|
36
|
-
+++ b/BaseTools/Source/C/Makefiles/header.makefile
|
37
|
-
@@ -71,9 +71,9 @@ INCLUDE = $(TOOL_INCLUDE) -I $(MAKEROOT) -I $(MAKEROOT)/Include/Common -I $(MAKE
|
38
|
-
BUILD_CPPFLAGS = $(INCLUDE) -O2
|
39
|
-
ifeq ($(DARWIN),Darwin)
|
40
|
-
# assume clang or clang compatible flags on OS X
|
41
|
-
-BUILD_CFLAGS = -MD -fshort-wchar -fno-strict-aliasing -Wall -Werror -Wno-deprecated-declarations -Wno-self-assign -Wno-unused-result -nostdlib -c -g
|
42
|
-
+BUILD_CFLAGS = -MD -fshort-wchar -fno-strict-aliasing -Wall -Werror -Wno-deprecated-declarations -Wno-self-assign -Wno-unused-result -nostdlib -g
|
43
|
-
else
|
44
|
-
-BUILD_CFLAGS = -MD -fshort-wchar -fno-strict-aliasing -Wall -Werror -Wno-deprecated-declarations -Wno-stringop-truncation -Wno-restrict -Wno-unused-result -nostdlib -c -g
|
45
|
-
+BUILD_CFLAGS = -MD -fshort-wchar -fno-strict-aliasing -Wall -Werror -Wno-deprecated-declarations -Wno-stringop-truncation -Wno-restrict -Wno-unused-result -nostdlib -g
|
46
|
-
endif
|
47
|
-
BUILD_LFLAGS =
|
48
|
-
BUILD_CXXFLAGS = -Wno-unused-result
|
49
|
-
--
|
50
|
-
1.8.3.1
|
51
|
-
|
@@ -1,130 +0,0 @@
|
|
1
|
-
From 8358e53013fc62c9556598ad842d233906de00ef Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Wed, 24 Oct 2018 21:03:44 +0200
|
4
|
-
Subject: [PATCH 3/4] IntelFrameworkModulePkg: Add more checker in
|
5
|
-
UefiTianoDecompressLib (CVE FIX)
|
6
|
-
|
7
|
-
Message-id: <20181024190345.15288-4-lersek@redhat.com>
|
8
|
-
Patchwork-id: 82885
|
9
|
-
O-Subject: [RHEL8 edk2 PATCH 3/4] IntelFrameworkModulePkg: Add more checker in
|
10
|
-
UefiTianoDecompressLib (CVE FIX)
|
11
|
-
Bugzilla: 1641453
|
12
|
-
1641464
|
13
|
-
1641469
|
14
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
15
|
-
Acked-by: Thomas Huth <thuth@redhat.com>
|
16
|
-
|
17
|
-
From: Liming Gao <liming.gao@intel.com>
|
18
|
-
|
19
|
-
--v-- RHEL8 note start --v--
|
20
|
-
|
21
|
-
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641453
|
22
|
-
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641464
|
23
|
-
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641469
|
24
|
-
|
25
|
-
Unfortunately, the upstream patch series was not structured according to
|
26
|
-
the CVE reports. This patch contributes to fixing:
|
27
|
-
|
28
|
-
- CVE-2017-5733
|
29
|
-
- CVE-2017-5734
|
30
|
-
- CVE-2017-5735
|
31
|
-
|
32
|
-
but not CVE-2017-5731 or CVE-2017-5732 (contrarily to the upstream commit
|
33
|
-
message). The best I could achieve up-stream was to get the "CVE FIX"
|
34
|
-
expression into the subject, and a whole-sale dump of the CVEs into the
|
35
|
-
body. I had not been invited to the original (off-list, embargoed)
|
36
|
-
analysis and review.
|
37
|
-
|
38
|
-
The trivial context difference (whitespace) is due to RHEL8 lacking
|
39
|
-
upstream commit 0a6f48249a60 ("IntelFrameworkModulePkg: Clean up source
|
40
|
-
files", 2018-06-28). I've considered backporting that (since it only
|
41
|
-
cleans up whitespace). However, the diffstat on that commit convinced me
|
42
|
-
otherwise: "246 files changed, 4067 insertions(+), 4067 deletions(-)".
|
43
|
-
I've decided not to do a partial backport of that (i.e. just for
|
44
|
-
"BaseUefiTianoCustomDecompressLib.c").
|
45
|
-
|
46
|
-
--^-- RHEL8 note end --^--
|
47
|
-
|
48
|
-
Fix CVE-2017-5731,CVE-2017-5732,CVE-2017-5733,CVE-2017-5734,CVE-2017-5735
|
49
|
-
https://bugzilla.tianocore.org/show_bug.cgi?id=686
|
50
|
-
To make sure the valid buffer be accessed only.
|
51
|
-
|
52
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
53
|
-
Signed-off-by: Holtsclaw Brent <brent.holtsclaw@intel.com>
|
54
|
-
Signed-off-by: Liming Gao <liming.gao@intel.com>
|
55
|
-
Reviewed-by: Star Zeng <star.zeng@intel.com>
|
56
|
-
Acked-by: Laszlo Ersek <lersek@redhat.com>
|
57
|
-
(cherry picked from commit 684db6da64bc7b5faee4e1174e801c245f563b5c)
|
58
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
59
|
-
---
|
60
|
-
.../BaseUefiTianoCustomDecompressLib.c | 16 ++++++++++++++--
|
61
|
-
1 file changed, 14 insertions(+), 2 deletions(-)
|
62
|
-
|
63
|
-
diff --git a/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c b/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c
|
64
|
-
index cb009e7..9b00166 100644
|
65
|
-
--- a/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c
|
66
|
-
+++ b/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c
|
67
|
-
@@ -143,6 +143,7 @@ MakeTable (
|
68
|
-
UINT16 Mask;
|
69
|
-
UINT16 WordOfStart;
|
70
|
-
UINT16 WordOfCount;
|
71
|
-
+ UINT16 MaxTableLength;
|
72
|
-
|
73
|
-
//
|
74
|
-
// The maximum mapping table width supported by this internal
|
75
|
-
@@ -155,6 +156,9 @@ MakeTable (
|
76
|
-
}
|
77
|
-
|
78
|
-
for (Index = 0; Index < NumOfChar; Index++) {
|
79
|
-
+ if (BitLen[Index] > 16) {
|
80
|
-
+ return (UINT16) BAD_TABLE;
|
81
|
-
+ }
|
82
|
-
Count[BitLen[Index]]++;
|
83
|
-
}
|
84
|
-
|
85
|
-
@@ -196,6 +200,7 @@ MakeTable (
|
86
|
-
|
87
|
-
Avail = NumOfChar;
|
88
|
-
Mask = (UINT16) (1U << (15 - TableBits));
|
89
|
-
+ MaxTableLength = (UINT16) (1U << TableBits);
|
90
|
-
|
91
|
-
for (Char = 0; Char < NumOfChar; Char++) {
|
92
|
-
|
93
|
-
@@ -209,6 +214,9 @@ MakeTable (
|
94
|
-
if (Len <= TableBits) {
|
95
|
-
|
96
|
-
for (Index = Start[Len]; Index < NextCode; Index++) {
|
97
|
-
+ if (Index >= MaxTableLength) {
|
98
|
-
+ return (UINT16) BAD_TABLE;
|
99
|
-
+ }
|
100
|
-
Table[Index] = Char;
|
101
|
-
}
|
102
|
-
|
103
|
-
@@ -615,10 +623,14 @@ Decode (
|
104
|
-
//
|
105
|
-
BytesRemain--;
|
106
|
-
while ((INT16) (BytesRemain) >= 0) {
|
107
|
-
- Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
|
108
|
-
if (Sd->mOutBuf >= Sd->mOrigSize) {
|
109
|
-
goto Done ;
|
110
|
-
}
|
111
|
-
+ if (DataIdx >= Sd->mOrigSize) {
|
112
|
-
+ Sd->mBadTableFlag = (UINT16) BAD_TABLE;
|
113
|
-
+ goto Done ;
|
114
|
-
+ }
|
115
|
-
+ Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
|
116
|
-
|
117
|
-
BytesRemain--;
|
118
|
-
}
|
119
|
-
@@ -688,7 +700,7 @@ UefiDecompressGetInfo (
|
120
|
-
}
|
121
|
-
|
122
|
-
CompressedSize = ReadUnaligned32 ((UINT32 *)Source);
|
123
|
-
- if (SourceSize < (CompressedSize + 8)) {
|
124
|
-
+ if (SourceSize < (CompressedSize + 8) || (CompressedSize + 8) < 8) {
|
125
|
-
return RETURN_INVALID_PARAMETER;
|
126
|
-
}
|
127
|
-
|
128
|
-
--
|
129
|
-
1.8.3.1
|
130
|
-
|
@@ -1,55 +0,0 @@
|
|
1
|
-
From 601458a0a87bf4169d1f0c81c0bb454d22abe8f0 Mon Sep 17 00:00:00 2001
|
2
|
-
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philmd@redhat.com>
|
3
|
-
Date: Wed, 9 Jan 2019 17:10:07 +0100
|
4
|
-
Subject: [PATCH 3/4] IntelFrameworkModulePkg: Fix UEFI and Tiano Decompression
|
5
|
-
logic issue
|
6
|
-
MIME-Version: 1.0
|
7
|
-
Content-Type: text/plain; charset=UTF-8
|
8
|
-
Content-Transfer-Encoding: 8bit
|
9
|
-
|
10
|
-
Message-id: <20190109161007.3471-4-philmd@redhat.com>
|
11
|
-
Patchwork-id: 83926
|
12
|
-
O-Subject: [RHEL8 edk2 PATCH 3/3] IntelFrameworkModulePkg: Fix UEFI and Tiano
|
13
|
-
Decompression logic issue
|
14
|
-
Bugzilla: 1662184
|
15
|
-
Acked-by: Laszlo Ersek <lersek@redhat.com>
|
16
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
17
|
-
|
18
|
-
From: Liming Gao <liming.gao@intel.com>
|
19
|
-
|
20
|
-
https://bugzilla.tianocore.org/show_bug.cgi?id=1317
|
21
|
-
|
22
|
-
This is a regression issue caused by 684db6da64bc7b5faee4e1174e801c245f563b5c.
|
23
|
-
In Decode() function, once mOutBuf is fully filled, Decode() should return.
|
24
|
-
Current logic misses the checker of mOutBuf after while() loop.
|
25
|
-
|
26
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
27
|
-
Signed-off-by: Liming Gao <liming.gao@intel.com>
|
28
|
-
Reviewed-by: Yonghong Zhu <yonghong.zhu@intel.com>
|
29
|
-
(cherry picked from commit ade71c52a49d659b20c0b433fb11ddb4f4f543c4)
|
30
|
-
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
|
31
|
-
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
32
|
-
---
|
33
|
-
.../BaseUefiTianoCustomDecompressLib.c | 6 ++++++
|
34
|
-
1 file changed, 6 insertions(+)
|
35
|
-
|
36
|
-
diff --git a/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c b/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c
|
37
|
-
index 9b00166..e34bf4b 100644
|
38
|
-
--- a/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c
|
39
|
-
+++ b/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c
|
40
|
-
@@ -634,6 +634,12 @@ Decode (
|
41
|
-
|
42
|
-
BytesRemain--;
|
43
|
-
}
|
44
|
-
+ //
|
45
|
-
+ // Once mOutBuf is fully filled, directly return
|
46
|
-
+ //
|
47
|
-
+ if (Sd->mOutBuf >= Sd->mOrigSize) {
|
48
|
-
+ goto Done ;
|
49
|
-
+ }
|
50
|
-
}
|
51
|
-
}
|
52
|
-
|
53
|
-
--
|
54
|
-
1.8.3.1
|
55
|
-
|
@@ -1,102 +0,0 @@
|
|
1
|
-
From b045711f96003a53493cd334fe867981fb3cae2b Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Fri, 1 Mar 2019 13:45:07 +0100
|
4
|
-
Subject: [PATCH 1/2] MdeModulePkg/PartitionDxe: Ensure blocksize holds MBR
|
5
|
-
(CVE-2018-12180)
|
6
|
-
|
7
|
-
Message-id: <20190301124508.18497-2-lersek@redhat.com>
|
8
|
-
Patchwork-id: 84759
|
9
|
-
O-Subject: [RHEL-8.0 edk2 PATCH 1/2] MdeModulePkg/PartitionDxe: Ensure blocksize
|
10
|
-
holds MBR (CVE-2018-12180)
|
11
|
-
Bugzilla: 1690501
|
12
|
-
Acked-by: Thomas Huth <thuth@redhat.com>
|
13
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
14
|
-
|
15
|
-
From: Hao Wu <hao.a.wu@intel.com>
|
16
|
-
|
17
|
-
--v-- RHEL-8.0 note --v--
|
18
|
-
|
19
|
-
Trivial conflicts resolved in "Gpt.c" and "Mbr.c": up-stream, the Intel
|
20
|
-
copyright notice got meanwhile extended to 2018, in commit d1102dba7210
|
21
|
-
("MdeModulePkg: Clean up source files", 2018-06-28).
|
22
|
-
|
23
|
-
--^-- RHEL-8.0 note --^--
|
24
|
-
|
25
|
-
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1134
|
26
|
-
|
27
|
-
The commit adds checks for detecting GPT and MBR partitions.
|
28
|
-
|
29
|
-
These checks will ensure that the device block size is big enough to hold
|
30
|
-
an MBR (512 bytes).
