render / rpms / edk2

Forked from rpms/edk2 6 months ago
Clone

fcd20d import edk2-20190308git89910a39dcfd-6.el8

Authored and Committed by centosrcm 5 years ago
53 files changed. 1168 lines added. 2934 lines removed.
.edk2.metadata
file modified
+2 -2
.gitignore
file modified
+2 -2
SOURCES/0003-advertise-OpenSSL-on-TianoCore-splash-screen-boot-lo.patch
file modified
+69 -75
SOURCES/0004-OvmfPkg-increase-max-debug-message-length-to-512-RHE.patch
file modified
+10 -3
SOURCES/0005-OvmfPkg-QemuVideoDxe-enable-debug-messages-in-VbeShi.patch
file modified
+12 -5
SOURCES/0006-MdeModulePkg-TerminalDxe-add-other-text-resolutions-.patch
file modified
+11 -4
SOURCES/0007-MdeModulePkg-TerminalDxe-set-xterm-resolution-on-mod.patch
file modified
+20 -13
SOURCES/0008-OvmfPkg-take-PcdResizeXterm-from-the-QEMU-command-li.patch
file modified
+19 -12
SOURCES/0009-ArmVirtPkg-QemuFwCfgLib-allow-UEFI_DRIVER-client-mod.patch
file modified
+10 -3
SOURCES/0010-ArmVirtPkg-take-PcdResizeXterm-from-the-QEMU-command.patch
file modified
+17 -10
SOURCES/0011-OvmfPkg-allow-exclusion-of-the-shell-from-the-firmwa.patch
file modified
+27 -23
SOURCES/0012-OvmfPkg-EnrollDefaultKeys-application-for-enrolling-.patch
file modified
+22 -15
SOURCES/0013-ArmPlatformPkg-introduce-fixed-PCD-for-early-hello-m.patch
file modified
+11 -4
SOURCES/0014-ArmPlatformPkg-PrePeiCore-write-early-hello-message-.patch
file modified
+14 -7
SOURCES/0015-ArmVirtPkg-set-early-hello-message-RH-only.patch
file modified
+14 -6
SOURCES/0016-OvmfPkg-enable-DEBUG_VERBOSE-RHEL-only.patch
file modified
+15 -8
SOURCES/0017-OvmfPkg-silence-DEBUG_VERBOSE-0x00400000-in-QemuVide.patchSOURCES/0017-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-QemuVide.patch
file renamed
+42 -13
SOURCES/0018-ArmVirtPkg-silence-DEBUG_VERBOSE-0x00400000-in-QemuR.patch
file added
+64
SOURCES/0019-OvmfPkg-PlatformBootManagerLib-connect-consoles-unco.patch
file removed
-222
SOURCES/0019-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-NvmExpre.patchSOURCES/0018-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-NvmExpre.patch
file renamed
+15 -8
SOURCES/0020-ArmVirtPkg-PlatformBootManagerLib-connect-Virtio-RNG.patch
file removed
-215
SOURCES/0021-OvmfPkg-PlatformBootManagerLib-connect-Virtio-RNG-de.patch
file removed
-188
SOURCES/0026-Downgrade-CryptoPkg-INF-files-to-OpenSSL-1.1.0i-RH-o.patch
file added
+59
SOURCES/0027-BaseTools-tools_def-add-fno-unwind-tables-to-GCC_AAR.patch
file removed
-73
SOURCES/edk2-ArmPkg-DebugPeCoffExtraActionLib-debugger-commands-a.patch
file added
+63
SOURCES/edk2-ArmVirtPkg-ArmVirtQemu-enable-the-IPv6-stack.patch
file removed
-197
SOURCES/edk2-ArmVirtPkg-silence-DEBUG_VERBOSE-masking-0x00400000-.patch
file added
+57
SOURCES/edk2-ArmVirtPkg-unify-HttpLib-resolutions-in-ArmVirt.dsc..patch
file removed
-76
SOURCES/edk2-BaseTools-Add-more-checker-in-Decompress-algorithm-t.patch
file removed
-273
SOURCES/edk2-BaseTools-Fix-UEFI-and-Tiano-Decompression-logic-iss.patch
file removed
-73
SOURCES/edk2-BaseTools-Source-C-split-O2-to-BUILD_OPTFLAGS.patch
file removed
-98
SOURCES/edk2-BaseTools-Source-C-take-EXTRA_LDFLAGS-from-the-calle.patch
file removed
-46
SOURCES/edk2-BaseTools-Source-C-take-EXTRA_OPTFLAGS-from-the-call.patch
file removed
-48
SOURCES/edk2-BaseTools-VfrCompile-honor-EXTRA_LDFLAGS.patch
file removed
-80
SOURCES/edk2-BaseTools-footer.makefile-expand-BUILD_CFLAGS-last-f.patch
file removed
-46
SOURCES/edk2-BaseTools-header.makefile-remove-c-from-BUILD_CFLAGS.patch
file removed
-51
SOURCES/edk2-IntelFrameworkModulePkg-Add-more-checker-in-UefiTian.patch
file removed
-130
SOURCES/edk2-IntelFrameworkModulePkg-Fix-UEFI-and-Tiano-Decompres.patch
file removed
-55
SOURCES/edk2-MdeModulePkg-PartitionDxe-Ensure-blocksize-holds-MBR.patch
file removed
-102
SOURCES/edk2-MdeModulePkg-RamDiskDxe-Restrict-on-RAM-disk-size-CV.patch
file removed
-137
SOURCES/edk2-MdeModulePkg-Variable-Fix-Timestamp-zeroing-issue-on.patch
file removed
-78
SOURCES/edk2-MdePkg-Add-more-checker-in-UefiDecompressLib-to-acce.patch
file removed
-133
SOURCES/edk2-MdePkg-BaseUefiDecompressLib-Fix-UEFI-Decompression-.patch
file removed
-56
SOURCES/edk2-NetworkPkg-UefiPxeBcDxe-Add-EXCLUSIVE-attribute-when.patch
file removed
-100
SOURCES/edk2-OvmfPkg-PlatformPei-set-32-bit-UC-area-at-PciBase-Pc.patch
file added
+198
SOURCES/edk2-OvmfPkg-QemuRamfbDxe-Do-not-report-DXE-failure-on-Aa.patch
file added
+75
SOURCES/edk2-OvmfPkg-raise-the-PCIEXBAR-base-to-2816-MB-on-Q35.patch
file added
+109
SOURCES/edk2-aarch64-verbose.json
file added
+31
SOURCES/edk2-aarch64.json
file added
+31
SOURCES/edk2-advertise-OpenSSL-due-to-IPv6-enablement-too-RHEL-on.patch
file removed
-154
SOURCES/edk2-ovmf-sb.json
file added
+36
SOURCES/edk2-ovmf.json
file added
+35
SPECS/edk2.spec
file modified
+78 -90
    import edk2-20190308git89910a39dcfd-6.el8
    
        
file modified
+2 -2
.edk2.metadata CHANGED
@@ -1,2 +1,2 @@
1
- b44cc7e0fda9dd4121d935975520b7cbd26ee4d0 SOURCES/edk2-ee3198e672e2.tar.xz
2
- 906190b6a6a794da4c1ccb7fc1c05bf97ddde77a SOURCES/openssl-fedora-264133c642cdb6fc916f1d9bba9db4cb4cd4a17c.tar.xz
1
+ 87a87bbfca0e751b2840f74b0612e2f0dad70535 SOURCES/edk2-89910a39dcfd.tar.xz
2
+ f0655dec5d8d815956bab417fcdb25e6da7e21b8 SOURCES/openssl-fedora-d2ede125556ac99aa0faa7744c703af3f559094e.tar.xz
file modified
+2 -2
.gitignore CHANGED
@@ -1,2 +1,2 @@
1
- SOURCES/edk2-ee3198e672e2.tar.xz
2
- SOURCES/openssl-fedora-264133c642cdb6fc916f1d9bba9db4cb4cd4a17c.tar.xz
1
+ SOURCES/edk2-89910a39dcfd.tar.xz
2
+ SOURCES/openssl-fedora-d2ede125556ac99aa0faa7744c703af3f559094e.tar.xz
SOURCES/0003-advertise-OpenSSL-on-TianoCore-splash-screen-boot-lo.patch CHANGED
@@ -1,8 +1,27 @@
1
- From 8e8ea8811e269cdb31103c70fcd91d2dcfb1755d Mon Sep 17 00:00:00 2001
1
+ From 727c11ecd9f34990312e14f239e6238693619849 Mon Sep 17 00:00:00 2001
2
2
From: Laszlo Ersek <lersek@redhat.com>
3
3
Date: Wed, 11 Jun 2014 23:33:33 +0200
4
4
Subject: advertise OpenSSL on TianoCore splash screen / boot logo (RHEL only)
5
5
6
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
7
+ RHEL-8.1/20190308-89910a39dcfd rebase:
8
+
9
+ - Upstream edk2 removed the obsoleted network drivers in MdeModulePkg. The
10
+ OvmfPkg platforms were adapted in commit d2f1f6423bd1 ("OvmfPkg: Replace
11
+ obsoleted network drivers from platform DSC/FDF.", 2018-11-06). The
12
+ ArmVirtPkg platforms were adapted in commit 9a67ba261fe9 ("ArmVirtPkg:
13
+ Replace obsoleted network drivers from platform DSC/FDF.", 2018-12-14).
14
+
15
+ Consequently, because the NetworkPkg iSCSI driver requires OpenSSL
16
+ unconditionally, as explained in
17
+ <https://bugzilla.tianocore.org/show_bug.cgi?id=1278#c3>, this patch now
18
+ builds LogoOpenSSLDxe unconditionally, squashing and updating previous
19
+ downstream commits
20
+
21
+ - 8e8ea8811e26 advertise OpenSSL on TianoCore splash screen / boot logo
22
+ (RHEL only)
23
+ - 02ed2c501cdd advertise OpenSSL due to IPv6 enablement too (RHEL only)
24
+
6
25
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
26
RHEL-8.0/20180508-ee3198e672e2 rebase:
8
27
@@ -103,71 +122,64 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
103
122
(cherry picked from commit 32192c62e289f261f5ce74acee48e5a94561f10b)
104
123
(cherry picked from commit 33a710cd613c2ca7d534b8401e2f9f2178af05be)
105
124
(cherry picked from commit 0b2d90347cb016cc71c2de62e941a2a4ab0f35a3)
125
+ (cherry picked from commit 8e8ea8811e269cdb31103c70fcd91d2dcfb1755d)
126
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
106
127
---
107
- ArmVirtPkg/ArmVirtQemu.dsc | 4 +++
108
- ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc | 4 +++
109
- ArmVirtPkg/ArmVirtQemuKernel.dsc | 4 +++
128
+ ArmVirtPkg/ArmVirtQemu.dsc | 2 +-
129
+ ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc | 2 +-
130
+ ArmVirtPkg/ArmVirtQemuKernel.dsc | 2 +-
110
131
MdeModulePkg/Logo/Logo-OpenSSL.bmp | Bin 0 -> 156342 bytes
111
- MdeModulePkg/Logo/Logo-OpenSSL.idf | 15 +++++++++
112
- MdeModulePkg/Logo/LogoOpenSSLDxe.inf | 61 +++++++++++++++++++++++++++++++++++
113
- MdeModulePkg/Logo/LogoOpenSSLDxe.uni | 22 +++++++++++++
114
- OvmfPkg/OvmfPkgIa32.dsc | 4 +++
115
- OvmfPkg/OvmfPkgIa32.fdf | 4 +++
116
- OvmfPkg/OvmfPkgIa32X64.dsc | 4 +++
117
- OvmfPkg/OvmfPkgIa32X64.fdf | 4 +++
118
- OvmfPkg/OvmfPkgX64.dsc | 4 +++
119
- OvmfPkg/OvmfPkgX64.fdf | 4 +++
120
- 13 files changed, 134 insertions(+)
132
+ MdeModulePkg/Logo/Logo-OpenSSL.idf | 15 +++++++
133
+ MdeModulePkg/Logo/LogoOpenSSLDxe.inf | 61 +++++++++++++++++++++++++++
134
+ MdeModulePkg/Logo/LogoOpenSSLDxe.uni | 22 ++++++++++
135
+ OvmfPkg/OvmfPkgIa32.dsc | 2 +-
136
+ OvmfPkg/OvmfPkgIa32.fdf | 2 +-
137
+ OvmfPkg/OvmfPkgIa32X64.dsc | 2 +-
138
+ OvmfPkg/OvmfPkgIa32X64.fdf | 2 +-
139
+ OvmfPkg/OvmfPkgX64.dsc | 2 +-
140
+ OvmfPkg/OvmfPkgX64.fdf | 2 +-
141
+ 13 files changed, 107 insertions(+), 9 deletions(-)
121
142
create mode 100644 MdeModulePkg/Logo/Logo-OpenSSL.bmp
122
143
create mode 100644 MdeModulePkg/Logo/Logo-OpenSSL.idf
123
144
create mode 100644 MdeModulePkg/Logo/LogoOpenSSLDxe.inf
124
145
create mode 100644 MdeModulePkg/Logo/LogoOpenSSLDxe.uni
125
146
126
147
diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
127
- index d74feb7..7331597 100644
148
+ index a77d71bcea..f2e5125494 100644
128
149
--- a/ArmVirtPkg/ArmVirtQemu.dsc
129
150
+++ b/ArmVirtPkg/ArmVirtQemu.dsc
130
- @@ -329,7 +329,11 @@
151
+ @@ -347,7 +347,7 @@
131
152
MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
132
153
MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
133
154
MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
134
- +!if $(SECURE_BOOT_ENABLE) == TRUE
155
+ - MdeModulePkg/Logo/LogoDxe.inf
135
156
+ MdeModulePkg/Logo/LogoOpenSSLDxe.inf
136
- +!else
137
- MdeModulePkg/Logo/LogoDxe.inf
138
- +!endif
139
157
MdeModulePkg/Application/UiApp/UiApp.inf {
140
158
<LibraryClasses>
141
159
NULL|MdeModulePkg/Library/DeviceManagerUiLib/DeviceManagerUiLib.inf
142
160
diff --git a/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc b/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
143
- index 89f95b2..8941b7f 100644
161
+ index 098d40b61b..ab799ca67f 100644
144
162
--- a/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
145
163
+++ b/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
146
- @@ -191,7 +191,11 @@ READ_LOCK_STATUS = TRUE
164
+ @@ -203,7 +203,7 @@ READ_LOCK_STATUS = TRUE
147
165
#
148
166
# TianoCore logo (splash screen)
149
167
#
150
- +!if $(SECURE_BOOT_ENABLE) == TRUE
168
+ - INF MdeModulePkg/Logo/LogoDxe.inf
151
169
+ INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
152
- +!else
153
- INF MdeModulePkg/Logo/LogoDxe.inf
154
- +!endif
155
170
156
171
#
157
172
# Ramdisk support
158
173
diff --git a/ArmVirtPkg/ArmVirtQemuKernel.dsc b/ArmVirtPkg/ArmVirtQemuKernel.dsc
159
- index 1e823ae..1981aae 100644
174
+ index 1e5388ae70..d2b3f24394 100644
160
175
--- a/ArmVirtPkg/ArmVirtQemuKernel.dsc
161
176
+++ b/ArmVirtPkg/ArmVirtQemuKernel.dsc
162
- @@ -318,7 +318,11 @@
177
+ @@ -331,7 +331,7 @@
163
178
MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
164
179
MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
165
180
MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
166
- +!if $(SECURE_BOOT_ENABLE) == TRUE
181
+ - MdeModulePkg/Logo/LogoDxe.inf
167
182
+ MdeModulePkg/Logo/LogoOpenSSLDxe.inf
168
- +!else
169
- MdeModulePkg/Logo/LogoDxe.inf
170
- +!endif
171
183
MdeModulePkg/Application/UiApp/UiApp.inf {
172
184
<LibraryClasses>
173
185
NULL|MdeModulePkg/Library/DeviceManagerUiLib/DeviceManagerUiLib.inf
@@ -393,7 +405,7 @@ HcmV?d00001
393
405
394
406
diff --git a/MdeModulePkg/Logo/Logo-OpenSSL.idf b/MdeModulePkg/Logo/Logo-OpenSSL.idf
395
407
new file mode 100644
396
- index 0000000..a80de29
408
+ index 0000000000..a80de29a63
397
409
--- /dev/null
398
410
+++ b/MdeModulePkg/Logo/Logo-OpenSSL.idf
399
411
@@ -0,0 +1,15 @@
@@ -414,7 +426,7 @@ index 0000000..a80de29
414
426
+#image IMG_LOGO Logo-OpenSSL.bmp
415
427
diff --git a/MdeModulePkg/Logo/LogoOpenSSLDxe.inf b/MdeModulePkg/Logo/LogoOpenSSLDxe.inf
416
428
new file mode 100644
417
- index 0000000..2f79d87
429
+ index 0000000000..2f79d873e2
418
430
--- /dev/null
419
431
+++ b/MdeModulePkg/Logo/LogoOpenSSLDxe.inf
420
432
@@ -0,0 +1,61 @@
@@ -481,7 +493,7 @@ index 0000000..2f79d87
481
493
+ LogoDxeExtra.uni
482
494
diff --git a/MdeModulePkg/Logo/LogoOpenSSLDxe.uni b/MdeModulePkg/Logo/LogoOpenSSLDxe.uni
483
495
new file mode 100644
484
- index 0000000..7227ac3
496
+ index 0000000000..7227ac3910
485
497
--- /dev/null
486
498
+++ b/MdeModulePkg/Logo/LogoOpenSSLDxe.uni
487
499
@@ -0,0 +1,22 @@
@@ -508,101 +520,83 @@ index 0000000..7227ac3
508
520
+#string STR_MODULE_DESCRIPTION #language en-US "This module provides the logo bitmap picture (with OpenSSL advertisment) shown on setup screen, through EDKII Platform Logo protocol."
509
521
+
510
522
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
511
- index 2d6c4c4..a5bb2b0 100644
523
+ index 5b885590b2..249b1d8dc0 100644
512
524
--- a/OvmfPkg/OvmfPkgIa32.dsc
513
525
+++ b/OvmfPkg/OvmfPkgIa32.dsc
514
- @@ -687,7 +687,11 @@
526
+ @@ -693,7 +693,7 @@
515
527
NULL|IntelFrameworkModulePkg/Library/LegacyBootManagerLib/LegacyBootManagerLib.inf
516
528
!endif
517
529
}
518
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
530
+ - MdeModulePkg/Logo/LogoDxe.inf
519
531
+ MdeModulePkg/Logo/LogoOpenSSLDxe.inf
520
- +!else
521
- MdeModulePkg/Logo/LogoDxe.inf
522
- +!endif
523
532
MdeModulePkg/Application/UiApp/UiApp.inf {
524
533
<LibraryClasses>
525
534
NULL|MdeModulePkg/Library/DeviceManagerUiLib/DeviceManagerUiLib.inf
526
535
diff --git a/OvmfPkg/OvmfPkgIa32.fdf b/OvmfPkg/OvmfPkgIa32.fdf
527
- index 0427ded..f552bc9 100644
536
+ index 4999403ad7..be3d3b4d14 100644
528
537
--- a/OvmfPkg/OvmfPkgIa32.fdf
529
538
+++ b/OvmfPkg/OvmfPkgIa32.fdf
530
- @@ -295,7 +295,11 @@ INF ShellPkg/Application/Shell/Shell.inf
539
+ @@ -293,7 +293,7 @@ INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
531
- INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
532
540
!endif
541
+ INF ShellPkg/Application/Shell/Shell.inf
533
542
534
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
543
+ -INF MdeModulePkg/Logo/LogoDxe.inf
535
544
+INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
536
- +!else
537
- INF MdeModulePkg/Logo/LogoDxe.inf
538
- +!endif
539
545
540
546
#
541
547
# Network modules
542
548
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
543
- index 43158c5..be8fee9 100644
549
+ index bbf0853ee6..5ec186df4b 100644
544
550
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
545
551
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
546
- @@ -696,7 +696,11 @@
552
+ @@ -702,7 +702,7 @@
547
553
NULL|IntelFrameworkModulePkg/Library/LegacyBootManagerLib/LegacyBootManagerLib.inf
548
554
!endif
549
555
}
550
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
556
+ - MdeModulePkg/Logo/LogoDxe.inf
551
557
+ MdeModulePkg/Logo/LogoOpenSSLDxe.inf
552
- +!else
553
- MdeModulePkg/Logo/LogoDxe.inf
554
- +!endif
555
558
MdeModulePkg/Application/UiApp/UiApp.inf {
556
559
<LibraryClasses>
557
560
NULL|MdeModulePkg/Library/DeviceManagerUiLib/DeviceManagerUiLib.inf
558
561
diff --git a/OvmfPkg/OvmfPkgIa32X64.fdf b/OvmfPkg/OvmfPkgIa32X64.fdf
559
- index 6df47f4..ee77ae1 100644
562
+ index d0cc107928..b56160b3bf 100644
560
563
--- a/OvmfPkg/OvmfPkgIa32X64.fdf
561
564
+++ b/OvmfPkg/OvmfPkgIa32X64.fdf
562
- @@ -296,7 +296,11 @@ INF ShellPkg/Application/Shell/Shell.inf
565
+ @@ -294,7 +294,7 @@ INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
563
- INF RuleOverride = BINARY USE = X64 EdkShellBinPkg/FullShell/FullShell.inf
564
566
!endif
567
+ INF ShellPkg/Application/Shell/Shell.inf
565
568
566
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
569
+ -INF MdeModulePkg/Logo/LogoDxe.inf
567
570
+INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
568
- +!else
569
- INF MdeModulePkg/Logo/LogoDxe.inf
570
- +!endif
571
571
572
572
#
573
573
# Network modules
574
574
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
575
- index d1fdf7c..e224b0e 100644
575
+ index d81460f520..29538ade4d 100644
576
576
--- a/OvmfPkg/OvmfPkgX64.dsc
577
577
+++ b/OvmfPkg/OvmfPkgX64.dsc
578
- @@ -694,7 +694,11 @@
578
+ @@ -700,7 +700,7 @@
579
579
NULL|IntelFrameworkModulePkg/Library/LegacyBootManagerLib/LegacyBootManagerLib.inf
580
580
!endif
581
581
}
582
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
582
+ - MdeModulePkg/Logo/LogoDxe.inf
583
583
+ MdeModulePkg/Logo/LogoOpenSSLDxe.inf
584
- +!else
585
- MdeModulePkg/Logo/LogoDxe.inf
586
- +!endif
587
584
MdeModulePkg/Application/UiApp/UiApp.inf {
588
585
<LibraryClasses>
589
586
NULL|MdeModulePkg/Library/DeviceManagerUiLib/DeviceManagerUiLib.inf
590
587
diff --git a/OvmfPkg/OvmfPkgX64.fdf b/OvmfPkg/OvmfPkgX64.fdf
591
- index 2e2a174..505d25d 100644
588
+ index d0cc107928..b56160b3bf 100644
592
589
--- a/OvmfPkg/OvmfPkgX64.fdf
593
590
+++ b/OvmfPkg/OvmfPkgX64.fdf
594
- @@ -296,7 +296,11 @@ INF ShellPkg/Application/Shell/Shell.inf
591
+ @@ -294,7 +294,7 @@ INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
595
- INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
596
592
!endif
593
+ INF ShellPkg/Application/Shell/Shell.inf
597
594
598
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
595
+ -INF MdeModulePkg/Logo/LogoDxe.inf
599
596
+INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
600
- +!else
601
- INF MdeModulePkg/Logo/LogoDxe.inf
602
- +!endif
603
597
604
598
#
605
599
# Network modules
606
600
--
607
- 1.8.3.1
601
+ 2.18.1
608
602
SOURCES/0004-OvmfPkg-increase-max-debug-message-length-to-512-RHE.patch CHANGED
@@ -1,8 +1,13 @@
1
- From 22c9b4e971c70c69b4adf8eb93133824ccb6426a Mon Sep 17 00:00:00 2001
1
+ From a1260c9122c95bcbef1efc5eebe11902767813c2 Mon Sep 17 00:00:00 2001
2
2
From: Laszlo Ersek <lersek@redhat.com>
3
3
Date: Thu, 20 Feb 2014 22:54:45 +0100
4
4
Subject: OvmfPkg: increase max debug message length to 512 (RHEL only)
5
5
6
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
7
+ RHEL-8.1/20190308-89910a39dcfd rebase:
8
+
9
+ - no changes
10
+
6
11
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
12
RHEL-8.0/20180508-ee3198e672e2 rebase:
8
13
@@ -34,12 +39,14 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
34
39
(cherry picked from commit 29435a32ec9428720c74c454ce9817662e601fb6)
35
40
(cherry picked from commit 58e1d1ebb78bfdaf05f4c6e8abf8d4908dfa038a)
36
41
(cherry picked from commit 1df2c822c996ad767f2f45570ab2686458f7604a)
42
+ (cherry picked from commit 22c9b4e971c70c69b4adf8eb93133824ccb6426a)
43
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
37
44
---
38
45
OvmfPkg/Library/PlatformDebugLibIoPort/DebugLib.c | 2 +-
39
46
1 file changed, 1 insertion(+), 1 deletion(-)
40
47
41
48
diff --git a/OvmfPkg/Library/PlatformDebugLibIoPort/DebugLib.c b/OvmfPkg/Library/PlatformDebugLibIoPort/DebugLib.c
42
- index 36cde54..c0c4eae 100644
49
+ index 36cde54976..c0c4eaee0f 100644
43
50
--- a/OvmfPkg/Library/PlatformDebugLibIoPort/DebugLib.c
44
51
+++ b/OvmfPkg/Library/PlatformDebugLibIoPort/DebugLib.c
45
52
@@ -27,7 +27,7 @@
@@ -52,5 +59,5 @@ index 36cde54..c0c4eae 100644
52
59
/**
53
60
Prints a debug message to the debug output device if the specified error level is enabled.
54
61
--
55
- 1.8.3.1
62
+ 2.18.1
56
63
SOURCES/0005-OvmfPkg-QemuVideoDxe-enable-debug-messages-in-VbeShi.patch CHANGED
@@ -1,8 +1,13 @@
1
- From 4dd1cc745bc9a8c8b32b5810b40743fed1e36d7e Mon Sep 17 00:00:00 2001
1
+ From bd264265a99c60f45cadaa4109a9db59ae218471 Mon Sep 17 00:00:00 2001
2
2
From: Laszlo Ersek <lersek@redhat.com>
3
3
Date: Thu, 12 Jun 2014 00:17:59 +0200
4
4
Subject: OvmfPkg: QemuVideoDxe: enable debug messages in VbeShim (RHEL only)
5
5
6
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
7
+ RHEL-8.1/20190308-89910a39dcfd rebase:
8
+
9
+ - no changes
10
+
6
11
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
12
RHEL-8.0/20180508-ee3198e672e2 rebase:
8
13
@@ -42,13 +47,15 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
42
47
(cherry picked from commit ed45b26dbeadd63dd8f2edf627290957d8bbb3b2)
43
48
(cherry picked from commit 9a8a034ebc082f86fdbb54dc1303a5059508e14c)
44
49
(cherry picked from commit 7046d6040181bb0f76a5ebd680e0dc701c895dba)
50
+ (cherry picked from commit 4dd1cc745bc9a8c8b32b5810b40743fed1e36d7e)
51
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
45
52
---
46
53
OvmfPkg/QemuVideoDxe/VbeShim.asm | 2 +-
47
- OvmfPkg/QemuVideoDxe/VbeShim.h | 481 +++++++++++++++++++++++++--------------
54
+ OvmfPkg/QemuVideoDxe/VbeShim.h | 481 ++++++++++++++++++++-----------
48
55
2 files changed, 308 insertions(+), 175 deletions(-)
49
56
50
57
diff --git a/OvmfPkg/QemuVideoDxe/VbeShim.asm b/OvmfPkg/QemuVideoDxe/VbeShim.asm
51
- index 18fa920..f87ed5c 100644
58
+ index 18fa9209d4..f87ed5cf30 100644
52
59
--- a/OvmfPkg/QemuVideoDxe/VbeShim.asm
53
60
+++ b/OvmfPkg/QemuVideoDxe/VbeShim.asm
54
61
@@ -18,7 +18,7 @@
@@ -61,7 +68,7 @@ index 18fa920..f87ed5c 100644
61
68
%macro DebugLog 1
62
69
%ifdef DEBUG
63
70
diff --git a/OvmfPkg/QemuVideoDxe/VbeShim.h b/OvmfPkg/QemuVideoDxe/VbeShim.h
64
- index cc9b6e1..325d647 100644
71
+ index cc9b6e14cd..325d6478a1 100644
65
72
--- a/OvmfPkg/QemuVideoDxe/VbeShim.h
66
73
+++ b/OvmfPkg/QemuVideoDxe/VbeShim.h
67
74
@@ -517,185 +517,318 @@ STATIC CONST UINT8 mVbeShim[] = {
@@ -558,5 +565,5 @@ index cc9b6e1..325d647 100644
558
565
};
559
566
#endif
560
567
--
561
- 1.8.3.1
568
+ 2.18.1
562
569
SOURCES/0006-MdeModulePkg-TerminalDxe-add-other-text-resolutions-.patch CHANGED
@@ -1,8 +1,13 @@
1
- From 28faeb5f94b4866b9da16cf2a1e4e0fc09a26e37 Mon Sep 17 00:00:00 2001
1
+ From 4e4e15b80a5b2103eadd495ef4a830d46dd4ed51 Mon Sep 17 00:00:00 2001
2
2
From: Laszlo Ersek <lersek@redhat.com>
3
3
Date: Tue, 25 Feb 2014 18:40:35 +0100
4
4
Subject: MdeModulePkg: TerminalDxe: add other text resolutions (RHEL only)
5
5
6
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
7
+ RHEL-8.1/20190308-89910a39dcfd rebase:
8
+
9
+ - no change
10
+
6
11
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
12
RHEL-8.0/20180508-ee3198e672e2 rebase:
8
13
@@ -83,12 +88,14 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
83
88
(cherry picked from commit 99dc3720ac86059f60156197328cc433603c536e)
84
89
(cherry picked from commit d2066c1748f885043026c51dec1bc8d6d406ae8f)
85
90
(cherry picked from commit 1facdd58e946c584a3dc1e5be8f2f837b5a7c621)
91
+ (cherry picked from commit 28faeb5f94b4866b9da16cf2a1e4e0fc09a26e37)
92
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
86
93
---
87
- .../Universal/Console/TerminalDxe/Terminal.c | 41 ++++++++++++++++++++--
94
+ .../Universal/Console/TerminalDxe/Terminal.c | 41 +++++++++++++++++--
88
95
1 file changed, 38 insertions(+), 3 deletions(-)
89
96
90
97
diff --git a/MdeModulePkg/Universal/Console/TerminalDxe/Terminal.c b/MdeModulePkg/Universal/Console/TerminalDxe/Terminal.c
91
- index 66dd3ad..78a1983 100644
98
+ index 66dd3ad550..78a198379a 100644
92
99
--- a/MdeModulePkg/Universal/Console/TerminalDxe/Terminal.c
93
100
+++ b/MdeModulePkg/Universal/Console/TerminalDxe/Terminal.c
94
101
@@ -113,9 +113,44 @@ TERMINAL_DEV mTerminalDevTemplate = {
@@ -140,5 +147,5 @@ index 66dd3ad..78a1983 100644
140
147
// New modes can be added here.