|
31
|
-
|
32
|
-
Cc: Jian J Wang <jian.j.wang@intel.com>
|
33
|
-
Cc: Star Zeng <star.zeng@intel.com>
|
34
|
-
Cc: Laszlo Ersek <lersek@redhat.com>
|
35
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
36
|
-
Signed-off-by: Hao Wu <hao.a.wu@intel.com>
|
37
|
-
Reviewed-by: Ray Ni <ray.ni@intel.com>
|
38
|
-
(cherry picked from commit fccdb88022c1f6d85c773fce506b10c879063f1d)
|
39
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
40
|
-
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
41
|
-
---
|
42
|
-
MdeModulePkg/Universal/Disk/PartitionDxe/Gpt.c | 9 ++++++++-
|
43
|
-
MdeModulePkg/Universal/Disk/PartitionDxe/Mbr.c | 9 ++++++++-
|
44
|
-
2 files changed, 16 insertions(+), 2 deletions(-)
|
45
|
-
|
46
|
-
diff --git a/MdeModulePkg/Universal/Disk/PartitionDxe/Gpt.c b/MdeModulePkg/Universal/Disk/PartitionDxe/Gpt.c
|
47
|
-
index fe26a64..141dca0 100644
|
48
|
-
--- a/MdeModulePkg/Universal/Disk/PartitionDxe/Gpt.c
|
49
|
-
+++ b/MdeModulePkg/Universal/Disk/PartitionDxe/Gpt.c
|
50
|
-
|
51
|
-
partition content and validate the GPT table and GPT entry.
|
52
|
-
|
53
|
-
Copyright (c) 2018 Qualcomm Datacenter Technologies, Inc.
|
54
|
-
-Copyright (c) 2006 - 2017, Intel Corporation. All rights reserved.<BR>
|
55
|
-
+Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
|
56
|
-
This program and the accompanying materials
|
57
|
-
are licensed and made available under the terms and conditions of the BSD License
|
58
|
-
which accompanies this distribution. The full text of the license may be found at
|
59
|
-
@@ -237,6 +237,13 @@ PartitionInstallGptChildHandles (
|
60
|
-
GptValidStatus = EFI_NOT_FOUND;
|
61
|
-
|
62
|
-
//
|
63
|
-
+ // Ensure the block size can hold the MBR
|
64
|
-
+ //
|
65
|
-
+ if (BlockSize < sizeof (MASTER_BOOT_RECORD)) {
|
66
|
-
+ return EFI_NOT_FOUND;
|
67
|
-
+ }
|
68
|
-
+
|
69
|
-
+ //
|
70
|
-
// Allocate a buffer for the Protective MBR
|
71
|
-
//
|
72
|
-
ProtectiveMbr = AllocatePool (BlockSize);
|
73
|
-
diff --git a/MdeModulePkg/Universal/Disk/PartitionDxe/Mbr.c b/MdeModulePkg/Universal/Disk/PartitionDxe/Mbr.c
|
74
|
-
index 479745b..d7a15b4 100644
|
75
|
-
--- a/MdeModulePkg/Universal/Disk/PartitionDxe/Mbr.c
|
76
|
-
+++ b/MdeModulePkg/Universal/Disk/PartitionDxe/Mbr.c
|
77
|
-
|
78
|
-
|
79
|
-
Copyright (c) 2018 Qualcomm Datacenter Technologies, Inc.
|
80
|
-
Copyright (c) 2014, Hewlett-Packard Development Company, L.P.<BR>
|
81
|
-
-Copyright (c) 2006 - 2017, Intel Corporation. All rights reserved.<BR>
|
82
|
-
+Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
|
83
|
-
This program and the accompanying materials
|
84
|
-
are licensed and made available under the terms and conditions of the BSD License
|
85
|
-
which accompanies this distribution. The full text of the license may be found at
|
86
|
-
@@ -150,6 +150,13 @@ PartitionInstallMbrChildHandles (
|
87
|
-
MediaId = BlockIo->Media->MediaId;
|
88
|
-
LastBlock = BlockIo->Media->LastBlock;
|
89
|
-
|
90
|
-
+ //
|
91
|
-
+ // Ensure the block size can hold the MBR
|
92
|
-
+ //
|
93
|
-
+ if (BlockSize < sizeof (MASTER_BOOT_RECORD)) {
|
94
|
-
+ return EFI_NOT_FOUND;
|
95
|
-
+ }
|
96
|
-
+
|
97
|
-
Mbr = AllocatePool (BlockSize);
|
98
|
-
if (Mbr == NULL) {
|
99
|
-
return Found;
|
100
|
-
--
|
101
|
-
1.8.3.1
|
102
|
-
|
@@ -1,137 +0,0 @@
|
|
1
|
-
From 1fab0b299bc4c5b3f5106f718692f8f9bad5e635 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Fri, 1 Mar 2019 13:45:08 +0100
|
4
|
-
Subject: [PATCH 2/2] MdeModulePkg/RamDiskDxe: Restrict on RAM disk size
|
5
|
-
(CVE-2018-12180)
|
6
|
-
|
7
|
-
Message-id: <20190301124508.18497-3-lersek@redhat.com>
|
8
|
-
Patchwork-id: 84760
|
9
|
-
O-Subject: [RHEL-8.0 edk2 PATCH 2/2] MdeModulePkg/RamDiskDxe: Restrict on RAM
|
10
|
-
disk size (CVE-2018-12180)
|
11
|
-
Bugzilla: 1690501
|
12
|
-
Acked-by: Thomas Huth <thuth@redhat.com>
|
13
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
14
|
-
|
15
|
-
From: Hao Wu <hao.a.wu@intel.com>
|
16
|
-
|
17
|
-
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1134
|
18
|
-
|
19
|
-
Originally, the block size of created Ram disks is hard-coded to 512
|
20
|
-
bytes. However, if the total size of the Ram disk is not a multiple of 512
|
21
|
-
bytes, there will be potential memory access issues when dealing with the
|
22
|
-
last block of the Ram disk.
|
23
|
-
|
24
|
-
This commit will adjust the block size of the Ram disks to ensure that the
|
25
|
-
total size is a multiple of the block size.
|
26
|
-
|
27
|
-
Cc: Jian J Wang <jian.j.wang@intel.com>
|
28
|
-
Cc: Star Zeng <star.zeng@intel.com>
|
29
|
-
Cc: Laszlo Ersek <lersek@redhat.com>
|
30
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
31
|
-
Signed-off-by: Hao Wu <hao.a.wu@intel.com>
|
32
|
-
Reviewed-by: Ray Ni <ray.ni@intel.com>
|
33
|
-
(cherry picked from commit 38c9fbdcaa0219eb86fe82d90e3f8cfb5a54be9f)
|
34
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
35
|
-
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
36
|
-
---
|
37
|
-
.../Universal/Disk/RamDiskDxe/RamDiskBlockIo.c | 20 ++++++++++++++------
|
38
|
-
MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskImpl.h | 6 +++---
|
39
|
-
.../Universal/Disk/RamDiskDxe/RamDiskProtocol.c | 5 +++--
|
40
|
-
3 files changed, 20 insertions(+), 11 deletions(-)
|
41
|
-
|
42
|
-
diff --git a/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskBlockIo.c b/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskBlockIo.c
|
43
|
-
index 4f74b5e..8926ad7 100644
|
44
|
-
--- a/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskBlockIo.c
|
45
|
-
+++ b/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskBlockIo.c
|
46
|
-
|
47
|
-
/** @file
|
48
|
-
Produce EFI_BLOCK_IO_PROTOCOL on a RAM disk device.
|
49
|
-
|
50
|
-
- Copyright (c) 2016 - 2018, Intel Corporation. All rights reserved.<BR>
|
51
|
-
+ Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.<BR>
|
52
|
-
This program and the accompanying materials
|
53
|
-
are licensed and made available under the terms and conditions of the BSD License
|
54
|
-
which accompanies this distribution. The full text of the license may be found at
|
55
|
-
@@ -54,6 +54,7 @@ RamDiskInitBlockIo (
|
56
|
-
EFI_BLOCK_IO_PROTOCOL *BlockIo;
|
57
|
-
EFI_BLOCK_IO2_PROTOCOL *BlockIo2;
|
58
|
-
EFI_BLOCK_IO_MEDIA *Media;
|
59
|
-
+ UINT32 Remainder;
|
60
|
-
|
61
|
-
BlockIo = &PrivateData->BlockIo;
|
62
|
-
BlockIo2 = &PrivateData->BlockIo2;
|
63
|
-
@@ -69,11 +70,18 @@ RamDiskInitBlockIo (
|
64
|
-
Media->LogicalPartition = FALSE;
|
65
|
-
Media->ReadOnly = FALSE;
|
66
|
-
Media->WriteCaching = FALSE;
|
67
|
-
- Media->BlockSize = RAM_DISK_BLOCK_SIZE;
|
68
|
-
- Media->LastBlock = DivU64x32 (
|
69
|
-
- PrivateData->Size + RAM_DISK_BLOCK_SIZE - 1,
|
70
|
-
- RAM_DISK_BLOCK_SIZE
|
71
|
-
- ) - 1;
|
72
|
-
+
|
73
|
-
+ for (Media->BlockSize = RAM_DISK_DEFAULT_BLOCK_SIZE;
|
74
|
-
+ Media->BlockSize >= 1;
|
75
|
-
+ Media->BlockSize = Media->BlockSize >> 1) {
|
76
|
-
+ Media->LastBlock = DivU64x32Remainder (PrivateData->Size, Media->BlockSize, &Remainder) - 1;
|
77
|
-
+ if (Remainder == 0) {
|
78
|
-
+ break;
|
79
|
-
+ }
|
80
|
-
+ }
|
81
|
-
+ ASSERT (Media->BlockSize != 0);
|
82
|
-
+
|
83
|
-
+ return;
|
84
|
-
}
|
85
|
-
|
86
|
-
|
87
|
-
diff --git a/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskImpl.h b/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskImpl.h
|
88
|
-
index 077bb77..18c7bb2 100644
|
89
|
-
--- a/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskImpl.h
|
90
|
-
+++ b/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskImpl.h
|
91
|
-
|
92
|
-
/** @file
|
93
|
-
The header file of RamDiskDxe driver.
|
94
|
-
|
95
|
-
- Copyright (c) 2016, Intel Corporation. All rights reserved.<BR>
|
96
|
-
+ Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.<BR>
|
97
|
-
This program and the accompanying materials
|
98
|
-
are licensed and made available under the terms and conditions of the BSD License
|
99
|
-
which accompanies this distribution. The full text of the license may be found at
|
100
|
-
|
101
|
-
///
|
102
|
-
|
103
|
-
//
|
104
|
-
-// Block size for RAM disk
|
105
|
-
+// Default block size for RAM disk
|
106
|
-
//
|
107
|
-
-#define RAM_DISK_BLOCK_SIZE 512
|
108
|
-
+#define RAM_DISK_DEFAULT_BLOCK_SIZE 512
|
109
|
-
|
110
|
-
//
|
111
|
-
// Iterate through the double linked list. NOT delete safe
|
112
|
-
diff --git a/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskProtocol.c b/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskProtocol.c
|
113
|
-
index 6784e2b..e8250d5 100644
|
114
|
-
--- a/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskProtocol.c
|
115
|
-
+++ b/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskProtocol.c
|
116
|
-
|
117
|
-
/** @file
|
118
|
-
The realization of EFI_RAM_DISK_PROTOCOL.
|
119
|
-
|
120
|
-
- Copyright (c) 2016, Intel Corporation. All rights reserved.<BR>
|
121
|
-
+ Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.<BR>
|
122
|
-
(C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
|
123
|
-
This program and the accompanying materials
|
124
|
-
are licensed and made available under the terms and conditions of the BSD License
|
125
|
-
@@ -613,7 +613,8 @@ RamDiskRegister (
|
126
|
-
//
|
127
|
-
// Add check to prevent data read across the memory boundary
|
128
|
-
//
|
129
|
-
- if (RamDiskBase + RamDiskSize > ((UINTN) -1) - RAM_DISK_BLOCK_SIZE + 1) {
|
130
|
-
+ if ((RamDiskSize > MAX_UINTN) ||
|
131
|
-
+ (RamDiskBase > MAX_UINTN - RamDiskSize + 1)) {
|
132
|
-
return EFI_INVALID_PARAMETER;
|
133
|
-
}
|
134
|
-
|
135
|
-
--
|
136
|
-
1.8.3.1
|
137
|
-
|
@@ -1,78 +0,0 @@
|
|
1
|
-
From 3b8ff18ad4ac1af740a979ad27fb83dbbdca70ef Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Wed, 24 Oct 2018 21:03:42 +0200
|
4
|
-
Subject: [PATCH 1/4] MdeModulePkg Variable: Fix Timestamp zeroing issue on
|
5
|
-
APPEND_WRITE
|
6
|
-
|
7
|
-
Message-id: <20181024190345.15288-2-lersek@redhat.com>
|
8
|
-
Patchwork-id: 82887
|
9
|
-
O-Subject: [RHEL8 edk2 PATCH 1/4] MdeModulePkg Variable: Fix Timestamp zeroing
|
10
|
-
issue on APPEND_WRITE
|
11
|
-
Bugzilla: 1641436
|
12
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
13
|
-
Acked-by: Thomas Huth <thuth@redhat.com>
|
14
|
-
|
15
|
-
From: Star Zeng <star.zeng@intel.com>
|
16
|
-
|
17
|
-
--v-- RHEL8 note start --v--
|
18
|
-
|
19
|
-
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641436
|
20
|
-
|
21
|
-
This patch fixes CVE-2018-3613. Unfortunately, the upstream subject line
|
22
|
-
does not include the CVE number. I've decided to stick with the upstream
|
23
|
-
subject verbatim in the backport, so we can more easily drop this patch at
|
24
|
-
the next rebase. On the upstream list, I did complain loudly, so there's
|
25
|
-
hope the next CVE fix will advertise the CVE number in the subject.
|
26
|
-
|
27
|
-
In practice, the vulnerability is difficult to exploit. Please refer to
|
28
|
-
the following messages in the upstream discussion:
|
29
|
-
|
30
|
-
https://lists.01.org/pipermail/edk2-devel/2018-October/031103.html
|
31
|
-
https://lists.01.org/pipermail/edk2-devel/2018-October/031140.html
|
32
|
-
|
33
|
-
--^-- RHEL8 note end --^--
|
34
|
-
|
35
|
-
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=415
|
36
|
-
|
37
|
-
When SetVariable() to a time based auth variable with APPEND_WRITE
|
38
|
-
attribute, and if the EFI_VARIABLE_AUTHENTICATION_2.TimeStamp in
|
39
|
-
the input Data is earlier than current value, it will cause timestamp
|
40
|
-
zeroing.
|
41
|
-
|
42
|
-
This issue may bring time based auth variable downgrade problem.
|
43
|
-
For example:
|
44
|
-
A vendor released three certs at 2014, 2015, and 2016, and system
|
45
|
-
integrated the 2016 cert. User can SetVariable() with 2015 cert and
|
46
|
-
APPEND_WRITE attribute to cause timestamp zeroing first, then
|
47
|
-
SetVariable() with 2014 cert to downgrade the cert.
|
48
|
-
|
49
|
-
This patch fixes this issue.
|
50
|
-
|
51
|
-
Cc: Jiewen Yao <jiewen.yao@intel.com>
|
52
|
-
Cc: Chao Zhang <chao.b.zhang@intel.com>
|
53
|
-
Cc: Jian J Wang <jian.j.wang@intel.com>
|
54
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
55
|
-
Signed-off-by: Star Zeng <star.zeng@intel.com>
|
56
|
-
Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
|
57
|
-
(cherry picked from commit b7dc8888f31402f410c53242839271ba3b94b619)
|
58
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
59
|
-
---
|
60
|
-
MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c | 2 ++
|
61
|
-
1 file changed, 2 insertions(+)
|
62
|
-
|
63
|
-
diff --git a/MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c b/MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c
|
64
|
-
index 6caf603..60439b5 100644
|
65
|
-
--- a/MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c
|
66
|
-
+++ b/MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c
|
67
|
-
@@ -2460,6 +2460,8 @@ UpdateVariable (
|
68
|
-
if (Variable->CurrPtr != NULL) {
|
69
|
-
if (VariableCompareTimeStampInternal (&(((AUTHENTICATED_VARIABLE_HEADER *) CacheVariable->CurrPtr)->TimeStamp), TimeStamp)) {
|
70
|
-
CopyMem (&AuthVariable->TimeStamp, TimeStamp, sizeof (EFI_TIME));
|
71
|
-
+ } else {
|
72
|
-
+ CopyMem (&AuthVariable->TimeStamp, &(((AUTHENTICATED_VARIABLE_HEADER *) CacheVariable->CurrPtr)->TimeStamp), sizeof (EFI_TIME));
|
73
|
-
}
|
74
|
-
}
|
75
|
-
}
|
76
|
-
--
|
77
|
-
1.8.3.1
|
78
|
-
|
@@ -1,133 +0,0 @@
|
|
1
|
-
From 41129e136b621728eb5cb1c81aafcc5fedc53a12 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Wed, 24 Oct 2018 21:03:43 +0200
|
4
|
-
Subject: [PATCH 2/4] MdePkg: Add more checker in UefiDecompressLib to access
|
5
|
-
the valid buffer only (CVE FIX)
|
6
|
-
|
7
|
-
Message-id: <20181024190345.15288-3-lersek@redhat.com>
|
8
|
-
Patchwork-id: 82883
|
9
|
-
O-Subject: [RHEL8 edk2 PATCH 2/4] MdePkg: Add more checker in UefiDecompressLib
|
10
|
-
to access the valid buffer only (CVE FIX)
|
11
|
-
Bugzilla: 1641449
|
12
|
-
1641453
|
13
|
-
1641464
|
14
|
-
1641469
|
15
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
16
|
-
Acked-by: Thomas Huth <thuth@redhat.com>
|
17
|
-
|
18
|
-
From: Liming Gao <liming.gao@intel.com>
|
19
|
-
|
20
|
-
--v-- RHEL8 note start --v--
|
21
|
-
|
22
|
-
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641449
|
23
|
-
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641453
|
24
|
-
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641464
|
25
|
-
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641469
|
26
|
-
|
27
|
-
Unfortunately, the upstream patch series was not structured according to
|
28
|
-
the CVE reports. This patch contributes to fixing:
|
29
|
-
|
30
|
-
- CVE-2017-5732
|
31
|
-
- CVE-2017-5733
|
32
|
-
- CVE-2017-5734
|
33
|
-
- CVE-2017-5735
|
34
|
-
|
35
|
-
but not CVE-2017-5731 (contrarily to the upstream commit message). The
|
36
|
-
best I could achieve up-stream was to get the "CVE FIX" expression into
|
37
|
-
the subject, and a whole-sale dump of the CVEs into the body. I had not
|
38
|
-
been invited to the original (off-list, embargoed) analysis and review.
|
39
|
-
|
40
|
-
The trivial context difference (whitespace) is due to RHEL8 lacking
|
41
|
-
upstream commit 9095d37b8fe5 ("MdePkg: Clean up source files",
|
42
|
-
2018-06-28). I've considered backporting that (since it only cleans up
|
43
|
-
whitespace). However, the diffstat on that commit convinced me otherwise:
|
44
|
-
"729 files changed, 15667 insertions(+), 15667 deletions(-)". I've decided
|
45
|
-
not to do a partial backport of that (i.e. just for
|
46
|
-
"BaseUefiDecompressLib.c").
|
47
|
-
|
48
|
-
--^-- RHEL8 note end --^--
|
49
|
-
|
50
|
-
Fix CVE-2017-5731,CVE-2017-5732,CVE-2017-5733,CVE-2017-5734,CVE-2017-5735
|
51
|
-
https://bugzilla.tianocore.org/show_bug.cgi?id=686
|
52
|
-
|
53
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
54
|
-
Signed-off-by: Holtsclaw Brent <brent.holtsclaw@intel.com>
|
55
|
-
Signed-off-by: Liming Gao <liming.gao@intel.com>
|
56
|
-
Reviewed-by: Star Zeng <star.zeng@intel.com>
|
57
|
-
Acked-by: Laszlo Ersek <lersek@redhat.com>
|
58
|
-
(cherry picked from commit 2ec7953d49677142c5f7552e9e3d96fb406ba0c4)
|
59
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
60
|
-
---
|
61
|
-
.../BaseUefiDecompressLib/BaseUefiDecompressLib.c | 17 +++++++++++++++--
|
62
|
-
1 file changed, 15 insertions(+), 2 deletions(-)
|
63
|
-
|
64
|
-
diff --git a/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c b/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c
|
65
|
-
index e818543..0c6b1fe 100644
|
66
|
-
--- a/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c
|
67
|
-
+++ b/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c
|
68
|
-
@@ -152,6 +152,7 @@ MakeTable (
|
69
|
-
UINT16 Mask;
|
70
|
-
UINT16 WordOfStart;
|
71
|
-
UINT16 WordOfCount;
|
72
|
-
+ UINT16 MaxTableLength;
|
73
|
-
|
74
|
-
//
|
75
|
-
// The maximum mapping table width supported by this internal
|
76
|
-
@@ -164,6 +165,9 @@ MakeTable (
|
77
|
-
}
|
78
|
-
|
79
|
-
for (Index = 0; Index < NumOfChar; Index++) {
|
80
|
-
+ if (BitLen[Index] > 16) {
|
81
|
-
+ return (UINT16) BAD_TABLE;
|
82
|
-
+ }
|
83
|
-
Count[BitLen[Index]]++;
|
84
|
-
}
|
85
|
-
|
86
|
-
@@ -205,6 +209,7 @@ MakeTable (
|
87
|
-
|
88
|
-
Avail = NumOfChar;
|
89
|
-
Mask = (UINT16) (1U << (15 - TableBits));
|
90
|
-
+ MaxTableLength = (UINT16) (1U << TableBits);
|
91
|
-
|
92
|
-
for (Char = 0; Char < NumOfChar; Char++) {
|
93
|
-
|
94
|
-
@@ -218,6 +223,9 @@ MakeTable (
|
95
|
-
if (Len <= TableBits) {
|
96
|
-
|
97
|
-
for (Index = Start[Len]; Index < NextCode; Index++) {
|
98
|
-
+ if (Index >= MaxTableLength) {
|
99
|
-
+ return (UINT16) BAD_TABLE;
|
100
|
-
+ }
|
101
|
-
Table[Index] = Char;
|
102
|
-
}
|
103
|
-
|
104
|
-
@@ -620,11 +628,16 @@ Decode (
|
105
|
-
// Write BytesRemain of bytes into mDstBase
|
106
|
-
//
|
107
|
-
BytesRemain--;
|
108
|
-
+
|
109
|
-
while ((INT16) (BytesRemain) >= 0) {
|
110
|
-
- Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
|
111
|
-
if (Sd->mOutBuf >= Sd->mOrigSize) {
|
112
|
-
goto Done;
|
113
|
-
}
|
114
|
-
+ if (DataIdx >= Sd->mOrigSize) {
|
115
|
-
+ Sd->mBadTableFlag = (UINT16) BAD_TABLE;
|
116
|
-
+ goto Done;
|
117
|
-
+ }
|
118
|
-
+ Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
|
119
|
-
|
120
|
-
BytesRemain--;
|
121
|
-
}
|
122
|
-
@@ -694,7 +707,7 @@ UefiDecompressGetInfo (
|
123
|
-
}
|
124
|
-
|
125
|
-
CompressedSize = ReadUnaligned32 ((UINT32 *)Source);
|
126
|
-
- if (SourceSize < (CompressedSize + 8)) {
|
127
|
-
+ if (SourceSize < (CompressedSize + 8) || (CompressedSize + 8) < 8) {
|
128
|
-
return RETURN_INVALID_PARAMETER;
|
129
|
-
}
|
130
|
-
|
131
|
-
--
|
132
|
-
1.8.3.1
|
133
|
-
|
@@ -1,56 +0,0 @@
|
|
1
|
-
From c46469847b68f6a1a5b42feaf0de7a83fd0bed85 Mon Sep 17 00:00:00 2001
|
2
|
-
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philmd@redhat.com>
|
3
|
-
Date: Wed, 9 Jan 2019 17:10:06 +0100
|
4
|
-
Subject: [PATCH 2/4] MdePkg BaseUefiDecompressLib: Fix UEFI Decompression
|
5
|
-
logic issue
|
6
|
-
MIME-Version: 1.0
|
7
|
-
Content-Type: text/plain; charset=UTF-8
|
8
|
-
Content-Transfer-Encoding: 8bit
|
9
|
-
|
10
|
-
Message-id: <20190109161007.3471-3-philmd@redhat.com>
|
11
|
-
Patchwork-id: 83923
|
12
|
-
O-Subject: [RHEL8 edk2 PATCH 2/3] MdePkg BaseUefiDecompressLib: Fix UEFI
|
13
|
-
Decompression logic issue
|
14
|
-
Bugzilla: 1662184
|
15
|
-
Acked-by: Laszlo Ersek <lersek@redhat.com>
|
16
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
17
|
-
|
18
|
-
From: Liming Gao <liming.gao@intel.com>
|
19
|
-
|
20
|
-
https://bugzilla.tianocore.org/show_bug.cgi?id=1317
|
21
|
-
|
22
|
-
This is a regression issue caused by 2ec7953d49677142c5f7552e9e3d96fb406ba0c4.
|
23
|
-
In Decode() function, once mOutBuf is fully filled, Decode() should return.
|
24
|
-
Current logic misses the checker of mOutBuf after while() loop.
|
25
|
-
|
26
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
27
|
-
Signed-off-by: Liming Gao <liming.gao@intel.com>
|
28
|
-
Cc: Michael Kinney <michael.d.kinney@intel.com>
|
29
|
-
Reviewed-by: Yonghong Zhu <yonghong.zhu@intel.com>
|
30
|
-
(cherry picked from commit 1c4cecc9fd314de0dce8125b0d4b45967637a401)
|
31
|
-
Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
|
32
|
-
Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
|
33
|
-
---
|
34
|
-
MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c | 6 ++++++
|
35
|
-
1 file changed, 6 insertions(+)
|
36
|
-
|
37
|
-
diff --git a/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c b/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c
|
38
|
-
index 0c6b1fe..8c30e97 100644
|
39
|
-
--- a/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c
|
40
|
-
+++ b/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c
|
41
|
-
@@ -641,6 +641,12 @@ Decode (
|
42
|
-
|
43
|
-
BytesRemain--;
|
44
|
-
}
|
45
|
-
+ //
|
46
|
-
+ // Once mOutBuf is fully filled, directly return
|
47
|
-
+ //
|
48
|
-
+ if (Sd->mOutBuf >= Sd->mOrigSize) {
|
49
|
-
+ goto Done;
|
50
|
-
+ }
|
51
|
-
}
|
52
|
-
}
|
53
|
-
|
54
|
-
--
|
55
|
-
1.8.3.1
|
56
|
-
|
@@ -1,100 +0,0 @@
|
|
1
|
-
From 1f2c35936d1731da26c3ed8d002785240853a742 Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Wed, 7 Nov 2018 11:25:57 +0100
|
4
|
-
Subject: [PATCH] NetworkPkg: UefiPxeBcDxe: Add EXCLUSIVE attribute when
|
5
|
-
opening SNP protocol installed by PXE.