141
148
//
142
149
--
143
- 1.8.3.1
150
+ 2.18.1
144
151
SOURCES/0007-MdeModulePkg-TerminalDxe-set-xterm-resolution-on-mod.patch CHANGED
@@ -1,9 +1,14 @@
1
- From 67415982afdc77922aa37496c981adeb4351acdb Mon Sep 17 00:00:00 2001
1
+ From cfccb98d13e955beb0b93b4a75a973f30c273ffc Mon Sep 17 00:00:00 2001
2
2
From: Laszlo Ersek <lersek@redhat.com>
3
3
Date: Tue, 25 Feb 2014 22:40:01 +0100
4
4
Subject: MdeModulePkg: TerminalDxe: set xterm resolution on mode change (RH
5
5
only)
6
6
7
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
8
+ RHEL-8.1/20190308-89910a39dcfd rebase:
9
+
10
+ - no change
11
+
7
12
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
8
13
RHEL-8.0/20180508-ee3198e672e2 rebase:
9
14
@@ -42,17 +47,19 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
42
47
(cherry picked from commit 2909e025db6878723b49644a8a0cf160d07e6444)
43
48
(cherry picked from commit b9c5c901f25e48d68eef6e78a4abca00e153f574)
44
49
(cherry picked from commit b7f6115b745de8cbc5214b6ede33c9a8558beb90)
50
+ (cherry picked from commit 67415982afdc77922aa37496c981adeb4351acdb)
51
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
45
52
---
46
- MdeModulePkg/MdeModulePkg.dec | 4 +++
47
- .../Universal/Console/TerminalDxe/TerminalConOut.c | 30 ++++++++++++++++++++++
48
- .../Universal/Console/TerminalDxe/TerminalDxe.inf | 2 ++
53
+ MdeModulePkg/MdeModulePkg.dec | 4 +++
54
+ .../Console/TerminalDxe/TerminalConOut.c | 30 +++++++++++++++++++
55
+ .../Console/TerminalDxe/TerminalDxe.inf | 2 ++
49
56
3 files changed, 36 insertions(+)
50
57
51
58
diff --git a/MdeModulePkg/MdeModulePkg.dec b/MdeModulePkg/MdeModulePkg.dec
52
- index cc39718..384d901 100644
59
+ index a2130bc439..dcd118ba62 100644
53
60
--- a/MdeModulePkg/MdeModulePkg.dec
54
61
+++ b/MdeModulePkg/MdeModulePkg.dec
55
- @@ -1914,6 +1914,10 @@
62
+ @@ -1968,6 +1968,10 @@
56
63
# @Prompt The address mask when memory encryption is enabled.
57
64
gEfiMdeModulePkgTokenSpaceGuid.PcdPteMemoryEncryptionAddressOrMask|0x0|UINT64|0x30001047
58
65
@@ -64,7 +71,7 @@ index cc39718..384d901 100644
64
71
## Specify memory size with page number for PEI code when
65
72
# Loading Module at Fixed Address feature is enabled.
66
73
diff --git a/MdeModulePkg/Universal/Console/TerminalDxe/TerminalConOut.c b/MdeModulePkg/Universal/Console/TerminalDxe/TerminalConOut.c
67
- index 5a83431..fbc1e0a 100644
74
+ index 4d7218e415..295e7641a5 100644
68
75
--- a/MdeModulePkg/Universal/Console/TerminalDxe/TerminalConOut.c
69
76
+++ b/MdeModulePkg/Universal/Console/TerminalDxe/TerminalConOut.c
70
77
@@ -13,6 +13,8 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
@@ -76,10 +83,11 @@ index 5a83431..fbc1e0a 100644
76
83
#include "Terminal.h"
77
84
78
85
//
79
- @@ -87,6 +89,16 @@ CHAR16 mCursorForwardString[] = { ESC, '[', '0', '0', 'C', 0 };
86
+ @@ -86,6 +88,16 @@ CHAR16 mSetCursorPositionString[] = { ESC, '[', '0', '0', ';', '0', '0', 'H', 0
87
+ CHAR16 mCursorForwardString[] = { ESC, '[', '0', '0', 'C', 0 };
80
88
CHAR16 mCursorBackwardString[] = { ESC, '[', '0', '0', 'D', 0 };
81
89
82
- //
90
+ +//
83
91
+// Note that this is an ASCII format string, taking two INT32 arguments:
84
92
+// rows, columns.
85
93
+//
@@ -89,10 +97,9 @@ index 5a83431..fbc1e0a 100644
89
97
+#define RESIZE_SEQ_SIZE (sizeof mResizeTextAreaFormatString + 2 * (11 - 2))
90
98
+
91
99
+
92
- +//
100
+ //
93
101
// Body of the ConOut functions
94
102
//
95
-
96
103
@@ -508,6 +520,24 @@ TerminalConOutSetMode (
97
104
return EFI_DEVICE_ERROR;
98
105
}
@@ -119,7 +126,7 @@ index 5a83431..fbc1e0a 100644
119
126
120
127
Status = This->ClearScreen (This);
121
128
diff --git a/MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf b/MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
122
- index 0780296..bd2ba82 100644
129
+ index 15b4ac1c33..a704bc17e5 100644
123
130
--- a/MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
124
131
+++ b/MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
125
132
@@ -60,6 +60,7 @@
@@ -139,5 +146,5 @@ index 0780296..bd2ba82 100644
139
146
# [Event]
140
147
# # Relative timer event set by UnicodeToEfiKey(), used to be one 2 seconds input timeout.
141
148
--
142
- 1.8.3.1
149
+ 2.18.1
143
150
SOURCES/0008-OvmfPkg-take-PcdResizeXterm-from-the-QEMU-command-li.patch CHANGED
@@ -1,8 +1,13 @@
1
- From 2ebf3cc2ae99275d63bb6efd3c22dec76251a853 Mon Sep 17 00:00:00 2001
1
+ From f9b73437b9b231773c1a20e0c516168817a930a2 Mon Sep 17 00:00:00 2001
2
2
From: Laszlo Ersek <lersek@redhat.com>
3
3
Date: Wed, 14 Oct 2015 15:59:06 +0200
4
4
Subject: OvmfPkg: take PcdResizeXterm from the QEMU command line (RH only)
5
5
6
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
7
+ RHEL-8.1/20190308-89910a39dcfd rebase:
8
+
9
+ - no change
10
+
6
11
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
12
RHEL-8.0/20180508-ee3198e672e2 rebase:
8
13
@@ -31,6 +36,8 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
31
36
(cherry picked from commit 8abc2a6ddad25af7e88dc0cf57d55dfb75fbf92d)
32
37
(cherry picked from commit b311932d3841c017a0f0fec553edcac365cc2038)
33
38
(cherry picked from commit 61914fb81cf624c9028d015533b400b2794e52d3)
39
+ (cherry picked from commit 2ebf3cc2ae99275d63bb6efd3c22dec76251a853)
40
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
34
41
---
35
42
OvmfPkg/OvmfPkgIa32.dsc | 1 +
36
43
OvmfPkg/OvmfPkgIa32X64.dsc | 1 +
@@ -40,10 +47,10 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
40
47
5 files changed, 5 insertions(+)
41
48
42
49
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
43
- index a5bb2b0..b577767 100644
50
+ index 249b1d8dc0..3f1da66aab 100644
44
51
--- a/OvmfPkg/OvmfPkgIa32.dsc
45
52
+++ b/OvmfPkg/OvmfPkgIa32.dsc
46
- @@ -530,6 +530,7 @@
53
+ @@ -531,6 +531,7 @@
47
54
# ($(SMM_REQUIRE) == FALSE)
48
55
gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvStoreReserved|0
49
56
@@ -52,10 +59,10 @@ index a5bb2b0..b577767 100644
52
59
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase|0
53
60
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase|0
54
61
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
55
- index be8fee9..a6a40be 100644
62
+ index 5ec186df4b..9bb0a4cede 100644
56
63
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
57
64
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
58
- @@ -536,6 +536,7 @@
65
+ @@ -537,6 +537,7 @@
59
66
# ($(SMM_REQUIRE) == FALSE)
60
67
gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvStoreReserved|0
61
68
@@ -64,10 +71,10 @@ index be8fee9..a6a40be 100644
64
71
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase|0
65
72
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase|0
66
73
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
67
- index e224b0e..8bd3754 100644
74
+ index 29538ade4d..3b7fc5328c 100644
68
75
--- a/OvmfPkg/OvmfPkgX64.dsc
69
76
+++ b/OvmfPkg/OvmfPkgX64.dsc
70
- @@ -535,6 +535,7 @@
77
+ @@ -536,6 +536,7 @@
71
78
# ($(SMM_REQUIRE) == FALSE)
72
79
gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvStoreReserved|0
73
80
@@ -76,7 +83,7 @@ index e224b0e..8bd3754 100644
76
83
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase|0
77
84
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase|0
78
85
diff --git a/OvmfPkg/PlatformPei/Platform.c b/OvmfPkg/PlatformPei/Platform.c
79
- index 5a78668..544ac54 100644
86
+ index 22139a64cb..64b8034117 100644
80
87
--- a/OvmfPkg/PlatformPei/Platform.c
81
88
+++ b/OvmfPkg/PlatformPei/Platform.c
82
89
@@ -670,6 +670,7 @@ InitializePlatform (
@@ -86,12 +93,12 @@ index 5a78668..544ac54 100644
86
93
+ UPDATE_BOOLEAN_PCD_FROM_FW_CFG (PcdResizeXterm);
87
94
}
88
95
89
- AmdSevInitialize ();
96
+ InstallClearCacheCallback ();
90
97
diff --git a/OvmfPkg/PlatformPei/PlatformPei.inf b/OvmfPkg/PlatformPei/PlatformPei.inf
91
- index 30ceb4b..016c067 100644
98
+ index 5c8dd0fe6d..035ce249fe 100644
92
99
--- a/OvmfPkg/PlatformPei/PlatformPei.inf
93
100
+++ b/OvmfPkg/PlatformPei/PlatformPei.inf
94
- @@ -94,6 +94,7 @@
101
+ @@ -96,6 +96,7 @@
95
102
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize
96
103
gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvStoreReserved
97
104
gEfiMdeModulePkgTokenSpaceGuid.PcdPciDisableBusEnumeration
@@ -100,5 +107,5 @@ index 30ceb4b..016c067 100644
100
107
gEfiMdeModulePkgTokenSpaceGuid.PcdUse1GPageTable
101
108
gEfiMdeModulePkgTokenSpaceGuid.PcdSetNxForStack
102
109
--
103
- 1.8.3.1
110
+ 2.18.1
104
111
SOURCES/0009-ArmVirtPkg-QemuFwCfgLib-allow-UEFI_DRIVER-client-mod.patch CHANGED
@@ -1,8 +1,13 @@
1
- From 762595334aa7ce88412cc77e136db9b41577a699 Mon Sep 17 00:00:00 2001
1
+ From f372886be5f1c41677f168be77c484bae5841361 Mon Sep 17 00:00:00 2001
2
2
From: Laszlo Ersek <lersek@redhat.com>
3
3
Date: Tue, 12 Apr 2016 20:50:25 +0200
4
4
Subject: ArmVirtPkg: QemuFwCfgLib: allow UEFI_DRIVER client modules (RH only)
5
5
6
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
7
+ RHEL-8.1/20190308-89910a39dcfd rebase:
8
+
9
+ - no change
10
+
6
11
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
12
RHEL-8.0/20180508-ee3198e672e2 rebase:
8
13
@@ -28,12 +33,14 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
28
33
(cherry picked from commit 5af259a93f4bbee5515ae18638068125e170f2cd)
29
34
(cherry picked from commit 22b073005af491eef177ef5f80ffe71c1ebabb03)
30
35
(cherry picked from commit f77f1e7dd6013f918c70e089c95b8f4166085fb9)
36
+ (cherry picked from commit 762595334aa7ce88412cc77e136db9b41577a699)
37
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
31
38
---
32
39
ArmVirtPkg/Library/QemuFwCfgLib/QemuFwCfgLib.inf | 2 +-
33
40
1 file changed, 1 insertion(+), 1 deletion(-)
34
41
35
42
diff --git a/ArmVirtPkg/Library/QemuFwCfgLib/QemuFwCfgLib.inf b/ArmVirtPkg/Library/QemuFwCfgLib/QemuFwCfgLib.inf
36
- index eff4a21..adf1ff6 100644
43
+ index eff4a21650..adf1ff6c6a 100644
37
44
--- a/ArmVirtPkg/Library/QemuFwCfgLib/QemuFwCfgLib.inf
38
45
+++ b/ArmVirtPkg/Library/QemuFwCfgLib/QemuFwCfgLib.inf
39
46
@@ -22,7 +22,7 @@
@@ -46,5 +53,5 @@ index eff4a21..adf1ff6 100644
46
53
CONSTRUCTOR = QemuFwCfgInitialize
47
54
48
55
--
49
- 1.8.3.1
56
+ 2.18.1
50
57
SOURCES/0010-ArmVirtPkg-take-PcdResizeXterm-from-the-QEMU-command.patch CHANGED
@@ -1,8 +1,13 @@
1
- From 9448b6b46267d8d807fac0c648e693171bb34806 Mon Sep 17 00:00:00 2001
1
+ From 232fcf06f6b3048b7c2ebd6931f23186b3852f04 Mon Sep 17 00:00:00 2001
2
2
From: Laszlo Ersek <lersek@redhat.com>
3
3
Date: Sun, 26 Jul 2015 08:02:50 +0000
4
4
Subject: ArmVirtPkg: take PcdResizeXterm from the QEMU command line (RH only)
5
5
6
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
7
+ RHEL-8.1/20190308-89910a39dcfd rebase:
8
+
9
+ - no change
10
+
6
11
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
12
RHEL-8.0/20180508-ee3198e672e2 rebase:
8
13
@@ -33,19 +38,21 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
33
38
(cherry picked from commit d4564d39dfdbf74e762af43314005a2c026cb262)
34
39
(cherry picked from commit c9081ebe3bcd28e5cce4bf58bd8d4fca12f9af7c)
35
40
(cherry picked from commit 8e92730c8e1cdb642b3b3e680e643ff774a90c65)
41
+ (cherry picked from commit 9448b6b46267d8d807fac0c648e693171bb34806)
42
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
36
43
---
37
- ArmVirtPkg/ArmVirtQemu.dsc | 7 +-
38
- .../TerminalPcdProducerLib.c | 87 ++++++++++++++++++++++
39
- .../TerminalPcdProducerLib.inf | 41 ++++++++++
44
+ ArmVirtPkg/ArmVirtQemu.dsc | 7 +-
45
+ .../TerminalPcdProducerLib.c | 87 +++++++++++++++++++
46
+ .../TerminalPcdProducerLib.inf | 41 +++++++++
40
47
3 files changed, 134 insertions(+), 1 deletion(-)
41
48
create mode 100644 ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.c
42
49
create mode 100644 ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.inf
43
50
44
51
diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
45
- index 7331597..4bf94ce 100644
52
+ index f2e5125494..9fc78d4e0a 100644
46
53
--- a/ArmVirtPkg/ArmVirtQemu.dsc
47
54
+++ b/ArmVirtPkg/ArmVirtQemu.dsc
48
- @@ -208,6 +208,8 @@
55
+ @@ -221,6 +221,8 @@
49
56
gEfiMdeModulePkgTokenSpaceGuid.PcdSmbiosDocRev|0x0
50
57
gUefiOvmfPkgTokenSpaceGuid.PcdQemuSmbiosValidated|FALSE
51
58
@@ -54,7 +61,7 @@ index 7331597..4bf94ce 100644
54
61
[PcdsDynamicHii]
55
62
gArmVirtTokenSpaceGuid.PcdForceNoAcpi|L"ForceNoAcpi"|gArmVirtVariableGuid|0x0|FALSE|NV,BS
56
63
57
- @@ -284,7 +286,10 @@
64
+ @@ -297,7 +299,10 @@
58
65
MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
59
66
MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
60
67
MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
@@ -68,7 +75,7 @@ index 7331597..4bf94ce 100644
68
75
MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
69
76
diff --git a/ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.c b/ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.c
70
77
new file mode 100644
71
- index 0000000..814ad48
78
+ index 0000000000..814ad48199
72
79
--- /dev/null
73
80
+++ b/ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.c
74
81
@@ -0,0 +1,87 @@
@@ -161,7 +168,7 @@ index 0000000..814ad48
161
168
+}
162
169
diff --git a/ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.inf b/ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.inf
163
170
new file mode 100644
164
- index 0000000..fecb37b
171
+ index 0000000000..fecb37bcdf
165
172
--- /dev/null
166
173
+++ b/ArmVirtPkg/Library/TerminalPcdProducerLib/TerminalPcdProducerLib.inf
167
174
@@ -0,0 +1,41 @@
@@ -207,5 +214,5 @@ index 0000000..fecb37b
207
214
+[Pcd]
208
215
+ gEfiMdeModulePkgTokenSpaceGuid.PcdResizeXterm
209
216
--
210
- 1.8.3.1
217
+ 2.18.1
211
218
SOURCES/0011-OvmfPkg-allow-exclusion-of-the-shell-from-the-firmwa.patch CHANGED
@@ -1,9 +1,17 @@
1
- From bbd64eb8658e9a33eab4227d9f4e51ad78d9f687 Mon Sep 17 00:00:00 2001
1
+ From 8628ef1b8d675ebec39d83834abbe3c8c8c42cf4 Mon Sep 17 00:00:00 2001
2
2
From: Laszlo Ersek <lersek@redhat.com>
3
3
Date: Tue, 4 Nov 2014 23:02:53 +0100
4
4
Subject: OvmfPkg: allow exclusion of the shell from the firmware image (RH
5
5
only)
6
6
7
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
8
+ RHEL-8.1/20190308-89910a39dcfd rebase:
9
+
10
+ - update the patch against the following upstream commits:
11
+ - 4b888334d234 ("OvmfPkg: Remove EdkShellBinPkg in FDF", 2018-11-19)
12
+ - 277a3958d93a ("OvmfPkg: Don't include TftpDynamicCommand in XCODE5
13
+ tool chain", 2018-11-27)
14
+
7
15
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
8
16
RHEL-8.0/20180508-ee3198e672e2 rebase:
9
17
@@ -70,6 +78,8 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
70
78
(cherry picked from commit d9dd9ee42937b2611fe37183cc9ec7f62d946933)
71
79
(cherry picked from commit 23df46ebbe7b09451d3a05034acd4d3a25e7177b)
72
80
(cherry picked from commit f0303f71d576c51b01c4ff961b429d0e0e707245)
81
+ (cherry picked from commit bbd64eb8658e9a33eab4227d9f4e51ad78d9f687)
82
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
73
83
---
74
84
OvmfPkg/OvmfPkgIa32.fdf | 2 ++
75
85
OvmfPkg/OvmfPkgIa32X64.fdf | 2 ++
@@ -77,62 +87,56 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
77
87
3 files changed, 6 insertions(+)
78
88
79
89
diff --git a/OvmfPkg/OvmfPkgIa32.fdf b/OvmfPkg/OvmfPkgIa32.fdf
80
- index f552bc9..73007dd 100644
90
+ index be3d3b4d14..a545f7c2a6 100644
81
91
--- a/OvmfPkg/OvmfPkgIa32.fdf
82
92
+++ b/OvmfPkg/OvmfPkgIa32.fdf
83
- @@ -288,12 +288,14 @@ INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResour
93
+ @@ -288,10 +288,12 @@ INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResour
84
94
INF FatPkg/EnhancedFatDxe/Fat.inf
85
95
INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
86
96
87
97
+!ifndef $(EXCLUDE_SHELL_FROM_FD)
88
- !ifndef $(USE_OLD_SHELL)
98
+ !if $(TOOL_CHAIN_TAG) != "XCODE5"
89
99
INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
90
- INF ShellPkg/Application/Shell/Shell.inf
91
- !else
92
- INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
93
100
!endif
101
+ INF ShellPkg/Application/Shell/Shell.inf
94
102
+!endif
95
103
96
- !if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
97
104
INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
105
+
98
106
diff --git a/OvmfPkg/OvmfPkgIa32X64.fdf b/OvmfPkg/OvmfPkgIa32X64.fdf
99
- index ee77ae1..116b3c6 100644
107
+ index b56160b3bf..fe24e86b92 100644
100
108
--- a/OvmfPkg/OvmfPkgIa32X64.fdf
101
109
+++ b/OvmfPkg/OvmfPkgIa32X64.fdf
102
- @@ -289,12 +289,14 @@ INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResour
110
+ @@ -289,10 +289,12 @@ INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResour
103
111
INF FatPkg/EnhancedFatDxe/Fat.inf
104
112
INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
105
113
106
114
+!ifndef $(EXCLUDE_SHELL_FROM_FD)
107
- !ifndef $(USE_OLD_SHELL)
115
+ !if $(TOOL_CHAIN_TAG) != "XCODE5"
108
116
INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
109
- INF ShellPkg/Application/Shell/Shell.inf
110
- !else
111
- INF RuleOverride = BINARY USE = X64 EdkShellBinPkg/FullShell/FullShell.inf
112
117
!endif
118
+ INF ShellPkg/Application/Shell/Shell.inf
113
119
+!endif
114
120
115
- !if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
116
121
INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
122
+
117
123
diff --git a/OvmfPkg/OvmfPkgX64.fdf b/OvmfPkg/OvmfPkgX64.fdf
118
- index 505d25d..84d5845 100644
124
+ index b56160b3bf..fe24e86b92 100644
119
125
--- a/OvmfPkg/OvmfPkgX64.fdf
120
126
+++ b/OvmfPkg/OvmfPkgX64.fdf
121
- @@ -289,12 +289,14 @@ INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResour
127
+ @@ -289,10 +289,12 @@ INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResour
122
128
INF FatPkg/EnhancedFatDxe/Fat.inf
123
129
INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
124
130
125
131
+!ifndef $(EXCLUDE_SHELL_FROM_FD)
126
- !ifndef $(USE_OLD_SHELL)
132
+ !if $(TOOL_CHAIN_TAG) != "XCODE5"
127
133
INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
128
- INF ShellPkg/Application/Shell/Shell.inf
129
- !else
130
- INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
131
134
!endif
135
+ INF ShellPkg/Application/Shell/Shell.inf
132
136
+!endif
133
137
134
- !if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
135
138
INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
139
+
136
140
--
137
- 1.8.3.1
141
+ 2.18.1
138
142
SOURCES/0012-OvmfPkg-EnrollDefaultKeys-application-for-enrolling-.patch CHANGED
@@ -1,9 +1,14 @@
1
- From b59ee7769814e207c917615af78c7428bdf3b450 Mon Sep 17 00:00:00 2001
1
+ From 60737ccca40e6b4f11da438892c862b254dbfac9 Mon Sep 17 00:00:00 2001
2
2
From: Laszlo Ersek <lersek@redhat.com>
3
3
Date: Tue, 4 Nov 2014 23:02:55 +0100
4
4
Subject: OvmfPkg: EnrollDefaultKeys: application for enrolling default keys
5
5
(RH only)
6
6
7
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
8
+ RHEL-8.1/20190308-89910a39dcfd rebase:
9
+
10
+ - no change
11
+
7
12
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
8
13
RHEL-8.0/20180508-ee3198e672e2 rebase:
9
14
@@ -214,19 +219,21 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
214
219
(cherry picked from commit c0b2615a9c0b4a4be1bffe45681a32915449279d)
215
220
(cherry picked from commit 92424de98ffaf1fa81e6346949b1d2b5f9a637ca)
216
221
(cherry picked from commit 98c91b36997e3afc4192449263182fbdcc771a1a)
222
+ (cherry picked from commit b59ee7769814e207c917615af78c7428bdf3b450)
223
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
217
224
---
218
- OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c | 1015 +++++++++++++++++++++++
219
- OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf | 52 ++
220
- OvmfPkg/OvmfPkgIa32.dsc | 4 +
221
- OvmfPkg/OvmfPkgIa32X64.dsc | 4 +
222
- OvmfPkg/OvmfPkgX64.dsc | 4 +
225
+ OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c | 1015 +++++++++++++++++
226
+ .../EnrollDefaultKeys/EnrollDefaultKeys.inf | 52 +
227
+ OvmfPkg/OvmfPkgIa32.dsc | 4 +
228
+ OvmfPkg/OvmfPkgIa32X64.dsc | 4 +
229
+ OvmfPkg/OvmfPkgX64.dsc | 4 +
223
230
5 files changed, 1079 insertions(+)
224
231
create mode 100644 OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c
225
232
create mode 100644 OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf
226
233
227
234
diff --git a/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c
228
235
new file mode 100644
229
- index 0000000..dd413df
236
+ index 0000000000..dd413df12d
230
237
--- /dev/null
231
238
+++ b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c
232
239
@@ -0,0 +1,1015 @@
@@ -1247,7 +1254,7 @@ index 0000000..dd413df
1247
1254
+}
1248
1255
diff --git a/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf
1249
1256
new file mode 100644
1250
- index 0000000..0ad86a2
1257
+ index 0000000000..0ad86a2843
1251
1258
--- /dev/null
1252
1259
+++ b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.inf
1253
1260
@@ -0,0 +1,52 @@
@@ -1304,10 +1311,10 @@ index 0000000..0ad86a2
1304
1311
+ UefiLib
1305
1312
+ UefiRuntimeServicesTableLib
1306
1313
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
1307
- index b577767..4d268c9 100644
1314
+ index 3f1da66aab..bc75e03d47 100644
1308
1315
--- a/OvmfPkg/OvmfPkgIa32.dsc
1309
1316
+++ b/OvmfPkg/OvmfPkgIa32.dsc
1310
- @@ -865,6 +865,10 @@
1317
+ @@ -864,6 +864,10 @@
1311
1318
1312
1319
!if $(SECURE_BOOT_ENABLE) == TRUE
1313
1320
SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
@@ -1319,10 +1326,10 @@ index b577767..4d268c9 100644
1319
1326
1320
1327
OvmfPkg/PlatformDxe/Platform.inf
1321
1328
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
1322
- index a6a40be..6836622 100644
1329
+ index 9bb0a4cede..f630737662 100644
1323
1330
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
1324
1331
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
1325
- @@ -874,6 +874,10 @@
1332
+ @@ -873,6 +873,10 @@
1326
1333
1327
1334
!if $(SECURE_BOOT_ENABLE) == TRUE
1328
1335
SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
@@ -1334,10 +1341,10 @@ index a6a40be..6836622 100644
1334
1341
1335
1342
OvmfPkg/PlatformDxe/Platform.inf
1336
1343
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
1337
- index 8bd3754..0b3008f 100644
1344
+ index 3b7fc5328c..ac70a0cac1 100644
1338
1345
--- a/OvmfPkg/OvmfPkgX64.dsc
1339
1346
+++ b/OvmfPkg/OvmfPkgX64.dsc
1340
- @@ -872,6 +872,10 @@
1347
+ @@ -871,6 +871,10 @@
1341
1348
1342
1349
!if $(SECURE_BOOT_ENABLE) == TRUE
1343
1350
SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
@@ -1349,5 +1356,5 @@ index 8bd3754..0b3008f 100644
1349
1356
1350
1357
OvmfPkg/PlatformDxe/Platform.inf
1351
1358
--
1352
- 1.8.3.1
1359
+ 2.18.1
1353
1360
SOURCES/0013-ArmPlatformPkg-introduce-fixed-PCD-for-early-hello-m.patch CHANGED
@@ -1,8 +1,13 @@
1
- From 58755c51d3252312d80cbcb97928d71199c2f5e1 Mon Sep 17 00:00:00 2001
1
+ From c3f07e323e76856f1b42ea7b8c598ba3201c28a2 Mon Sep 17 00:00:00 2001
2
2
From: Laszlo Ersek <lersek@redhat.com>
3
3
Date: Wed, 14 Oct 2015 13:49:43 +0200
4
4
Subject: ArmPlatformPkg: introduce fixed PCD for early hello message (RH only)
5
5
6
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
7
+ RHEL-8.1/20190308-89910a39dcfd rebase:
8
+
9
+ - no change
10
+
6
11
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
12
RHEL-8.0/20180508-ee3198e672e2 rebase:
8
13
@@ -42,15 +47,17 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
42
47
(cherry picked from commit 20b1f1cbd0590aa71c6d99d35e23cf08e0707750)
43
48
(cherry picked from commit 6734b88cf7abcaf42632e3d2fc469b2169dd2f16)
44
49
(cherry picked from commit ef77da632559e9baa1c69869e4cbea377068ef27)
50
+ (cherry picked from commit 58755c51d3252312d80cbcb97928d71199c2f5e1)
51
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
45
52
---
46
53
ArmPlatformPkg/ArmPlatformPkg.dec | 7 +++++++
47
54
1 file changed, 7 insertions(+)
48
55
49
56
diff --git a/ArmPlatformPkg/ArmPlatformPkg.dec b/ArmPlatformPkg/ArmPlatformPkg.dec
50
- index dff4598..3c5c6c7 100644
57
+ index 44c00bd0c1..40c8ec3251 100644
51
58
--- a/ArmPlatformPkg/ArmPlatformPkg.dec
52
59
+++ b/ArmPlatformPkg/ArmPlatformPkg.dec
53
- @@ -112,6 +112,13 @@
60
+ @@ -114,6 +114,13 @@
54
61
## If set, this will swap settings for HDLCD RED_SELECT and BLUE_SELECT registers
55
62
gArmPlatformTokenSpaceGuid.PcdArmHdLcdSwapBlueRedSelect|FALSE|BOOLEAN|0x00000045
56
63
@@ -65,5 +72,5 @@ index dff4598..3c5c6c7 100644
65
72
## PL031 RealTimeClock
66
73
gArmPlatformTokenSpaceGuid.PcdPL031RtcBase|0x0|UINT32|0x00000024
67
74
--
68
- 1.8.3.1
75
+ 2.18.1
69
76
SOURCES/0014-ArmPlatformPkg-PrePeiCore-write-early-hello-message-.patch CHANGED
@@ -1,9 +1,14 @@
1
- From f4b7aae411d88b2b83f85d20ef06a4032a57e7de Mon Sep 17 00:00:00 2001
1
+ From bb71490fdda3b38fa9f071d281b863f9b64363bf Mon Sep 17 00:00:00 2001
2
2
From: Laszlo Ersek <lersek@redhat.com>
3
3
Date: Wed, 14 Oct 2015 13:59:20 +0200
4
4
Subject: ArmPlatformPkg: PrePeiCore: write early hello message to the serial
5
5
port (RH)
6
6
7
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
8
+ RHEL-8.1/20190308-89910a39dcfd rebase:
9
+
10
+ - no change
11
+
7
12
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
8
13
RHEL-8.0/20180508-ee3198e672e2 rebase:
9
14
@@ -40,6 +45,8 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
40
45
(cherry picked from commit 742e5bf6d5ce5a1e73879d6e5c0dd00feda7a9ac)
41
46
(cherry picked from commit 93d69eb9393cf05af90676253875c59c1bec67fd)
42
47
(cherry picked from commit 638594083b191f84f5d9333eb6147a31570f5a5a)
48
+ (cherry picked from commit f4b7aae411d88b2b83f85d20ef06a4032a57e7de)
49
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
43
50
---
44
51
ArmPlatformPkg/PrePeiCore/MainMPCore.c | 5 +++++
45
52
ArmPlatformPkg/PrePeiCore/MainUniCore.c | 5 +++++
@@ -49,7 +56,7 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
49
56
5 files changed, 15 insertions(+)
50
57
51
58
diff --git a/ArmPlatformPkg/PrePeiCore/MainMPCore.c b/ArmPlatformPkg/PrePeiCore/MainMPCore.c
52
- index dc47adb..cbd7223 100644
59
+ index dc47adbaff..cbd72232c7 100644
53
60
--- a/ArmPlatformPkg/PrePeiCore/MainMPCore.c
54
61
+++ b/ArmPlatformPkg/PrePeiCore/MainMPCore.c
55
62
@@ -117,6 +117,11 @@ PrimaryMain (
@@ -65,7 +72,7 @@ index dc47adb..cbd7223 100644
65
72
66
73
// Enable the GIC Distributor
67
74
diff --git a/ArmPlatformPkg/PrePeiCore/MainUniCore.c b/ArmPlatformPkg/PrePeiCore/MainUniCore.c
68
- index 134a469..af39fc0 100644
75
+ index 134a469427..af39fc017c 100644
69
76
--- a/ArmPlatformPkg/PrePeiCore/MainUniCore.c
70
77
+++ b/ArmPlatformPkg/PrePeiCore/MainUniCore.c
71
78
@@ -35,6 +35,11 @@ PrimaryMain (
@@ -81,7 +88,7 @@ index 134a469..af39fc0 100644
81
88
82
89
// Adjust the Temporary Ram as the new Ppi List (Common + Platform Ppi Lists) is created at
83
90
diff --git a/ArmPlatformPkg/PrePeiCore/PrePeiCore.h b/ArmPlatformPkg/PrePeiCore/PrePeiCore.h
84
- index 1608946..bf843d7 100644
91
+ index 160894620c..bf843d7768 100644
85
92
--- a/ArmPlatformPkg/PrePeiCore/PrePeiCore.h
86
93
+++ b/ArmPlatformPkg/PrePeiCore/PrePeiCore.h
87
94
@@ -21,6 +21,7 @@
@@ -93,7 +100,7 @@ index 1608946..bf843d7 100644
93
100
#include <PiPei.h>
94
101
#include <Ppi/TemporaryRamSupport.h>
95
102
diff --git a/ArmPlatformPkg/PrePeiCore/PrePeiCoreMPCore.inf b/ArmPlatformPkg/PrePeiCore/PrePeiCoreMPCore.inf
96
- index e3a31fa..1bc0c45 100644
103
+ index e3a31fa7c6..1bc0c45420 100644
97
104
--- a/ArmPlatformPkg/PrePeiCore/PrePeiCoreMPCore.inf
98
105
+++ b/ArmPlatformPkg/PrePeiCore/PrePeiCoreMPCore.inf
99
106
@@ -72,6 +72,8 @@
@@ -106,7 +113,7 @@ index e3a31fa..1bc0c45 100644
106
113
gArmTokenSpaceGuid.PcdGicInterruptInterfaceBase
107
114
gArmTokenSpaceGuid.PcdGicSgiIntId
108
115
diff --git a/ArmPlatformPkg/PrePeiCore/PrePeiCoreUniCore.inf b/ArmPlatformPkg/PrePeiCore/PrePeiCoreUniCore.inf
109
- index ec83cec..b100820 100644
116
+ index ec83cec2d8..b100820491 100644
110
117
--- a/ArmPlatformPkg/PrePeiCore/PrePeiCoreUniCore.inf
111
118
+++ b/ArmPlatformPkg/PrePeiCore/PrePeiCoreUniCore.inf
112
119
@@ -70,4 +70,6 @@
@@ -117,5 +124,5 @@ index ec83cec..b100820 100644
117
124
+
118
125
gEfiMdeModulePkgTokenSpaceGuid.PcdInitValueInTempStack
119
126
--
120
- 1.8.3.1
127
+ 2.18.1
121
128
SOURCES/0015-ArmVirtPkg-set-early-hello-message-RH-only.patch CHANGED
@@ -1,8 +1,14 @@
1
- From 2d4db6ec70e004cd9ac147615d17033bee5d3b18 Mon Sep 17 00:00:00 2001
1
+ From fb2032bbea7e02c426855cf86a323556d493fd8a Mon Sep 17 00:00:00 2001
2
2
From: Laszlo Ersek <lersek@redhat.com>
3
3
Date: Wed, 14 Oct 2015 14:07:17 +0200
4
4
Subject: ArmVirtPkg: set early hello message (RH only)
5
5
6
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
7
+ RHEL-8.1/20190308-89910a39dcfd rebase:
8
+
9
+ - resolve context conflict with upstream commit eaa1e98ae31d ("ArmVirtPkg:
10
+ don't set PcdCoreCount", 2019-02-13)
11
+
6
12
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
13
RHEL-8.0/20180508-ee3198e672e2 rebase:
8
14
@@ -34,22 +40,24 @@ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
34
40
(cherry picked from commit 179df76dbb0d199bd905236e98775b4059c6502a)
35
41
(cherry picked from commit ce3f59d0710c24c162d5222bbf5cd7e36180c80c)
36
42
(cherry picked from commit c201a8e6ae28d75f7ba581828b533c3b26fa7f18)
43
+ (cherry picked from commit 2d4db6ec70e004cd9ac147615d17033bee5d3b18)
44
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
37
45
---
38
46
ArmVirtPkg/ArmVirtQemu.dsc | 1 +
39
47
1 file changed, 1 insertion(+)
40
48
41
49
diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
42
- index 4bf94ce..035b729 100644
50
+ index 9fc78d4e0a..a4cd66b846 100644
43
51
--- a/ArmVirtPkg/ArmVirtQemu.dsc
44
52
+++ b/ArmVirtPkg/ArmVirtQemu.dsc
45
- @@ -89,6 +89,7 @@
46
- gEfiMdeModulePkgTokenSpaceGuid.PcdConOutUgaSupport|FALSE
53
+ @@ -94,6 +94,7 @@
54
+ gEfiMdeModulePkgTokenSpaceGuid.PcdTurnOffUsbLegacySupport|TRUE
47
55
48
56
[PcdsFixedAtBuild.common]
49
57
+ gArmPlatformTokenSpaceGuid.PcdEarlyHelloMessage|"UEFI firmware starting.\r\n"
50
- gArmPlatformTokenSpaceGuid.PcdCoreCount|1
51
58
!if $(ARCH) == AARCH64
52
59
gArmTokenSpaceGuid.PcdVFPEnabled|1
60
+ !endif
53
61
--
54
- 1.8.3.1
62
+ 2.18.1
55
63
SOURCES/0016-OvmfPkg-enable-DEBUG_VERBOSE-RHEL-only.patch CHANGED
@@ -1,8 +1,13 @@
1
- From 759bd3f591e2db699bdef4c7ea4e97c908e7f027 Mon Sep 17 00:00:00 2001
1
+ From 7e6d5dc4078c64be6d55d8fc3317c59a91507a50 Mon Sep 17 00:00:00 2001
2
2
From: Paolo Bonzini <pbonzini@redhat.com>
3
3
Date: Tue, 21 Nov 2017 00:57:45 +0100
4
4
Subject: OvmfPkg: enable DEBUG_VERBOSE (RHEL only)
5
5
6
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
7
+ RHEL-8.1/20190308-89910a39dcfd rebase:
8
+
9
+ - no change
10
+
6
11
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
12
RHEL-8.0/20180508-ee3198e672e2 rebase:
8
13
@@ -32,6 +37,8 @@ Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
32
37
(this patch was previously applied as commit 78d3ed73172b5738e32d2b0bc03f7984b9584117)
33
38
(cherry picked from commit 7aeeaabc9871f657e65d2b99d81011b4964a1ce9)
34
39
(cherry picked from commit a0617a6be1a80966099ddceb010f89202a79ee76)
40
+ (cherry picked from commit 759bd3f591e2db699bdef4c7ea4e97c908e7f027)
41
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
35
42
---
36
43
OvmfPkg/OvmfPkgIa32.dsc | 2 +-
37
44
OvmfPkg/OvmfPkgIa32X64.dsc | 2 +-
@@ -39,10 +46,10 @@ Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
39
46
3 files changed, 3 insertions(+), 3 deletions(-)
40
47
41
48
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
42
- index 4d268c9..57bf021 100644
49
+ index bc75e03d47..8093e6f000 100644
43
50
--- a/OvmfPkg/OvmfPkgIa32.dsc
44
51
+++ b/OvmfPkg/OvmfPkgIa32.dsc
45
- @@ -481,7 +481,7 @@
52
+ @@ -484,7 +484,7 @@
46
53
# DEBUG_VERBOSE 0x00400000 // Detailed debug messages that may
47
54
# // significantly impact boot performance
48
55
# DEBUG_ERROR 0x80000000 // Error
@@ -52,10 +59,10 @@ index 4d268c9..57bf021 100644
52
59
!ifdef $(SOURCE_DEBUG_ENABLE)
53
60
gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x17
54
61
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
55
- index 6836622..0e87c8f 100644
62
+ index f630737662..eca9b4e6db 100644
56
63
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
57
64
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
58
- @@ -486,7 +486,7 @@
65
+ @@ -489,7 +489,7 @@
59
66
# DEBUG_VERBOSE 0x00400000 // Detailed debug messages that may
60
67
# // significantly impact boot performance
61
68
# DEBUG_ERROR 0x80000000 // Error
@@ -65,10 +72,10 @@ index 6836622..0e87c8f 100644
65
72
!ifdef $(SOURCE_DEBUG_ENABLE)
66
73
gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x17
67
74
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
68
- index 0b3008f..38ba204 100644
75
+ index ac70a0cac1..3ff9a3181e 100644
69
76
--- a/OvmfPkg/OvmfPkgX64.dsc
70
77
+++ b/OvmfPkg/OvmfPkgX64.dsc
71
- @@ -486,7 +486,7 @@
78
+ @@ -489,7 +489,7 @@
72
79
# DEBUG_VERBOSE 0x00400000 // Detailed debug messages that may
73
80
# // significantly impact boot performance
74
81
# DEBUG_ERROR 0x80000000 // Error
@@ -78,5 +85,5 @@ index 0b3008f..38ba204 100644
78
85
!ifdef $(SOURCE_DEBUG_ENABLE)
79
86
gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x17
80
87
--
81
- 1.8.3.1
88
+ 2.18.1
82
89
SOURCES/0017-OvmfPkg-silence-DEBUG_VERBOSE-0x00400000-in-QemuVide.patch SOURCES/0017-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-QemuVide.patch
file renamed
+42 -13
SOURCES/{0017-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-QemuVide.patch → 0017-OvmfPkg-silence-DEBUG_VERBOSE-0x00400000-in-QemuVide.patch} RENAMED
@@ -1,7 +1,19 @@
1
- From bd650684712fb840dbcda5d6eaee065bd9e91fa1 Mon Sep 17 00:00:00 2001
1
+ From b06b87f8ffd4fed4ef7eacb13689a9b6d111f850 Mon Sep 17 00:00:00 2001
2
2
From: Paolo Bonzini <pbonzini@redhat.com>
3
3
Date: Tue, 21 Nov 2017 00:57:46 +0100
4
- Subject: OvmfPkg: silence EFI_D_VERBOSE (0x00400000) in QemuVideoDxe (RH only)
4
+ Subject: OvmfPkg: silence DEBUG_VERBOSE (0x00400000) in
5
+ QemuVideoDxe/QemuRamfbDxe (RH)
6
+
7
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
8
+ RHEL-8.1/20190308-89910a39dcfd rebase:
9
+
10
+ - Upstream commit 1d25ff51af5c ("OvmfPkg: add QemuRamfbDxe", 2018-06-14)
11
+ introduced another GOP driver that consumes FrameBufferBltLib, and
12
+ thereby produces a large number of (mostly useless) debug messages at
13
+ the DEBUG_VERBOSE level. Extend the patch to suppress those messages in
14
+ both QemuVideoDxe and QemuRamfbDxe; update the subject accordingly.
15
+ QemuRamfbDxe itself doesn't log anything at the VERBOSE level (see also
16
+ the original commit message at the bottom of this downstream patch).
5
17
6
18
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
19
RHEL-8.0/20180508-ee3198e672e2 rebase:
@@ -42,60 +54,77 @@ Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
42
54
(this patch was previously applied as commit 9b0d031dee7e823f6717bab73e422fbc6f0a6c52)
43
55
(cherry picked from commit 9122d5f2e8d8d289064d1e1700cb61964d9931f3)
44
56
(cherry picked from commit 7eb3be1d4ccafc26c11fe5afb95cc12b250ce6f0)
57
+ (cherry picked from commit bd650684712fb840dbcda5d6eaee065bd9e91fa1)
58
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
45
59
---
46
- OvmfPkg/OvmfPkgIa32.dsc | 5 ++++-
47
- OvmfPkg/OvmfPkgIa32X64.dsc | 5 ++++-
48
- OvmfPkg/OvmfPkgX64.dsc | 5 ++++-
49
- 3 files changed, 12 insertions(+), 3 deletions(-)
60
+ OvmfPkg/OvmfPkgIa32.dsc | 10 ++++++++--
61
+ OvmfPkg/OvmfPkgIa32X64.dsc | 10 ++++++++--
62
+ OvmfPkg/OvmfPkgX64.dsc | 10 ++++++++--
63
+ 3 files changed, 24 insertions(+), 6 deletions(-)
50
64
51
65
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
52
- index 57bf021..2b2e874 100644
66
+ index 8093e6f000..8f1cf80fe6 100644
53
67
--- a/OvmfPkg/OvmfPkgIa32.dsc
54
68
+++ b/OvmfPkg/OvmfPkgIa32.dsc
55
- @@ -744,7 +744,10 @@
69
+ @@ -746,8 +746,14 @@
56
70
MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
57
71
MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
58
72
59
73
- OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
74
+ - OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
60
75
+ OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf {
61
76
+ <PcdsFixedAtBuild>
62
77
+ gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
63
78
+ }
79
+ + OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf {
80
+ + <PcdsFixedAtBuild>
81
+ + gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
82
+ + }
64
83
OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
65
84
66
85
#
67
86
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
68
- index 0e87c8f..892cc5e 100644
87
+ index eca9b4e6db..62d6d6c406 100644
69
88
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
70
89
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
71
- @@ -753,7 +753,10 @@
90
+ @@ -755,8 +755,14 @@
72
91
MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
73
92
MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
74
93
75
94
- OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
95
+ - OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
76
96
+ OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf {
77
97
+ <PcdsFixedAtBuild>
78
98
+ gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
79
99
+ }
100
+ + OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf {
101
+ + <PcdsFixedAtBuild>
102
+ + gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
103
+ + }
80
104
OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
81
105
82
106
#
83
107
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
84
- index 38ba204..e7cb582 100644
108
+ index 3ff9a3181e..992b141113 100644
85
109
--- a/OvmfPkg/OvmfPkgX64.dsc
86
110
+++ b/OvmfPkg/OvmfPkgX64.dsc
87
- @@ -751,7 +751,10 @@
111
+ @@ -753,8 +753,14 @@
88
112
MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
89
113
MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
90
114
91
115
- OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
116
+ - OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
92
117
+ OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf {
93
118
+ <PcdsFixedAtBuild>
94
119
+ gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
95
120
+ }
121
+ + OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf {
122
+ + <PcdsFixedAtBuild>
123
+ + gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
124
+ + }
96
125
OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
97
126
98
127
#
99
128
--
100
- 1.8.3.1
129
+ 2.18.1
101
130
SOURCES/0018-ArmVirtPkg-silence-DEBUG_VERBOSE-0x00400000-in-QemuR.patch ADDED
@@ -0,0 +1,64 @@
1
+ From 76b4ac28e975bd63c25db903a1d42c47b38cc756 Mon Sep 17 00:00:00 2001
2
+ From: Laszlo Ersek <lersek@redhat.com>
3
+ Date: Wed, 27 Jan 2016 03:05:18 +0100
4
+ Subject: ArmVirtPkg: silence DEBUG_VERBOSE (0x00400000) in QemuRamfbDxe (RH
5
+ only)
6
+
7
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
8
+ RHEL-8.1/20190308-89910a39dcfd rebase:
9
+
10
+ - new patch, due to upstream commit c64688f36a8b ("ArmVirtPkg: add
11
+ QemuRamfbDxe", 2018-06-14)
12
+
13
+ QemuRamfbDxe uses FrameBufferLib. The FrameBufferBltLib instance added in
14
+ commit b1ca386074bd ("MdeModulePkg: Add FrameBufferBltLib library
15
+ instance") logs many messages on the VERBOSE level; for example, a normal
16
+ boot with ArmVirtQemu[Kernel] can produce 500+ "VideoFill" messages,
17
+ dependent on the progress bar, when the VERBOSE bit is set in
18
+ PcdDebugPrintErrorLevel.
19
+
20
+ QemuRamfbDxe itself doesn't log anything at the VERBOSE level, so we lose
21
+ none of its messages this way.
22
+
23
+ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
24
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
25
+ ---
26
+ ArmVirtPkg/ArmVirtQemu.dsc | 5 ++++-
27
+ ArmVirtPkg/ArmVirtQemuKernel.dsc | 5 ++++-
28
+ 2 files changed, 8 insertions(+), 2 deletions(-)
29
+
30
+ diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
31
+ index a4cd66b846..aac4094665 100644
32
+ --- a/ArmVirtPkg/ArmVirtQemu.dsc
33
+ +++ b/ArmVirtPkg/ArmVirtQemu.dsc
34
+ @@ -421,7 +421,10 @@
35
+ #
36
+ # Video support
37
+ #
38
+ - OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
39
+ + OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf {
40
+ + <PcdsFixedAtBuild>
41
+ + gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
42
+ + }
43
+ OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
44
+ OvmfPkg/PlatformDxe/Platform.inf
45
+
46
+ diff --git a/ArmVirtPkg/ArmVirtQemuKernel.dsc b/ArmVirtPkg/ArmVirtQemuKernel.dsc
47
+ index d2b3f24394..c9a635e80b 100644
48
+ --- a/ArmVirtPkg/ArmVirtQemuKernel.dsc
49
+ +++ b/ArmVirtPkg/ArmVirtQemuKernel.dsc
50
+ @@ -399,7 +399,10 @@
51
+ #
52
+ # Video support
53
+ #
54
+ - OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
55
+ + OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf {
56
+ + <PcdsFixedAtBuild>
57
+ + gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
58
+ + }
59
+ OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
60
+ OvmfPkg/PlatformDxe/Platform.inf
61
+
62
+ --
63
+ 2.18.1
64
+
SOURCES/0019-OvmfPkg-PlatformBootManagerLib-connect-consoles-unco.patch DELETED
@@ -1,222 +0,0 @@
1
- From fca819227b23a4d0597e3da42d7edce1da8fb0f4 Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Tue, 15 May 2018 12:40:05 +0200
4
- Subject: OvmfPkg/PlatformBootManagerLib: connect consoles unconditionally
5
-
6
- Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
- RHEL-8.0/20180508-ee3198e672e2 rebase:
8
-
9
- - reorder the rebase changelog in the commit message so that it reads like
10
- a blog: place more recent entries near the top
11
- - no changes to the patch body
12
-
13
- Message-id: <20180515104005.12265-2-lersek@redhat.com>
14
- Patchwork-id: 80268
15
- O-Subject: [RHEL-7.6 ovmf PATCH 1/1] OvmfPkg/PlatformBootManagerLib: connect
16
- consoles unconditionally
17
- Bugzilla: 1577546
18
- Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
19
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
20
-
21
- If both ConIn and ConOut exist, but ConIn references none of the PS/2
22
- keyboard, the USB wild-card keyboard, and any serial ports, then
23
- PlatformInitializeConsole() currently allows the boot to proceed without
24
- any input devices at all. This makes for a bad user experience -- the
25
- firmware menu could only be entered through OsIndications, set by a guest
26
- OS.
27
-
28
- Do what ArmVirtQemu does already, namely connect the consoles, and add
29
- them to ConIn / ConOut / ErrOut, unconditionally. (The underlying
30
- EfiBootManagerUpdateConsoleVariable() function checks for duplicates.)
31
-
32
- The issue used to be masked by the EfiBootManagerConnectAll() call that
33
- got conditionalized in commit 245c643cc8b7.
34
-
35
- This patch is best viewed with "git show -b -W".
36
-
37
- Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
38
- Cc: Jordan Justen <jordan.l.justen@intel.com>
39
- Fixes: 245c643cc8b73240c3b88cb55b2911b285a8c10d
40
- Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1577546
41
- Contributed-under: TianoCore Contribution Agreement 1.1
42
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
43
- Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
44
- (cherry picked from commit f803c03cc2e0b6b0b0bed447a97ea2c61b04ed82)
45
- (cherry picked from commit 3e05bfc48cd7b2cf4c1cbfc1d0cd2572338fad1e)
46
- ---
47
- .../Library/PlatformBootManagerLib/BdsPlatform.c | 127 +++++++--------------
48
- 1 file changed, 44 insertions(+), 83 deletions(-)
49
-
50
- diff --git a/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c b/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c
51
- index 862fa6eb..004b753 100644
52
- --- a/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c
53
- +++ b/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c
54
- @@ -26,7 +26,6 @@ VOID *mEfiDevPathNotifyReg;
55
- EFI_EVENT mEfiDevPathEvent;
56
- VOID *mEmuVariableEventReg;
57
- EFI_EVENT mEmuVariableEvent;
58
- -BOOLEAN mDetectVgaOnly;
59
- UINT16 mHostBridgeDevId;
60
-
61
- //
62
- @@ -830,35 +829,33 @@ DetectAndPreparePlatformPciDevicePath (
63
- );
64
- ASSERT_EFI_ERROR (Status);
65
-
66
- - if (!mDetectVgaOnly) {
67
- + //
68
- + // Here we decide whether it is LPC Bridge
69
- + //
70
- + if ((IS_PCI_LPC (Pci)) ||
71
- + ((IS_PCI_ISA_PDECODE (Pci)) &&
72
- + (Pci->Hdr.VendorId == 0x8086) &&
73
- + (Pci->Hdr.DeviceId == 0x7000)
74
- + )
75
- + ) {
76
- //
77
- - // Here we decide whether it is LPC Bridge
78
- + // Add IsaKeyboard to ConIn,
79
- + // add IsaSerial to ConOut, ConIn, ErrOut
80
- //
81
- - if ((IS_PCI_LPC (Pci)) ||
82
- - ((IS_PCI_ISA_PDECODE (Pci)) &&
83
- - (Pci->Hdr.VendorId == 0x8086) &&
84
- - (Pci->Hdr.DeviceId == 0x7000)
85
- - )
86
- - ) {
87
- - //
88
- - // Add IsaKeyboard to ConIn,
89
- - // add IsaSerial to ConOut, ConIn, ErrOut
90
- - //
91
- - DEBUG ((EFI_D_INFO, "Found LPC Bridge device\n"));
92
- - PrepareLpcBridgeDevicePath (Handle);
93
- - return EFI_SUCCESS;
94
- - }
95
- + DEBUG ((EFI_D_INFO, "Found LPC Bridge device\n"));
96
- + PrepareLpcBridgeDevicePath (Handle);
97
- + return EFI_SUCCESS;
98
- + }
99
- + //
100
- + // Here we decide which Serial device to enable in PCI bus
101
- + //
102
- + if (IS_PCI_16550SERIAL (Pci)) {
103
- //
104
- - // Here we decide which Serial device to enable in PCI bus
105
- + // Add them to ConOut, ConIn, ErrOut.
106
- //
107
- - if (IS_PCI_16550SERIAL (Pci)) {
108
- - //
109
- - // Add them to ConOut, ConIn, ErrOut.
110
- - //
111
- - DEBUG ((EFI_D_INFO, "Found PCI 16550 SERIAL device\n"));
112
- - PreparePciSerialDevicePath (Handle);
113
- - return EFI_SUCCESS;
114
- - }
115
- + DEBUG ((EFI_D_INFO, "Found PCI 16550 SERIAL device\n"));
116
- + PreparePciSerialDevicePath (Handle);
117
- + return EFI_SUCCESS;
118
- }
119
-
120
- //
121
- @@ -878,26 +875,6 @@ DetectAndPreparePlatformPciDevicePath (
122
-
123
-
124
- /**
125
- - Do platform specific PCI Device check and add them to ConOut, ConIn, ErrOut
126
- -
127
- - @param[in] DetectVgaOnly - Only detect VGA device if it's TRUE.
128
- -
129
- - @retval EFI_SUCCESS - PCI Device check and Console variable update
130
- - successfully.
131
- - @retval EFI_STATUS - PCI Device check or Console variable update fail.
132
- -
133
- -**/
134
- -EFI_STATUS
135
- -DetectAndPreparePlatformPciDevicePaths (
136
- - BOOLEAN DetectVgaOnly
137
- - )
138
- -{
139
- - mDetectVgaOnly = DetectVgaOnly;
140
- - return VisitAllPciInstances (DetectAndPreparePlatformPciDevicePath);
141
- -}
142
- -
143
- -
144
- -/**
145
- Connect the predefined platform default console device.
146
-
147
- Always try to find and enable PCI display devices.
148
- @@ -910,50 +887,34 @@ PlatformInitializeConsole (
149
- )
150
- {
151
- UINTN Index;
152
- - EFI_DEVICE_PATH_PROTOCOL *VarConout;
153
- - EFI_DEVICE_PATH_PROTOCOL *VarConin;
154
-
155
- //
156
- - // Connect RootBridge
157
- + // Do platform specific PCI Device check and add them to ConOut, ConIn,
158
- + // ErrOut
159
- //
160
- - GetEfiGlobalVariable2 (EFI_CON_OUT_VARIABLE_NAME, (VOID **) &VarConout,
161
- - NULL);
162
- - GetEfiGlobalVariable2 (EFI_CON_IN_VARIABLE_NAME, (VOID **) &VarConin, NULL);
163
- -
164
- - if (VarConout == NULL || VarConin == NULL) {
165
- - //
166
- - // Do platform specific PCI Device check and add them to ConOut, ConIn,
167
- - // ErrOut
168
- - //
169
- - DetectAndPreparePlatformPciDevicePaths (FALSE);
170
- + VisitAllPciInstances (DetectAndPreparePlatformPciDevicePath);
171
-
172
- + //
173
- + // Have chance to connect the platform default console,
174
- + // the platform default console is the minimum device group
175
- + // the platform should support
176
- + //
177
- + for (Index = 0; PlatformConsole[Index].DevicePath != NULL; ++Index) {
178
- //
179
- - // Have chance to connect the platform default console,
180
- - // the platform default console is the minimum device group
181
- - // the platform should support
182
- + // Update the console variable with the connect type
183
- //
184
- - for (Index = 0; PlatformConsole[Index].DevicePath != NULL; ++Index) {
185
- - //
186
- - // Update the console variable with the connect type
187
- - //
188
- - if ((PlatformConsole[Index].ConnectType & CONSOLE_IN) == CONSOLE_IN) {
189
- - EfiBootManagerUpdateConsoleVariable (ConIn,
190
- - PlatformConsole[Index].DevicePath, NULL);
191
- - }
192
- - if ((PlatformConsole[Index].ConnectType & CONSOLE_OUT) == CONSOLE_OUT) {
193
- - EfiBootManagerUpdateConsoleVariable (ConOut,
194
- - PlatformConsole[Index].DevicePath, NULL);
195
- - }
196
- - if ((PlatformConsole[Index].ConnectType & STD_ERROR) == STD_ERROR) {
197
- - EfiBootManagerUpdateConsoleVariable (ErrOut,
198
- - PlatformConsole[Index].DevicePath, NULL);
199
- - }
200
- + if ((PlatformConsole[Index].ConnectType & CONSOLE_IN) == CONSOLE_IN) {
201
- + EfiBootManagerUpdateConsoleVariable (ConIn,
202
- + PlatformConsole[Index].DevicePath, NULL);
203
- + }
204
- + if ((PlatformConsole[Index].ConnectType & CONSOLE_OUT) == CONSOLE_OUT) {
205
- + EfiBootManagerUpdateConsoleVariable (ConOut,
206
- + PlatformConsole[Index].DevicePath, NULL);
207
- + }
208
- + if ((PlatformConsole[Index].ConnectType & STD_ERROR) == STD_ERROR) {
209
- + EfiBootManagerUpdateConsoleVariable (ErrOut,
210
- + PlatformConsole[Index].DevicePath, NULL);
211
- }
212
- - } else {
213
- - //
214
- - // Only detect VGA device and add them to ConOut
215
- - //
216
- - DetectAndPreparePlatformPciDevicePaths (TRUE);
217
- }
218
- }
219
-
220
- --
221
- 1.8.3.1
222
-
SOURCES/0019-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-NvmExpre.patch SOURCES/0018-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-NvmExpre.patch
file renamed
+15 -8
SOURCES/{0018-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-NvmExpre.patch → 0019-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-NvmExpre.patch} RENAMED
@@ -1,9 +1,14 @@
1
- From 5a27af700f49e00608f232f618dedd7bf5e9b3e6 Mon Sep 17 00:00:00 2001
1
+ From 58bba429b9ec7b78109940ef945d0dc93f3cd958 Mon Sep 17 00:00:00 2001
2
2
From: Paolo Bonzini <pbonzini@redhat.com>
3
3
Date: Tue, 21 Nov 2017 00:57:47 +0100
4
4
Subject: OvmfPkg: silence EFI_D_VERBOSE (0x00400000) in NvmExpressDxe (RH
5
5
only)
6
6
7
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
8
+ RHEL-8.1/20190308-89910a39dcfd rebase:
9
+
10
+ - no change
11
+
7
12
Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
8
13
RHEL-8.0/20180508-ee3198e672e2 rebase:
9
14
@@ -33,6 +38,8 @@ Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
33
38
(this patch was previously applied as commit 5f432837b9c60c2929b13dda1a1b488d5c3a6d2f)
34
39
(cherry picked from commit 33e00146eb878588ad1395d7b1ae38f401729da4)
35
40
(cherry picked from commit bd10cabcfcb1bc9a32b05062f4ee3792e27bc2d8)
41
+ (cherry picked from commit 5a27af700f49e00608f232f618dedd7bf5e9b3e6)
42
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
36
43
---
37
44
OvmfPkg/OvmfPkgIa32.dsc | 5 ++++-
38
45
OvmfPkg/OvmfPkgIa32X64.dsc | 5 ++++-
@@ -40,10 +47,10 @@ Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
40
47
3 files changed, 12 insertions(+), 3 deletions(-)
41
48
42
49
diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
43
- index 2b2e874..f6d7833 100644
50
+ index 8f1cf80fe6..bbf5e38274 100644
44
51
--- a/OvmfPkg/OvmfPkgIa32.dsc
45
52
+++ b/OvmfPkg/OvmfPkgIa32.dsc
46
- @@ -738,7 +738,10 @@
53
+ @@ -740,7 +740,10 @@
47
54
OvmfPkg/SataControllerDxe/SataControllerDxe.inf
48
55
MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf
49
56
MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf
@@ -56,10 +63,10 @@ index 2b2e874..f6d7833 100644
56
63
MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
57
64
MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
58
65
diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
59
- index 892cc5e..d6e628b 100644
66
+ index 62d6d6c406..3ec1b916e7 100644
60
67
--- a/OvmfPkg/OvmfPkgIa32X64.dsc
61
68
+++ b/OvmfPkg/OvmfPkgIa32X64.dsc
62
- @@ -747,7 +747,10 @@
69
+ @@ -749,7 +749,10 @@
63
70
OvmfPkg/SataControllerDxe/SataControllerDxe.inf
64
71
MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf
65
72
MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf
@@ -72,10 +79,10 @@ index 892cc5e..d6e628b 100644
72
79
MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
73
80
MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
74
81
diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
75
- index e7cb582..a9fe89c 100644
82
+ index 992b141113..ea54b4b8e8 100644
76
83
--- a/OvmfPkg/OvmfPkgX64.dsc
77
84
+++ b/OvmfPkg/OvmfPkgX64.dsc
78
- @@ -745,7 +745,10 @@
85
+ @@ -747,7 +747,10 @@
79
86
OvmfPkg/SataControllerDxe/SataControllerDxe.inf
80
87
MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf
81
88
MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf
@@ -88,5 +95,5 @@ index e7cb582..a9fe89c 100644
88
95
MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
89
96
MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
90
97
--
91
- 1.8.3.1
98
+ 2.18.1
92
99
SOURCES/0020-ArmVirtPkg-PlatformBootManagerLib-connect-Virtio-RNG.patch DELETED
@@ -1,215 +0,0 @@
1
- From 402cfd944f9a6764daec96aef9eec4d2393c3a90 Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Fri, 18 May 2018 21:40:23 +0200
4
- Subject: ArmVirtPkg/PlatformBootManagerLib: connect Virtio RNG devices again
5
-
6
- Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
- RHEL-8.0/20180508-ee3198e672e2 rebase:
8
-
9
- - reorder the rebase changelog in the commit message so that it reads like
10
- a blog: place more recent entries near the top
11
- - no changes to the patch body
12
-
13
- Message-id: <20180518194024.30614-2-lersek@redhat.com>
14
- Patchwork-id: 80426
15
- O-Subject: [RHEL-7.6 ovmf PATCH 1/2] ArmVirtPkg/PlatformBootManagerLib: connect
16
- Virtio RNG devices again
17
- Bugzilla: 1579518
18
- Acked-by: Thomas Huth <thuth@redhat.com>
19
- Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
20
-
21
- Virtio RNG devices are never boot devices, so in commit ff1d0fbfbaec we
22
- stopped connecting them. This is a problem because an OS boot loader may
23
- depend on EFI_RNG_PROTOCOL to seed the OS's RNG.
24
-
25
- Connect Virtio RNG devices again. And, while commit ff1d0fbfbaec removed
26
- that from PlatformBootManagerAfterConsole(), reintroduce it now to
27
- PlatformBootManagerBeforeConsole() -- this way Driver#### options launched
28
- between both functions may access EFI_RNG_PROTOCOL too.
29
-
30
- Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
31
- Fixes: ff1d0fbfbaec55038ccf888759588fa4e21516f4
32
- Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1579518
33
- Contributed-under: TianoCore Contribution Agreement 1.1
34
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
35
- Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
36
- (cherry picked from commit c4add6b6e971e0bb3f276ed3636a083e782e96cc)
37
- (cherry picked from commit 1d33f4bb28e1aa2c4d62979596140c22677a2e9f)
38
- ---
39
- .../Library/PlatformBootManagerLib/PlatformBm.c | 129 +++++++++++++++++++++
40
- .../PlatformBootManagerLib.inf | 1 +
41
- 2 files changed, 130 insertions(+)
42
-
43
- diff --git a/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBm.c b/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBm.c
44
- index 5d5e51d..62cce6a 100644
45
- --- a/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBm.c
46
- +++ b/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBm.c
47
- @@ -16,6 +16,7 @@
48
- **/
49
-
50
- #include <IndustryStandard/Pci22.h>
51
- +#include <IndustryStandard/Virtio095.h>
52
- #include <Library/BootLogoLib.h>
53
- #include <Library/DevicePathLib.h>
54
- #include <Library/PcdLib.h>
55
- @@ -27,6 +28,7 @@
56
- #include <Protocol/LoadedImage.h>
57
- #include <Protocol/PciIo.h>
58
- #include <Protocol/PciRootBridgeIo.h>
59
- +#include <Protocol/VirtioDevice.h>
60
- #include <Guid/EventGroup.h>
61
- #include <Guid/RootBridgesConnectedEventGroup.h>
62
-
63
- @@ -261,6 +263,121 @@ IsPciDisplay (
64
-
65
-
66
- /**
67
- + This FILTER_FUNCTION checks if a handle corresponds to a Virtio RNG device at
68
- + the VIRTIO_DEVICE_PROTOCOL level.