|
6
|
-
MIME-Version: 1.0
|
7
|
-
Content-Type: text/plain; charset=UTF-8
|
8
|
-
Content-Transfer-Encoding: 8bit
|
9
|
-
|
10
|
-
Message-id: <20181107102557.9106-2-lersek@redhat.com>
|
11
|
-
Patchwork-id: 82937
|
12
|
-
O-Subject: [RHEL8 edk2 PATCH 1/1] NetworkPkg: UefiPxeBcDxe: Add EXCLUSIVE
|
13
|
-
attribute when opening SNP protocol installed by PXE.
|
14
|
-
Bugzilla: 1643377
|
15
|
-
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
16
|
-
Acked-by: Philippe Mathieu-Daudé <philmd@redhat.com>
|
17
|
-
|
18
|
-
From: "edk2-devel-bounces@lists.01.org" <edk2-devel-bounces@lists.01.org>
|
19
|
-
|
20
|
-
--v-- RHEL8 note start --v--
|
21
|
-
|
22
|
-
Please see the analysis for this backport in
|
23
|
-
<https://bugzilla.redhat.com/show_bug.cgi?id=1643377#c20> through
|
24
|
-
<https://bugzilla.redhat.com/show_bug.cgi?id=1643377#c25>.
|
25
|
-
|
26
|
-
There was a trivial conflict to resolve while cherry-picking the upstream
|
27
|
-
commit; please refer to
|
28
|
-
<https://bugzilla.redhat.com/show_bug.cgi?id=1643377#c28>.
|
29
|
-
|
30
|
-
--^-- RHEL8 note end --^--
|
31
|
-
|
32
|
-
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1152
|
33
|
-
|
34
|
-
v2: Sync the same logic to Ipv6 and update code comments.
|
35
|
-
|
36
|
-
The PXE driver installs a SNP and open this SNP with attribute BY_DRIVER
|
37
|
-
to avoid it being opened by MNP driver, this SNP is also expected not to
|
38
|
-
be opened by other drivers with EXCLUSIVE attribute. In some cases, other
|
39
|
-
drivers may happen to do this by error, and thus cause a system crash.
|
40
|
-
This patch adds EXCLUSIVE attribute when opening SNP in PXE driver, and
|
41
|
-
will reject all OpenProtocol requests by EXCLUSIVE.
|
42
|
-
|
43
|
-
Cc: Subramanian, Sriram <sriram-s@hpe.com>
|
44
|
-
Cc: Ye Ting <ting.ye@intel.com>
|
45
|
-
Cc: Fu Siyuan <siyuan.fu@intel.com>
|
46
|
-
Cc: Wu Jiaxin <jiaxin.wu@intel.com>
|
47
|
-
Contributed-under: TianoCore Contribution Agreement 1.1
|
48
|
-
Signed-off-by: Wang Fan <fan.wang@intel.com>
|
49
|
-
Reviewed-by: Sriram Subramanian <sriram-s@hpe.com>
|
50
|
-
Reviewed-by: Fu Siyuan <siyuan.fu@intel.com>
|
51
|
-
Reviewed-by: Wu Jiaxin <jiaxin.wu@intel.com>
|
52
|
-
(cherry picked from commit cde5a72d365eff5b02b8330fef1c8d36fced08eb)
|
53
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
54
|
-
---
|
55
|
-
NetworkPkg/UefiPxeBcDxe/PxeBcDriver.c | 8 ++++----
|
56
|
-
1 file changed, 4 insertions(+), 4 deletions(-)
|
57
|
-
|
58
|
-
diff --git a/NetworkPkg/UefiPxeBcDxe/PxeBcDriver.c b/NetworkPkg/UefiPxeBcDxe/PxeBcDriver.c
|
59
|
-
index 8dd787b..437cd6f 100644
|
60
|
-
--- a/NetworkPkg/UefiPxeBcDxe/PxeBcDriver.c
|
61
|
-
+++ b/NetworkPkg/UefiPxeBcDxe/PxeBcDriver.c
|
62
|
-
@@ -814,7 +814,7 @@ PxeBcCreateIp4Children (
|
63
|
-
}
|
64
|
-
|
65
|
-
//
|
66
|
-
- // Open SNP on the child handle BY_DRIVER. It will prevent any additionally
|
67
|
-
+ // Open SNP on the child handle BY_DRIVER|EXCLUSIVE. It will prevent any additionally
|
68
|
-
// layering to perform the experiment.
|
69
|
-
//
|
70
|
-
Status = gBS->OpenProtocol (
|
71
|
-
@@ -823,7 +823,7 @@ PxeBcCreateIp4Children (
|
72
|
-
(VOID **) &Snp,
|
73
|
-
This->DriverBindingHandle,
|
74
|
-
Private->Ip4Nic->Controller,
|
75
|
-
- EFI_OPEN_PROTOCOL_BY_DRIVER
|
76
|
-
+ EFI_OPEN_PROTOCOL_BY_DRIVER|EFI_OPEN_PROTOCOL_EXCLUSIVE
|
77
|
-
);
|
78
|
-
if (EFI_ERROR (Status)) {
|
79
|
-
goto ON_ERROR;
|
80
|
-
@@ -1157,7 +1157,7 @@ PxeBcCreateIp6Children (
|
81
|
-
}
|
82
|
-
|
83
|
-
//
|
84
|
-
- // Open SNP on the child handle BY_DRIVER. It will prevent any additionally
|
85
|
-
+ // Open SNP on the child handle BY_DRIVER|EXCLUSIVE. It will prevent any additionally
|
86
|
-
// layering to perform the experiment.
|
87
|
-
//
|
88
|
-
Status = gBS->OpenProtocol (
|
89
|
-
@@ -1166,7 +1166,7 @@ PxeBcCreateIp6Children (
|
90
|
-
(VOID **) &Snp,
|
91
|
-
This->DriverBindingHandle,
|
92
|
-
Private->Ip6Nic->Controller,
|
93
|
-
- EFI_OPEN_PROTOCOL_BY_DRIVER
|
94
|
-
+ EFI_OPEN_PROTOCOL_BY_DRIVER|EFI_OPEN_PROTOCOL_EXCLUSIVE
|
95
|
-
);
|
96
|
-
if (EFI_ERROR (Status)) {
|
97
|
-
goto ON_ERROR;
|
98
|
-
--
|
99
|
-
1.8.3.1
|
100
|
-
|
@@ -0,0 +1,198 @@
|
|
1
|
+
From 71c39f0fb0b9a3e9856cebc58ef3812752fd07cc Mon Sep 17 00:00:00 2001
|
2
|
+
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
+
Date: Tue, 4 Jun 2019 11:06:45 +0200
|
4
|
+
Subject: [PATCH 3/3] OvmfPkg/PlatformPei: set 32-bit UC area at PciBase /
|
5
|
+
PciExBarBase (pc/q35)
|
6
|
+
MIME-Version: 1.0
|
7
|
+
Content-Type: text/plain; charset=UTF-8
|
8
|
+
Content-Transfer-Encoding: 8bit
|
9
|
+
|
10
|
+
Message-id: <20190604090645.2847-4-lersek@redhat.com>
|
11
|
+
Patchwork-id: 88483
|
12
|
+
O-Subject: [RHEL-8.1.0 edk2 PATCH v2 3/3] OvmfPkg/PlatformPei: set 32-bit UC
|
13
|
+
area at PciBase / PciExBarBase (pc/q35)
|
14
|
+
Bugzilla: 1666941
|
15
|
+
Acked-by: Philippe Mathieu-Daudé <philmd@redhat.com>
|
16
|
+
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
17
|
+
|
18
|
+
(This is a replacement for commit 39b9a5ffe661 ("OvmfPkg/PlatformPei: fix
|
19
|
+
MTRR for low-RAM sizes that have many bits clear", 2019-05-16).)
|
20
|
+
|
21
|
+
Reintroduce the same logic as seen in commit 39b9a5ffe661 for the pc
|
22
|
+
(i440fx) board type.
|
23
|
+
|
24
|
+
For q35, the same approach doesn't work any longer, given that (a) we'd
|
25
|
+
like to keep the PCIEXBAR in the platform DSC a fixed-at-build PCD, and
|
26
|
+
(b) QEMU expects the PCIEXBAR to reside at a lower address than the 32-bit
|
27
|
+
PCI MMIO aperture.
|
28
|
+
|
29
|
+
Therefore, introduce a helper function for determining the 32-bit
|
30
|
+
"uncacheable" (MMIO) area base address:
|
31
|
+
|
32
|
+
- On q35, this function behaves statically. Furthermore, the MTRR setup
|
33
|
+
exploits that the range [0xB000_0000, 0xFFFF_FFFF] can be marked UC with
|
34
|
+
just two variable MTRRs (one at 0xB000_0000 (size 256MB), another at
|
35
|
+
0xC000_0000 (size 1GB)).
|
36
|
+
|
37
|
+
- On pc (i440fx), the function behaves dynamically, implementing the same
|
38
|
+
logic as commit 39b9a5ffe661 did. The PciBase value is adjusted to the
|
39
|
+
value calculated, similarly to commit 39b9a5ffe661. A further
|
40
|
+
simplification is that we show that the UC32 area size truncation to a
|
41
|
+
whole power of two automatically guarantees a >=2GB base address.
|
42
|
+
|
43
|
+
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
44
|
+
Cc: Gerd Hoffmann <kraxel@redhat.com>
|
45
|
+
Cc: Jordan Justen <jordan.l.justen@intel.com>
|
46
|
+
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1859
|
47
|
+
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
48
|
+
Reviewed-by: Philippe Mathieu-Daude <philmd@redhat.com>
|
49
|
+
Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
50
|
+
(cherry picked from commit 49edde15230a5bfd6746225eb95535eaa2ec1ba4)
|
51
|
+
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
52
|
+
---
|
53
|
+
OvmfPkg/PlatformPei/MemDetect.c | 59 ++++++++++++++++++++++++++++++++++++++---
|
54
|
+
OvmfPkg/PlatformPei/Platform.c | 5 +++-
|
55
|
+
OvmfPkg/PlatformPei/Platform.h | 7 +++++
|
56
|
+
3 files changed, 66 insertions(+), 5 deletions(-)
|
57
|
+
|
58
|
+
diff --git a/OvmfPkg/PlatformPei/MemDetect.c b/OvmfPkg/PlatformPei/MemDetect.c
|
59
|
+
index 2f9e835..0c38b70 100644
|
60
|
+
--- a/OvmfPkg/PlatformPei/MemDetect.c
|
61
|
+
+++ b/OvmfPkg/PlatformPei/MemDetect.c
|
62
|
+
@@ -20,6 +20,7 @@ Module Name:
|
63
|
+
// The package level header files this module uses
|
64
|
+
//
|
65
|
+
#include <IndustryStandard/E820.h>
|
66
|
+
+#include <IndustryStandard/I440FxPiix4.h>
|
67
|
+
#include <IndustryStandard/Q35MchIch9.h>
|
68
|
+
#include <PiPei.h>
|
69
|
+
|
70
|
+
@@ -48,6 +49,8 @@ STATIC UINT32 mS3AcpiReservedMemorySize;
|
71
|
+
|
72
|
+
STATIC UINT16 mQ35TsegMbytes;
|
73
|
+
|
74
|
+
+UINT32 mQemuUc32Base;
|
75
|
+
+
|
76
|
+
VOID
|
77
|
+
Q35TsegMbytesInitialization (
|
78
|
+
VOID
|
79
|
+
@@ -104,6 +107,54 @@ Q35TsegMbytesInitialization (
|
80
|
+
}
|
81
|
+
|
82
|
+
|
83
|
+
+VOID
|
84
|
+
+QemuUc32BaseInitialization (
|
85
|
+
+ VOID
|
86
|
+
+ )
|
87
|
+
+{
|
88
|
+
+ UINT32 LowerMemorySize;
|
89
|
+
+ UINT32 Uc32Size;
|
90
|
+
+
|
91
|
+
+ if (mXen) {
|
92
|
+
+ return;
|
93
|
+
+ }
|
94
|
+
+
|
95
|
+
+ if (mHostBridgeDevId == INTEL_Q35_MCH_DEVICE_ID) {
|
96
|
+
+ //
|
97
|
+
+ // On q35, the 32-bit area that we'll mark as UC, through variable MTRRs,
|
98
|
+
+ // starts at PcdPciExpressBaseAddress. The platform DSC is responsible for
|
99
|
+
+ // setting PcdPciExpressBaseAddress such that describing the
|
100
|
+
+ // [PcdPciExpressBaseAddress, 4GB) range require a very small number of
|
101
|
+
+ // variable MTRRs (preferably 1 or 2).
|
102
|
+
+ //
|
103
|
+
+ ASSERT (FixedPcdGet64 (PcdPciExpressBaseAddress) <= MAX_UINT32);
|
104
|
+
+ mQemuUc32Base = (UINT32)FixedPcdGet64 (PcdPciExpressBaseAddress);
|
105
|
+
+ return;
|
106
|
+
+ }
|
107
|
+
+
|
108
|
+
+ ASSERT (mHostBridgeDevId == INTEL_82441_DEVICE_ID);
|
109
|
+
+ //
|
110
|
+
+ // On i440fx, start with the [LowerMemorySize, 4GB) range. Make sure one
|
111
|
+
+ // variable MTRR suffices by truncating the size to a whole power of two,
|
112
|
+
+ // while keeping the end affixed to 4GB. This will round the base up.