69
- +**/
70
- +STATIC
71
- +BOOLEAN
72
- +EFIAPI
73
- +IsVirtioRng (
74
- + IN EFI_HANDLE Handle,
75
- + IN CONST CHAR16 *ReportText
76
- + )
77
- +{
78
- + EFI_STATUS Status;
79
- + VIRTIO_DEVICE_PROTOCOL *VirtIo;
80
- +
81
- + Status = gBS->HandleProtocol (Handle, &gVirtioDeviceProtocolGuid,
82
- + (VOID**)&VirtIo);
83
- + if (EFI_ERROR (Status)) {
84
- + return FALSE;
85
- + }
86
- + return (BOOLEAN)(VirtIo->SubSystemDeviceId ==
87
- + VIRTIO_SUBSYSTEM_ENTROPY_SOURCE);
88
- +}
89
- +
90
- +
91
- +/**
92
- + This FILTER_FUNCTION checks if a handle corresponds to a Virtio RNG device at
93
- + the EFI_PCI_IO_PROTOCOL level.
94
- +**/
95
- +STATIC
96
- +BOOLEAN
97
- +EFIAPI
98
- +IsVirtioPciRng (
99
- + IN EFI_HANDLE Handle,
100
- + IN CONST CHAR16 *ReportText
101
- + )
102
- +{
103
- + EFI_STATUS Status;
104
- + EFI_PCI_IO_PROTOCOL *PciIo;
105
- + UINT16 VendorId;
106
- + UINT16 DeviceId;
107
- + UINT8 RevisionId;
108
- + BOOLEAN Virtio10;
109
- + UINT16 SubsystemId;
110
- +
111
- + Status = gBS->HandleProtocol (Handle, &gEfiPciIoProtocolGuid,
112
- + (VOID**)&PciIo);
113
- + if (EFI_ERROR (Status)) {
114
- + return FALSE;
115
- + }
116
- +
117
- + //
118
- + // Read and check VendorId.
119
- + //
120
- + Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint16, PCI_VENDOR_ID_OFFSET,
121
- + 1, &VendorId);
122
- + if (EFI_ERROR (Status)) {
123
- + goto PciError;
124
- + }
125
- + if (VendorId != VIRTIO_VENDOR_ID) {
126
- + return FALSE;
127
- + }
128
- +
129
- + //
130
- + // Read DeviceId and RevisionId.
131
- + //
132
- + Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint16, PCI_DEVICE_ID_OFFSET,
133
- + 1, &DeviceId);
134
- + if (EFI_ERROR (Status)) {
135
- + goto PciError;
136
- + }
137
- + Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint8, PCI_REVISION_ID_OFFSET,
138
- + 1, &RevisionId);
139
- + if (EFI_ERROR (Status)) {
140
- + goto PciError;
141
- + }
142
- +
143
- + //
144
- + // From DeviceId and RevisionId, determine whether the device is a
145
- + // modern-only Virtio 1.0 device. In case of Virtio 1.0, DeviceId can
146
- + // immediately be restricted to VIRTIO_SUBSYSTEM_ENTROPY_SOURCE, and
147
- + // SubsystemId will only play a sanity-check role. Otherwise, DeviceId can
148
- + // only be sanity-checked, and SubsystemId will decide.
149
- + //
150
- + if (DeviceId == 0x1040 + VIRTIO_SUBSYSTEM_ENTROPY_SOURCE &&
151
- + RevisionId >= 0x01) {
152
- + Virtio10 = TRUE;
153
- + } else if (DeviceId >= 0x1000 && DeviceId <= 0x103F && RevisionId == 0x00) {
154
- + Virtio10 = FALSE;
155
- + } else {
156
- + return FALSE;
157
- + }
158
- +
159
- + //
160
- + // Read and check SubsystemId as dictated by Virtio10.
161
- + //
162
- + Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint16,
163
- + PCI_SUBSYSTEM_ID_OFFSET, 1, &SubsystemId);
164
- + if (EFI_ERROR (Status)) {
165
- + goto PciError;
166
- + }
167
- + if (Virtio10 && SubsystemId >= 0x40) {
168
- + return TRUE;
169
- + }
170
- + if (!Virtio10 && SubsystemId == VIRTIO_SUBSYSTEM_ENTROPY_SOURCE) {
171
- + return TRUE;
172
- + }
173
- + return FALSE;
174
- +
175
- +PciError:
176
- + DEBUG ((DEBUG_ERROR, "%a: %s: %r\n", __FUNCTION__, ReportText, Status));
177
- + return FALSE;
178
- +}
179
- +
180
- +
181
- +/**
182
- This CALLBACK_FUNCTION attempts to connect a handle non-recursively, asking
183
- the matching driver to produce all first-level child handles.
184
- **/
185
- @@ -644,6 +761,18 @@ PlatformBootManagerBeforeConsole (
186
- // Register platform-specific boot options and keyboard shortcuts.
187
- //
188
- PlatformRegisterOptionsAndKeys ();
189
- +
190
- + //
191
- + // At this point, VIRTIO_DEVICE_PROTOCOL instances exist only for Virtio MMIO
192
- + // transports. Install EFI_RNG_PROTOCOL instances on Virtio MMIO RNG devices.
193
- + //
194
- + FilterAndProcess (&gVirtioDeviceProtocolGuid, IsVirtioRng, Connect);
195
- +
196
- + //
197
- + // Install both VIRTIO_DEVICE_PROTOCOL and (dependent) EFI_RNG_PROTOCOL
198
- + // instances on Virtio PCI RNG devices.
199
- + //
200
- + FilterAndProcess (&gEfiPciIoProtocolGuid, IsVirtioPciRng, Connect);
201
- }
202
-
203
- /**
204
- diff --git a/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.inf b/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.inf
205
- index 1e22f8b..d6c1ef9 100644
206
- --- a/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.inf
207
- +++ b/ArmVirtPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.inf
208
- @@ -83,3 +83,4 @@
209
- gEfiLoadedImageProtocolGuid
210
- gEfiPciRootBridgeIoProtocolGuid
211
- gEfiSimpleFileSystemProtocolGuid
212
- + gVirtioDeviceProtocolGuid
213
- --
214
- 1.8.3.1
215
-
SOURCES/0021-OvmfPkg-PlatformBootManagerLib-connect-Virtio-RNG-de.patch DELETED
@@ -1,188 +0,0 @@
1
- From 3f2be5f30bbd996473e7336b29ac43795d999676 Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Fri, 18 May 2018 21:40:24 +0200
4
- Subject: OvmfPkg/PlatformBootManagerLib: connect Virtio RNG devices again
5
-
6
- Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
- RHEL-8.0/20180508-ee3198e672e2 rebase:
8
-
9
- - reorder the rebase changelog in the commit message so that it reads like
10
- a blog: place more recent entries near the top
11
- - no changes to the patch body
12
-
13
- Message-id: <20180518194024.30614-3-lersek@redhat.com>
14
- Patchwork-id: 80427
15
- O-Subject: [RHEL-7.6 ovmf PATCH 2/2] OvmfPkg/PlatformBootManagerLib: connect
16
- Virtio RNG devices again
17
- Bugzilla: 1579518
18
- Acked-by: Thomas Huth <thuth@redhat.com>
19
- Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
20
-
21
- Virtio RNG devices are never boot devices, so in commit 245c643cc8b7 we
22
- stopped connecting them. This is a problem because an OS boot loader may
23
- depend on EFI_RNG_PROTOCOL to seed the OS's RNG.
24
-
25
- Connect Virtio RNG devices again. And, while commit 245c643cc8b7 removed
26
- that from PlatformBootManagerAfterConsole(), reintroduce it now to
27
- PlatformBootManagerBeforeConsole() -- this way Driver#### options launched
28
- between both functions may access EFI_RNG_PROTOCOL too.
29
-
30
- Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
31
- Cc: Jordan Justen <jordan.l.justen@intel.com>
32
- Fixes: 245c643cc8b73240c3b88cb55b2911b285a8c10d
33
- Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1579518
34
- Contributed-under: TianoCore Contribution Agreement 1.1
35
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
36
- Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
37
- (cherry picked from commit 7ebad830d6ab61f0395f6f4bae4156664bbd8086)
38
- (cherry picked from commit 4c7e315ccb97dd7c3dc7f38e22b84ffbc4df90e3)
39
- ---
40
- .../Library/PlatformBootManagerLib/BdsPlatform.c | 105 +++++++++++++++++++++
41
- .../Library/PlatformBootManagerLib/BdsPlatform.h | 1 +
42
- 2 files changed, 106 insertions(+)
43
-
44
- diff --git a/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c b/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c
45
- index 004b753..5d4d323 100644
46
- --- a/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c
47
- +++ b/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.c
48
- @@ -319,6 +319,15 @@ ConnectRootBridge (
49
- );
50
-
51
- STATIC
52
- +EFI_STATUS
53
- +EFIAPI
54
- +ConnectVirtioPciRng (
55
- + IN EFI_HANDLE Handle,
56
- + IN VOID *Instance,
57
- + IN VOID *Context
58
- + );
59
- +
60
- +STATIC
61
- VOID
62
- SaveS3BootScript (
63
- VOID
64
- @@ -399,6 +408,13 @@ PlatformBootManagerBeforeConsole (
65
- ASSERT_RETURN_ERROR (PcdStatus);
66
-
67
- PlatformRegisterOptionsAndKeys ();
68
- +
69
- + //
70
- + // Install both VIRTIO_DEVICE_PROTOCOL and (dependent) EFI_RNG_PROTOCOL
71
- + // instances on Virtio PCI RNG devices.
72
- + //
73
- + VisitAllInstancesOfProtocol (&gEfiPciIoProtocolGuid, ConnectVirtioPciRng,
74
- + NULL);
75
- }
76
-
77
-
78
- @@ -427,6 +443,95 @@ ConnectRootBridge (
79
- }
80
-
81
-
82
- +STATIC
83
- +EFI_STATUS
84
- +EFIAPI
85
- +ConnectVirtioPciRng (
86
- + IN EFI_HANDLE Handle,
87
- + IN VOID *Instance,
88
- + IN VOID *Context
89
- + )
90
- +{
91
- + EFI_PCI_IO_PROTOCOL *PciIo;
92
- + EFI_STATUS Status;
93
- + UINT16 VendorId;
94
- + UINT16 DeviceId;
95
- + UINT8 RevisionId;
96
- + BOOLEAN Virtio10;
97
- + UINT16 SubsystemId;
98
- +
99
- + PciIo = Instance;
100
- +
101
- + //
102
- + // Read and check VendorId.
103
- + //
104
- + Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint16, PCI_VENDOR_ID_OFFSET,
105
- + 1, &VendorId);
106
- + if (EFI_ERROR (Status)) {
107
- + goto Error;
108
- + }
109
- + if (VendorId != VIRTIO_VENDOR_ID) {
110
- + return EFI_SUCCESS;
111
- + }
112
- +
113
- + //
114
- + // Read DeviceId and RevisionId.
115
- + //
116
- + Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint16, PCI_DEVICE_ID_OFFSET,
117
- + 1, &DeviceId);
118
- + if (EFI_ERROR (Status)) {
119
- + goto Error;
120
- + }
121
- + Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint8, PCI_REVISION_ID_OFFSET,
122
- + 1, &RevisionId);
123
- + if (EFI_ERROR (Status)) {
124
- + goto Error;
125
- + }
126
- +
127
- + //
128
- + // From DeviceId and RevisionId, determine whether the device is a
129
- + // modern-only Virtio 1.0 device. In case of Virtio 1.0, DeviceId can
130
- + // immediately be restricted to VIRTIO_SUBSYSTEM_ENTROPY_SOURCE, and
131
- + // SubsystemId will only play a sanity-check role. Otherwise, DeviceId can
132
- + // only be sanity-checked, and SubsystemId will decide.
133
- + //
134
- + if (DeviceId == 0x1040 + VIRTIO_SUBSYSTEM_ENTROPY_SOURCE &&
135
- + RevisionId >= 0x01) {
136
- + Virtio10 = TRUE;
137
- + } else if (DeviceId >= 0x1000 && DeviceId <= 0x103F && RevisionId == 0x00) {
138
- + Virtio10 = FALSE;
139
- + } else {
140
- + return EFI_SUCCESS;
141
- + }
142
- +
143
- + //
144
- + // Read and check SubsystemId as dictated by Virtio10.
145
- + //
146
- + Status = PciIo->Pci.Read (PciIo, EfiPciIoWidthUint16,
147
- + PCI_SUBSYSTEM_ID_OFFSET, 1, &SubsystemId);
148
- + if (EFI_ERROR (Status)) {
149
- + goto Error;
150
- + }
151
- + if ((Virtio10 && SubsystemId >= 0x40) ||
152
- + (!Virtio10 && SubsystemId == VIRTIO_SUBSYSTEM_ENTROPY_SOURCE)) {
153
- + Status = gBS->ConnectController (
154
- + Handle, // ControllerHandle
155
- + NULL, // DriverImageHandle -- connect all drivers
156
- + NULL, // RemainingDevicePath -- produce all child handles
157
- + FALSE // Recursive -- don't follow child handles
158
- + );
159
- + if (EFI_ERROR (Status)) {
160
- + goto Error;
161
- + }
162
- + }
163
- + return EFI_SUCCESS;
164
- +
165
- +Error:
166
- + DEBUG ((DEBUG_ERROR, "%a: %r\n", __FUNCTION__, Status));
167
- + return Status;
168
- +}
169
- +
170
- +
171
- /**
172
- Add IsaKeyboard to ConIn; add IsaSerial to ConOut, ConIn, ErrOut.
173
-
174
- diff --git a/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.h b/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.h
175
- index 97ffbb5..4948ca6 100644
176
- --- a/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.h
177
- +++ b/OvmfPkg/Library/PlatformBootManagerLib/BdsPlatform.h
178
- @@ -30,6 +30,7 @@ Abstract:
179
- #include <IndustryStandard/Acpi.h>
180
- #include <IndustryStandard/SmBios.h>
181
- #include <IndustryStandard/PeImage.h>
182
- +#include <IndustryStandard/Virtio095.h>
183
-
184
- #include <Library/DebugLib.h>
185
- #include <Library/BaseMemoryLib.h>
186
- --
187
- 1.8.3.1
188
-
SOURCES/0026-Downgrade-CryptoPkg-INF-files-to-OpenSSL-1.1.0i-RH-o.patch ADDED
@@ -0,0 +1,59 @@
1
+ From d382b66affafe06c7e470e0a2dffbd3634b363f1 Mon Sep 17 00:00:00 2001
2
+ From: Laszlo Ersek <lersek@redhat.com>
3
+ Date: Tue, 19 Mar 2019 15:48:34 +0100
4
+ Subject: Downgrade CryptoPkg INF files to OpenSSL 1.1.0i (RH only)
5
+
6
+ Notes about the RHEL-8.0/20180508-ee3198e672e2 ->
7
+ RHEL-8.1/20190308-89910a39dcfd rebase:
8
+
9
+ - new patch, due to upstream commit a18f784cfdbe ("Upgrade OpenSSL to
10
+ 1.1.0j", 2018-12-21)
11
+
12
+ Upstream commit a18f784cfdbe (see above) advanced the OpenSSL git
13
+ submodule from upstream OpenSSL commit d4e4bd2a8163 ("Prepare for 1.1.0h
14
+ release", 2018-03-27) to upstream OpenSSL commit 74f2d9c1ec5f ("Prepare
15
+ for 1.1.0j release", 2018-11-20). Meaning, upstream edk2 skipped 1.1.0i.
16
+
17
+ However, Fedora 28 only offers 1.1.0i at this point (and it will not be
18
+ rebased again until 1.1.0k is released). Therefore hunks in the upstream
19
+ CryptoPkg commit that relate specifically to 1.1.0j have to be backed out.
20
+
21
+ The only such hunks are the "crypto/getenv.c" additions to the INF files.
22
+ The related upstream OpenSSL change was commit 1abdf08284af ("Use
23
+ secure_getenv(3) when available.", 2018-09-24), part of tag
24
+ "OpenSSL_1_1_0j".
25
+
26
+ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
27
+ Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
28
+ ---
29
+ CryptoPkg/Library/OpensslLib/OpensslLib.inf | 1 -
30
+ CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf | 1 -
31
+ 2 files changed, 2 deletions(-)
32
+
33
+ diff --git a/CryptoPkg/Library/OpensslLib/OpensslLib.inf b/CryptoPkg/Library/OpensslLib/OpensslLib.inf
34
+ index 6162d29143..fcb8bfddde 100644
35
+ --- a/CryptoPkg/Library/OpensslLib/OpensslLib.inf
36
+ +++ b/CryptoPkg/Library/OpensslLib/OpensslLib.inf
37
+ @@ -282,7 +282,6 @@
38
+ $(OPENSSL_PATH)/crypto/evp/pmeth_lib.c
39
+ $(OPENSSL_PATH)/crypto/evp/scrypt.c
40
+ $(OPENSSL_PATH)/crypto/ex_data.c
41
+ - $(OPENSSL_PATH)/crypto/getenv.c
42
+ $(OPENSSL_PATH)/crypto/hmac/hm_ameth.c
43
+ $(OPENSSL_PATH)/crypto/hmac/hm_pmeth.c
44
+ $(OPENSSL_PATH)/crypto/hmac/hmac.c
45
+ diff --git a/CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf b/CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf
46
+ index b04bf62b4e..99ff89da0e 100644
47
+ --- a/CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf
48
+ +++ b/CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf
49
+ @@ -282,7 +282,6 @@
50
+ $(OPENSSL_PATH)/crypto/evp/pmeth_lib.c
51
+ $(OPENSSL_PATH)/crypto/evp/scrypt.c
52
+ $(OPENSSL_PATH)/crypto/ex_data.c
53
+ - $(OPENSSL_PATH)/crypto/getenv.c
54
+ $(OPENSSL_PATH)/crypto/hmac/hm_ameth.c
55
+ $(OPENSSL_PATH)/crypto/hmac/hm_pmeth.c
56
+ $(OPENSSL_PATH)/crypto/hmac/hmac.c
57
+ --
58
+ 2.18.1
59
+
SOURCES/0027-BaseTools-tools_def-add-fno-unwind-tables-to-GCC_AAR.patch DELETED
@@ -1,73 +0,0 @@
1
- From 7ef29963526aa451b1101e4b92e47d3028c9035a Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Fri, 18 May 2018 19:20:32 +0200
4
- Subject: BaseTools/tools_def: add "-fno-unwind-tables" to GCC_AARCH64_CC_FLAGS
5
-
6
- Notes about the RHEL-7.6/ovmf-20180508-2.gitee3198e672e2.el7 ->
7
- RHEL-8.0/20180508-ee3198e672e2 rebase:
8
-
9
- - reorder the rebase changelog in the commit message so that it reads like
10
- a blog: place more recent entries near the top
11
-
12
- - in RHEL-8.0 Alpha, this patch was applied downstream-only, for fixing
13
- RHBZ#1579525. Since then, the patch has been upstreamed, and now it is
14
- cherry-picked from upstream.
15
-
16
- The ElfConvert routines in GenFw don't handle the ".eh_frame" ELF section
17
- emitted by gcc. For this reason, Leif disabled the generation of that
18
- section for AARCH64 with "-fno-asynchronous-unwind-tables" in commit
19
- 28e80befa4fe [1], and Ard did the same for IA32 and X64 in commit
20
- 26ecc55c027d [2]. (The CLANG38 toolchain received the same flag at its
21
- inception, in commit 6f756db5ea05 [3].)
22
-
23
- However, ".eh_frame" is back now; in upstream gcc commit 9cbee213b579 [4]
24
- (part of tag "gcc-8_1_0-release"), both "-fasynchronous-unwind-tables" and
25
- "-funwind-tables" were made the default for AARCH64. (The patch author
26
- described the effects on the gcc mailing list [5].) We have to counter the
27
- latter flag with "-fno-unwind-tables", otherwise GenFw chokes on
28
- ".eh_frame" again (triggered for example on Fedora 28).
29
-
30
- "-f[no-]unwind-tables" goes back to at least gcc-4.4 [6], so it's safe to
31
- add to GCC_AARCH64_CC_FLAGS.
32
-
33
- [1] https://github.com/tianocore/edk2/commit/28e80befa4fe
34
- [2] https://github.com/tianocore/edk2/commit/26ecc55c027d
35
- [3] https://github.com/tianocore/edk2/commit/6f756db5ea05
36
- [4] https://gcc.gnu.org/git/?p=gcc.git;a=commitdiff;h=9cbee213b579
37
- [5] http://mid.mail-archive.com/7b28c03a-c032-6cec-c127-1c12cbe98eeb@foss.arm.com
38
- [6] https://gcc.gnu.org/onlinedocs/gcc-4.4.7/gcc/Code-Gen-Options.html
39
-
40
- Cc: "Danilo C. L. de Paula" <ddepaula@redhat.com>
41
- Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
42
- Cc: Cole Robinson <crobinso@redhat.com>
43
- Cc: Gerd Hoffmann <kraxel@redhat.com>
44
- Cc: Leif Lindholm <leif.lindholm@linaro.org>
45
- Cc: Liming Gao <liming.gao@intel.com>
46
- Cc: Paolo Bonzini <pbonzini@redhat.com>
47
- Cc: Yonghong Zhu <yonghong.zhu@intel.com>
48
- Reported-by: "Danilo C. L. de Paula" <ddepaula@redhat.com>
49
- Contributed-under: TianoCore Contribution Agreement 1.1
50
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
51
- Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
52
- Reviewed-by: Liming Gao <liming.gao@intel.com>
53
- (cherry picked from commit cbf00651eda6818ca3c76115b8a18e3f6b23eef4)
54
- ---
55
- BaseTools/Conf/tools_def.template | 2 +-
56
- 1 file changed, 1 insertion(+), 1 deletion(-)
57
-
58
- diff --git a/BaseTools/Conf/tools_def.template b/BaseTools/Conf/tools_def.template
59
- index 03d7000..9429033 100755
60
- --- a/BaseTools/Conf/tools_def.template
61
- +++ b/BaseTools/Conf/tools_def.template
62
- @@ -4537,7 +4537,7 @@ DEFINE GCC_X64_CC_FLAGS = DEF(GCC_ALL_CC_FLAGS) -mno-red-zone -Wno-ad
63
- DEFINE GCC_IPF_CC_FLAGS = DEF(GCC_ALL_CC_FLAGS) -minline-int-divide-min-latency
64
- DEFINE GCC_ARM_CC_FLAGS = DEF(GCC_ALL_CC_FLAGS) -mlittle-endian -mabi=aapcs -fno-short-enums -funsigned-char -ffunction-sections -fdata-sections -fomit-frame-pointer -Wno-address -mthumb -mfloat-abi=soft -fno-pic -fno-pie
65
- DEFINE GCC_ARM_CC_XIPFLAGS = -mno-unaligned-access
66
- -DEFINE GCC_AARCH64_CC_FLAGS = DEF(GCC_ALL_CC_FLAGS) -mlittle-endian -fno-short-enums -fverbose-asm -funsigned-char -ffunction-sections -fdata-sections -Wno-address -fno-asynchronous-unwind-tables -fno-pic -fno-pie -ffixed-x18
67
- +DEFINE GCC_AARCH64_CC_FLAGS = DEF(GCC_ALL_CC_FLAGS) -mlittle-endian -fno-short-enums -fverbose-asm -funsigned-char -ffunction-sections -fdata-sections -Wno-address -fno-asynchronous-unwind-tables -fno-unwind-tables -fno-pic -fno-pie -ffixed-x18
68
- DEFINE GCC_AARCH64_CC_XIPFLAGS = -mstrict-align -mgeneral-regs-only
69
- DEFINE GCC_DLINK_FLAGS_COMMON = -nostdlib --pie
70
- DEFINE GCC_DLINK2_FLAGS_COMMON = -Wl,--script=$(EDK_TOOLS_PATH)/Scripts/GccBase.lds
71
- --
72
- 1.8.3.1
73
-
SOURCES/edk2-ArmPkg-DebugPeCoffExtraActionLib-debugger-commands-a.patch ADDED
@@ -0,0 +1,63 @@
1
+ From 11a1c8085b0edccd3a304f704f47ec5d8ee6255d Mon Sep 17 00:00:00 2001
2
+ From: Philippe Mathieu-Daude <philmd@redhat.com>
3
+ Date: Thu, 1 Aug 2019 20:43:49 +0200
4
+ Subject: [PATCH 3/3] ArmPkg: DebugPeCoffExtraActionLib: debugger commands are
5
+ not errors
6
+
7
+ Message-id: <20190801184349.28512-4-philmd@redhat.com>
8
+ Patchwork-id: 89860
9
+ O-Subject: [RHEL-8.1.0 edk2 PATCH v4 3/3] ArmPkg: DebugPeCoffExtraActionLib:
10
+ debugger commands are not errors
11
+ Bugzilla: 1714446
12
+ Acked-by: Andrew Jones <drjones@redhat.com>
13
+ Acked-by: Laszlo Ersek <lersek@redhat.com>
14
+
15
+ In commit 1fce963d89f3e we reduced the level of information printed
16
+ by PeCoffLoaderRelocateImageExtraAction() but we did not update the
17
+ similar PeCoffLoaderUnloadImageExtraAction() function.
18
+
19
+ PeCoffLoaderUnloadImageExtraAction() prints helpful debugger commands
20
+ for source level debugging. These messages should not be printed on the
21
+ EFI_D_ERROR level; they don't report errors. Change the debug level
22
+ (bitmask, actually) to DEBUG_LOAD | DEBUG_INFO, because the messages are
23
+ printed in relation to image loading, and they are informative.
24
+
25
+ Cc: Leif Lindholm <leif.lindholm@linaro.org>
26
+ Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
27
+ Reported-by: Andrew Jones <drjones@redhat.com>
28
+ Suggested-by: Laszlo Ersek <lersek@redhat.com>
29
+ Signed-off-by: Philippe Mathieu-Daude <philmd@redhat.com>
30
+ Reviewed-by: Laszlo Ersek <lersek@redhat.com>
31
+ Reviewed-by: Leif Lindholm <leif.lindholm@linaro.org>
32
+ (cherry picked from commit a6cd7fbac494ed3b2386db1f2a8b1a73f399e940)
33
+ Signed-off-by: Philippe Mathieu-Daude <philmd@redhat.com>
34
+ ---
35
+ .../Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.c | 8 ++++----
36
+ 1 file changed, 4 insertions(+), 4 deletions(-)
37
+
38
+ diff --git a/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.c b/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.c
39
+ index f298e58..895198f 100644
40
+ --- a/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.c
41
+ +++ b/ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.c
42
+ @@ -128,14 +128,14 @@ PeCoffLoaderUnloadImageExtraAction (
43
+ if (ImageContext->PdbPointer) {
44
+ #ifdef __CC_ARM
45
+ // Print out the command for the RVD debugger to load symbols for this image
46
+ - DEBUG ((EFI_D_ERROR, "unload symbols_only %a\n", DeCygwinPathIfNeeded (ImageContext->PdbPointer, Temp, sizeof (Temp))));
47
+ + DEBUG ((DEBUG_LOAD | DEBUG_INFO, "unload symbols_only %a\n", DeCygwinPathIfNeeded (ImageContext->PdbPointer, Temp, sizeof (Temp))));
48
+ #elif __GNUC__
49
+ // This may not work correctly if you generate PE/COFF directlyas then the Offset would not be required
50
+ - DEBUG ((EFI_D_ERROR, "remove-symbol-file %a 0x%08x\n", DeCygwinPathIfNeeded (ImageContext->PdbPointer, Temp, sizeof (Temp)), (UINTN)(ImageContext->ImageAddress + ImageContext->SizeOfHeaders)));
51
+ + DEBUG ((DEBUG_LOAD | DEBUG_INFO, "remove-symbol-file %a 0x%08x\n", DeCygwinPathIfNeeded (ImageContext->PdbPointer, Temp, sizeof (Temp)), (UINTN)(ImageContext->ImageAddress + ImageContext->SizeOfHeaders)));
52
+ #else
53
+ - DEBUG ((EFI_D_ERROR, "Unloading %a\n", ImageContext->PdbPointer));
54
+ + DEBUG ((DEBUG_LOAD | DEBUG_INFO, "Unloading %a\n", ImageContext->PdbPointer));
55
+ #endif
56
+ } else {
57
+ - DEBUG ((EFI_D_ERROR, "Unloading driver at 0x%11p\n", (VOID *)(UINTN) ImageContext->ImageAddress));
58
+ + DEBUG ((DEBUG_LOAD | DEBUG_INFO, "Unloading driver at 0x%11p\n", (VOID *)(UINTN) ImageContext->ImageAddress));
59
+ }
60
+ }
61
+ --
62
+ 1.8.3.1
63
+
SOURCES/edk2-ArmVirtPkg-ArmVirtQemu-enable-the-IPv6-stack.patch DELETED
@@ -1,197 +0,0 @@
1
- From eff60320e87dcda19a50de4f1ac05af4a5e1b133 Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Wed, 18 Jul 2018 00:18:19 +0200
4
- Subject: [PATCH 3/6] ArmVirtPkg/ArmVirtQemu: enable the IPv6 stack
5
-
6
- Message-id: <20180717221822.13110-3-lersek@redhat.com>
7
- Patchwork-id: 81375
8
- O-Subject: [RHEL8/virt212 edk2 PATCH 2/5] ArmVirtPkg/ArmVirtQemu: enable the
9
- IPv6 stack
10
- Bugzilla: 1536627
11
- Acked-by: Paolo Bonzini <pbonzini@redhat.com>
12
- Acked-by: Wei Huang <wei@redhat.com>
13
-
14
- Add the IPv6 stack to ArmVirtQemu with a cumulative port of the following
15
- OvmfPkg commits:
16
-
17
- * 36c6413f76e5 "OvmfPkg: enable the IPv6 support", 2014-12-19
18
-
19
- * 96302b80d90e "OvmfPkg: Enable Network2 Shell Commands for IPv6",
20
- 2016-03-08
21
-
22
- * 6d0f8941bdc2 "OvmfPkg: always resolve OpenSslLib, IntrinsicLib and
23
- BaseCryptLib", 2017-01-17
24
-
25
- * 32e22f20c985 "OvmfPkg: correct the IScsiDxe module included for the IPv6
26
- stack", 2017-01-17
27
-
28
- The IPv6-enabled IScsiDxe driver depends on BaseCryptLib, and the
29
- "CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf" instance depends on
30
- IntrinsicLib and OpensslLib. This is why commit 6d0f8941bdc2 is relevant.
31
-
32
- However, unlike in OvmfPkg, in ArmVirtPkg we'll precisely track the
33
- firmware features that require these library classes. (The OvmfPkg
34
- discussion was quite complex, and the OvmfPkg solution was a compromise:
35
- <http://mid.mail-archive.com/1484569332-13440-1-git-send-email-jiaxin.wu@intel.com>.)
36
-
37
- The ArmVirtXen platform is not extended with the relevant drivers because
38
- currently it doesn't include any networking support.