|
113
|
+
+ //
|
114
|
+
+ LowerMemorySize = GetSystemMemorySizeBelow4gb ();
|
115
|
+
+ Uc32Size = GetPowerOfTwo32 ((UINT32)(SIZE_4GB - LowerMemorySize));
|
116
|
+
+ mQemuUc32Base = (UINT32)(SIZE_4GB - Uc32Size);
|
117
|
+
+ //
|
118
|
+
+ // Assuming that LowerMemorySize is at least 1 byte, Uc32Size is at most 2GB.
|
119
|
+
+ // Therefore mQemuUc32Base is at least 2GB.
|
120
|
+
+ //
|
121
|
+
+ ASSERT (mQemuUc32Base >= BASE_2GB);
|
122
|
+
+
|
123
|
+
+ if (mQemuUc32Base != LowerMemorySize) {
|
124
|
+
+ DEBUG ((DEBUG_VERBOSE, "%a: rounded UC32 base from 0x%x up to 0x%x, for "
|
125
|
+
+ "an UC32 size of 0x%x\n", __FUNCTION__, LowerMemorySize, mQemuUc32Base,
|
126
|
+
+ Uc32Size));
|
127
|
+
+ }
|
128
|
+
+}
|
129
|
+
+
|
130
|
+
+
|
131
|
+
/**
|
132
|
+
Iterate over the RAM entries in QEMU's fw_cfg E820 RAM map that start outside
|
133
|
+
of the 32-bit address range.
|
134
|
+
@@ -694,11 +745,11 @@ QemuInitializeRam (
|
135
|
+
ASSERT_EFI_ERROR (Status);
|
136
|
+
|
137
|
+
//
|
138
|
+
- // Set memory range from the "top of lower RAM" (RAM below 4GB) to 4GB as
|
139
|
+
- // uncacheable
|
140
|
+
+ // Set the memory range from the start of the 32-bit MMIO area (32-bit PCI
|
141
|
+
+ // MMIO aperture on i440fx, PCIEXBAR on q35) to 4GB as uncacheable.
|
142
|
+
//
|
143
|
+
- Status = MtrrSetMemoryAttribute (LowerMemorySize,
|
144
|
+
- SIZE_4GB - LowerMemorySize, CacheUncacheable);
|
145
|
+
+ Status = MtrrSetMemoryAttribute (mQemuUc32Base, SIZE_4GB - mQemuUc32Base,
|
146
|
+
+ CacheUncacheable);
|
147
|
+
ASSERT_EFI_ERROR (Status);
|
148
|
+
}
|
149
|
+
}
|
150
|
+
diff --git a/OvmfPkg/PlatformPei/Platform.c b/OvmfPkg/PlatformPei/Platform.c
|
151
|
+
index 64b8034..de19f5c 100644
|
152
|
+
--- a/OvmfPkg/PlatformPei/Platform.c
|
153
|
+
+++ b/OvmfPkg/PlatformPei/Platform.c
|
154
|
+
@@ -197,7 +197,8 @@ MemMapInitialization (
|
155
|
+
ASSERT (PciExBarBase <= MAX_UINT32 - SIZE_256MB);
|
156
|
+
PciBase = (UINT32)(PciExBarBase + SIZE_256MB);
|
157
|
+
} else {
|
158
|
+
- PciBase = (TopOfLowRam < BASE_2GB) ? BASE_2GB : TopOfLowRam;
|
159
|
+
+ ASSERT (TopOfLowRam <= mQemuUc32Base);
|
160
|
+
+ PciBase = mQemuUc32Base;
|
161
|
+
}
|
162
|
+
|
163
|
+
//
|
164
|
+
@@ -656,6 +657,8 @@ InitializePlatform (
|
165
|
+
|
166
|
+
PublishPeiMemory ();
|
167
|
+
|
168
|
+
+ QemuUc32BaseInitialization ();
|
169
|
+
+
|
170
|
+
InitializeRamRegions ();
|
171
|
+
|
172
|
+
if (mXen) {
|
173
|
+
diff --git a/OvmfPkg/PlatformPei/Platform.h b/OvmfPkg/PlatformPei/Platform.h
|
174
|
+
index b12a5c1..2b486ce 100644
|
175
|
+
--- a/OvmfPkg/PlatformPei/Platform.h
|
176
|
+
+++ b/OvmfPkg/PlatformPei/Platform.h
|
177
|
+
@@ -69,6 +69,11 @@ GetSystemMemorySizeBelow4gb (
|
178
|
+
);
|
179
|
+
|
180
|
+
VOID
|
181
|
+
+QemuUc32BaseInitialization (
|
182
|
+
+ VOID
|
183
|
+
+ );
|
184
|
+
+
|
185
|
+
+VOID
|
186
|
+
InitializeRamRegions (
|
187
|
+
VOID
|
188
|
+
);
|
189
|
+
@@ -120,4 +125,6 @@ extern UINT32 mMaxCpuCount;
|
190
|
+
|
191
|
+
extern UINT16 mHostBridgeDevId;
|
192
|
+
|
193
|
+
+extern UINT32 mQemuUc32Base;
|
194
|
+
+
|
195
|
+
#endif // _PLATFORM_PEI_H_INCLUDED_
|
196
|
+
--
|
197
|
+
1.8.3.1
|
198
|
+
|
@@ -0,0 +1,75 @@
|
|
1
|
+
From aaaedc1e2cfd55ef003fb1b5a37c73a196b26dc7 Mon Sep 17 00:00:00 2001
|
2
|
+
From: Philippe Mathieu-Daude <philmd@redhat.com>
|
3
|
+
Date: Thu, 1 Aug 2019 20:43:48 +0200
|
4
|
+
Subject: [PATCH 2/3] OvmfPkg: QemuRamfbDxe: Do not report DXE failure on
|
5
|
+
Aarch64 silent builds (RH only)
|
6
|
+
|
7
|
+
Message-id: <20190801184349.28512-3-philmd@redhat.com>
|
8
|
+
Patchwork-id: 89861
|
9
|
+
O-Subject: [RHEL-8.1.0 edk2 PATCH v4 2/3] OvmfPkg: QemuRamfbDxe: Do not report
|
10
|
+
DXE failure on Aarch64 silent builds (RH only)
|
11
|
+
Bugzilla: 1714446
|
12
|
+
Acked-by: Andrew Jones <drjones@redhat.com>
|
13
|
+
Acked-by: Laszlo Ersek <lersek@redhat.com>
|
14
|
+
|
15
|
+
To suppress an error message on the silent build when ramfb is
|
16
|
+
not configured, change QemuRamfbDxe to return EFI_SUCCESS even
|
17
|
+
when it fails.
|
18
|
+
Some memory is wasted (driver stays resident without
|
19
|
+
any good use), but it is mostly harmless, as the memory
|
20
|
+
is released by the OS after ExitBootServices().
|
21
|
+
|
22
|
+
Suggested-by: Laszlo Ersek <lersek@redhat.com>
|
23
|
+
Signed-off-by: Philippe Mathieu-Daude <philmd@redhat.com>
|
24
|
+
---
|
25
|
+
OvmfPkg/QemuRamfbDxe/QemuRamfb.c | 14 ++++++++++++++
|
26
|
+
OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf | 1 +
|
27
|
+
2 files changed, 15 insertions(+)
|
28
|
+
|
29
|
+
diff --git a/OvmfPkg/QemuRamfbDxe/QemuRamfb.c b/OvmfPkg/QemuRamfbDxe/QemuRamfb.c
|
30
|
+
index b49f2ca..c27e55f 100644
|
31
|
+
--- a/OvmfPkg/QemuRamfbDxe/QemuRamfb.c
|
32
|
+
+++ b/OvmfPkg/QemuRamfbDxe/QemuRamfb.c
|
33
|
+
|
34
|
+
#include <Library/BaseLib.h>
|
35
|
+
#include <Library/BaseMemoryLib.h>
|
36
|
+
#include <Library/DebugLib.h>
|
37
|
+
+#include <Library/DebugPrintErrorLevelLib.h>
|
38
|
+
#include <Library/DevicePathLib.h>
|
39
|
+
#include <Library/FrameBufferBltLib.h>
|
40
|
+
#include <Library/MemoryAllocationLib.h>
|
41
|
+
@@ -249,6 +250,19 @@ InitializeQemuRamfb (
|
42
|
+
|
43
|
+
Status = QemuFwCfgFindFile ("etc/ramfb", &mRamfbFwCfgItem, &FwCfgSize);
|
44
|
+
if (EFI_ERROR (Status)) {
|
45
|
+
+#if defined (MDE_CPU_AARCH64)
|
46
|
+
+ //
|
47
|
+
+ // RHBZ#1714446
|
48
|
+
+ // If no ramfb device was configured, this platform DXE driver should
|
49
|
+
+ // returns EFI_NOT_FOUND, so the DXE Core can unload it. However, even
|
50
|
+
+ // using a silent build, an error message is issued to the guest console.
|
51
|
+
+ // Since this confuse users, return success and stay resident. The wasted
|
52
|
+
+ // guest RAM still gets freed later after ExitBootServices().
|
53
|
+
+ //
|
54
|
+
+ if (GetDebugPrintErrorLevel () == DEBUG_ERROR) {
|
55
|
+
+ return EFI_SUCCESS;
|
56
|
+
+ }
|
57
|
+
+#endif
|
58
|
+
return EFI_NOT_FOUND;
|
59
|
+
}
|
60
|
+
if (FwCfgSize != sizeof (RAMFB_CONFIG)) {
|
61
|
+
diff --git a/OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf b/OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
|
62
|
+
index 013edef..f9e24cb 100644
|
63
|
+
--- a/OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
|
64
|
+
+++ b/OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
|
65
|
+
|
66
|
+
BaseLib
|
67
|
+
BaseMemoryLib
|
68
|
+
DebugLib
|
69
|
+
+ DebugPrintErrorLevelLib
|
70
|
+
DevicePathLib
|
71
|
+
FrameBufferBltLib
|
72
|
+
MemoryAllocationLib
|
73
|
+
--
|
74
|
+
1.8.3.1
|
75
|
+
|
@@ -0,0 +1,109 @@
|
|
1
|
+
From d362291ada9ee22316e3c069dc788c4c801b0796 Mon Sep 17 00:00:00 2001
|
2
|
+
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
+
Date: Tue, 4 Jun 2019 11:06:44 +0200
|
4
|
+
Subject: [PATCH 2/3] OvmfPkg: raise the PCIEXBAR base to 2816 MB on Q35
|
5
|
+
MIME-Version: 1.0
|
6
|
+
Content-Type: text/plain; charset=UTF-8
|
7
|
+
Content-Transfer-Encoding: 8bit
|
8
|
+
|
9
|
+
Message-id: <20190604090645.2847-3-lersek@redhat.com>
|
10
|
+
Patchwork-id: 88481
|
11
|
+
O-Subject: [RHEL-8.1.0 edk2 PATCH v2 2/3] OvmfPkg: raise the PCIEXBAR base to
|
12
|
+
2816 MB on Q35
|
13
|
+
Bugzilla: 1666941
|
14
|
+
Acked-by: Philippe Mathieu-Daudé <philmd@redhat.com>
|
15
|
+
Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
16
|
+
|
17
|
+
(This is a replacement for commit 75136b29541b, "OvmfPkg/PlatformPei:
|
18
|
+
reorder the 32-bit PCI window vs. the PCIEXBAR on q35", 2019-05-16).
|
19
|
+
|
20
|
+
Commit 7b8fe63561b4 ("OvmfPkg: PlatformPei: enable PCIEXBAR (aka MMCONFIG
|
21
|
+
/ ECAM) on Q35", 2016-03-10) claimed that,
|
22
|
+
|
23
|
+
On Q35 machine types that QEMU intends to support in the long term, QEMU
|
24
|
+
never lets the RAM below 4 GB exceed 2 GB.
|
25
|
+
|
26
|
+
Alas, this statement came from a misunderstanding that occurred while we
|
27
|
+
worked out the interface contract. In fact QEMU does allow the 32-bit RAM
|
28
|
+
extend up to 0xB000_0000 (exclusive), in case the RAM size falls in the
|
29
|
+
range (0x8000_0000, 0xB000_0000) (i.e., the RAM size is greater than
|
30
|
+
2048MB and smaller than 2816MB).
|
31
|
+
|
32
|
+
In turn, such a RAM size (justifiedly) triggers
|
33
|
+
|
34
|
+
ASSERT (TopOfLowRam <= PciExBarBase);
|
35
|
+
|
36
|
+
in MemMapInitialization(), because we placed the 256MB PCIEXBAR at
|
37
|
+
0x8000_0000 (2GB) exactly, relying on the interface contract. (And, the
|
38
|
+
32-bit PCI window would follow the PCIEXBAR, covering the [0x9000_0000,
|
39
|
+
0xFC00_0000) range.)
|
40
|
+
|
41
|
+
In order to fix this, place the PCIEXBAR at 2816MB (0xB000_0000), and
|
42
|
+
start the 32-bit PCI window at 3 GB (0xC000_0000). This shrinks the 32-bit
|
43
|
+
PCI window to
|
44
|
+
|
45
|
+
0xFC00_0000 - 0xC000_0000 = 0x3C00_0000 = 960 MB.
|
46
|
+
|
47
|
+
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
48
|
+
Cc: Gerd Hoffmann <kraxel@redhat.com>
|
49
|
+
Cc: Jordan Justen <jordan.l.justen@intel.com>
|
50
|
+
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1859
|
51
|
+
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
52
|
+
Reviewed-by: Philippe Mathieu-Daude <philmd@redhat.com>
|
53
|
+
Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
54
|
+
(cherry picked from commit b07de0974b65a6a393c2d477427d1d6c7acce002)
|
55
|
+
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
56
|
+
---
|
57
|
+
OvmfPkg/OvmfPkgIa32.dsc | 4 ++--
|
58
|
+
OvmfPkg/OvmfPkgIa32X64.dsc | 4 ++--
|
59
|
+
OvmfPkg/OvmfPkgX64.dsc | 4 ++--
|
60
|
+
3 files changed, 6 insertions(+), 6 deletions(-)
|
61
|
+
|
62
|
+
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
|
63
|
+
index bbf5e38..cf5f2ea 100644
|
64
|
+
--- a/OvmfPkg/OvmfPkgIa32.dsc
|
65
|
+
+++ b/OvmfPkg/OvmfPkgIa32.dsc
|
66
|
+
|
67
|
+
# the PCIEXBAR register.
|
68
|
+
#
|
69
|
+
# On Q35 machine types that QEMU intends to support in the long term, QEMU
|
70
|
+
- # never lets the RAM below 4 GB exceed 2 GB.
|
71
|
+
- gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0x80000000
|
72
|
+
+ # never lets the RAM below 4 GB exceed 2816 MB.
|
73
|
+
+ gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0xB0000000
|
74
|
+
|
75
|
+
!ifdef $(SOURCE_DEBUG_ENABLE)
|
76
|
+
gEfiSourceLevelDebugPkgTokenSpaceGuid.PcdDebugLoadImageMethod|0x2
|
77
|
+
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
|
78
|
+
index 3ec1b91..5a24065 100644
|
79
|
+
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
|
80
|
+
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
|
81
|
+
|
82
|
+
# the PCIEXBAR register.
|
83
|
+
#
|
84
|
+
# On Q35 machine types that QEMU intends to support in the long term, QEMU
|
85
|
+
- # never lets the RAM below 4 GB exceed 2 GB.
|
86
|
+
- gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0x80000000
|
87
|
+
+ # never lets the RAM below 4 GB exceed 2816 MB.
|
88
|
+
+ gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0xB0000000
|
89
|
+
|
90
|
+
!ifdef $(SOURCE_DEBUG_ENABLE)
|
91
|
+
gEfiSourceLevelDebugPkgTokenSpaceGuid.PcdDebugLoadImageMethod|0x2
|
92
|
+
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
|
93
|
+
index ea54b4b..6ab50c9 100644
|
94
|
+
--- a/OvmfPkg/OvmfPkgX64.dsc
|
95
|
+
+++ b/OvmfPkg/OvmfPkgX64.dsc
|
96
|
+
|
97
|
+
# the PCIEXBAR register.
|
98
|
+
#
|
99
|
+
# On Q35 machine types that QEMU intends to support in the long term, QEMU
|
100
|
+
- # never lets the RAM below 4 GB exceed 2 GB.
|
101
|
+
- gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0x80000000
|
102
|
+
+ # never lets the RAM below 4 GB exceed 2816 MB.
|
103
|
+
+ gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0xB0000000
|
104
|
+
|
105
|
+
!ifdef $(SOURCE_DEBUG_ENABLE)
|
106
|
+
gEfiSourceLevelDebugPkgTokenSpaceGuid.PcdDebugLoadImageMethod|0x2
|
107
|
+
--
|
108
|
+
1.8.3.1
|
109
|
+
|
@@ -0,0 +1,31 @@
|
|
1
|
+
{
|
2
|
+
"description": "UEFI firmware for ARM64 virtual machines, verbose logs",
|
3
|
+
"interface-types": [
|
4
|
+
"uefi"
|
5
|
+
],
|
6
|
+
"mapping": {
|
7
|
+
"device": "flash",
|
8
|
+
"executable": {
|
9
|
+
"filename": "/usr/share/edk2/aarch64/QEMU_EFI-pflash.raw",
|
10
|
+
"format": "raw"
|
11
|
+
},
|
12
|
+
"nvram-template": {
|
13
|
+
"filename": "/usr/share/edk2/aarch64/vars-template-pflash.raw",
|
14
|
+
"format": "raw"
|
15
|
+
}
|
16
|
+
},
|
17
|
+
"targets": [
|
18
|
+
{
|
19
|
+
"architecture": "aarch64",
|
20
|
+
"machines": [
|
21
|
+
"virt-*"
|
22
|
+
]
|
23
|
+
}
|
24
|
+
],
|
25
|
+
"features": [
|
26
|
+
"verbose-static"
|
27
|
+
],
|
28
|
+
"tags": [
|
29
|
+
|
30
|
+
]
|
31
|
+
}
|
@@ -0,0 +1,31 @@
|
|
1
|
+
{
|
2
|
+
"description": "UEFI firmware for ARM64 virtual machines",
|
3
|
+
"interface-types": [
|
4
|
+
"uefi"
|
5
|
+
],
|
6
|
+
"mapping": {
|
7
|
+
"device": "flash",
|
8
|
+
"executable": {
|
9
|
+
"filename": "/usr/share/edk2/aarch64/QEMU_EFI-silent-pflash.raw",
|
10
|
+
"format": "raw"
|
11
|
+
},
|
12
|
+
"nvram-template": {
|
13
|
+
"filename": "/usr/share/edk2/aarch64/vars-template-pflash.raw",
|
14
|
+
"format": "raw"
|
15
|
+
}
|
16
|
+
},
|
17
|
+
"targets": [
|
18
|
+
{
|
19
|
+
"architecture": "aarch64",
|
20
|
+
"machines": [
|
21
|
+
"virt-*"
|
22
|
+
]
|
23
|
+
}
|
24
|
+
],
|
25
|
+
"features": [
|
26
|
+
|
27
|
+
],
|
28
|
+
"tags": [
|
29
|
+
|
30
|
+
]
|
31
|
+
}
|
@@ -1,154 +0,0 @@
|
|
1
|
-
From 02ed2c501cdd56e9c404bdc8eac0abb9dfd5a04c Mon Sep 17 00:00:00 2001
|
2
|
-
From: Laszlo Ersek <lersek@redhat.com>
|
3
|
-
Date: Wed, 18 Jul 2018 00:18:20 +0200
|
4
|
-
Subject: [PATCH 4/6] advertise OpenSSL due to IPv6 enablement too (RHEL only)
|
5
|
-
|
6
|
-
Message-id: <20180717221822.13110-4-lersek@redhat.com>
|
7
|
-
Patchwork-id: 81378
|
8
|
-
O-Subject: [RHEL8/virt212 edk2 PATCH 3/5] advertise OpenSSL due to IPv6
|
9
|
-
enablement too (RHEL only)
|
10
|
-
Bugzilla: 1536627
|
11
|
-
Acked-by: Paolo Bonzini <pbonzini@redhat.com>
|
12
|
-
Acked-by: Wei Huang <wei@redhat.com>
|
13
|
-
|
14
|
-
With "-D NETWORK_IP6_ENABLE", we pull the IPv6-enabled IScsiDxe driver
|
15
|
-
into the edk2-ovmf and edk2-aarch64 builds. That driver depends on OpenSSL
|
16
|
-
(the crypto part only, not the ssl part). Accordingly, extend our
|
17
|
-
(downstream-only) OpenSSL advertisment to NETWORK_IP6_ENABLE.
|
18
|
-
|
19
|
-
(At the next rebase, this patch will be squashed into commit "advertise
|
20
|
-
OpenSSL on TianoCore splash screen / boot logo (RHEL only)".)
|
21
|
-
|
22
|
-
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
|
23
|
-
---
|
24
|
-
ArmVirtPkg/ArmVirtQemu.dsc | 2 +-
|
25
|
-
ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc | 2 +-
|
26
|
-
ArmVirtPkg/ArmVirtQemuKernel.dsc | 2 +-
|
27
|
-
OvmfPkg/OvmfPkgIa32.dsc | 2 +-
|
28
|
-
OvmfPkg/OvmfPkgIa32.fdf | 2 +-
|
29
|
-
OvmfPkg/OvmfPkgIa32X64.dsc | 2 +-
|
30
|
-
OvmfPkg/OvmfPkgIa32X64.fdf | 2 +-
|
31
|
-
OvmfPkg/OvmfPkgX64.dsc | 2 +-
|
32
|
-
OvmfPkg/OvmfPkgX64.fdf | 2 +-
|
33
|
-
9 files changed, 9 insertions(+), 9 deletions(-)
|
34
|
-
|
35
|
-
diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
|
36
|
-
index 41ff17d..7091b6c 100644
|
37
|
-
--- a/ArmVirtPkg/ArmVirtQemu.dsc
|
38
|
-
+++ b/ArmVirtPkg/ArmVirtQemu.dsc
|
39
|
-
|
40
|
-
MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
|
41
|
-
MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
|
42
|
-
MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
|
43
|
-
-!if $(SECURE_BOOT_ENABLE) == TRUE
|
44
|
-
+!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE)
|
45
|
-
MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
46
|
-
!else
|
47
|
-
MdeModulePkg/Logo/LogoDxe.inf
|
48
|
-
diff --git a/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc b/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
|
49
|
-
index 82d9cbd..a3f5fa9 100644
|
50
|
-
--- a/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
|
51
|
-
+++ b/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
|
52
|
-
@@ -201,7 +201,7 @@ READ_LOCK_STATUS = TRUE
|
53
|
-
#
|
54
|
-
# TianoCore logo (splash screen)
|
55
|
-
#
|
56
|
-
-!if $(SECURE_BOOT_ENABLE) == TRUE
|
57
|
-
+!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE)
|
58
|
-
INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
59
|
-
!else
|
60
|
-
INF MdeModulePkg/Logo/LogoDxe.inf
|
61
|
-
diff --git a/ArmVirtPkg/ArmVirtQemuKernel.dsc b/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
62
|
-
index 83fc12f..5730633 100644
|
63
|
-
--- a/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
64
|
-
+++ b/ArmVirtPkg/ArmVirtQemuKernel.dsc
|
65
|
-
|
66
|
-
MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
|
67
|
-
MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
|
68
|
-
MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
|
69
|
-
-!if $(SECURE_BOOT_ENABLE) == TRUE
|
70
|
-
+!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE)
|
71
|
-
MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
72
|
-
!else
|
73
|
-
MdeModulePkg/Logo/LogoDxe.inf
|
74
|
-
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
|
75
|
-
index f6d7833..bef8df9 100644
|
76
|
-
--- a/OvmfPkg/OvmfPkgIa32.dsc
|
77
|
-
+++ b/OvmfPkg/OvmfPkgIa32.dsc
|
78
|
-
|
79
|
-
NULL|IntelFrameworkModulePkg/Library/LegacyBootManagerLib/LegacyBootManagerLib.inf
|
80
|
-
!endif
|
81
|
-
}
|
82
|
-
-!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
83
|
-
+!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
84
|
-
MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
85
|
-
!else
|
86
|
-
MdeModulePkg/Logo/LogoDxe.inf
|
87
|
-
diff --git a/OvmfPkg/OvmfPkgIa32.fdf b/OvmfPkg/OvmfPkgIa32.fdf
|
88
|
-
index 73007dd..43f80cd 100644
|
89
|
-
--- a/OvmfPkg/OvmfPkgIa32.fdf
|
90
|
-
+++ b/OvmfPkg/OvmfPkgIa32.fdf
|
91
|
-
@@ -297,7 +297,7 @@ INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
|
92
|
-
!endif
|
93
|
-
!endif
|
94
|
-
|
95
|
-
-!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
96
|
-
+!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
97
|
-
INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
98
|
-
!else
|
99
|
-
INF MdeModulePkg/Logo/LogoDxe.inf
|
100
|
-
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
|
101
|
-
index d6e628b..2085848 100644
|
102
|
-
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