39
-
40
- Cc: Julien Grall <julien.grall@linaro.org>
41
- Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1007
42
- Contributed-under: TianoCore Contribution Agreement 1.1
43
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
44
- Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
45
- (cherry picked from commit ae08ea246fe9b4a4e05b7ee6cdbd5b0fa38f3f69)
46
- ---
47
- ArmVirtPkg/ArmVirt.dsc.inc | 18 +++++++++++++++---
48
- ArmVirtPkg/ArmVirtQemu.dsc | 13 ++++++++++++-
49
- ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc | 12 +++++++++++-
50
- ArmVirtPkg/ArmVirtQemuKernel.dsc | 13 ++++++++++++-
51
- 4 files changed, 50 insertions(+), 6 deletions(-)
52
-
53
- diff --git a/ArmVirtPkg/ArmVirt.dsc.inc b/ArmVirtPkg/ArmVirt.dsc.inc
54
- index 2bb8860..f031e81 100644
55
- --- a/ArmVirtPkg/ArmVirt.dsc.inc
56
- +++ b/ArmVirtPkg/ArmVirt.dsc.inc
57
- @@ -80,6 +80,9 @@
58
- DpcLib|MdeModulePkg/Library/DxeDpcLib/DxeDpcLib.inf
59
- UdpIoLib|MdeModulePkg/Library/DxeUdpIoLib/DxeUdpIoLib.inf
60
- IpIoLib|MdeModulePkg/Library/DxeIpIoLib/DxeIpIoLib.inf
61
- +!if $(NETWORK_IP6_ENABLE) == TRUE
62
- + TcpIoLib|MdeModulePkg/Library/DxeTcpIoLib/DxeTcpIoLib.inf
63
- +!endif
64
- !if $(HTTP_BOOT_ENABLE) == TRUE
65
- HttpLib|MdeModulePkg/Library/DxeHttpLib/DxeHttpLib.inf
66
- !endif
67
- @@ -141,14 +144,20 @@
68
- XenIoMmioLib|OvmfPkg/Library/XenIoMmioLib/XenIoMmioLib.inf
69
-
70
- #
71
- - # Secure Boot dependencies
72
- + # CryptoPkg libraries needed by multiple firmware features
73
- #
74
- -!if $(SECURE_BOOT_ENABLE) == TRUE
75
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE)
76
- IntrinsicLib|CryptoPkg/Library/IntrinsicLib/IntrinsicLib.inf
77
- OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLibCrypto.inf
78
- + BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf
79
- +!endif
80
- +
81
- + #
82
- + # Secure Boot dependencies
83
- + #
84
- +!if $(SECURE_BOOT_ENABLE) == TRUE
85
- TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
86
- AuthVariableLib|SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf
87
- - BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf
88
-
89
- # re-use the UserPhysicalPresent() dummy implementation from the ovmf tree
90
- PlatformSecureLib|OvmfPkg/Library/PlatformSecureLib/PlatformSecureLib.inf
91
- @@ -403,6 +412,9 @@
92
- NULL|ShellPkg/Library/UefiShellDebug1CommandsLib/UefiShellDebug1CommandsLib.inf
93
- NULL|ShellPkg/Library/UefiShellInstall1CommandsLib/UefiShellInstall1CommandsLib.inf
94
- NULL|ShellPkg/Library/UefiShellNetwork1CommandsLib/UefiShellNetwork1CommandsLib.inf
95
- +!if $(NETWORK_IP6_ENABLE) == TRUE
96
- + NULL|ShellPkg/Library/UefiShellNetwork2CommandsLib/UefiShellNetwork2CommandsLib.inf
97
- +!endif
98
- HandleParsingLib|ShellPkg/Library/UefiHandleParsingLib/UefiHandleParsingLib.inf
99
- PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf
100
- BcfgCommandLib|ShellPkg/Library/UefiShellBcfgCommandLib/UefiShellBcfgCommandLib.inf
101
- diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
102
- index bb9d7c8..41ff17d 100644
103
- --- a/ArmVirtPkg/ArmVirtQemu.dsc
104
- +++ b/ArmVirtPkg/ArmVirtQemu.dsc
105
- @@ -34,6 +34,7 @@
106
- # -D FLAG=VALUE
107
- #
108
- DEFINE SECURE_BOOT_ENABLE = FALSE
109
- + DEFINE NETWORK_IP6_ENABLE = FALSE
110
- DEFINE HTTP_BOOT_ENABLE = FALSE
111
-
112
- !include ArmVirtPkg/ArmVirt.dsc.inc
113
- @@ -353,10 +354,20 @@
114
- MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf
115
- MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf
116
- MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf
117
- - MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
118
- MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf
119
- +!if $(NETWORK_IP6_ENABLE) == TRUE
120
- + NetworkPkg/Ip6Dxe/Ip6Dxe.inf
121
- + NetworkPkg/TcpDxe/TcpDxe.inf
122
- + NetworkPkg/Udp6Dxe/Udp6Dxe.inf
123
- + NetworkPkg/Dhcp6Dxe/Dhcp6Dxe.inf
124
- + NetworkPkg/Mtftp6Dxe/Mtftp6Dxe.inf
125
- + NetworkPkg/UefiPxeBcDxe/UefiPxeBcDxe.inf
126
- + NetworkPkg/IScsiDxe/IScsiDxe.inf
127
- +!else
128
- + MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
129
- MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf
130
- MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf
131
- +!endif
132
- !if $(HTTP_BOOT_ENABLE) == TRUE
133
- NetworkPkg/DnsDxe/DnsDxe.inf
134
- NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf
135
- diff --git a/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc b/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
136
- index 8941b7f..82d9cbd 100644
137
- --- a/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
138
- +++ b/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
139
- @@ -125,10 +125,20 @@ READ_LOCK_STATUS = TRUE
140
- INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf
141
- INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf
142
- INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf
143
- - INF MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
144
- INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf
145
- +!if $(NETWORK_IP6_ENABLE) == TRUE
146
- + INF NetworkPkg/Ip6Dxe/Ip6Dxe.inf
147
- + INF NetworkPkg/TcpDxe/TcpDxe.inf
148
- + INF NetworkPkg/Udp6Dxe/Udp6Dxe.inf
149
- + INF NetworkPkg/Dhcp6Dxe/Dhcp6Dxe.inf
150
- + INF NetworkPkg/Mtftp6Dxe/Mtftp6Dxe.inf
151
- + INF NetworkPkg/UefiPxeBcDxe/UefiPxeBcDxe.inf
152
- + INF NetworkPkg/IScsiDxe/IScsiDxe.inf
153
- +!else
154
- + INF MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
155
- INF MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf
156
- INF MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf
157
- +!endif
158
- !if $(HTTP_BOOT_ENABLE) == TRUE
159
- INF NetworkPkg/DnsDxe/DnsDxe.inf
160
- INF NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf
161
- diff --git a/ArmVirtPkg/ArmVirtQemuKernel.dsc b/ArmVirtPkg/ArmVirtQemuKernel.dsc
162
- index 9027805..83fc12f 100644
163
- --- a/ArmVirtPkg/ArmVirtQemuKernel.dsc
164
- +++ b/ArmVirtPkg/ArmVirtQemuKernel.dsc
165
- @@ -34,6 +34,7 @@
166
- # -D FLAG=VALUE
167
- #
168
- DEFINE SECURE_BOOT_ENABLE = FALSE
169
- + DEFINE NETWORK_IP6_ENABLE = FALSE
170
- DEFINE HTTP_BOOT_ENABLE = FALSE
171
-
172
- !include ArmVirtPkg/ArmVirt.dsc.inc
173
- @@ -336,10 +337,20 @@
174
- MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf
175
- MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf
176
- MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf
177
- - MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
178
- MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf
179
- +!if $(NETWORK_IP6_ENABLE) == TRUE
180
- + NetworkPkg/Ip6Dxe/Ip6Dxe.inf
181
- + NetworkPkg/TcpDxe/TcpDxe.inf
182
- + NetworkPkg/Udp6Dxe/Udp6Dxe.inf
183
- + NetworkPkg/Dhcp6Dxe/Dhcp6Dxe.inf
184
- + NetworkPkg/Mtftp6Dxe/Mtftp6Dxe.inf
185
- + NetworkPkg/UefiPxeBcDxe/UefiPxeBcDxe.inf
186
- + NetworkPkg/IScsiDxe/IScsiDxe.inf
187
- +!else
188
- + MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
189
- MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf
190
- MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf
191
- +!endif
192
- !if $(HTTP_BOOT_ENABLE) == TRUE
193
- NetworkPkg/DnsDxe/DnsDxe.inf
194
- NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf
195
- --
196
- 1.8.3.1
197
-
SOURCES/edk2-ArmVirtPkg-silence-DEBUG_VERBOSE-masking-0x00400000-.patch ADDED
@@ -0,0 +1,57 @@
1
+ From 5a216abaa737195327235e37563b18a6bf2a74dc Mon Sep 17 00:00:00 2001
2
+ From: Philippe Mathieu-Daude <philmd@redhat.com>
3
+ Date: Thu, 1 Aug 2019 20:43:47 +0200
4
+ Subject: [PATCH 1/3] ArmVirtPkg: silence DEBUG_VERBOSE masking ~0x00400000 in
5
+ QemuRamfbDxe (RH only)
6
+
7
+ Message-id: <20190801184349.28512-2-philmd@redhat.com>
8
+ Patchwork-id: 89859
9
+ O-Subject: [RHEL-8.1.0 edk2 PATCH v4 1/3] ArmVirtPkg: silence DEBUG_VERBOSE
10
+ masking ~0x00400000 in QemuRamfbDxe (RH only)
11
+ Bugzilla: 1714446
12
+ Acked-by: Andrew Jones <drjones@redhat.com>
13
+ Acked-by: Laszlo Ersek <lersek@redhat.com>
14
+
15
+ Commit 76b4ac28e975 introduced a regression, while trying to only clear
16
+ the DEBUG_VERBOSE bit, it also unconditionally sets other bits, normally
17
+ kept clear in the "silent" build.
18
+
19
+ Fix the macro by masking the cleared bits out.
20
+
21
+ Reported-by: Andrew Jones <drjones@redhat.com>
22
+ Suggested-by: Laszlo Ersek <lersek@redhat.com>
23
+ Signed-off-by: Philippe Mathieu-Daude <philmd@redhat.com>
24
+ ---
25
+ ArmVirtPkg/ArmVirtQemu.dsc | 2 +-
26
+ ArmVirtPkg/ArmVirtQemuKernel.dsc | 2 +-
27
+ 2 files changed, 2 insertions(+), 2 deletions(-)
28
+
29
+ diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
30
+ index aac4094..a44477f 100644
31
+ --- a/ArmVirtPkg/ArmVirtQemu.dsc
32
+ +++ b/ArmVirtPkg/ArmVirtQemu.dsc
33
+ @@ -423,7 +423,7 @@
34
+ #
35
+ OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf {
36
+ <PcdsFixedAtBuild>
37
+ - gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
38
+ + gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|($(DEBUG_PRINT_ERROR_LEVEL)) & 0xFFBFFFFF
39
+ }
40
+ OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
41
+ OvmfPkg/PlatformDxe/Platform.inf
42
+ diff --git a/ArmVirtPkg/ArmVirtQemuKernel.dsc b/ArmVirtPkg/ArmVirtQemuKernel.dsc
43
+ index c9a635e..d28ac52 100644
44
+ --- a/ArmVirtPkg/ArmVirtQemuKernel.dsc
45
+ +++ b/ArmVirtPkg/ArmVirtQemuKernel.dsc
46
+ @@ -401,7 +401,7 @@
47
+ #
48
+ OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf {
49
+ <PcdsFixedAtBuild>
50
+ - gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F
51
+ + gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|($(DEBUG_PRINT_ERROR_LEVEL)) & 0xFFBFFFFF
52
+ }
53
+ OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
54
+ OvmfPkg/PlatformDxe/Platform.inf
55
+ --
56
+ 1.8.3.1
57
+
SOURCES/edk2-ArmVirtPkg-unify-HttpLib-resolutions-in-ArmVirt.dsc..patch DELETED
@@ -1,76 +0,0 @@
1
- From c51468996553e70659b85a24cbdad61a27dac952 Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Wed, 18 Jul 2018 00:18:18 +0200
4
- Subject: [PATCH 2/6] ArmVirtPkg: unify HttpLib resolutions in
5
- "ArmVirt.dsc.inc"
6
-
7
- Message-id: <20180717221822.13110-2-lersek@redhat.com>
8
- Patchwork-id: 81376
9
- O-Subject: [RHEL8/virt212 edk2 PATCH 1/5] ArmVirtPkg: unify HttpLib resolutions
10
- in "ArmVirt.dsc.inc"
11
- Bugzilla: 1536627
12
- Acked-by: Paolo Bonzini <pbonzini@redhat.com>
13
- Acked-by: Wei Huang <wei@redhat.com>
14
-
15
- We already resolve a number of networking-related library classes in
16
- ArmVirt.dsc.inc; follow suit with HttpLib.
17
-
18
- Cc: Julien Grall <julien.grall@linaro.org>
19
- Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1007
20
- Contributed-under: TianoCore Contribution Agreement 1.1
21
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
22
- Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
23
- (cherry picked from commit 77b702bfa4947caaa6b4b04730820d91bdf07b03)
24
- ---
25
- ArmVirtPkg/ArmVirt.dsc.inc | 3 +++
26
- ArmVirtPkg/ArmVirtQemu.dsc | 4 ----
27
- ArmVirtPkg/ArmVirtQemuKernel.dsc | 4 ----
28
- 3 files changed, 3 insertions(+), 8 deletions(-)
29
-
30
- diff --git a/ArmVirtPkg/ArmVirt.dsc.inc b/ArmVirtPkg/ArmVirt.dsc.inc
31
- index 35bccb3d..2bb8860 100644
32
- --- a/ArmVirtPkg/ArmVirt.dsc.inc
33
- +++ b/ArmVirtPkg/ArmVirt.dsc.inc
34
- @@ -80,6 +80,9 @@
35
- DpcLib|MdeModulePkg/Library/DxeDpcLib/DxeDpcLib.inf
36
- UdpIoLib|MdeModulePkg/Library/DxeUdpIoLib/DxeUdpIoLib.inf
37
- IpIoLib|MdeModulePkg/Library/DxeIpIoLib/DxeIpIoLib.inf
38
- +!if $(HTTP_BOOT_ENABLE) == TRUE
39
- + HttpLib|MdeModulePkg/Library/DxeHttpLib/DxeHttpLib.inf
40
- +!endif
41
-
42
- #
43
- # It is not possible to prevent the ARM compiler from inserting calls to intrinsic functions.
44
- diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
45
- index 035b729..bb9d7c8 100644
46
- --- a/ArmVirtPkg/ArmVirtQemu.dsc
47
- +++ b/ArmVirtPkg/ArmVirtQemu.dsc
48
- @@ -63,10 +63,6 @@
49
- PciSegmentLib|MdePkg/Library/BasePciSegmentLibPci/BasePciSegmentLibPci.inf
50
- PciHostBridgeLib|ArmVirtPkg/Library/FdtPciHostBridgeLib/FdtPciHostBridgeLib.inf
51
-
52
- -!if $(HTTP_BOOT_ENABLE) == TRUE
53
- - HttpLib|MdeModulePkg/Library/DxeHttpLib/DxeHttpLib.inf
54
- -!endif
55
- -
56
- [LibraryClasses.common.PEIM]
57
- ArmVirtMemInfoLib|ArmVirtPkg/Library/QemuVirtMemInfoLib/QemuVirtMemInfoPeiLib.inf
58
-
59
- diff --git a/ArmVirtPkg/ArmVirtQemuKernel.dsc b/ArmVirtPkg/ArmVirtQemuKernel.dsc
60
- index 1981aae..9027805 100644
61
- --- a/ArmVirtPkg/ArmVirtQemuKernel.dsc
62
- +++ b/ArmVirtPkg/ArmVirtQemuKernel.dsc
63
- @@ -63,10 +63,6 @@
64
- PciSegmentLib|MdePkg/Library/BasePciSegmentLibPci/BasePciSegmentLibPci.inf
65
- PciHostBridgeLib|ArmVirtPkg/Library/FdtPciHostBridgeLib/FdtPciHostBridgeLib.inf
66
-
67
- -!if $(HTTP_BOOT_ENABLE) == TRUE
68
- - HttpLib|MdeModulePkg/Library/DxeHttpLib/DxeHttpLib.inf
69
- -!endif
70
- -
71
- [LibraryClasses.common.UEFI_DRIVER]
72
- UefiScsiLib|MdePkg/Library/UefiScsiLib/UefiScsiLib.inf
73
-
74
- --
75
- 1.8.3.1
76
-
SOURCES/edk2-BaseTools-Add-more-checker-in-Decompress-algorithm-t.patch DELETED
@@ -1,273 +0,0 @@
1
- From 29c394f110b1f769e629e8775874261e33d4abd9 Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Wed, 24 Oct 2018 21:03:45 +0200
4
- Subject: [PATCH 4/4] BaseTools: Add more checker in Decompress algorithm to
5
- access the valid buffer (CVE FIX)
6
-
7
- Message-id: <20181024190345.15288-5-lersek@redhat.com>
8
- Patchwork-id: 82886
9
- O-Subject: [RHEL8 edk2 PATCH 4/4] BaseTools: Add more checker in Decompress
10
- algorithm to access the valid buffer (CVE FIX)
11
- Bugzilla: 1641445
12
- 1641453
13
- 1641464
14
- 1641469
15
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
16
- Acked-by: Thomas Huth <thuth@redhat.com>
17
-
18
- From: Liming Gao <liming.gao@intel.com>
19
-
20
- --v-- RHEL8 note start --v--
21
-
22
- Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641445
23
- Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641453
24
- Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641464
25
- Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641469
26
-
27
- Unfortunately, the upstream patch series was not structured according to
28
- the CVE reports. This patch contributes to fixing:
29
-
30
- - CVE-2017-5731
31
- - CVE-2017-5733
32
- - CVE-2017-5734
33
- - CVE-2017-5735
34
-
35
- but not CVE-2017-5732 (contrarily to the upstream commit message). The
36
- best I could achieve up-stream was to get the "CVE FIX" expression into
37
- the subject, and a whole-sale dump of the CVEs into the body. I had not
38
- been invited to the original (off-list, embargoed) analysis and review.
39
-
40
- The differences that "git-backport-diff" reports as "functional" for this
41
- backport aren't actually functional differences. They are due to
42
- downstream lacking two upstream commits:
43
-
44
- - f7496d717357 ("BaseTools: Clean up source files", 2018-07-09), with the
45
- "usual" diffstat "289 files changed, 10645 insertions(+), 10645
46
- deletions(-)";
47
-
48
- - more importantly, 472eb3b89682 ("BaseTools: Add --uefi option to enable
49
- UefiCompress method", 2018-10-13).
50
-
51
- (Side note: in upstream, commit 472eb3b89682 was incorrectly reverted as
52
- part of 1ccc4d895dd8 ("Revert BaseTools: PYTHON3 migration", 2018-10-15),
53
- but then it was re-applied in f1400101a732.)
54
-
55
- In commit 472eb3b89682, the "UEFI" compression/decompression method was
56
- added to BaseTools, beyond the original "Tiano" method. This caused the
57
- Tiano method to be indented more deeply, in the main() function of
58
- "TianoCompress.c". (Also the original Decompress() function was renamed to
59
- TDecompress().) The CVE fix applies to the "Tiano" method, which RHEL8
60
- does have, but at a different nesting level. Therefore the changes have
61
- been backported manually, and the difference in indentation is also why
62
- "git-backport-diff" thinks the changes are functional.
63
-
64
- This backport, once applied, can be diffed against the upstream tree more
65
- easily as follows:
66
-
67
- git diff -b HEAD..041d89bc0f01 -- \
68
- BaseTools/Source/C/Common/Decompress.c \
69
- BaseTools/Source/C/TianoCompress/TianoCompress.c
70
-
71
- --^-- RHEL8 note end --^--
72
-
73
- Fix CVE-2017-5731,CVE-2017-5732,CVE-2017-5733,CVE-2017-5734,CVE-2017-5735
74
- https://bugzilla.tianocore.org/show_bug.cgi?id=686
75
-
76
- Contributed-under: TianoCore Contribution Agreement 1.1
77
- Signed-off-by: Holtsclaw Brent <brent.holtsclaw@intel.com>
78
- Signed-off-by: Liming Gao <liming.gao@intel.com>
79
- Reviewed-by: Star Zeng <star.zeng@intel.com>
80
- Acked-by: Laszlo Ersek <lersek@redhat.com>
81
- (cherry picked from commit 041d89bc0f0119df37a5fce1d0f16495ff905089)
82
- ---
83
- BaseTools/Source/C/Common/Decompress.c | 23 +++++++++++++++++++--
84
- BaseTools/Source/C/TianoCompress/TianoCompress.c | 26 +++++++++++++++++++++++-
85
- 2 files changed, 46 insertions(+), 3 deletions(-)
86
-
87
- diff --git a/BaseTools/Source/C/Common/Decompress.c b/BaseTools/Source/C/Common/Decompress.c
88
- index 8f1afb4..bdc10f5 100644
89
- --- a/BaseTools/Source/C/Common/Decompress.c
90
- +++ b/BaseTools/Source/C/Common/Decompress.c
91
- @@ -194,12 +194,16 @@ Returns:
92
- UINT16 Avail;
93
- UINT16 NextCode;
94
- UINT16 Mask;
95
- + UINT16 MaxTableLength;
96
-
97
- for (Index = 1; Index <= 16; Index++) {
98
- Count[Index] = 0;
99
- }
100
-
101
- for (Index = 0; Index < NumOfChar; Index++) {
102
- + if (BitLen[Index] > 16) {
103
- + return (UINT16) BAD_TABLE;
104
- + }
105
- Count[BitLen[Index]]++;
106
- }
107
-
108
- @@ -237,6 +241,7 @@ Returns:
109
-
110
- Avail = NumOfChar;
111
- Mask = (UINT16) (1U << (15 - TableBits));
112
- + MaxTableLength = (UINT16) (1U << TableBits);
113
-
114
- for (Char = 0; Char < NumOfChar; Char++) {
115
-
116
- @@ -250,6 +255,9 @@ Returns:
117
- if (Len <= TableBits) {
118
-
119
- for (Index = Start[Len]; Index < NextCode; Index++) {
120
- + if (Index >= MaxTableLength) {
121
- + return (UINT16) BAD_TABLE;
122
- + }
123
- Table[Index] = Char;
124
- }
125
-
126
- @@ -643,10 +651,14 @@ Returns: (VOID)
127
-
128
- BytesRemain--;
129
- while ((INT16) (BytesRemain) >= 0) {
130
- - Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
131
- if (Sd->mOutBuf >= Sd->mOrigSize) {
132
- return ;
133
- }
134
- + if (DataIdx >= Sd->mOrigSize) {
135
- + Sd->mBadTableFlag = (UINT16) BAD_TABLE;
136
- + return ;
137
- + }
138
- + Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
139
-
140
- BytesRemain--;
141
- }
142
- @@ -684,6 +696,7 @@ Returns:
143
- --*/
144
- {
145
- UINT8 *Src;
146
- + UINT32 CompSize;
147
-
148
- *ScratchSize = sizeof (SCRATCH_DATA);
149
-
150
- @@ -692,7 +705,13 @@ Returns:
151
- return EFI_INVALID_PARAMETER;
152
- }
153
-
154
- + CompSize = Src[0] + (Src[1] << 8) + (Src[2] << 16) + (Src[3] << 24);
155
- *DstSize = Src[4] + (Src[5] << 8) + (Src[6] << 16) + (Src[7] << 24);
156
- +
157
- + if (SrcSize < CompSize + 8 || (CompSize + 8) < 8) {
158
- + return EFI_INVALID_PARAMETER;
159
- + }
160
- +
161
- return EFI_SUCCESS;
162
- }
163
-
164
- @@ -752,7 +771,7 @@ Returns:
165
- CompSize = Src[0] + (Src[1] << 8) + (Src[2] << 16) + (Src[3] << 24);
166
- OrigSize = Src[4] + (Src[5] << 8) + (Src[6] << 16) + (Src[7] << 24);
167
-
168
- - if (SrcSize < CompSize + 8) {
169
- + if (SrcSize < CompSize + 8 || (CompSize + 8) < 8) {
170
- return EFI_INVALID_PARAMETER;
171
- }
172
-
173
- diff --git a/BaseTools/Source/C/TianoCompress/TianoCompress.c b/BaseTools/Source/C/TianoCompress/TianoCompress.c
174
- index 046fb36..d07fd9e 100644
175
- --- a/BaseTools/Source/C/TianoCompress/TianoCompress.c
176
- +++ b/BaseTools/Source/C/TianoCompress/TianoCompress.c
177
- @@ -1753,6 +1753,7 @@ Returns:
178
- SCRATCH_DATA *Scratch;
179
- UINT8 *Src;
180
- UINT32 OrigSize;
181
- + UINT32 CompSize;
182
-
183
- SetUtilityName(UTILITY_NAME);
184
-
185
- @@ -1761,6 +1762,7 @@ Returns:
186
- OutBuffer = NULL;
187
- Scratch = NULL;
188
- OrigSize = 0;
189
- + CompSize = 0;
190
- InputLength = 0;
191
- InputFileName = NULL;
192
- OutputFileName = NULL;
193
- @@ -1979,15 +1981,24 @@ Returns:
194
- if (DebugMode) {
195
- DebugMsg(UTILITY_NAME, 0, DebugLevel, "Decoding\n", NULL);
196
- }
197
- + if (InputLength < 8){
198
- + Error (NULL, 0, 3000, "Invalid", "The input file %s is too small.", InputFileName);
199
- + goto ERROR;
200
- + }
201
- //
202
- // Get Compressed file original size
203
- //
204
- Src = (UINT8 *)FileBuffer;
205
- OrigSize = Src[4] + (Src[5] << 8) + (Src[6] << 16) + (Src[7] << 24);
206
- + CompSize = Src[0] + (Src[1] << 8) + (Src[2] <<16) + (Src[3] <<24);
207
-
208
- //
209
- // Allocate OutputBuffer
210
- //
211
- + if (InputLength < CompSize + 8 || (CompSize + 8) < 8) {
212
- + Error (NULL, 0, 3000, "Invalid", "The input file %s data is invalid.", InputFileName);
213
- + goto ERROR;
214
- + }
215
- OutBuffer = (UINT8 *)malloc(OrigSize);
216
- if (OutBuffer == NULL) {
217
- Error (NULL, 0, 4001, "Resource:", "Memory cannot be allocated!");
218
- @@ -2171,12 +2182,16 @@ Returns:
219
- UINT16 Mask;
220
- UINT16 WordOfStart;
221
- UINT16 WordOfCount;
222
- + UINT16 MaxTableLength;
223
-
224
- for (Index = 0; Index <= 16; Index++) {
225
- Count[Index] = 0;
226
- }
227
-
228
- for (Index = 0; Index < NumOfChar; Index++) {
229
- + if (BitLen[Index] > 16) {
230
- + return (UINT16) BAD_TABLE;
231
- + }
232
- Count[BitLen[Index]]++;
233
- }
234
-
235
- @@ -2220,6 +2235,7 @@ Returns:
236
-
237
- Avail = NumOfChar;
238
- Mask = (UINT16) (1U << (15 - TableBits));
239
- + MaxTableLength = (UINT16) (1U << TableBits);
240
-
241
- for (Char = 0; Char < NumOfChar; Char++) {
242
-
243
- @@ -2233,6 +2249,9 @@ Returns:
244
- if (Len <= TableBits) {
245
-
246
- for (Index = Start[Len]; Index < NextCode; Index++) {
247
- + if (Index >= MaxTableLength) {
248
- + return (UINT16) BAD_TABLE;
249
- + }
250
- Table[Index] = Char;
251
- }
252
-
253
- @@ -2617,11 +2636,16 @@ Returns: (VOID)
254
- DataIdx = Sd->mOutBuf - DecodeP (Sd) - 1;
255
-
256
- BytesRemain--;
257
- +
258
- while ((INT16) (BytesRemain) >= 0) {
259
- - Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
260
- if (Sd->mOutBuf >= Sd->mOrigSize) {
261
- goto Done ;
262
- }
263
- + if (DataIdx >= Sd->mOrigSize) {
264
- + Sd->mBadTableFlag = (UINT16) BAD_TABLE;
265
- + goto Done ;
266
- + }
267
- + Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
268
-
269
- BytesRemain--;
270
- }
271
- --
272
- 1.8.3.1
273
-
SOURCES/edk2-BaseTools-Fix-UEFI-and-Tiano-Decompression-logic-iss.patch DELETED
@@ -1,73 +0,0 @@
1
- From 115cf260ac54a6793a184227d6ae6bfe3da74a56 Mon Sep 17 00:00:00 2001
2
- From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philmd@redhat.com>
3
- Date: Wed, 9 Jan 2019 17:10:05 +0100
4
- Subject: [PATCH 1/4] BaseTools: Fix UEFI and Tiano Decompression logic issue
5
- MIME-Version: 1.0
6
- Content-Type: text/plain; charset=UTF-8
7
- Content-Transfer-Encoding: 8bit
8
-
9
- Message-id: <20190109161007.3471-2-philmd@redhat.com>
10
- Patchwork-id: 83924
11
- O-Subject: [RHEL8 edk2 PATCH 1/3] BaseTools: Fix UEFI and Tiano Decompression
12
- logic issue
13
- Bugzilla: 1662184
14
- Acked-by: Laszlo Ersek <lersek@redhat.com>
15
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
16
-
17
- From: Liming Gao <liming.gao@intel.com>
18
-
19
- https://bugzilla.tianocore.org/show_bug.cgi?id=1317
20
-
21
- This is a regression issue caused by 041d89bc0f0119df37a5fce1d0f16495ff905089.
22
- In Decode() function, once mOutBuf is fully filled, Decode() should return.
23
- Current logic misses the checker of mOutBuf after while() loop.
24
-
25
- Contributed-under: TianoCore Contribution Agreement 1.1
26
- Signed-off-by: Liming Gao <liming.gao@intel.com>
27
- Cc: Yonghong Zhu <yonghong.zhu@intel.com>
28
- Reviewed-by: Yonghong Zhu <yonghong.zhu@intel.com>
29
- (cherry picked from commit 5e45a1fdcfbf9b2b389122eb97475148594625f8)
30
- Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
31
- Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
32
- ---
33
- BaseTools/Source/C/Common/Decompress.c | 6 ++++++
34
- BaseTools/Source/C/TianoCompress/TianoCompress.c | 6 ++++++
35
- 2 files changed, 12 insertions(+)
36
-
37
- diff --git a/BaseTools/Source/C/Common/Decompress.c b/BaseTools/Source/C/Common/Decompress.c
38
- index bdc10f5..af76f67 100644
39
- --- a/BaseTools/Source/C/Common/Decompress.c
40
- +++ b/BaseTools/Source/C/Common/Decompress.c
41
- @@ -662,6 +662,12 @@ Returns: (VOID)
42
-
43
- BytesRemain--;
44
- }
45
- + //
46
- + // Once mOutBuf is fully filled, directly return
47
- + //
48
- + if (Sd->mOutBuf >= Sd->mOrigSize) {
49
- + return ;
50
- + }
51
- }
52
- }
53
-
54
- diff --git a/BaseTools/Source/C/TianoCompress/TianoCompress.c b/BaseTools/Source/C/TianoCompress/TianoCompress.c
55
- index d07fd9e..369f7b3 100644
56
- --- a/BaseTools/Source/C/TianoCompress/TianoCompress.c
57
- +++ b/BaseTools/Source/C/TianoCompress/TianoCompress.c
58
- @@ -2649,6 +2649,12 @@ Returns: (VOID)
59
-
60
- BytesRemain--;
61
- }
62
- + //
63
- + // Once mOutBuf is fully filled, directly return
64
- + //
65
- + if (Sd->mOutBuf >= Sd->mOrigSize) {
66
- + goto Done ;
67
- + }
68
- }
69
- }
70
-
71
- --
72
- 1.8.3.1
73
-
SOURCES/edk2-BaseTools-Source-C-split-O2-to-BUILD_OPTFLAGS.patch DELETED
@@ -1,98 +0,0 @@
1
- From bd8f7996e759b1aa2549efc6062dbed8ac9b8dcb Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Wed, 29 Aug 2018 17:12:00 +0200
4
- Subject: [PATCH 3/7] BaseTools/Source/C: split "-O2" to BUILD_OPTFLAGS
5
-
6
- Message-id: <20180829151204.26958-4-lersek@redhat.com>
7
- Patchwork-id: 81961
8
- O-Subject: [RHEL8/virt212 edk2 PATCH 3/7] BaseTools/Source/C: split "-O2" to
9
- BUILD_OPTFLAGS
10
- Bugzilla: 1607906
11
- Acked-by: Thomas Huth <thuth@redhat.com>
12
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
13
-
14
- The option "-O2" is not a preprocessor flag, but a code generation
15
- (compilation) flag. Move it from BUILD_CPPFLAGS to BUILD_CFLAGS and
16
- BUILD_CXXFLAGS.
17
-
18
- Because "VfrCompile/GNUmakefile" uses "-O2" through BUILD_CPPFLAGS, and
19
- because it doesn't use BUILD_CXXFLAGS, we have to introduce BUILD_OPTFLAGS
20
- separately, so that "VfrCompile/GNUmakefile" can continue using just this
21
- flag.