|
103
|
-
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
|
104
|
-
|
105
|
-
NULL|IntelFrameworkModulePkg/Library/LegacyBootManagerLib/LegacyBootManagerLib.inf
|
106
|
-
!endif
|
107
|
-
}
|
108
|
-
-!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
109
|
-
+!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
110
|
-
MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
111
|
-
!else
|
112
|
-
MdeModulePkg/Logo/LogoDxe.inf
|
113
|
-
diff --git a/OvmfPkg/OvmfPkgIa32X64.fdf b/OvmfPkg/OvmfPkgIa32X64.fdf
|
114
|
-
index 116b3c6..d858012 100644
|
115
|
-
--- a/OvmfPkg/OvmfPkgIa32X64.fdf
|
116
|
-
+++ b/OvmfPkg/OvmfPkgIa32X64.fdf
|
117
|
-
@@ -298,7 +298,7 @@ INF RuleOverride = BINARY USE = X64 EdkShellBinPkg/FullShell/FullShell.inf
|
118
|
-
!endif
|
119
|
-
!endif
|
120
|
-
|
121
|
-
-!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
122
|
-
+!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
123
|
-
INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
124
|
-
!else
|
125
|
-
INF MdeModulePkg/Logo/LogoDxe.inf
|
126
|
-
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
|
127
|
-
index a9fe89c..7bcb9fa 100644
|
128
|
-
--- a/OvmfPkg/OvmfPkgX64.dsc
|
129
|
-
+++ b/OvmfPkg/OvmfPkgX64.dsc
|
130
|
-
|
131
|
-
NULL|IntelFrameworkModulePkg/Library/LegacyBootManagerLib/LegacyBootManagerLib.inf
|
132
|
-
!endif
|
133
|
-
}
|
134
|
-
-!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
135
|
-
+!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
136
|
-
MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
137
|
-
!else
|
138
|
-
MdeModulePkg/Logo/LogoDxe.inf
|
139
|
-
diff --git a/OvmfPkg/OvmfPkgX64.fdf b/OvmfPkg/OvmfPkgX64.fdf
|
140
|
-
index 84d5845..41ce2d0 100644
|
141
|
-
--- a/OvmfPkg/OvmfPkgX64.fdf
|
142
|
-
+++ b/OvmfPkg/OvmfPkgX64.fdf
|
143
|
-
@@ -298,7 +298,7 @@ INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
|
144
|
-
!endif
|
145
|
-
!endif
|
146
|
-
|
147
|
-
-!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
148
|
-
+!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
|
149
|
-
INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
|
150
|
-
!else
|
151
|
-
INF MdeModulePkg/Logo/LogoDxe.inf
|
152
|
-
--
|
153
|
-
1.8.3.1
|
154
|
-
|
@@ -0,0 +1,36 @@
|
|
1
|
+
{
|
2
|
+
"description": "OVMF with SB+SMM, SB enabled, MS certs enrolled",
|
3
|
+
"interface-types": [
|
4
|
+
"uefi"
|
5
|
+
],
|
6
|
+
"mapping": {
|
7
|
+
"device": "flash",
|
8
|
+
"executable": {
|
9
|
+
"filename": "/usr/share/edk2/ovmf/OVMF_CODE.secboot.fd",
|
10
|
+
"format": "raw"
|
11
|
+
},
|
12
|
+
"nvram-template": {
|
13
|
+
"filename": "/usr/share/edk2/ovmf/OVMF_VARS.secboot.fd",
|
14
|
+
"format": "raw"
|
15
|
+
}
|
16
|
+
},
|
17
|
+
"targets": [
|
18
|
+
{
|
19
|
+
"architecture": "x86_64",
|
20
|
+
"machines": [
|
21
|
+
"pc-q35-*"
|
22
|
+
]
|
23
|
+
}
|
24
|
+
],
|
25
|
+
"features": [
|
26
|
+
"acpi-s3",
|
27
|
+
"amd-sev",
|
28
|
+
"enrolled-keys",
|
29
|
+
"requires-smm",
|
30
|
+
"secure-boot",
|
31
|
+
"verbose-dynamic"
|
32
|
+
],
|
33
|
+
"tags": [
|
34
|
+
|
35
|
+
]
|
36
|
+
}
|
@@ -0,0 +1,35 @@
|
|
1
|
+
{
|
2
|
+
"description": "OVMF with SB+SMM, empty varstore",
|
3
|
+
"interface-types": [
|
4
|
+
"uefi"
|
5
|
+
],
|
6
|
+
"mapping": {
|
7
|
+
"device": "flash",
|
8
|
+
"executable": {
|
9
|
+
"filename": "/usr/share/edk2/ovmf/OVMF_CODE.secboot.fd",
|
10
|
+
"format": "raw"
|
11
|
+
},
|
12
|
+
"nvram-template": {
|
13
|
+
"filename": "/usr/share/edk2/ovmf/OVMF_VARS.fd",
|
14
|
+
"format": "raw"
|
15
|
+
}
|
16
|
+
},
|
17
|
+
"targets": [
|
18
|
+
{
|
19
|
+
"architecture": "x86_64",
|
20
|
+
"machines": [
|
21
|
+
"pc-q35-*"
|
22
|
+
]
|
23
|
+
}
|
24
|
+
],
|
25
|
+
"features": [
|
26
|
+
"acpi-s3",
|
27
|
+
"amd-sev",
|
28
|
+
"requires-smm",
|
29
|
+
"secure-boot",
|
30
|
+
"verbose-dynamic"
|
31
|
+
],
|
32
|
+
"tags": [
|
33
|
+
|
34
|
+
]
|
35
|
+
}
|
@@ -1,13 +1,13 @@
|
|
1
1
|
ExclusiveArch: x86_64 aarch64
|
2
2
|
|
3
|
-
%define GITDATE
|
4
|
-
%define GITCOMMIT
|
3
|
+
%define GITDATE 20190308
|
4
|
+
%define GITCOMMIT 89910a39dcfd
|
5
5
|
%define TOOLCHAIN GCC5
|
6
|
-
%define OPENSSL_VER 1.1.
|
6
|
+
%define OPENSSL_VER 1.1.0i
|
7
7
|
|
8
8
|
Name: edk2
|
9
9
|
Version: %{GITDATE}git%{GITCOMMIT}
|
10
|
-
Release:
|
10
|
+
Release: 6%{?dist}
|
11
11
|
Summary: UEFI firmware for 64-bit virtual machines
|
12
12
|
Group: Applications/Emulators
|
13
13
|
License: BSD and OpenSSL and MIT
|
@@ -19,10 +19,15 @@ URL: http://www.tianocore.org
|
|
19
19
|
# | xz -9ev >/tmp/edk2-$COMMIT.tar.xz
|
20
20
|
Source0: http://batcave.lab.eng.brq.redhat.com/www/edk2-%{GITCOMMIT}.tar.xz
|
21
21
|
Source1: ovmf-whitepaper-c770f8c.txt
|
22
|
-
Source2: openssl-fedora-
|
22
|
+
Source2: openssl-fedora-d2ede125556ac99aa0faa7744c703af3f559094e.tar.xz
|
23
23
|
Source3: ovmf-vars-generator
|
24
24
|
Source4: LICENSE.qosb
|
25
25
|
|
26
|
+
Source10: edk2-aarch64-verbose.json
|
27
|
+
Source11: edk2-aarch64.json
|
28
|
+
Source12: edk2-ovmf-sb.json
|
29
|
+
Source13: edk2-ovmf.json
|
30
|
+
|
26
31
|
Patch0003: 0003-advertise-OpenSSL-on-TianoCore-splash-screen-boot-lo.patch
|
27
32
|
Patch0004: 0004-OvmfPkg-increase-max-debug-message-length-to-512-RHE.patch
|
28
33
|
Patch0005: 0005-OvmfPkg-QemuVideoDxe-enable-debug-messages-in-VbeShi.patch
|
@@ -37,62 +42,26 @@ Patch0013: 0013-ArmPlatformPkg-introduce-fixed-PCD-for-early-hello-m.patch
|
|
37
42
|
Patch0014: 0014-ArmPlatformPkg-PrePeiCore-write-early-hello-message-.patch
|
38
43
|
Patch0015: 0015-ArmVirtPkg-set-early-hello-message-RH-only.patch
|
39
44
|
Patch0016: 0016-OvmfPkg-enable-DEBUG_VERBOSE-RHEL-only.patch
|
40
|
-
Patch0017: 0017-OvmfPkg-silence-
|
41
|
-
Patch0018: 0018-
|
42
|
-
Patch0019: 0019-OvmfPkg-
|
43
|
-
|
44
|
-
|
45
|
-
|
46
|
-
# For bz#
|
47
|
-
|
48
|
-
# For bz#
|
49
|
-
|
50
|
-
# For bz#
|
51
|
-
|
52
|
-
# For bz#
|
53
|
-
|
54
|
-
|
55
|
-
|
56
|
-
#
|
57
|
-
|
58
|
-
#
|
59
|
-
|
45
|
+
Patch0017: 0017-OvmfPkg-silence-DEBUG_VERBOSE-0x00400000-in-QemuVide.patch
|
46
|
+
Patch0018: 0018-ArmVirtPkg-silence-DEBUG_VERBOSE-0x00400000-in-QemuR.patch
|
47
|
+
Patch0019: 0019-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-NvmExpre.patch
|
48
|
+
Patch0026: 0026-Downgrade-CryptoPkg-INF-files-to-OpenSSL-1.1.0i-RH-o.patch
|
49
|
+
# For bz#1666941 - UEFI guest cannot boot into os when setting some special memory size
|
50
|
+
Patch27: edk2-OvmfPkg-raise-the-PCIEXBAR-base-to-2816-MB-on-Q35.patch
|
51
|
+
# For bz#1666941 - UEFI guest cannot boot into os when setting some special memory size
|
52
|
+
Patch28: edk2-OvmfPkg-PlatformPei-set-32-bit-UC-area-at-PciBase-Pc.patch
|
53
|
+
# For bz#1714446 - edk2-aarch64 silent build is not silent enough
|
54
|
+
Patch29: edk2-ArmVirtPkg-silence-DEBUG_VERBOSE-masking-0x00400000-.patch
|
55
|
+
# For bz#1714446 - edk2-aarch64 silent build is not silent enough
|
56
|
+
Patch30: edk2-OvmfPkg-QemuRamfbDxe-Do-not-report-DXE-failure-on-Aa.patch
|
57
|
+
# For bz#1714446 - edk2-aarch64 silent build is not silent enough
|
58
|
+
Patch31: edk2-ArmPkg-DebugPeCoffExtraActionLib-debugger-commands-a.patch
|
59
|
+
|
60
|
+
|
61
|
+
# python3-devel and libuuid-devel are required for building tools.
|
62
|
+
# python3-devel is also needed for varstore template generation and
|
63
|
+
# verification with "ovmf-vars-generator".
|
64
|
+
BuildRequires: python3-devel
|
60
|
-
# For bz#1607906 - edk2-tools: Does not use RPM build flags
|
61
|
-
Patch42: edk2-BaseTools-Source-C-take-EXTRA_LDFLAGS-from-the-calle.patch
|
62
|
-
# For bz#1607906 - edk2-tools: Does not use RPM build flags
|
63
|
-
Patch43: edk2-BaseTools-VfrCompile-honor-EXTRA_LDFLAGS.patch
|
64
|
-
# For bz#1641436 - CVE-2018-3613 edk2: Logic error in MdeModulePkg in EDK II firmware allows for privilege escalation by authenticated users [rhel-8]
|
65
|
-
Patch44: edk2-MdeModulePkg-Variable-Fix-Timestamp-zeroing-issue-on.patch
|
66
|
-
# For bz#1641449 - CVE-2017-5732 edk2: Privilege escalation via processing of malformed files in BaseUefiDecompressLib.c [rhel-8]
|
67
|
-
# For bz#1641453 - CVE-2017-5733 edk2: Privilege escalation via heap-based buffer overflow in MakeTable() function [rhel-8]
|
68
|
-
# For bz#1641464 - CVE-2017-5734 edk2: Privilege escalation via stack-based buffer overflow in MakeTable() function [rhel-8]
|
69
|
-
# For bz#1641469 - CVE-2017-5735 edk2: Privilege escalation via heap-based buffer overflow in Decode() function [rhel-8]
|
70
|
-
Patch45: edk2-MdePkg-Add-more-checker-in-UefiDecompressLib-to-acce.patch
|
71
|
-
# For bz#1641453 - CVE-2017-5733 edk2: Privilege escalation via heap-based buffer overflow in MakeTable() function [rhel-8]
|
72
|
-
# For bz#1641464 - CVE-2017-5734 edk2: Privilege escalation via stack-based buffer overflow in MakeTable() function [rhel-8]
|
73
|
-
# For bz#1641469 - CVE-2017-5735 edk2: Privilege escalation via heap-based buffer overflow in Decode() function [rhel-8]
|
74
|
-
Patch46: edk2-IntelFrameworkModulePkg-Add-more-checker-in-UefiTian.patch
|
75
|
-
# For bz#1641445 - CVE-2017-5731 edk2: Privilege escalation via processing of malformed files in TianoCompress.c [rhel-8]
|
76
|
-
# For bz#1641453 - CVE-2017-5733 edk2: Privilege escalation via heap-based buffer overflow in MakeTable() function [rhel-8]
|
77
|
-
# For bz#1641464 - CVE-2017-5734 edk2: Privilege escalation via stack-based buffer overflow in MakeTable() function [rhel-8]
|
78
|
-
# For bz#1641469 - CVE-2017-5735 edk2: Privilege escalation via heap-based buffer overflow in Decode() function [rhel-8]
|
79
|
-
Patch47: edk2-BaseTools-Add-more-checker-in-Decompress-algorithm-t.patch
|
80
|
-
# For bz#1643377 - Exception when grubx64.efi used for UEFI netboot
|
81
|
-
Patch48: edk2-NetworkPkg-UefiPxeBcDxe-Add-EXCLUSIVE-attribute-when.patch
|
82
|
-
# For bz#1662184 - backport fix for (theoretical?) regression introduced by earlier CVE fixes
|
83
|
-
Patch49: edk2-BaseTools-Fix-UEFI-and-Tiano-Decompression-logic-iss.patch
|
84
|
-
# For bz#1662184 - backport fix for (theoretical?) regression introduced by earlier CVE fixes
|
85
|
-
Patch50: edk2-MdePkg-BaseUefiDecompressLib-Fix-UEFI-Decompression-.patch
|
86
|
-
# For bz#1662184 - backport fix for (theoretical?) regression introduced by earlier CVE fixes
|
87
|
-
Patch51: edk2-IntelFrameworkModulePkg-Fix-UEFI-and-Tiano-Decompres.patch
|
88
|
-
# For bz#1690501 - CVE-2018-12180 edk2: Buffer Overflow in BlockIo service for RAM disk [rhel-8.0.0.z]
|
89
|
-
Patch52: edk2-MdeModulePkg-PartitionDxe-Ensure-blocksize-holds-MBR.patch
|
90
|
-
# For bz#1690501 - CVE-2018-12180 edk2: Buffer Overflow in BlockIo service for RAM disk [rhel-8.0.0.z]
|
91
|
-
Patch53: edk2-MdeModulePkg-RamDiskDxe-Restrict-on-RAM-disk-size-CV.patch
|
92
|
-
|
93
|
-
|
94
|
-
# python2-devel and libuuid-devel are required for building tools
|
95
|
-
BuildRequires: python2-devel
|
96
65
|
BuildRequires: libuuid-devel
|
97
66
|
BuildRequires: /usr/bin/iasl
|
98
67
|
BuildRequires: binutils gcc git
|
@@ -116,10 +85,6 @@ BuildRequires: qemu-kvm
|
|
116
85
|
BuildRequires: kernel-core
|
117
86
|
BuildRequires: rpmdevtools
|
118
87
|
|
119
|
-
# For orchestrating the above two steps (varstore generation and verification),
|
120
|
-
# we need to launch "ovmf-vars-generator" -- which we run on Python 3.
|
121
|
-
BuildRequires: python3-devel
|
122
|
-
|
123
88
|
%package ovmf
|
124
89
|
Summary: UEFI firmware for x86_64 virtual machines
|
125
90
|
BuildArch: noarch
|
@@ -186,10 +151,7 @@ environment for the UEFI and PI specifications. This package contains sample
|
|
186
151
|
%prep
|
187
152
|
%setup -q -n edk2-%{GITCOMMIT}
|
188
153
|
|
189
|
-
# Ensure
|
154
|
+
# Ensure binary packages are not used
|
190
|
-
rm -rf EdkShellBinPkg
|
191
|
-
rm -rf EdkShellPkg
|
192
|
-
rm -rf FatBinPkg
|
193
155
|
rm -rf ShellBinPkg
|
194
156
|
|
195
157
|
%{lua:
|
@@ -228,16 +190,14 @@ echo "Applied $COUNT patches"
|
|
228
190
|
rm -f $PATCHLIST
|
229
191
|
|
230
192
|
cp -a -- %{SOURCE1} %{SOURCE3} .
|
193
|
+
cp -a -- %{SOURCE10} %{SOURCE11} %{SOURCE12} %{SOURCE13} .
|
231
194
|
tar -C CryptoPkg/Library/OpensslLib -a -f %{SOURCE2} -x
|
232
195
|
|
233
196
|
# Done by %setup, but we do not use it for the auxiliary tarballs
|
234
197
|
chmod -Rf a+rX,u+w,g-w,o-w .
|
235
198
|
|
236
199
|
%build
|
237
|
-
|
200
|
+
export PYTHON_COMMAND=%{__python3}
|
238
|
-
# <https://url.corp.redhat.com/rhel8-py2>.
|
239
|
-
export RHEL_ALLOW_PYTHON2_FOR_BUILD=1
|
240
|
-
|
241
201
|
source ./edksetup.sh
|
242
202
|
make -C "$EDK_TOOLS_PATH" \
|
243
203
|
EXTRA_OPTFLAGS="%{optflags}" \
|
@@ -255,12 +215,13 @@ CC_FLAGS="$CC_FLAGS -D NETWORK_IP6_ENABLE"
|
|
255
215
|
|
256
216
|
%ifarch x86_64
|
257
217
|
# Build with neither SB nor SMM; include UEFI shell.
|
258
|
-
build ${CC_FLAGS} -D FD_SIZE_4MB -a X64
|
218
|
+
build ${CC_FLAGS} -D TPM2_ENABLE -D FD_SIZE_4MB -a X64 \
|
219
|
+
-p OvmfPkg/OvmfPkgX64.dsc
|
259
220
|
|
260
221
|
# Build with SB and SMM; exclude UEFI shell.
|
261
222
|
build -D SECURE_BOOT_ENABLE -D EXCLUDE_SHELL_FROM_FD ${CC_FLAGS} \
|
262
223
|
-a IA32 -a X64 -p OvmfPkg/OvmfPkgIa32X64.dsc -D SMM_REQUIRE \
|
263
|
-
-D FD_SIZE_4MB
|
224
|
+
-D TPM2_ENABLE -D FD_SIZE_4MB
|
264
225
|
|
265
226
|
# Sanity check: the varstore templates must be identical.
|
266
227
|
cmp Build/OvmfX64/DEBUG_%{TOOLCHAIN}/FV/OVMF_VARS.fd \
|
@@ -326,6 +287,7 @@ build ${CC_FLAGS} -a AARCH64 \
|
|
326
287
|
%install
|
327
288
|
|
328
289
|
cp -a License.txt License.edk2.txt
|
290
|
+
mkdir -p $RPM_BUILD_ROOT%{_datadir}/qemu/firmware
|
329
291
|
|
330
292
|
%ifarch x86_64
|
331
293
|
mkdir -p \
|
@@ -358,6 +320,11 @@ install -m 0644 Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/X64/Shell.efi \
|
|
358
320
|
install -m 0644 Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/X64/EnrollDefaultKeys.efi \
|
359
321
|
$RPM_BUILD_ROOT%{_datadir}/%{name}/ovmf/EnrollDefaultKeys.efi
|
360
322
|
|
323
|
+
install -m 0644 edk2-ovmf-sb.json \
|
324
|
+
$RPM_BUILD_ROOT%{_datadir}/qemu/firmware/40-edk2-ovmf-sb.json
|
325
|
+
install -m 0644 edk2-ovmf.json \
|
326
|
+
$RPM_BUILD_ROOT%{_datadir}/qemu/firmware/50-edk2-ovmf.json
|
327
|
+
|
361
328
|
%else
|
362
329
|
mkdir -p \
|
363
330
|
$RPM_BUILD_ROOT%{_datadir}/AAVMF \
|
@@ -397,6 +364,11 @@ install -m 0644 Build/ArmVirtQemu-AARCH64/DEBUG_%{TOOLCHAIN}/FV/QEMU_EFI.fd \
|
|
397
364
|
install -m 0644 Build/ArmVirtQemu-AARCH64/DEBUG_%{TOOLCHAIN}/FV/QEMU_VARS.fd \
|
398
365
|
$RPM_BUILD_ROOT%{_datadir}/%{name}/aarch64/QEMU_VARS.fd
|
399
366
|
|
367
|
+
install -m 0644 edk2-aarch64.json \
|
368
|
+
$RPM_BUILD_ROOT%{_datadir}/qemu/firmware/60-edk2-aarch64.json
|
369
|
+
install -m 0644 edk2-aarch64-verbose.json \
|
370
|
+
$RPM_BUILD_ROOT%{_datadir}/qemu/firmware/70-edk2-aarch64-verbose.json
|
371
|
+
|
400
372
|
%endif
|
401
373
|
|
402
374
|
cp -a CryptoPkg/Library/OpensslLib/openssl/LICENSE LICENSE.openssl
|
@@ -427,6 +399,8 @@ install BaseTools/Scripts/GccBase.lds \
|
|
427
399
|
%license OvmfPkg/License.txt
|
428
400
|
%license LICENSE.openssl
|
429
401
|
%dir %{_datadir}/%{name}/
|
402
|
+
%dir %{_datadir}/qemu
|
403
|
+
%dir %{_datadir}/qemu/firmware
|
430
404
|
|
431
405
|
%ifarch x86_64
|
432
406
|
%doc OvmfPkg/README
|
@@ -447,6 +421,8 @@ install BaseTools/Scripts/GccBase.lds \
|
|
447
421
|
%{_datadir}/OVMF/UefiShell.iso
|
448
422
|
%{_datadir}/%{name}/ovmf/Shell.efi
|
449
423
|
%{_datadir}/%{name}/ovmf/EnrollDefaultKeys.efi
|
424
|
+
%{_datadir}/qemu/firmware/40-edk2-ovmf-sb.json
|
425
|
+
%{_datadir}/qemu/firmware/50-edk2-ovmf.json
|
450
426
|
|
451
427
|
%else
|
452
428
|
%dir %{_datadir}/AAVMF/
|
@@ -460,23 +436,20 @@ install BaseTools/Scripts/GccBase.lds \
|
|
460
436
|
%{_datadir}/%{name}/aarch64/QEMU_EFI.fd
|
461
437
|
%{_datadir}/%{name}/aarch64/QEMU_EFI.silent.fd
|
462
438
|
%{_datadir}/%{name}/aarch64/QEMU_VARS.fd
|
439
|
+
%{_datadir}/qemu/firmware/60-edk2-aarch64.json
|
440
|
+
%{_datadir}/qemu/firmware/70-edk2-aarch64-verbose.json
|
463
441
|
%endif
|
464
442
|
|
465
443
|
%files tools
|
466
444
|
%license License.txt
|
467
|
-
%{_bindir}/BootSectImage
|
468
445
|
%{_bindir}/Brotli
|
469
446
|
%{_bindir}/DevicePath
|
470
|
-
%{_bindir}/EfiLdrImage
|
471
447
|
%{_bindir}/EfiRom
|
472
448
|
%{_bindir}/GenCrc32
|
473
449
|
%{_bindir}/GenFfs
|
474
450
|
%{_bindir}/GenFv
|
475
451
|
%{_bindir}/GenFw
|
476
|
-
%{_bindir}/GenPage
|
477
452
|
%{_bindir}/GenSec
|
478
|
-
%{_bindir}/GenVtf
|
479
|
-
%{_bindir}/GnuGenBootSector
|
480
453
|
%{_bindir}/LzmaCompress
|
481
454
|
%{_bindir}/LzmaF86Compress
|
482
455
|
%{_bindir}/Split
|
@@ -515,11 +488,31 @@ true
|
|
515
488
|
%endif
|
516
489
|
|
517
490
|
%changelog
|
518
|
-
*
|
519
|
-
- edk2-
|
520
|
-
- edk2-
|
521
|
-
-
|
522
|
-
|
491
|
+
* Mon Aug 05 2019 Miroslav Rezanina <mrezanin@redhat.com> - 20190308git89910a39dcfd-6.el8
|
492
|
+
- edk2-ArmVirtPkg-silence-DEBUG_VERBOSE-masking-0x00400000-.patch [bz#1714446]
|
493
|
+
- edk2-OvmfPkg-QemuRamfbDxe-Do-not-report-DXE-failure-on-Aa.patch [bz#1714446]
|
494
|
+
- edk2-ArmPkg-DebugPeCoffExtraActionLib-debugger-commands-a.patch [bz#1714446]
|
495
|
+
- Resolves: bz#1714446
|
496
|
+
(edk2-aarch64 silent build is not silent enough)
|
497
|
+
|
498
|
+
* Tue Jul 02 2019 Miroslav Rezanina <mrezanin@redhat.com> - 20190308git89910a39dcfd-5.el8
|
499
|
+
- edk2-redhat-add-D-TPM2_ENABLE-to-the-edk2-ovmf-build-flag.patch [bz#1693205]
|
500
|
+
- Resolves: bz#1693205
|
501
|
+
(edk2: Enable TPM2 support)
|
502
|
+
|
503
|
+
* Tue Jun 11 2019 Miroslav Rezanina <mrezanin@redhat.com> - 20190308git89910a39dcfd-4.el8
|
504
|
+
- edk2-OvmfPkg-raise-the-PCIEXBAR-base-to-2816-MB-on-Q35.patch [bz#1666941]
|
505
|
+
- edk2-OvmfPkg-PlatformPei-set-32-bit-UC-area-at-PciBase-Pc.patch [bz#1666941]
|
506
|
+
- Resolves: bz#1666941
|
507
|
+
(UEFI guest cannot boot into os when setting some special memory size)
|
508
|
+
|
509
|
+
* Tue Apr 09 2019 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20190308git89910a39dcfd-2.el8
|
510
|
+
- edk2-redhat-provide-firmware-descriptor-meta-files.patch [bz#1600230]
|
511
|
+
- Resolves: bz#1600230
|
512
|
+
([RHEL 8.1] RFE: provide firmware descriptor meta-files for the edk2-ovmf and edk2-aarch64 firmware images)
|
513
|
+
|
514
|
+
* Mon Apr 08 2019 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20190308git89910a39dcfd-1.el8
|
515
|
+
- Rebase to edk2-20190308git89910a39dcfd
|
523
516
|
|
524
517
|
* Mon Jan 21 2019 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20180508gitee3198e672e2-9.el8
|
525
518
|
- edk2-BaseTools-Fix-UEFI-and-Tiano-Decompression-logic-iss.patch [bz#1662184]
|
@@ -534,11 +527,6 @@ true
|
|
534
527
|
- Resolves: bz#1643377
|
535
528
|
(Exception when grubx64.efi used for UEFI netboot)
|
536
529
|
|
537
|
-
* Fri Nov 16 2018 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20180508gitee3198e672e2-7.el8
|
538
|
-
- Rebuilding edk2 outside the module branch
|
539
|
-
- Resolves: bz#1637650
|
540
|
-
(Move ipxe and edk2 out of the virt module.)
|
541
|
-
|
542
530
|
* Tue Nov 06 2018 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20180508gitee3198e672e2-5.el8
|
543
531
|
- edk2-MdeModulePkg-Variable-Fix-Timestamp-zeroing-issue-on.patch [bz#1641436]
|
544
532
|
- edk2-MdePkg-Add-more-checker-in-UefiDecompressLib-to-acce.patch [bz#1641449 bz#1641453 bz#1641464 bz#1641469]
|