22
-
23
- This patch doesn't change behavior.
24
-
25
- Cc: Liming Gao <liming.gao@intel.com>
26
- Cc: Yonghong Zhu <yonghong.zhu@intel.com>
27
- Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1540244
28
- Contributed-under: TianoCore Contribution Agreement 1.1
29
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
30
- Reviewed-by: Liming Gao <liming.gao@intel.com>
31
- (cherry picked from commit b8a66170264395edeaa61e6d22930a58e576a685)
32
- ---
33
- BaseTools/Source/C/Makefiles/header.makefile | 6 +++++-
34
- BaseTools/Source/C/VfrCompile/GNUmakefile | 11 +++++++----
35
- 2 files changed, 12 insertions(+), 5 deletions(-)
36
-
37
- diff --git a/BaseTools/Source/C/Makefiles/header.makefile b/BaseTools/Source/C/Makefiles/header.makefile
38
- index 08421ba..498c6cf 100644
39
- --- a/BaseTools/Source/C/Makefiles/header.makefile
40
- +++ b/BaseTools/Source/C/Makefiles/header.makefile
41
- @@ -68,7 +68,8 @@ $(error Bad HOST_ARCH)
42
- endif
43
-
44
- INCLUDE = $(TOOL_INCLUDE) -I $(MAKEROOT) -I $(MAKEROOT)/Include/Common -I $(MAKEROOT)/Include/ -I $(MAKEROOT)/Include/IndustryStandard -I $(MAKEROOT)/Common/ -I .. -I . $(ARCH_INCLUDE)
45
- -BUILD_CPPFLAGS = $(INCLUDE) -O2
46
- +BUILD_CPPFLAGS = $(INCLUDE)
47
- +BUILD_OPTFLAGS = -O2
48
- ifeq ($(DARWIN),Darwin)
49
- # assume clang or clang compatible flags on OS X
50
- BUILD_CFLAGS = -MD -fshort-wchar -fno-strict-aliasing -Wall -Werror -Wno-deprecated-declarations -Wno-self-assign -Wno-unused-result -nostdlib -g
51
- @@ -91,6 +92,9 @@ ifeq ($(DARWIN),Darwin)
52
- endif
53
- endif
54
-
55
- +# keep BUILD_OPTFLAGS last
56
- +BUILD_CFLAGS += $(BUILD_OPTFLAGS)
57
- +BUILD_CXXFLAGS += $(BUILD_OPTFLAGS)
58
-
59
- .PHONY: all
60
- .PHONY: install
61
- diff --git a/BaseTools/Source/C/VfrCompile/GNUmakefile b/BaseTools/Source/C/VfrCompile/GNUmakefile
62
- index c4ec61a..bbe562c 100644
63
- --- a/BaseTools/Source/C/VfrCompile/GNUmakefile
64
- +++ b/BaseTools/Source/C/VfrCompile/GNUmakefile
65
- @@ -25,6 +25,9 @@ OBJECTS = AParser.o DLexerBase.o ATokenBuffer.o EfiVfrParser.o VfrLexer.o VfrSyn
66
-
67
- VFR_CPPFLAGS = -DPCCTS_USE_NAMESPACE_STD $(BUILD_CPPFLAGS)
68
-
69
- +# keep BUILD_OPTFLAGS last
70
- +VFR_CXXFLAGS = $(BUILD_OPTFLAGS)
71
- +
72
- LINKER = $(BUILD_CXX)
73
-
74
- EXTRA_CLEAN_OBJECTS = EfiVfrParser.cpp EfiVfrParser.h VfrParser.dlg VfrTokens.h VfrLexer.cpp VfrLexer.h VfrSyntax.cpp tokens.h
75
- @@ -58,16 +61,16 @@ Pccts/dlg/dlg:
76
- BIN_DIR='.' $(MAKE) -C Pccts/dlg
77
-
78
- ATokenBuffer.o: Pccts/h/ATokenBuffer.cpp
79
- - $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $? -o $@
80
- + $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $(VFR_CXXFLAGS) $? -o $@
81
-
82
- DLexerBase.o: Pccts/h/DLexerBase.cpp
83
- - $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $? -o $@
84
- + $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $(VFR_CXXFLAGS) $? -o $@
85
-
86
- AParser.o: Pccts/h/AParser.cpp
87
- - $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $? -o $@
88
- + $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $(VFR_CXXFLAGS) $? -o $@
89
-
90
- VfrSyntax.o: VfrSyntax.cpp
91
- - $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $? -o $@
92
- + $(BUILD_CXX) -c $(VFR_CPPFLAGS) $(INC) $(VFR_CXXFLAGS) $? -o $@
93
-
94
- clean: localClean
95
-
96
- --
97
- 1.8.3.1
98
-
SOURCES/edk2-BaseTools-Source-C-take-EXTRA_LDFLAGS-from-the-calle.patch DELETED
@@ -1,46 +0,0 @@
1
- From 7ad1348d09a32c467229ee8bef98a09e47b5a708 Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Wed, 29 Aug 2018 17:12:02 +0200
4
- Subject: [PATCH 5/7] BaseTools/Source/C: take EXTRA_LDFLAGS from the caller
5
-
6
- Message-id: <20180829151204.26958-6-lersek@redhat.com>
7
- Patchwork-id: 81965
8
- O-Subject: [RHEL8/virt212 edk2 PATCH 5/7] BaseTools/Source/C: take EXTRA_LDFLAGS
9
- from the caller
10
- Bugzilla: 1607906
11
- Acked-by: Thomas Huth <thuth@redhat.com>
12
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
13
-
14
- Allow the caller of the top-level makefile either to set EXTRA_LDFLAGS in
15
- the environment or to pass EXTRA_LDFLAGS as a macro definition on the
16
- command line. EXTRA_LDFLAGS extends (and potentially overrides) default
17
- link-editing flags set in the makefiles.
18
-
19
- Cc: Liming Gao <liming.gao@intel.com>
20
- Cc: Yonghong Zhu <yonghong.zhu@intel.com>
21
- Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1540244
22
- Contributed-under: TianoCore Contribution Agreement 1.1
23
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
24
- Reviewed-by: Liming Gao <liming.gao@intel.com>
25
- (cherry picked from commit 81502cee20ac4046f08bb4aec754c7091c8808dc)
26
- ---
27
- BaseTools/Source/C/Makefiles/header.makefile | 3 +++
28
- 1 file changed, 3 insertions(+)
29
-
30
- diff --git a/BaseTools/Source/C/Makefiles/header.makefile b/BaseTools/Source/C/Makefiles/header.makefile
31
- index 1b4cad5..7f283d6 100644
32
- --- a/BaseTools/Source/C/Makefiles/header.makefile
33
- +++ b/BaseTools/Source/C/Makefiles/header.makefile
34
- @@ -99,6 +99,9 @@ endif
35
- BUILD_CFLAGS += $(BUILD_OPTFLAGS)
36
- BUILD_CXXFLAGS += $(BUILD_OPTFLAGS)
37
-
38
- +# keep EXTRA_LDFLAGS last
39
- +BUILD_LFLAGS += $(EXTRA_LDFLAGS)
40
- +
41
- .PHONY: all
42
- .PHONY: install
43
- .PHONY: clean
44
- --
45
- 1.8.3.1
46
-
SOURCES/edk2-BaseTools-Source-C-take-EXTRA_OPTFLAGS-from-the-call.patch DELETED
@@ -1,48 +0,0 @@
1
- From c8f78f5ef3463ffb63d26879d858327aba934d12 Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Wed, 29 Aug 2018 17:12:01 +0200
4
- Subject: [PATCH 4/7] BaseTools/Source/C: take EXTRA_OPTFLAGS from the caller
5
-
6
- Message-id: <20180829151204.26958-5-lersek@redhat.com>
7
- Patchwork-id: 81966
8
- O-Subject: [RHEL8/virt212 edk2 PATCH 4/7] BaseTools/Source/C: take
9
- EXTRA_OPTFLAGS from the caller
10
- Bugzilla: 1607906
11
- Acked-by: Thomas Huth <thuth@redhat.com>
12
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
13
-
14
- Allow the caller of the top-level makefile either to set EXTRA_OPTFLAGS in
15
- the environment or to pass EXTRA_OPTFLAGS as a macro definition on the
16
- command line. EXTRA_OPTFLAGS extends (and potentially overrides) default C
17
- compilation flags set in the makefiles.
18
-
19
- Cc: Liming Gao <liming.gao@intel.com>
20
- Cc: Yonghong Zhu <yonghong.zhu@intel.com>
21
- Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1540244
22
- Contributed-under: TianoCore Contribution Agreement 1.1
23
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
24
- Reviewed-by: Liming Gao <liming.gao@intel.com>
25
- (cherry picked from commit b0ca5dae78ff71397a8ef568f1914da7668ff5a9)
26
- ---
27
- BaseTools/Source/C/Makefiles/header.makefile | 5 ++++-
28
- 1 file changed, 4 insertions(+), 1 deletion(-)
29
-
30
- diff --git a/BaseTools/Source/C/Makefiles/header.makefile b/BaseTools/Source/C/Makefiles/header.makefile
31
- index 498c6cf..1b4cad5 100644
32
- --- a/BaseTools/Source/C/Makefiles/header.makefile
33
- +++ b/BaseTools/Source/C/Makefiles/header.makefile
34
- @@ -69,7 +69,10 @@ endif
35
-
36
- INCLUDE = $(TOOL_INCLUDE) -I $(MAKEROOT) -I $(MAKEROOT)/Include/Common -I $(MAKEROOT)/Include/ -I $(MAKEROOT)/Include/IndustryStandard -I $(MAKEROOT)/Common/ -I .. -I . $(ARCH_INCLUDE)
37
- BUILD_CPPFLAGS = $(INCLUDE)
38
- -BUILD_OPTFLAGS = -O2
39
- +
40
- +# keep EXTRA_OPTFLAGS last
41
- +BUILD_OPTFLAGS = -O2 $(EXTRA_OPTFLAGS)
42
- +
43
- ifeq ($(DARWIN),Darwin)
44
- # assume clang or clang compatible flags on OS X
45
- BUILD_CFLAGS = -MD -fshort-wchar -fno-strict-aliasing -Wall -Werror -Wno-deprecated-declarations -Wno-self-assign -Wno-unused-result -nostdlib -g
46
- --
47
- 1.8.3.1
48
-
SOURCES/edk2-BaseTools-VfrCompile-honor-EXTRA_LDFLAGS.patch DELETED
@@ -1,80 +0,0 @@
1
- From 5825a1b2507e195c40a8655e18c5485c00513445 Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Wed, 29 Aug 2018 17:12:03 +0200
4
- Subject: [PATCH 6/7] BaseTools/VfrCompile: honor EXTRA_LDFLAGS
5
-
6
- Message-id: <20180829151204.26958-7-lersek@redhat.com>
7
- Patchwork-id: 81963
8
- O-Subject: [RHEL8/virt212 edk2 PATCH 6/7] BaseTools/VfrCompile: honor
9
- EXTRA_LDFLAGS
10
- Bugzilla: 1607906
11
- Acked-by: Thomas Huth <thuth@redhat.com>
12
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
13
-
14
- In commit 81502cee20ac ("BaseTools/Source/C: take EXTRA_LDFLAGS from the
15
- caller", 2018-08-16), I missed that "VfrCompile/GNUmakefile" does not use
16
- BUILD_LFLAGS in the APPLICATION linking rule, unlike "app.makefile" does.
17
- Instead, "VfrCompile/GNUmakefile" uses the (undefined) LFLAGS macro.
18
- Therefore commit 81502cee20ac did not cover the linking step of
19
- VfrCompile.
20
-
21
- Thankfully, the structure of the linking rules is the same, between
22
- "app.makefile" and "VfrCompile/GNUmakefile". Rename the undefined LFLAGS
23
- macro in "VfrCompile/GNUmakefile" to VFR_LFLAGS (for consistency with
24
- VFR_CXXFLAGS), and set it to EXTRA_LDFLAGS.
25
-
26
- As a result, we have:
27
-
28
- | compilation | linking
29
- -----------+--------------------------------+----------------------
30
- VfrCompile | VFR_CXXFLAGS = | VFR_LFLAGS =
31
- | BUILD_OPTFLAGS = | EXTRA_LDFLAGS
32
- | '-O2' + EXTRA_OPTFLAGS |
33
- -----------+--------------------------------+----------------------
34
- other apps | BUILD_CFLAGS/BUILD_CXXFLAGS = | BUILD_LFLAGS =
35
- | [...] + BUILD_OPTFLAGS = | [...] + EXTRA_LDFLAGS
36
- | [...] + '-O2' + EXTRA_OPTFLAGS |
37
-
38
- This table shows
39
- - that the VfrCompile compilation and linking flags are always a subset of
40
- the corresponding flags used by the other apps,
41
- - and that the EXTRA flags are always at the end.
42
-
43
- Cc: Liming Gao <liming.gao@intel.com>
44
- Cc: Yonghong Zhu <yonghong.zhu@intel.com>
45
- Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1540244
46
- Fixes: 81502cee20ac4046f08bb4aec754c7091c8808dc
47
- Contributed-under: TianoCore Contribution Agreement 1.1
48
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
49
- Reviewed-by: Liming Gao <liming.gao@intel.com>
50
- (cherry picked from commit aa4e0df1f0c7ffdff07d7e382c9da89cbe207cdb)
51
- ---
52
- BaseTools/Source/C/VfrCompile/GNUmakefile | 5 ++++-
53
- 1 file changed, 4 insertions(+), 1 deletion(-)
54
-
55
- diff --git a/BaseTools/Source/C/VfrCompile/GNUmakefile b/BaseTools/Source/C/VfrCompile/GNUmakefile
56
- index bbe562c..9273589 100644
57
- --- a/BaseTools/Source/C/VfrCompile/GNUmakefile
58
- +++ b/BaseTools/Source/C/VfrCompile/GNUmakefile
59
- @@ -28,6 +28,9 @@ VFR_CPPFLAGS = -DPCCTS_USE_NAMESPACE_STD $(BUILD_CPPFLAGS)
60
- # keep BUILD_OPTFLAGS last
61
- VFR_CXXFLAGS = $(BUILD_OPTFLAGS)
62
-
63
- +# keep EXTRA_LDFLAGS last
64
- +VFR_LFLAGS = $(EXTRA_LDFLAGS)
65
- +
66
- LINKER = $(BUILD_CXX)
67
-
68
- EXTRA_CLEAN_OBJECTS = EfiVfrParser.cpp EfiVfrParser.h VfrParser.dlg VfrTokens.h VfrLexer.cpp VfrLexer.h VfrSyntax.cpp tokens.h
69
- @@ -42,7 +45,7 @@ APPLICATION = $(MAKEROOT)/bin/$(APPNAME)
70
- all: $(MAKEROOT)/bin $(APPLICATION)
71
-
72
- $(APPLICATION): $(OBJECTS)
73
- - $(LINKER) -o $(APPLICATION) $(LFLAGS) $(OBJECTS) -L$(MAKEROOT)/libs $(LIBS)
74
- + $(LINKER) -o $(APPLICATION) $(VFR_LFLAGS) $(OBJECTS) -L$(MAKEROOT)/libs $(LIBS)
75
-
76
- VfrCompiler.o: ../Include/Common/BuildVersion.h
77
-
78
- --
79
- 1.8.3.1
80
-
SOURCES/edk2-BaseTools-footer.makefile-expand-BUILD_CFLAGS-last-f.patch DELETED
@@ -1,46 +0,0 @@
1
- From 5898a7a6403bb5ff73fc27a39f9c64b746089cb1 Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Wed, 29 Aug 2018 17:11:58 +0200
4
- Subject: [PATCH 1/7] BaseTools/footer.makefile: expand BUILD_CFLAGS last for C
5
- files too
6
-
7
- Message-id: <20180829151204.26958-2-lersek@redhat.com>
8
- Patchwork-id: 81962
9
- O-Subject: [RHEL8/virt212 edk2 PATCH 1/7] BaseTools/footer.makefile: expand
10
- BUILD_CFLAGS last for C files too
11
- Bugzilla: 1607906
12
- Acked-by: Thomas Huth <thuth@redhat.com>
13
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
14
-
15
- BUILD_CPPFLAGS should be expanded before BUILD_CFLAGS. (The rule for C++
16
- source files already does this, with BUILD_CPPFLAGS and BUILD_CXXFLAGS.)
17
-
18
- This patch doesn't change behavior.
19
-
20
- Cc: Liming Gao <liming.gao@intel.com>
21
- Cc: Yonghong Zhu <yonghong.zhu@intel.com>
22
- Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1540244
23
- Contributed-under: TianoCore Contribution Agreement 1.1
24
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
25
- Reviewed-by: Liming Gao <liming.gao@intel.com>
26
- (cherry picked from commit 67983484a4430c5f82bb5f1397e010c759136321)
27
- ---
28
- BaseTools/Source/C/Makefiles/footer.makefile | 2 +-
29
- 1 file changed, 1 insertion(+), 1 deletion(-)
30
-
31
- diff --git a/BaseTools/Source/C/Makefiles/footer.makefile b/BaseTools/Source/C/Makefiles/footer.makefile
32
- index 0926aa9..5bda9e4 100644
33
- --- a/BaseTools/Source/C/Makefiles/footer.makefile
34
- +++ b/BaseTools/Source/C/Makefiles/footer.makefile
35
- @@ -24,7 +24,7 @@ $(LIBRARY): $(OBJECTS)
36
- $(BUILD_AR) crs $@ $^
37
-
38
- %.o : %.c
39
- - $(BUILD_CC) -c $(BUILD_CFLAGS) $(BUILD_CPPFLAGS) $< -o $@
40
- + $(BUILD_CC) -c $(BUILD_CPPFLAGS) $(BUILD_CFLAGS) $< -o $@
41
-
42
- %.o : %.cpp
43
- $(BUILD_CXX) -c $(BUILD_CPPFLAGS) $(BUILD_CXXFLAGS) $< -o $@
44
- --
45
- 1.8.3.1
46
-
SOURCES/edk2-BaseTools-header.makefile-remove-c-from-BUILD_CFLAGS.patch DELETED
@@ -1,51 +0,0 @@
1
- From e7091299a079fd0405f01276f35838884b4c06b5 Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Wed, 29 Aug 2018 17:11:59 +0200
4
- Subject: [PATCH 2/7] BaseTools/header.makefile: remove "-c" from BUILD_CFLAGS
5
-
6
- Message-id: <20180829151204.26958-3-lersek@redhat.com>
7
- Patchwork-id: 81964
8
- O-Subject: [RHEL8/virt212 edk2 PATCH 2/7] BaseTools/header.makefile: remove "-c"
9
- from BUILD_CFLAGS
10
- Bugzilla: 1607906
11
- Acked-by: Thomas Huth <thuth@redhat.com>
12
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
13
-
14
- Option "-c" is a mode selection flag (choosing between compiling and
15
- linking); it should not be in BUILD_CFLAGS, which applies only to
16
- compiling anyway. The compilation rule for C source files, in
17
- "footer.makefile", already includes "-c" -- currently we have double "-c"
18
- options.
19
-
20
- This patch doesn't change behavior.
21
-
22
- Cc: Liming Gao <liming.gao@intel.com>
23
- Cc: Yonghong Zhu <yonghong.zhu@intel.com>
24
- Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1540244
25
- Contributed-under: TianoCore Contribution Agreement 1.1
26
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
27
- Reviewed-by: Liming Gao <liming.gao@intel.com>
28
- (cherry picked from commit 03252ae287c4a61983b3793ff71baeabe2ff3df7)
29
- ---
30
- BaseTools/Source/C/Makefiles/header.makefile | 4 ++--
31
- 1 file changed, 2 insertions(+), 2 deletions(-)
32
-
33
- diff --git a/BaseTools/Source/C/Makefiles/header.makefile b/BaseTools/Source/C/Makefiles/header.makefile
34
- index db43677..08421ba 100644
35
- --- a/BaseTools/Source/C/Makefiles/header.makefile
36
- +++ b/BaseTools/Source/C/Makefiles/header.makefile
37
- @@ -71,9 +71,9 @@ INCLUDE = $(TOOL_INCLUDE) -I $(MAKEROOT) -I $(MAKEROOT)/Include/Common -I $(MAKE
38
- BUILD_CPPFLAGS = $(INCLUDE) -O2
39
- ifeq ($(DARWIN),Darwin)
40
- # assume clang or clang compatible flags on OS X
41
- -BUILD_CFLAGS = -MD -fshort-wchar -fno-strict-aliasing -Wall -Werror -Wno-deprecated-declarations -Wno-self-assign -Wno-unused-result -nostdlib -c -g
42
- +BUILD_CFLAGS = -MD -fshort-wchar -fno-strict-aliasing -Wall -Werror -Wno-deprecated-declarations -Wno-self-assign -Wno-unused-result -nostdlib -g
43
- else
44
- -BUILD_CFLAGS = -MD -fshort-wchar -fno-strict-aliasing -Wall -Werror -Wno-deprecated-declarations -Wno-stringop-truncation -Wno-restrict -Wno-unused-result -nostdlib -c -g
45
- +BUILD_CFLAGS = -MD -fshort-wchar -fno-strict-aliasing -Wall -Werror -Wno-deprecated-declarations -Wno-stringop-truncation -Wno-restrict -Wno-unused-result -nostdlib -g
46
- endif
47
- BUILD_LFLAGS =
48
- BUILD_CXXFLAGS = -Wno-unused-result
49
- --
50
- 1.8.3.1
51
-
SOURCES/edk2-IntelFrameworkModulePkg-Add-more-checker-in-UefiTian.patch DELETED
@@ -1,130 +0,0 @@
1
- From 8358e53013fc62c9556598ad842d233906de00ef Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Wed, 24 Oct 2018 21:03:44 +0200
4
- Subject: [PATCH 3/4] IntelFrameworkModulePkg: Add more checker in
5
- UefiTianoDecompressLib (CVE FIX)
6
-
7
- Message-id: <20181024190345.15288-4-lersek@redhat.com>
8
- Patchwork-id: 82885
9
- O-Subject: [RHEL8 edk2 PATCH 3/4] IntelFrameworkModulePkg: Add more checker in
10
- UefiTianoDecompressLib (CVE FIX)
11
- Bugzilla: 1641453
12
- 1641464
13
- 1641469
14
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
15
- Acked-by: Thomas Huth <thuth@redhat.com>
16
-
17
- From: Liming Gao <liming.gao@intel.com>
18
-
19
- --v-- RHEL8 note start --v--
20
-
21
- Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641453
22
- Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641464
23
- Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641469
24
-
25
- Unfortunately, the upstream patch series was not structured according to
26
- the CVE reports. This patch contributes to fixing:
27
-
28
- - CVE-2017-5733
29
- - CVE-2017-5734
30
- - CVE-2017-5735
31
-
32
- but not CVE-2017-5731 or CVE-2017-5732 (contrarily to the upstream commit
33
- message). The best I could achieve up-stream was to get the "CVE FIX"
34
- expression into the subject, and a whole-sale dump of the CVEs into the
35
- body. I had not been invited to the original (off-list, embargoed)
36
- analysis and review.
37
-
38
- The trivial context difference (whitespace) is due to RHEL8 lacking
39
- upstream commit 0a6f48249a60 ("IntelFrameworkModulePkg: Clean up source
40
- files", 2018-06-28). I've considered backporting that (since it only
41
- cleans up whitespace). However, the diffstat on that commit convinced me
42
- otherwise: "246 files changed, 4067 insertions(+), 4067 deletions(-)".
43
- I've decided not to do a partial backport of that (i.e. just for
44
- "BaseUefiTianoCustomDecompressLib.c").
45
-
46
- --^-- RHEL8 note end --^--
47
-
48
- Fix CVE-2017-5731,CVE-2017-5732,CVE-2017-5733,CVE-2017-5734,CVE-2017-5735
49
- https://bugzilla.tianocore.org/show_bug.cgi?id=686
50
- To make sure the valid buffer be accessed only.
51
-
52
- Contributed-under: TianoCore Contribution Agreement 1.1
53
- Signed-off-by: Holtsclaw Brent <brent.holtsclaw@intel.com>
54
- Signed-off-by: Liming Gao <liming.gao@intel.com>
55
- Reviewed-by: Star Zeng <star.zeng@intel.com>
56
- Acked-by: Laszlo Ersek <lersek@redhat.com>
57
- (cherry picked from commit 684db6da64bc7b5faee4e1174e801c245f563b5c)
58
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
59
- ---
60
- .../BaseUefiTianoCustomDecompressLib.c | 16 ++++++++++++++--
61
- 1 file changed, 14 insertions(+), 2 deletions(-)
62
-
63
- diff --git a/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c b/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c
64
- index cb009e7..9b00166 100644
65
- --- a/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c
66
- +++ b/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c
67
- @@ -143,6 +143,7 @@ MakeTable (
68
- UINT16 Mask;
69
- UINT16 WordOfStart;
70
- UINT16 WordOfCount;
71
- + UINT16 MaxTableLength;
72
-
73
- //
74
- // The maximum mapping table width supported by this internal
75
- @@ -155,6 +156,9 @@ MakeTable (
76
- }
77
-
78
- for (Index = 0; Index < NumOfChar; Index++) {
79
- + if (BitLen[Index] > 16) {
80
- + return (UINT16) BAD_TABLE;
81
- + }
82
- Count[BitLen[Index]]++;
83
- }
84
-
85
- @@ -196,6 +200,7 @@ MakeTable (
86
-
87
- Avail = NumOfChar;
88
- Mask = (UINT16) (1U << (15 - TableBits));
89
- + MaxTableLength = (UINT16) (1U << TableBits);
90
-
91
- for (Char = 0; Char < NumOfChar; Char++) {
92
-
93
- @@ -209,6 +214,9 @@ MakeTable (
94
- if (Len <= TableBits) {
95
-
96
- for (Index = Start[Len]; Index < NextCode; Index++) {
97
- + if (Index >= MaxTableLength) {
98
- + return (UINT16) BAD_TABLE;
99
- + }
100
- Table[Index] = Char;
101
- }
102
-
103
- @@ -615,10 +623,14 @@ Decode (
104
- //
105
- BytesRemain--;
106
- while ((INT16) (BytesRemain) >= 0) {
107
- - Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
108
- if (Sd->mOutBuf >= Sd->mOrigSize) {
109
- goto Done ;
110
- }
111
- + if (DataIdx >= Sd->mOrigSize) {
112
- + Sd->mBadTableFlag = (UINT16) BAD_TABLE;
113
- + goto Done ;
114
- + }
115
- + Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
116
-
117
- BytesRemain--;
118
- }
119
- @@ -688,7 +700,7 @@ UefiDecompressGetInfo (
120
- }
121
-
122
- CompressedSize = ReadUnaligned32 ((UINT32 *)Source);
123
- - if (SourceSize < (CompressedSize + 8)) {
124
- + if (SourceSize < (CompressedSize + 8) || (CompressedSize + 8) < 8) {
125
- return RETURN_INVALID_PARAMETER;
126
- }
127
-
128
- --
129
- 1.8.3.1
130
-
SOURCES/edk2-IntelFrameworkModulePkg-Fix-UEFI-and-Tiano-Decompres.patch DELETED
@@ -1,55 +0,0 @@
1
- From 601458a0a87bf4169d1f0c81c0bb454d22abe8f0 Mon Sep 17 00:00:00 2001
2
- From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philmd@redhat.com>
3
- Date: Wed, 9 Jan 2019 17:10:07 +0100
4
- Subject: [PATCH 3/4] IntelFrameworkModulePkg: Fix UEFI and Tiano Decompression
5
- logic issue
6
- MIME-Version: 1.0
7
- Content-Type: text/plain; charset=UTF-8
8
- Content-Transfer-Encoding: 8bit
9
-
10
- Message-id: <20190109161007.3471-4-philmd@redhat.com>
11
- Patchwork-id: 83926
12
- O-Subject: [RHEL8 edk2 PATCH 3/3] IntelFrameworkModulePkg: Fix UEFI and Tiano
13
- Decompression logic issue
14
- Bugzilla: 1662184
15
- Acked-by: Laszlo Ersek <lersek@redhat.com>
16
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
17
-
18
- From: Liming Gao <liming.gao@intel.com>
19
-
20
- https://bugzilla.tianocore.org/show_bug.cgi?id=1317
21
-
22
- This is a regression issue caused by 684db6da64bc7b5faee4e1174e801c245f563b5c.
23
- In Decode() function, once mOutBuf is fully filled, Decode() should return.
24
- Current logic misses the checker of mOutBuf after while() loop.
25
-
26
- Contributed-under: TianoCore Contribution Agreement 1.1
27
- Signed-off-by: Liming Gao <liming.gao@intel.com>
28
- Reviewed-by: Yonghong Zhu <yonghong.zhu@intel.com>
29
- (cherry picked from commit ade71c52a49d659b20c0b433fb11ddb4f4f543c4)
30
- Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
31
- Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
32
- ---
33
- .../BaseUefiTianoCustomDecompressLib.c | 6 ++++++
34
- 1 file changed, 6 insertions(+)
35
-
36
- diff --git a/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c b/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c
37
- index 9b00166..e34bf4b 100644
38
- --- a/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c
39
- +++ b/IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.c
40
- @@ -634,6 +634,12 @@ Decode (
41
-
42
- BytesRemain--;
43
- }
44
- + //
45
- + // Once mOutBuf is fully filled, directly return
46
- + //
47
- + if (Sd->mOutBuf >= Sd->mOrigSize) {
48
- + goto Done ;
49
- + }
50
- }
51
- }
52
-
53
- --
54
- 1.8.3.1
55
-
SOURCES/edk2-MdeModulePkg-PartitionDxe-Ensure-blocksize-holds-MBR.patch DELETED
@@ -1,102 +0,0 @@
1
- From b045711f96003a53493cd334fe867981fb3cae2b Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Fri, 1 Mar 2019 13:45:07 +0100
4
- Subject: [PATCH 1/2] MdeModulePkg/PartitionDxe: Ensure blocksize holds MBR
5
- (CVE-2018-12180)
6
-
7
- Message-id: <20190301124508.18497-2-lersek@redhat.com>
8
- Patchwork-id: 84759
9
- O-Subject: [RHEL-8.0 edk2 PATCH 1/2] MdeModulePkg/PartitionDxe: Ensure blocksize
10
- holds MBR (CVE-2018-12180)
11
- Bugzilla: 1690501
12
- Acked-by: Thomas Huth <thuth@redhat.com>
13
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
14
-
15
- From: Hao Wu <hao.a.wu@intel.com>
16
-
17
- --v-- RHEL-8.0 note --v--
18
-
19
- Trivial conflicts resolved in "Gpt.c" and "Mbr.c": up-stream, the Intel
20
- copyright notice got meanwhile extended to 2018, in commit d1102dba7210
21
- ("MdeModulePkg: Clean up source files", 2018-06-28).
22
-
23
- --^-- RHEL-8.0 note --^--
24
-
25
- REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1134
26
-
27
- The commit adds checks for detecting GPT and MBR partitions.
28
-
29
- These checks will ensure that the device block size is big enough to hold
30
- an MBR (512 bytes).
31
-
32
- Cc: Jian J Wang <jian.j.wang@intel.com>
33
- Cc: Star Zeng <star.zeng@intel.com>
34
- Cc: Laszlo Ersek <lersek@redhat.com>
35
- Contributed-under: TianoCore Contribution Agreement 1.1
36
- Signed-off-by: Hao Wu <hao.a.wu@intel.com>
37
- Reviewed-by: Ray Ni <ray.ni@intel.com>
38
- (cherry picked from commit fccdb88022c1f6d85c773fce506b10c879063f1d)
39
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
40
- Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
41
- ---
42
- MdeModulePkg/Universal/Disk/PartitionDxe/Gpt.c | 9 ++++++++-
43
- MdeModulePkg/Universal/Disk/PartitionDxe/Mbr.c | 9 ++++++++-
44
- 2 files changed, 16 insertions(+), 2 deletions(-)
45
-
46
- diff --git a/MdeModulePkg/Universal/Disk/PartitionDxe/Gpt.c b/MdeModulePkg/Universal/Disk/PartitionDxe/Gpt.c
47
- index fe26a64..141dca0 100644
48
- --- a/MdeModulePkg/Universal/Disk/PartitionDxe/Gpt.c
49
- +++ b/MdeModulePkg/Universal/Disk/PartitionDxe/Gpt.c
50
- @@ -14,7 +14,7 @@
51
- partition content and validate the GPT table and GPT entry.
52
-
53
- Copyright (c) 2018 Qualcomm Datacenter Technologies, Inc.
54
- -Copyright (c) 2006 - 2017, Intel Corporation. All rights reserved.<BR>
55
- +Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
56
- This program and the accompanying materials
57
- are licensed and made available under the terms and conditions of the BSD License
58
- which accompanies this distribution. The full text of the license may be found at
59
- @@ -237,6 +237,13 @@ PartitionInstallGptChildHandles (
60
- GptValidStatus = EFI_NOT_FOUND;
61
-
62
- //
63
- + // Ensure the block size can hold the MBR
64
- + //
65
- + if (BlockSize < sizeof (MASTER_BOOT_RECORD)) {
66
- + return EFI_NOT_FOUND;
67
- + }
68
- +
69
- + //
70
- // Allocate a buffer for the Protective MBR
71
- //
72
- ProtectiveMbr = AllocatePool (BlockSize);
73
- diff --git a/MdeModulePkg/Universal/Disk/PartitionDxe/Mbr.c b/MdeModulePkg/Universal/Disk/PartitionDxe/Mbr.c
74
- index 479745b..d7a15b4 100644
75
- --- a/MdeModulePkg/Universal/Disk/PartitionDxe/Mbr.c
76
- +++ b/MdeModulePkg/Universal/Disk/PartitionDxe/Mbr.c
77
- @@ -13,7 +13,7 @@
78
-
79
- Copyright (c) 2018 Qualcomm Datacenter Technologies, Inc.
80
- Copyright (c) 2014, Hewlett-Packard Development Company, L.P.<BR>
81
- -Copyright (c) 2006 - 2017, Intel Corporation. All rights reserved.<BR>
82
- +Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
83
- This program and the accompanying materials
84
- are licensed and made available under the terms and conditions of the BSD License
85
- which accompanies this distribution. The full text of the license may be found at
86
- @@ -150,6 +150,13 @@ PartitionInstallMbrChildHandles (
87
- MediaId = BlockIo->Media->MediaId;
88
- LastBlock = BlockIo->Media->LastBlock;
89
-
90
- + //
91
- + // Ensure the block size can hold the MBR
92
- + //
93
- + if (BlockSize < sizeof (MASTER_BOOT_RECORD)) {
94
- + return EFI_NOT_FOUND;
95
- + }
96
- +
97
- Mbr = AllocatePool (BlockSize);
98
- if (Mbr == NULL) {
99
- return Found;
100
- --
101
- 1.8.3.1
102
-
SOURCES/edk2-MdeModulePkg-RamDiskDxe-Restrict-on-RAM-disk-size-CV.patch DELETED
@@ -1,137 +0,0 @@
1
- From 1fab0b299bc4c5b3f5106f718692f8f9bad5e635 Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Fri, 1 Mar 2019 13:45:08 +0100
4
- Subject: [PATCH 2/2] MdeModulePkg/RamDiskDxe: Restrict on RAM disk size
5
- (CVE-2018-12180)
6
-
7
- Message-id: <20190301124508.18497-3-lersek@redhat.com>
8
- Patchwork-id: 84760
9
- O-Subject: [RHEL-8.0 edk2 PATCH 2/2] MdeModulePkg/RamDiskDxe: Restrict on RAM
10
- disk size (CVE-2018-12180)
11
- Bugzilla: 1690501
12
- Acked-by: Thomas Huth <thuth@redhat.com>
13
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
14
-
15
- From: Hao Wu <hao.a.wu@intel.com>
16
-
17
- REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1134
18
-
19
- Originally, the block size of created Ram disks is hard-coded to 512
20
- bytes. However, if the total size of the Ram disk is not a multiple of 512
21
- bytes, there will be potential memory access issues when dealing with the
22
- last block of the Ram disk.
23
-
24
- This commit will adjust the block size of the Ram disks to ensure that the
25
- total size is a multiple of the block size.
26
-
27
- Cc: Jian J Wang <jian.j.wang@intel.com>
28
- Cc: Star Zeng <star.zeng@intel.com>
29
- Cc: Laszlo Ersek <lersek@redhat.com>
30
- Contributed-under: TianoCore Contribution Agreement 1.1
31
- Signed-off-by: Hao Wu <hao.a.wu@intel.com>
32
- Reviewed-by: Ray Ni <ray.ni@intel.com>
33
- (cherry picked from commit 38c9fbdcaa0219eb86fe82d90e3f8cfb5a54be9f)
34
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
35
- Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
36
- ---
37
- .../Universal/Disk/RamDiskDxe/RamDiskBlockIo.c | 20 ++++++++++++++------
38
- MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskImpl.h | 6 +++---
39
- .../Universal/Disk/RamDiskDxe/RamDiskProtocol.c | 5 +++--
40
- 3 files changed, 20 insertions(+), 11 deletions(-)
41
-
42
- diff --git a/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskBlockIo.c b/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskBlockIo.c
43
- index 4f74b5e..8926ad7 100644
44
- --- a/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskBlockIo.c
45
- +++ b/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskBlockIo.c
46
- @@ -1,7 +1,7 @@
47
- /** @file
48
- Produce EFI_BLOCK_IO_PROTOCOL on a RAM disk device.
49
-
50
- - Copyright (c) 2016 - 2018, Intel Corporation. All rights reserved.<BR>
51
- + Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.<BR>
52
- This program and the accompanying materials
53
- are licensed and made available under the terms and conditions of the BSD License
54
- which accompanies this distribution. The full text of the license may be found at
55
- @@ -54,6 +54,7 @@ RamDiskInitBlockIo (
56
- EFI_BLOCK_IO_PROTOCOL *BlockIo;
57
- EFI_BLOCK_IO2_PROTOCOL *BlockIo2;
58
- EFI_BLOCK_IO_MEDIA *Media;
59
- + UINT32 Remainder;
60
-
61
- BlockIo = &PrivateData->BlockIo;
62
- BlockIo2 = &PrivateData->BlockIo2;
63
- @@ -69,11 +70,18 @@ RamDiskInitBlockIo (
64
- Media->LogicalPartition = FALSE;
65
- Media->ReadOnly = FALSE;
66
- Media->WriteCaching = FALSE;
67
- - Media->BlockSize = RAM_DISK_BLOCK_SIZE;
68
- - Media->LastBlock = DivU64x32 (
69
- - PrivateData->Size + RAM_DISK_BLOCK_SIZE - 1,
70
- - RAM_DISK_BLOCK_SIZE
71
- - ) - 1;
72
- +
73
- + for (Media->BlockSize = RAM_DISK_DEFAULT_BLOCK_SIZE;
74
- + Media->BlockSize >= 1;
75
- + Media->BlockSize = Media->BlockSize >> 1) {
76
- + Media->LastBlock = DivU64x32Remainder (PrivateData->Size, Media->BlockSize, &Remainder) - 1;
77
- + if (Remainder == 0) {
78
- + break;
79
- + }
80
- + }
81
- + ASSERT (Media->BlockSize != 0);
82
- +
83
- + return;
84
- }
85
-
86
-
87
- diff --git a/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskImpl.h b/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskImpl.h
88
- index 077bb77..18c7bb2 100644
89
- --- a/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskImpl.h
90
- +++ b/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskImpl.h
91
- @@ -1,7 +1,7 @@
92
- /** @file
93
- The header file of RamDiskDxe driver.
94
-
95
- - Copyright (c) 2016, Intel Corporation. All rights reserved.<BR>
96
- + Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.<BR>
97
- This program and the accompanying materials
98
- are licensed and made available under the terms and conditions of the BSD License
99
- which accompanies this distribution. The full text of the license may be found at
100
- @@ -49,9 +49,9 @@
101
- ///
102
-
103
- //
104
- -// Block size for RAM disk
105
- +// Default block size for RAM disk
106
- //
107
- -#define RAM_DISK_BLOCK_SIZE 512
108
- +#define RAM_DISK_DEFAULT_BLOCK_SIZE 512
109
-
110
- //
111
- // Iterate through the double linked list. NOT delete safe
112
- diff --git a/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskProtocol.c b/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskProtocol.c
113
- index 6784e2b..e8250d5 100644
114
- --- a/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskProtocol.c
115
- +++ b/MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskProtocol.c
116
- @@ -1,7 +1,7 @@
117
- /** @file
118
- The realization of EFI_RAM_DISK_PROTOCOL.
119
-
120
- - Copyright (c) 2016, Intel Corporation. All rights reserved.<BR>
121
- + Copyright (c) 2016 - 2019, Intel Corporation. All rights reserved.<BR>
122
- (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
123
- This program and the accompanying materials
124
- are licensed and made available under the terms and conditions of the BSD License
125
- @@ -613,7 +613,8 @@ RamDiskRegister (
126
- //
127
- // Add check to prevent data read across the memory boundary
128
- //
129
- - if (RamDiskBase + RamDiskSize > ((UINTN) -1) - RAM_DISK_BLOCK_SIZE + 1) {
130
- + if ((RamDiskSize > MAX_UINTN) ||
131
- + (RamDiskBase > MAX_UINTN - RamDiskSize + 1)) {
132
- return EFI_INVALID_PARAMETER;
133
- }
134
-
135
- --
136
- 1.8.3.1
137
-
SOURCES/edk2-MdeModulePkg-Variable-Fix-Timestamp-zeroing-issue-on.patch DELETED
@@ -1,78 +0,0 @@
1
- From 3b8ff18ad4ac1af740a979ad27fb83dbbdca70ef Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Wed, 24 Oct 2018 21:03:42 +0200
4
- Subject: [PATCH 1/4] MdeModulePkg Variable: Fix Timestamp zeroing issue on
5
- APPEND_WRITE
6
-
7
- Message-id: <20181024190345.15288-2-lersek@redhat.com>
8
- Patchwork-id: 82887
9
- O-Subject: [RHEL8 edk2 PATCH 1/4] MdeModulePkg Variable: Fix Timestamp zeroing
10
- issue on APPEND_WRITE
11
- Bugzilla: 1641436
12
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
13
- Acked-by: Thomas Huth <thuth@redhat.com>
14
-
15
- From: Star Zeng <star.zeng@intel.com>
16
-
17
- --v-- RHEL8 note start --v--
18
-
19
- Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641436
20
-
21
- This patch fixes CVE-2018-3613. Unfortunately, the upstream subject line
22
- does not include the CVE number. I've decided to stick with the upstream
23
- subject verbatim in the backport, so we can more easily drop this patch at
24
- the next rebase. On the upstream list, I did complain loudly, so there's
25
- hope the next CVE fix will advertise the CVE number in the subject.
26
-
27
- In practice, the vulnerability is difficult to exploit. Please refer to
28
- the following messages in the upstream discussion:
29
-
30
- https://lists.01.org/pipermail/edk2-devel/2018-October/031103.html
31
- https://lists.01.org/pipermail/edk2-devel/2018-October/031140.html
32
-
33
- --^-- RHEL8 note end --^--
34
-
35
- REF: https://bugzilla.tianocore.org/show_bug.cgi?id=415
36
-
37
- When SetVariable() to a time based auth variable with APPEND_WRITE
38
- attribute, and if the EFI_VARIABLE_AUTHENTICATION_2.TimeStamp in
39
- the input Data is earlier than current value, it will cause timestamp
40
- zeroing.
41
-
42
- This issue may bring time based auth variable downgrade problem.
43
- For example:
44
- A vendor released three certs at 2014, 2015, and 2016, and system
45
- integrated the 2016 cert. User can SetVariable() with 2015 cert and
46
- APPEND_WRITE attribute to cause timestamp zeroing first, then
47
- SetVariable() with 2014 cert to downgrade the cert.
48
-
49
- This patch fixes this issue.
50
-
51
- Cc: Jiewen Yao <jiewen.yao@intel.com>
52
- Cc: Chao Zhang <chao.b.zhang@intel.com>
53
- Cc: Jian J Wang <jian.j.wang@intel.com>
54
- Contributed-under: TianoCore Contribution Agreement 1.1
55
- Signed-off-by: Star Zeng <star.zeng@intel.com>
56
- Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
57
- (cherry picked from commit b7dc8888f31402f410c53242839271ba3b94b619)
58
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
59
- ---
60
- MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c | 2 ++
61
- 1 file changed, 2 insertions(+)
62
-
63
- diff --git a/MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c b/MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c
64
- index 6caf603..60439b5 100644
65
- --- a/MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c
66
- +++ b/MdeModulePkg/Universal/Variable/RuntimeDxe/Variable.c
67
- @@ -2460,6 +2460,8 @@ UpdateVariable (
68
- if (Variable->CurrPtr != NULL) {
69
- if (VariableCompareTimeStampInternal (&(((AUTHENTICATED_VARIABLE_HEADER *) CacheVariable->CurrPtr)->TimeStamp), TimeStamp)) {
70
- CopyMem (&AuthVariable->TimeStamp, TimeStamp, sizeof (EFI_TIME));
71
- + } else {
72
- + CopyMem (&AuthVariable->TimeStamp, &(((AUTHENTICATED_VARIABLE_HEADER *) CacheVariable->CurrPtr)->TimeStamp), sizeof (EFI_TIME));
73
- }
74
- }
75
- }
76
- --
77
- 1.8.3.1
78
-
SOURCES/edk2-MdePkg-Add-more-checker-in-UefiDecompressLib-to-acce.patch DELETED
@@ -1,133 +0,0 @@
1
- From 41129e136b621728eb5cb1c81aafcc5fedc53a12 Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Wed, 24 Oct 2018 21:03:43 +0200
4
- Subject: [PATCH 2/4] MdePkg: Add more checker in UefiDecompressLib to access
5
- the valid buffer only (CVE FIX)
6
-
7
- Message-id: <20181024190345.15288-3-lersek@redhat.com>
8
- Patchwork-id: 82883
9
- O-Subject: [RHEL8 edk2 PATCH 2/4] MdePkg: Add more checker in UefiDecompressLib
10
- to access the valid buffer only (CVE FIX)
11
- Bugzilla: 1641449
12
- 1641453
13
- 1641464
14
- 1641469
15
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
16
- Acked-by: Thomas Huth <thuth@redhat.com>
17
-
18
- From: Liming Gao <liming.gao@intel.com>
19
-
20
- --v-- RHEL8 note start --v--
21
-
22
- Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641449
23
- Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641453
24
- Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641464
25
- Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1641469
26
-
27
- Unfortunately, the upstream patch series was not structured according to
28
- the CVE reports. This patch contributes to fixing:
29
-
30
- - CVE-2017-5732
31
- - CVE-2017-5733
32
- - CVE-2017-5734
33
- - CVE-2017-5735
34
-
35
- but not CVE-2017-5731 (contrarily to the upstream commit message). The
36
- best I could achieve up-stream was to get the "CVE FIX" expression into
37
- the subject, and a whole-sale dump of the CVEs into the body. I had not
38
- been invited to the original (off-list, embargoed) analysis and review.
39
-
40
- The trivial context difference (whitespace) is due to RHEL8 lacking
41
- upstream commit 9095d37b8fe5 ("MdePkg: Clean up source files",
42
- 2018-06-28). I've considered backporting that (since it only cleans up
43
- whitespace). However, the diffstat on that commit convinced me otherwise:
44
- "729 files changed, 15667 insertions(+), 15667 deletions(-)". I've decided
45
- not to do a partial backport of that (i.e. just for
46
- "BaseUefiDecompressLib.c").
47
-
48
- --^-- RHEL8 note end --^--
49
-
50
- Fix CVE-2017-5731,CVE-2017-5732,CVE-2017-5733,CVE-2017-5734,CVE-2017-5735
51
- https://bugzilla.tianocore.org/show_bug.cgi?id=686
52
-
53
- Contributed-under: TianoCore Contribution Agreement 1.1
54
- Signed-off-by: Holtsclaw Brent <brent.holtsclaw@intel.com>
55
- Signed-off-by: Liming Gao <liming.gao@intel.com>
56
- Reviewed-by: Star Zeng <star.zeng@intel.com>
57
- Acked-by: Laszlo Ersek <lersek@redhat.com>
58
- (cherry picked from commit 2ec7953d49677142c5f7552e9e3d96fb406ba0c4)
59
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
60
- ---
61
- .../BaseUefiDecompressLib/BaseUefiDecompressLib.c | 17 +++++++++++++++--
62
- 1 file changed, 15 insertions(+), 2 deletions(-)
63
-
64
- diff --git a/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c b/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c
65
- index e818543..0c6b1fe 100644
66
- --- a/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c
67
- +++ b/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c
68
- @@ -152,6 +152,7 @@ MakeTable (
69
- UINT16 Mask;
70
- UINT16 WordOfStart;
71
- UINT16 WordOfCount;
72
- + UINT16 MaxTableLength;
73
-
74
- //
75
- // The maximum mapping table width supported by this internal
76
- @@ -164,6 +165,9 @@ MakeTable (
77
- }
78
-
79
- for (Index = 0; Index < NumOfChar; Index++) {
80
- + if (BitLen[Index] > 16) {
81
- + return (UINT16) BAD_TABLE;
82
- + }
83
- Count[BitLen[Index]]++;
84
- }
85
-
86
- @@ -205,6 +209,7 @@ MakeTable (
87
-
88
- Avail = NumOfChar;
89
- Mask = (UINT16) (1U << (15 - TableBits));
90
- + MaxTableLength = (UINT16) (1U << TableBits);
91
-
92
- for (Char = 0; Char < NumOfChar; Char++) {
93
-
94
- @@ -218,6 +223,9 @@ MakeTable (
95
- if (Len <= TableBits) {
96
-
97
- for (Index = Start[Len]; Index < NextCode; Index++) {
98
- + if (Index >= MaxTableLength) {
99
- + return (UINT16) BAD_TABLE;
100
- + }
101
- Table[Index] = Char;
102
- }
103
-
104
- @@ -620,11 +628,16 @@ Decode (
105
- // Write BytesRemain of bytes into mDstBase
106
- //
107
- BytesRemain--;
108
- +
109
- while ((INT16) (BytesRemain) >= 0) {
110
- - Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
111
- if (Sd->mOutBuf >= Sd->mOrigSize) {
112
- goto Done;
113
- }
114
- + if (DataIdx >= Sd->mOrigSize) {
115
- + Sd->mBadTableFlag = (UINT16) BAD_TABLE;
116
- + goto Done;
117
- + }
118
- + Sd->mDstBase[Sd->mOutBuf++] = Sd->mDstBase[DataIdx++];
119
-
120
- BytesRemain--;
121
- }
122
- @@ -694,7 +707,7 @@ UefiDecompressGetInfo (
123
- }
124
-
125
- CompressedSize = ReadUnaligned32 ((UINT32 *)Source);
126
- - if (SourceSize < (CompressedSize + 8)) {
127
- + if (SourceSize < (CompressedSize + 8) || (CompressedSize + 8) < 8) {
128
- return RETURN_INVALID_PARAMETER;
129
- }
130
-
131
- --
132
- 1.8.3.1
133
-
SOURCES/edk2-MdePkg-BaseUefiDecompressLib-Fix-UEFI-Decompression-.patch DELETED
@@ -1,56 +0,0 @@
1
- From c46469847b68f6a1a5b42feaf0de7a83fd0bed85 Mon Sep 17 00:00:00 2001
2
- From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philmd@redhat.com>
3
- Date: Wed, 9 Jan 2019 17:10:06 +0100
4
- Subject: [PATCH 2/4] MdePkg BaseUefiDecompressLib: Fix UEFI Decompression
5
- logic issue
6
- MIME-Version: 1.0
7
- Content-Type: text/plain; charset=UTF-8
8
- Content-Transfer-Encoding: 8bit
9
-
10
- Message-id: <20190109161007.3471-3-philmd@redhat.com>
11
- Patchwork-id: 83923
12
- O-Subject: [RHEL8 edk2 PATCH 2/3] MdePkg BaseUefiDecompressLib: Fix UEFI
13
- Decompression logic issue
14
- Bugzilla: 1662184
15
- Acked-by: Laszlo Ersek <lersek@redhat.com>
16
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
17
-
18
- From: Liming Gao <liming.gao@intel.com>
19
-
20
- https://bugzilla.tianocore.org/show_bug.cgi?id=1317
21
-
22
- This is a regression issue caused by 2ec7953d49677142c5f7552e9e3d96fb406ba0c4.
23
- In Decode() function, once mOutBuf is fully filled, Decode() should return.
24
- Current logic misses the checker of mOutBuf after while() loop.
25
-
26
- Contributed-under: TianoCore Contribution Agreement 1.1
27
- Signed-off-by: Liming Gao <liming.gao@intel.com>
28
- Cc: Michael Kinney <michael.d.kinney@intel.com>
29
- Reviewed-by: Yonghong Zhu <yonghong.zhu@intel.com>
30
- (cherry picked from commit 1c4cecc9fd314de0dce8125b0d4b45967637a401)
31
- Signed-off-by: Philippe Mathieu-Daudé <philmd@redhat.com>
32
- Signed-off-by: Danilo C. L. de Paula <ddepaula@redhat.com>
33
- ---
34
- MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c | 6 ++++++
35
- 1 file changed, 6 insertions(+)
36
-
37
- diff --git a/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c b/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c
38
- index 0c6b1fe..8c30e97 100644
39
- --- a/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c
40
- +++ b/MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.c
41
- @@ -641,6 +641,12 @@ Decode (
42
-
43
- BytesRemain--;
44
- }
45
- + //
46
- + // Once mOutBuf is fully filled, directly return
47
- + //
48
- + if (Sd->mOutBuf >= Sd->mOrigSize) {
49
- + goto Done;
50
- + }
51
- }
52
- }
53
-
54
- --
55
- 1.8.3.1
56
-
SOURCES/edk2-NetworkPkg-UefiPxeBcDxe-Add-EXCLUSIVE-attribute-when.patch DELETED
@@ -1,100 +0,0 @@
1
- From 1f2c35936d1731da26c3ed8d002785240853a742 Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Wed, 7 Nov 2018 11:25:57 +0100
4
- Subject: [PATCH] NetworkPkg: UefiPxeBcDxe: Add EXCLUSIVE attribute when
5
- opening SNP protocol installed by PXE.
6
- MIME-Version: 1.0
7
- Content-Type: text/plain; charset=UTF-8
8
- Content-Transfer-Encoding: 8bit
9
-
10
- Message-id: <20181107102557.9106-2-lersek@redhat.com>
11
- Patchwork-id: 82937
12
- O-Subject: [RHEL8 edk2 PATCH 1/1] NetworkPkg: UefiPxeBcDxe: Add EXCLUSIVE
13
- attribute when opening SNP protocol installed by PXE.
14
- Bugzilla: 1643377
15
- Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
16
- Acked-by: Philippe Mathieu-Daudé <philmd@redhat.com>
17
-
18
- From: "edk2-devel-bounces@lists.01.org" <edk2-devel-bounces@lists.01.org>
19
-
20
- --v-- RHEL8 note start --v--
21
-
22
- Please see the analysis for this backport in
23
- <https://bugzilla.redhat.com/show_bug.cgi?id=1643377#c20> through
24
- <https://bugzilla.redhat.com/show_bug.cgi?id=1643377#c25>.
25
-
26
- There was a trivial conflict to resolve while cherry-picking the upstream
27
- commit; please refer to
28
- <https://bugzilla.redhat.com/show_bug.cgi?id=1643377#c28>.
29
-
30
- --^-- RHEL8 note end --^--
31
-
32
- Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1152
33
-
34
- v2: Sync the same logic to Ipv6 and update code comments.
35
-
36
- The PXE driver installs a SNP and open this SNP with attribute BY_DRIVER
37
- to avoid it being opened by MNP driver, this SNP is also expected not to
38
- be opened by other drivers with EXCLUSIVE attribute. In some cases, other
39
- drivers may happen to do this by error, and thus cause a system crash.
40
- This patch adds EXCLUSIVE attribute when opening SNP in PXE driver, and
41
- will reject all OpenProtocol requests by EXCLUSIVE.
42
-
43
- Cc: Subramanian, Sriram <sriram-s@hpe.com>
44
- Cc: Ye Ting <ting.ye@intel.com>
45
- Cc: Fu Siyuan <siyuan.fu@intel.com>
46
- Cc: Wu Jiaxin <jiaxin.wu@intel.com>
47
- Contributed-under: TianoCore Contribution Agreement 1.1
48
- Signed-off-by: Wang Fan <fan.wang@intel.com>
49
- Reviewed-by: Sriram Subramanian <sriram-s@hpe.com>
50
- Reviewed-by: Fu Siyuan <siyuan.fu@intel.com>
51
- Reviewed-by: Wu Jiaxin <jiaxin.wu@intel.com>
52
- (cherry picked from commit cde5a72d365eff5b02b8330fef1c8d36fced08eb)
53
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
54
- ---
55
- NetworkPkg/UefiPxeBcDxe/PxeBcDriver.c | 8 ++++----
56
- 1 file changed, 4 insertions(+), 4 deletions(-)
57
-
58
- diff --git a/NetworkPkg/UefiPxeBcDxe/PxeBcDriver.c b/NetworkPkg/UefiPxeBcDxe/PxeBcDriver.c
59
- index 8dd787b..437cd6f 100644
60
- --- a/NetworkPkg/UefiPxeBcDxe/PxeBcDriver.c
61
- +++ b/NetworkPkg/UefiPxeBcDxe/PxeBcDriver.c
62
- @@ -814,7 +814,7 @@ PxeBcCreateIp4Children (
63
- }
64
-
65
- //
66
- - // Open SNP on the child handle BY_DRIVER. It will prevent any additionally
67
- + // Open SNP on the child handle BY_DRIVER|EXCLUSIVE. It will prevent any additionally
68
- // layering to perform the experiment.
69
- //
70
- Status = gBS->OpenProtocol (
71
- @@ -823,7 +823,7 @@ PxeBcCreateIp4Children (
72
- (VOID **) &Snp,
73
- This->DriverBindingHandle,
74
- Private->Ip4Nic->Controller,
75
- - EFI_OPEN_PROTOCOL_BY_DRIVER
76
- + EFI_OPEN_PROTOCOL_BY_DRIVER|EFI_OPEN_PROTOCOL_EXCLUSIVE
77
- );
78
- if (EFI_ERROR (Status)) {
79
- goto ON_ERROR;
80
- @@ -1157,7 +1157,7 @@ PxeBcCreateIp6Children (
81
- }
82
-
83
- //
84
- - // Open SNP on the child handle BY_DRIVER. It will prevent any additionally
85
- + // Open SNP on the child handle BY_DRIVER|EXCLUSIVE. It will prevent any additionally
86
- // layering to perform the experiment.
87
- //
88
- Status = gBS->OpenProtocol (
89
- @@ -1166,7 +1166,7 @@ PxeBcCreateIp6Children (
90
- (VOID **) &Snp,
91
- This->DriverBindingHandle,
92
- Private->Ip6Nic->Controller,
93
- - EFI_OPEN_PROTOCOL_BY_DRIVER
94
- + EFI_OPEN_PROTOCOL_BY_DRIVER|EFI_OPEN_PROTOCOL_EXCLUSIVE
95
- );
96
- if (EFI_ERROR (Status)) {
97
- goto ON_ERROR;
98
- --
99
- 1.8.3.1
100
-
SOURCES/edk2-OvmfPkg-PlatformPei-set-32-bit-UC-area-at-PciBase-Pc.patch ADDED
@@ -0,0 +1,198 @@
1
+ From 71c39f0fb0b9a3e9856cebc58ef3812752fd07cc Mon Sep 17 00:00:00 2001
2
+ From: Laszlo Ersek <lersek@redhat.com>
3
+ Date: Tue, 4 Jun 2019 11:06:45 +0200
4
+ Subject: [PATCH 3/3] OvmfPkg/PlatformPei: set 32-bit UC area at PciBase /
5
+ PciExBarBase (pc/q35)
6
+ MIME-Version: 1.0
7
+ Content-Type: text/plain; charset=UTF-8
8
+ Content-Transfer-Encoding: 8bit
9
+
10
+ Message-id: <20190604090645.2847-4-lersek@redhat.com>
11
+ Patchwork-id: 88483
12
+ O-Subject: [RHEL-8.1.0 edk2 PATCH v2 3/3] OvmfPkg/PlatformPei: set 32-bit UC
13
+ area at PciBase / PciExBarBase (pc/q35)
14
+ Bugzilla: 1666941
15
+ Acked-by: Philippe Mathieu-Daudé <philmd@redhat.com>
16
+ Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
17
+
18
+ (This is a replacement for commit 39b9a5ffe661 ("OvmfPkg/PlatformPei: fix
19
+ MTRR for low-RAM sizes that have many bits clear", 2019-05-16).)
20
+
21
+ Reintroduce the same logic as seen in commit 39b9a5ffe661 for the pc
22
+ (i440fx) board type.
23
+
24
+ For q35, the same approach doesn't work any longer, given that (a) we'd
25
+ like to keep the PCIEXBAR in the platform DSC a fixed-at-build PCD, and
26
+ (b) QEMU expects the PCIEXBAR to reside at a lower address than the 32-bit
27
+ PCI MMIO aperture.
28
+
29
+ Therefore, introduce a helper function for determining the 32-bit
30
+ "uncacheable" (MMIO) area base address:
31
+
32
+ - On q35, this function behaves statically. Furthermore, the MTRR setup
33
+ exploits that the range [0xB000_0000, 0xFFFF_FFFF] can be marked UC with
34
+ just two variable MTRRs (one at 0xB000_0000 (size 256MB), another at
35
+ 0xC000_0000 (size 1GB)).
36
+
37
+ - On pc (i440fx), the function behaves dynamically, implementing the same
38
+ logic as commit 39b9a5ffe661 did. The PciBase value is adjusted to the
39
+ value calculated, similarly to commit 39b9a5ffe661. A further
40
+ simplification is that we show that the UC32 area size truncation to a
41
+ whole power of two automatically guarantees a >=2GB base address.
42
+
43
+ Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
44
+ Cc: Gerd Hoffmann <kraxel@redhat.com>
45
+ Cc: Jordan Justen <jordan.l.justen@intel.com>
46
+ Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1859
47
+ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
48
+ Reviewed-by: Philippe Mathieu-Daude <philmd@redhat.com>
49
+ Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
50
+ (cherry picked from commit 49edde15230a5bfd6746225eb95535eaa2ec1ba4)
51
+ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
52
+ ---
53
+ OvmfPkg/PlatformPei/MemDetect.c | 59 ++++++++++++++++++++++++++++++++++++++---
54
+ OvmfPkg/PlatformPei/Platform.c | 5 +++-
55
+ OvmfPkg/PlatformPei/Platform.h | 7 +++++
56
+ 3 files changed, 66 insertions(+), 5 deletions(-)
57
+
58
+ diff --git a/OvmfPkg/PlatformPei/MemDetect.c b/OvmfPkg/PlatformPei/MemDetect.c
59
+ index 2f9e835..0c38b70 100644
60
+ --- a/OvmfPkg/PlatformPei/MemDetect.c
61
+ +++ b/OvmfPkg/PlatformPei/MemDetect.c
62
+ @@ -20,6 +20,7 @@ Module Name:
63
+ // The package level header files this module uses
64
+ //
65
+ #include <IndustryStandard/E820.h>
66
+ +#include <IndustryStandard/I440FxPiix4.h>
67
+ #include <IndustryStandard/Q35MchIch9.h>
68
+ #include <PiPei.h>
69
+
70
+ @@ -48,6 +49,8 @@ STATIC UINT32 mS3AcpiReservedMemorySize;
71
+
72
+ STATIC UINT16 mQ35TsegMbytes;
73
+
74
+ +UINT32 mQemuUc32Base;
75
+ +
76
+ VOID
77
+ Q35TsegMbytesInitialization (
78
+ VOID
79
+ @@ -104,6 +107,54 @@ Q35TsegMbytesInitialization (
80
+ }
81
+
82
+
83
+ +VOID
84
+ +QemuUc32BaseInitialization (
85
+ + VOID
86
+ + )
87
+ +{
88
+ + UINT32 LowerMemorySize;
89
+ + UINT32 Uc32Size;
90
+ +
91
+ + if (mXen) {
92
+ + return;
93
+ + }
94
+ +
95
+ + if (mHostBridgeDevId == INTEL_Q35_MCH_DEVICE_ID) {
96
+ + //
97
+ + // On q35, the 32-bit area that we'll mark as UC, through variable MTRRs,
98
+ + // starts at PcdPciExpressBaseAddress. The platform DSC is responsible for
99
+ + // setting PcdPciExpressBaseAddress such that describing the
100
+ + // [PcdPciExpressBaseAddress, 4GB) range require a very small number of
101
+ + // variable MTRRs (preferably 1 or 2).
102
+ + //
103
+ + ASSERT (FixedPcdGet64 (PcdPciExpressBaseAddress) <= MAX_UINT32);
104
+ + mQemuUc32Base = (UINT32)FixedPcdGet64 (PcdPciExpressBaseAddress);
105
+ + return;
106
+ + }
107
+ +
108
+ + ASSERT (mHostBridgeDevId == INTEL_82441_DEVICE_ID);
109
+ + //
110
+ + // On i440fx, start with the [LowerMemorySize, 4GB) range. Make sure one
111
+ + // variable MTRR suffices by truncating the size to a whole power of two,
112
+ + // while keeping the end affixed to 4GB. This will round the base up.
113
+ + //
114
+ + LowerMemorySize = GetSystemMemorySizeBelow4gb ();
115
+ + Uc32Size = GetPowerOfTwo32 ((UINT32)(SIZE_4GB - LowerMemorySize));
116
+ + mQemuUc32Base = (UINT32)(SIZE_4GB - Uc32Size);
117
+ + //
118
+ + // Assuming that LowerMemorySize is at least 1 byte, Uc32Size is at most 2GB.
119
+ + // Therefore mQemuUc32Base is at least 2GB.
120
+ + //
121
+ + ASSERT (mQemuUc32Base >= BASE_2GB);
122
+ +
123
+ + if (mQemuUc32Base != LowerMemorySize) {
124
+ + DEBUG ((DEBUG_VERBOSE, "%a: rounded UC32 base from 0x%x up to 0x%x, for "
125
+ + "an UC32 size of 0x%x\n", __FUNCTION__, LowerMemorySize, mQemuUc32Base,
126
+ + Uc32Size));
127
+ + }
128
+ +}
129
+ +
130
+ +
131
+ /**
132
+ Iterate over the RAM entries in QEMU's fw_cfg E820 RAM map that start outside
133
+ of the 32-bit address range.
134
+ @@ -694,11 +745,11 @@ QemuInitializeRam (
135
+ ASSERT_EFI_ERROR (Status);
136
+
137
+ //
138
+ - // Set memory range from the "top of lower RAM" (RAM below 4GB) to 4GB as
139
+ - // uncacheable
140
+ + // Set the memory range from the start of the 32-bit MMIO area (32-bit PCI
141
+ + // MMIO aperture on i440fx, PCIEXBAR on q35) to 4GB as uncacheable.
142
+ //
143
+ - Status = MtrrSetMemoryAttribute (LowerMemorySize,
144
+ - SIZE_4GB - LowerMemorySize, CacheUncacheable);
145
+ + Status = MtrrSetMemoryAttribute (mQemuUc32Base, SIZE_4GB - mQemuUc32Base,
146
+ + CacheUncacheable);
147
+ ASSERT_EFI_ERROR (Status);
148
+ }
149
+ }
150
+ diff --git a/OvmfPkg/PlatformPei/Platform.c b/OvmfPkg/PlatformPei/Platform.c
151
+ index 64b8034..de19f5c 100644
152
+ --- a/OvmfPkg/PlatformPei/Platform.c
153
+ +++ b/OvmfPkg/PlatformPei/Platform.c
154
+ @@ -197,7 +197,8 @@ MemMapInitialization (
155
+ ASSERT (PciExBarBase <= MAX_UINT32 - SIZE_256MB);
156
+ PciBase = (UINT32)(PciExBarBase + SIZE_256MB);
157
+ } else {
158
+ - PciBase = (TopOfLowRam < BASE_2GB) ? BASE_2GB : TopOfLowRam;
159
+ + ASSERT (TopOfLowRam <= mQemuUc32Base);
160
+ + PciBase = mQemuUc32Base;
161
+ }
162
+
163
+ //
164
+ @@ -656,6 +657,8 @@ InitializePlatform (
165
+
166
+ PublishPeiMemory ();
167
+
168
+ + QemuUc32BaseInitialization ();
169
+ +
170
+ InitializeRamRegions ();
171
+
172
+ if (mXen) {
173
+ diff --git a/OvmfPkg/PlatformPei/Platform.h b/OvmfPkg/PlatformPei/Platform.h
174
+ index b12a5c1..2b486ce 100644
175
+ --- a/OvmfPkg/PlatformPei/Platform.h
176
+ +++ b/OvmfPkg/PlatformPei/Platform.h
177
+ @@ -69,6 +69,11 @@ GetSystemMemorySizeBelow4gb (
178
+ );
179
+
180
+ VOID
181
+ +QemuUc32BaseInitialization (
182
+ + VOID
183
+ + );
184
+ +
185
+ +VOID
186
+ InitializeRamRegions (
187
+ VOID
188
+ );
189
+ @@ -120,4 +125,6 @@ extern UINT32 mMaxCpuCount;
190
+
191
+ extern UINT16 mHostBridgeDevId;
192
+
193
+ +extern UINT32 mQemuUc32Base;
194
+ +
195
+ #endif // _PLATFORM_PEI_H_INCLUDED_
196
+ --
197
+ 1.8.3.1
198
+
SOURCES/edk2-OvmfPkg-QemuRamfbDxe-Do-not-report-DXE-failure-on-Aa.patch ADDED
@@ -0,0 +1,75 @@
1
+ From aaaedc1e2cfd55ef003fb1b5a37c73a196b26dc7 Mon Sep 17 00:00:00 2001
2
+ From: Philippe Mathieu-Daude <philmd@redhat.com>
3
+ Date: Thu, 1 Aug 2019 20:43:48 +0200
4
+ Subject: [PATCH 2/3] OvmfPkg: QemuRamfbDxe: Do not report DXE failure on
5
+ Aarch64 silent builds (RH only)
6
+
7
+ Message-id: <20190801184349.28512-3-philmd@redhat.com>
8
+ Patchwork-id: 89861
9
+ O-Subject: [RHEL-8.1.0 edk2 PATCH v4 2/3] OvmfPkg: QemuRamfbDxe: Do not report
10
+ DXE failure on Aarch64 silent builds (RH only)
11
+ Bugzilla: 1714446
12
+ Acked-by: Andrew Jones <drjones@redhat.com>
13
+ Acked-by: Laszlo Ersek <lersek@redhat.com>
14
+
15
+ To suppress an error message on the silent build when ramfb is
16
+ not configured, change QemuRamfbDxe to return EFI_SUCCESS even
17
+ when it fails.
18
+ Some memory is wasted (driver stays resident without
19
+ any good use), but it is mostly harmless, as the memory
20
+ is released by the OS after ExitBootServices().
21
+
22
+ Suggested-by: Laszlo Ersek <lersek@redhat.com>
23
+ Signed-off-by: Philippe Mathieu-Daude <philmd@redhat.com>
24
+ ---
25
+ OvmfPkg/QemuRamfbDxe/QemuRamfb.c | 14 ++++++++++++++
26
+ OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf | 1 +
27
+ 2 files changed, 15 insertions(+)
28
+
29
+ diff --git a/OvmfPkg/QemuRamfbDxe/QemuRamfb.c b/OvmfPkg/QemuRamfbDxe/QemuRamfb.c
30
+ index b49f2ca..c27e55f 100644
31
+ --- a/OvmfPkg/QemuRamfbDxe/QemuRamfb.c
32
+ +++ b/OvmfPkg/QemuRamfbDxe/QemuRamfb.c
33
+ @@ -20,6 +20,7 @@
34
+ #include <Library/BaseLib.h>
35
+ #include <Library/BaseMemoryLib.h>
36
+ #include <Library/DebugLib.h>
37
+ +#include <Library/DebugPrintErrorLevelLib.h>
38
+ #include <Library/DevicePathLib.h>
39
+ #include <Library/FrameBufferBltLib.h>
40
+ #include <Library/MemoryAllocationLib.h>
41
+ @@ -249,6 +250,19 @@ InitializeQemuRamfb (
42
+
43
+ Status = QemuFwCfgFindFile ("etc/ramfb", &mRamfbFwCfgItem, &FwCfgSize);
44
+ if (EFI_ERROR (Status)) {
45
+ +#if defined (MDE_CPU_AARCH64)
46
+ + //
47
+ + // RHBZ#1714446
48
+ + // If no ramfb device was configured, this platform DXE driver should
49
+ + // returns EFI_NOT_FOUND, so the DXE Core can unload it. However, even
50
+ + // using a silent build, an error message is issued to the guest console.
51
+ + // Since this confuse users, return success and stay resident. The wasted
52
+ + // guest RAM still gets freed later after ExitBootServices().
53
+ + //
54
+ + if (GetDebugPrintErrorLevel () == DEBUG_ERROR) {
55
+ + return EFI_SUCCESS;
56
+ + }
57
+ +#endif
58
+ return EFI_NOT_FOUND;
59
+ }
60
+ if (FwCfgSize != sizeof (RAMFB_CONFIG)) {
61
+ diff --git a/OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf b/OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
62
+ index 013edef..f9e24cb 100644
63
+ --- a/OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
64
+ +++ b/OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
65
+ @@ -36,6 +36,7 @@
66
+ BaseLib
67
+ BaseMemoryLib
68
+ DebugLib
69
+ + DebugPrintErrorLevelLib
70
+ DevicePathLib
71
+ FrameBufferBltLib
72
+ MemoryAllocationLib
73
+ --
74
+ 1.8.3.1
75
+
SOURCES/edk2-OvmfPkg-raise-the-PCIEXBAR-base-to-2816-MB-on-Q35.patch ADDED
@@ -0,0 +1,109 @@
1
+ From d362291ada9ee22316e3c069dc788c4c801b0796 Mon Sep 17 00:00:00 2001
2
+ From: Laszlo Ersek <lersek@redhat.com>
3
+ Date: Tue, 4 Jun 2019 11:06:44 +0200
4
+ Subject: [PATCH 2/3] OvmfPkg: raise the PCIEXBAR base to 2816 MB on Q35
5
+ MIME-Version: 1.0
6
+ Content-Type: text/plain; charset=UTF-8
7
+ Content-Transfer-Encoding: 8bit
8
+
9
+ Message-id: <20190604090645.2847-3-lersek@redhat.com>
10
+ Patchwork-id: 88481
11
+ O-Subject: [RHEL-8.1.0 edk2 PATCH v2 2/3] OvmfPkg: raise the PCIEXBAR base to
12
+ 2816 MB on Q35
13
+ Bugzilla: 1666941
14
+ Acked-by: Philippe Mathieu-Daudé <philmd@redhat.com>
15
+ Acked-by: Vitaly Kuznetsov <vkuznets@redhat.com>
16
+
17
+ (This is a replacement for commit 75136b29541b, "OvmfPkg/PlatformPei:
18
+ reorder the 32-bit PCI window vs. the PCIEXBAR on q35", 2019-05-16).
19
+
20
+ Commit 7b8fe63561b4 ("OvmfPkg: PlatformPei: enable PCIEXBAR (aka MMCONFIG
21
+ / ECAM) on Q35", 2016-03-10) claimed that,
22
+
23
+ On Q35 machine types that QEMU intends to support in the long term, QEMU
24
+ never lets the RAM below 4 GB exceed 2 GB.
25
+
26
+ Alas, this statement came from a misunderstanding that occurred while we
27
+ worked out the interface contract. In fact QEMU does allow the 32-bit RAM
28
+ extend up to 0xB000_0000 (exclusive), in case the RAM size falls in the
29
+ range (0x8000_0000, 0xB000_0000) (i.e., the RAM size is greater than
30
+ 2048MB and smaller than 2816MB).
31
+
32
+ In turn, such a RAM size (justifiedly) triggers
33
+
34
+ ASSERT (TopOfLowRam <= PciExBarBase);
35
+
36
+ in MemMapInitialization(), because we placed the 256MB PCIEXBAR at
37
+ 0x8000_0000 (2GB) exactly, relying on the interface contract. (And, the
38
+ 32-bit PCI window would follow the PCIEXBAR, covering the [0x9000_0000,
39
+ 0xFC00_0000) range.)
40
+
41
+ In order to fix this, place the PCIEXBAR at 2816MB (0xB000_0000), and
42
+ start the 32-bit PCI window at 3 GB (0xC000_0000). This shrinks the 32-bit
43
+ PCI window to
44
+
45
+ 0xFC00_0000 - 0xC000_0000 = 0x3C00_0000 = 960 MB.
46
+
47
+ Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
48
+ Cc: Gerd Hoffmann <kraxel@redhat.com>
49
+ Cc: Jordan Justen <jordan.l.justen@intel.com>
50
+ Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1859
51
+ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
52
+ Reviewed-by: Philippe Mathieu-Daude <philmd@redhat.com>
53
+ Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
54
+ (cherry picked from commit b07de0974b65a6a393c2d477427d1d6c7acce002)
55
+ Signed-off-by: Laszlo Ersek <lersek@redhat.com>
56
+ ---
57
+ OvmfPkg/OvmfPkgIa32.dsc | 4 ++--
58
+ OvmfPkg/OvmfPkgIa32X64.dsc | 4 ++--
59
+ OvmfPkg/OvmfPkgX64.dsc | 4 ++--
60
+ 3 files changed, 6 insertions(+), 6 deletions(-)
61
+
62
+ diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
63
+ index bbf5e38..cf5f2ea 100644
64
+ --- a/OvmfPkg/OvmfPkgIa32.dsc
65
+ +++ b/OvmfPkg/OvmfPkgIa32.dsc
66
+ @@ -497,8 +497,8 @@
67
+ # the PCIEXBAR register.
68
+ #
69
+ # On Q35 machine types that QEMU intends to support in the long term, QEMU
70
+ - # never lets the RAM below 4 GB exceed 2 GB.
71
+ - gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0x80000000
72
+ + # never lets the RAM below 4 GB exceed 2816 MB.
73
+ + gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0xB0000000
74
+
75
+ !ifdef $(SOURCE_DEBUG_ENABLE)
76
+ gEfiSourceLevelDebugPkgTokenSpaceGuid.PcdDebugLoadImageMethod|0x2
77
+ diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
78
+ index 3ec1b91..5a24065 100644
79
+ --- a/OvmfPkg/OvmfPkgIa32X64.dsc
80
+ +++ b/OvmfPkg/OvmfPkgIa32X64.dsc
81
+ @@ -502,8 +502,8 @@
82
+ # the PCIEXBAR register.
83
+ #
84
+ # On Q35 machine types that QEMU intends to support in the long term, QEMU
85
+ - # never lets the RAM below 4 GB exceed 2 GB.
86
+ - gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0x80000000
87
+ + # never lets the RAM below 4 GB exceed 2816 MB.
88
+ + gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0xB0000000
89
+
90
+ !ifdef $(SOURCE_DEBUG_ENABLE)
91
+ gEfiSourceLevelDebugPkgTokenSpaceGuid.PcdDebugLoadImageMethod|0x2
92
+ diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
93
+ index ea54b4b..6ab50c9 100644
94
+ --- a/OvmfPkg/OvmfPkgX64.dsc
95
+ +++ b/OvmfPkg/OvmfPkgX64.dsc
96
+ @@ -502,8 +502,8 @@
97
+ # the PCIEXBAR register.
98
+ #
99
+ # On Q35 machine types that QEMU intends to support in the long term, QEMU
100
+ - # never lets the RAM below 4 GB exceed 2 GB.
101
+ - gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0x80000000
102
+ + # never lets the RAM below 4 GB exceed 2816 MB.
103
+ + gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0xB0000000
104
+
105
+ !ifdef $(SOURCE_DEBUG_ENABLE)
106
+ gEfiSourceLevelDebugPkgTokenSpaceGuid.PcdDebugLoadImageMethod|0x2
107
+ --
108
+ 1.8.3.1
109
+
SOURCES/edk2-aarch64-verbose.json ADDED
@@ -0,0 +1,31 @@
1
+ {
2
+ "description": "UEFI firmware for ARM64 virtual machines, verbose logs",
3
+ "interface-types": [
4
+ "uefi"
5
+ ],
6
+ "mapping": {
7
+ "device": "flash",
8
+ "executable": {
9
+ "filename": "/usr/share/edk2/aarch64/QEMU_EFI-pflash.raw",
10
+ "format": "raw"
11
+ },
12
+ "nvram-template": {
13
+ "filename": "/usr/share/edk2/aarch64/vars-template-pflash.raw",
14
+ "format": "raw"
15
+ }
16
+ },
17
+ "targets": [
18
+ {
19
+ "architecture": "aarch64",
20
+ "machines": [
21
+ "virt-*"
22
+ ]
23
+ }
24
+ ],
25
+ "features": [
26
+ "verbose-static"
27
+ ],
28
+ "tags": [
29
+
30
+ ]
31
+ }
SOURCES/edk2-aarch64.json ADDED
@@ -0,0 +1,31 @@
1
+ {
2
+ "description": "UEFI firmware for ARM64 virtual machines",
3
+ "interface-types": [
4
+ "uefi"
5
+ ],
6
+ "mapping": {
7
+ "device": "flash",
8
+ "executable": {
9
+ "filename": "/usr/share/edk2/aarch64/QEMU_EFI-silent-pflash.raw",
10
+ "format": "raw"
11
+ },
12
+ "nvram-template": {
13
+ "filename": "/usr/share/edk2/aarch64/vars-template-pflash.raw",
14
+ "format": "raw"
15
+ }
16
+ },
17
+ "targets": [
18
+ {
19
+ "architecture": "aarch64",
20
+ "machines": [
21
+ "virt-*"
22
+ ]
23
+ }
24
+ ],
25
+ "features": [
26
+
27
+ ],
28
+ "tags": [
29
+
30
+ ]
31
+ }
SOURCES/edk2-advertise-OpenSSL-due-to-IPv6-enablement-too-RHEL-on.patch DELETED
@@ -1,154 +0,0 @@
1
- From 02ed2c501cdd56e9c404bdc8eac0abb9dfd5a04c Mon Sep 17 00:00:00 2001
2
- From: Laszlo Ersek <lersek@redhat.com>
3
- Date: Wed, 18 Jul 2018 00:18:20 +0200
4
- Subject: [PATCH 4/6] advertise OpenSSL due to IPv6 enablement too (RHEL only)
5
-
6
- Message-id: <20180717221822.13110-4-lersek@redhat.com>
7
- Patchwork-id: 81378
8
- O-Subject: [RHEL8/virt212 edk2 PATCH 3/5] advertise OpenSSL due to IPv6
9
- enablement too (RHEL only)
10
- Bugzilla: 1536627
11
- Acked-by: Paolo Bonzini <pbonzini@redhat.com>
12
- Acked-by: Wei Huang <wei@redhat.com>
13
-
14
- With "-D NETWORK_IP6_ENABLE", we pull the IPv6-enabled IScsiDxe driver
15
- into the edk2-ovmf and edk2-aarch64 builds. That driver depends on OpenSSL
16
- (the crypto part only, not the ssl part). Accordingly, extend our
17
- (downstream-only) OpenSSL advertisment to NETWORK_IP6_ENABLE.
18
-
19
- (At the next rebase, this patch will be squashed into commit "advertise
20
- OpenSSL on TianoCore splash screen / boot logo (RHEL only)".)
21
-
22
- Signed-off-by: Laszlo Ersek <lersek@redhat.com>
23
- ---
24
- ArmVirtPkg/ArmVirtQemu.dsc | 2 +-
25
- ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc | 2 +-
26
- ArmVirtPkg/ArmVirtQemuKernel.dsc | 2 +-
27
- OvmfPkg/OvmfPkgIa32.dsc | 2 +-
28
- OvmfPkg/OvmfPkgIa32.fdf | 2 +-
29
- OvmfPkg/OvmfPkgIa32X64.dsc | 2 +-
30
- OvmfPkg/OvmfPkgIa32X64.fdf | 2 +-
31
- OvmfPkg/OvmfPkgX64.dsc | 2 +-
32
- OvmfPkg/OvmfPkgX64.fdf | 2 +-
33
- 9 files changed, 9 insertions(+), 9 deletions(-)
34
-
35
- diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc
36
- index 41ff17d..7091b6c 100644
37
- --- a/ArmVirtPkg/ArmVirtQemu.dsc
38
- +++ b/ArmVirtPkg/ArmVirtQemu.dsc
39
- @@ -332,7 +332,7 @@
40
- MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
41
- MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
42
- MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
43
- -!if $(SECURE_BOOT_ENABLE) == TRUE
44
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE)
45
- MdeModulePkg/Logo/LogoOpenSSLDxe.inf
46
- !else
47
- MdeModulePkg/Logo/LogoDxe.inf
48
- diff --git a/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc b/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
49
- index 82d9cbd..a3f5fa9 100644
50
- --- a/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
51
- +++ b/ArmVirtPkg/ArmVirtQemuFvMain.fdf.inc
52
- @@ -201,7 +201,7 @@ READ_LOCK_STATUS = TRUE
53
- #
54
- # TianoCore logo (splash screen)
55
- #
56
- -!if $(SECURE_BOOT_ENABLE) == TRUE
57
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE)
58
- INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
59
- !else
60
- INF MdeModulePkg/Logo/LogoDxe.inf
61
- diff --git a/ArmVirtPkg/ArmVirtQemuKernel.dsc b/ArmVirtPkg/ArmVirtQemuKernel.dsc
62
- index 83fc12f..5730633 100644
63
- --- a/ArmVirtPkg/ArmVirtQemuKernel.dsc
64
- +++ b/ArmVirtPkg/ArmVirtQemuKernel.dsc
65
- @@ -315,7 +315,7 @@
66
- MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
67
- MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
68
- MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
69
- -!if $(SECURE_BOOT_ENABLE) == TRUE
70
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE)
71
- MdeModulePkg/Logo/LogoOpenSSLDxe.inf
72
- !else
73
- MdeModulePkg/Logo/LogoDxe.inf
74
- diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc
75
- index f6d7833..bef8df9 100644
76
- --- a/OvmfPkg/OvmfPkgIa32.dsc
77
- +++ b/OvmfPkg/OvmfPkgIa32.dsc
78
- @@ -688,7 +688,7 @@
79
- NULL|IntelFrameworkModulePkg/Library/LegacyBootManagerLib/LegacyBootManagerLib.inf
80
- !endif
81
- }
82
- -!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
83
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
84
- MdeModulePkg/Logo/LogoOpenSSLDxe.inf
85
- !else
86
- MdeModulePkg/Logo/LogoDxe.inf
87
- diff --git a/OvmfPkg/OvmfPkgIa32.fdf b/OvmfPkg/OvmfPkgIa32.fdf
88
- index 73007dd..43f80cd 100644
89
- --- a/OvmfPkg/OvmfPkgIa32.fdf
90
- +++ b/OvmfPkg/OvmfPkgIa32.fdf
91
- @@ -297,7 +297,7 @@ INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
92
- !endif
93
- !endif
94
-
95
- -!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
96
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
97
- INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
98
- !else
99
- INF MdeModulePkg/Logo/LogoDxe.inf
100
- diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc
101
- index d6e628b..2085848 100644
102
- --- a/OvmfPkg/OvmfPkgIa32X64.dsc
103
- +++ b/OvmfPkg/OvmfPkgIa32X64.dsc
104
- @@ -697,7 +697,7 @@
105
- NULL|IntelFrameworkModulePkg/Library/LegacyBootManagerLib/LegacyBootManagerLib.inf
106
- !endif
107
- }
108
- -!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
109
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
110
- MdeModulePkg/Logo/LogoOpenSSLDxe.inf
111
- !else
112
- MdeModulePkg/Logo/LogoDxe.inf
113
- diff --git a/OvmfPkg/OvmfPkgIa32X64.fdf b/OvmfPkg/OvmfPkgIa32X64.fdf
114
- index 116b3c6..d858012 100644
115
- --- a/OvmfPkg/OvmfPkgIa32X64.fdf
116
- +++ b/OvmfPkg/OvmfPkgIa32X64.fdf
117
- @@ -298,7 +298,7 @@ INF RuleOverride = BINARY USE = X64 EdkShellBinPkg/FullShell/FullShell.inf
118
- !endif
119
- !endif
120
-
121
- -!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
122
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
123
- INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
124
- !else
125
- INF MdeModulePkg/Logo/LogoDxe.inf
126
- diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
127
- index a9fe89c..7bcb9fa 100644
128
- --- a/OvmfPkg/OvmfPkgX64.dsc
129
- +++ b/OvmfPkg/OvmfPkgX64.dsc
130
- @@ -695,7 +695,7 @@
131
- NULL|IntelFrameworkModulePkg/Library/LegacyBootManagerLib/LegacyBootManagerLib.inf
132
- !endif
133
- }
134
- -!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
135
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
136
- MdeModulePkg/Logo/LogoOpenSSLDxe.inf
137
- !else
138
- MdeModulePkg/Logo/LogoDxe.inf
139
- diff --git a/OvmfPkg/OvmfPkgX64.fdf b/OvmfPkg/OvmfPkgX64.fdf
140
- index 84d5845..41ce2d0 100644
141
- --- a/OvmfPkg/OvmfPkgX64.fdf
142
- +++ b/OvmfPkg/OvmfPkgX64.fdf
143
- @@ -298,7 +298,7 @@ INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
144
- !endif
145
- !endif
146
-
147
- -!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
148
- +!if ($(SECURE_BOOT_ENABLE) == TRUE) || ($(NETWORK_IP6_ENABLE) == TRUE) || ($(TLS_ENABLE) == TRUE)
149
- INF MdeModulePkg/Logo/LogoOpenSSLDxe.inf
150
- !else
151
- INF MdeModulePkg/Logo/LogoDxe.inf
152
- --
153
- 1.8.3.1
154
-
SOURCES/edk2-ovmf-sb.json ADDED
@@ -0,0 +1,36 @@
1
+ {
2
+ "description": "OVMF with SB+SMM, SB enabled, MS certs enrolled",
3
+ "interface-types": [
4
+ "uefi"
5
+ ],
6
+ "mapping": {
7
+ "device": "flash",
8
+ "executable": {
9
+ "filename": "/usr/share/edk2/ovmf/OVMF_CODE.secboot.fd",
10
+ "format": "raw"
11
+ },
12
+ "nvram-template": {
13
+ "filename": "/usr/share/edk2/ovmf/OVMF_VARS.secboot.fd",
14
+ "format": "raw"
15
+ }
16
+ },
17
+ "targets": [
18
+ {
19
+ "architecture": "x86_64",
20
+ "machines": [
21
+ "pc-q35-*"
22
+ ]
23
+ }
24
+ ],
25
+ "features": [
26
+ "acpi-s3",
27
+ "amd-sev",
28
+ "enrolled-keys",
29
+ "requires-smm",
30
+ "secure-boot",
31
+ "verbose-dynamic"
32
+ ],
33
+ "tags": [
34
+
35
+ ]
36
+ }
SOURCES/edk2-ovmf.json ADDED
@@ -0,0 +1,35 @@
1
+ {
2
+ "description": "OVMF with SB+SMM, empty varstore",
3
+ "interface-types": [
4
+ "uefi"
5
+ ],
6
+ "mapping": {
7
+ "device": "flash",
8
+ "executable": {
9
+ "filename": "/usr/share/edk2/ovmf/OVMF_CODE.secboot.fd",
10
+ "format": "raw"
11
+ },
12
+ "nvram-template": {
13
+ "filename": "/usr/share/edk2/ovmf/OVMF_VARS.fd",
14
+ "format": "raw"
15
+ }
16
+ },
17
+ "targets": [
18
+ {
19
+ "architecture": "x86_64",
20
+ "machines": [
21
+ "pc-q35-*"
22
+ ]
23
+ }
24
+ ],
25
+ "features": [
26
+ "acpi-s3",
27
+ "amd-sev",
28
+ "requires-smm",
29
+ "secure-boot",
30
+ "verbose-dynamic"
31
+ ],
32
+ "tags": [
33
+
34
+ ]
35
+ }
file modified
+78 -90
SPECS/edk2.spec CHANGED
@@ -1,13 +1,13 @@
1
1
ExclusiveArch: x86_64 aarch64
2
2
3
- %define GITDATE 20180508
4
- %define GITCOMMIT ee3198e672e2
3
+ %define GITDATE 20190308
4
+ %define GITCOMMIT 89910a39dcfd
5
5
%define TOOLCHAIN GCC5
6
- %define OPENSSL_VER 1.1.0h
6
+ %define OPENSSL_VER 1.1.0i
7
7
8
8
Name: edk2
9
9
Version: %{GITDATE}git%{GITCOMMIT}
10
- Release: 9%{?dist}.1
10
+ Release: 6%{?dist}
11
11
Summary: UEFI firmware for 64-bit virtual machines
12
12
Group: Applications/Emulators
13
13
License: BSD and OpenSSL and MIT
@@ -19,10 +19,15 @@ URL: http://www.tianocore.org
19
19
# | xz -9ev >/tmp/edk2-$COMMIT.tar.xz
20
20
Source0: http://batcave.lab.eng.brq.redhat.com/www/edk2-%{GITCOMMIT}.tar.xz
21
21
Source1: ovmf-whitepaper-c770f8c.txt
22
- Source2: openssl-fedora-264133c642cdb6fc916f1d9bba9db4cb4cd4a17c.tar.xz
22
+ Source2: openssl-fedora-d2ede125556ac99aa0faa7744c703af3f559094e.tar.xz
23
23
Source3: ovmf-vars-generator
24
24
Source4: LICENSE.qosb
25
25
26
+ Source10: edk2-aarch64-verbose.json
27
+ Source11: edk2-aarch64.json
28
+ Source12: edk2-ovmf-sb.json
29
+ Source13: edk2-ovmf.json
30
+
26
31
Patch0003: 0003-advertise-OpenSSL-on-TianoCore-splash-screen-boot-lo.patch
27
32
Patch0004: 0004-OvmfPkg-increase-max-debug-message-length-to-512-RHE.patch
28
33
Patch0005: 0005-OvmfPkg-QemuVideoDxe-enable-debug-messages-in-VbeShi.patch
@@ -37,62 +42,26 @@ Patch0013: 0013-ArmPlatformPkg-introduce-fixed-PCD-for-early-hello-m.patch
37
42
Patch0014: 0014-ArmPlatformPkg-PrePeiCore-write-early-hello-message-.patch
38
43
Patch0015: 0015-ArmVirtPkg-set-early-hello-message-RH-only.patch
39
44
Patch0016: 0016-OvmfPkg-enable-DEBUG_VERBOSE-RHEL-only.patch
40
- Patch0017: 0017-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-QemuVide.patch
41
- Patch0018: 0018-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-NvmExpre.patch
42
- Patch0019: 0019-OvmfPkg-PlatformBootManagerLib-connect-consoles-unco.patch
43
- Patch0020: 0020-ArmVirtPkg-PlatformBootManagerLib-connect-Virtio-RNG.patch
44
- Patch0021: 0021-OvmfPkg-PlatformBootManagerLib-connect-Virtio-RNG-de.patch
45
- Patch0027: 0027-BaseTools-tools_def-add-fno-unwind-tables-to-GCC_AAR.patch
46
- # For bz#1536627 - IPv6 enablement in OVMF
47
- Patch35: edk2-ArmVirtPkg-unify-HttpLib-resolutions-in-ArmVirt.dsc..patch
48
- # For bz#1536627 - IPv6 enablement in OVMF
49
- Patch36: edk2-ArmVirtPkg-ArmVirtQemu-enable-the-IPv6-stack.patch
50
- # For bz#1536627 - IPv6 enablement in OVMF
51
- Patch37: edk2-advertise-OpenSSL-due-to-IPv6-enablement-too-RHEL-on.patch
52
- # For bz#1607906 - edk2-tools: Does not use RPM build flags
53
- Patch38: edk2-BaseTools-footer.makefile-expand-BUILD_CFLAGS-last-f.patch
54
- # For bz#1607906 - edk2-tools: Does not use RPM build flags
55
- Patch39: edk2-BaseTools-header.makefile-remove-c-from-BUILD_CFLAGS.patch
56
- # For bz#1607906 - edk2-tools: Does not use RPM build flags
57
- Patch40: edk2-BaseTools-Source-C-split-O2-to-BUILD_OPTFLAGS.patch
58
- # For bz#1607906 - edk2-tools: Does not use RPM build flags
59
- Patch41: edk2-BaseTools-Source-C-take-EXTRA_OPTFLAGS-from-the-call.patch
45
+ Patch0017: 0017-OvmfPkg-silence-DEBUG_VERBOSE-0x00400000-in-QemuVide.patch
46
+ Patch0018: 0018-ArmVirtPkg-silence-DEBUG_VERBOSE-0x00400000-in-QemuR.patch
47
+ Patch0019: 0019-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-NvmExpre.patch
48
+ Patch0026: 0026-Downgrade-CryptoPkg-INF-files-to-OpenSSL-1.1.0i-RH-o.patch
49
+ # For bz#1666941 - UEFI guest cannot boot into os when setting some special memory size
50
+ Patch27: edk2-OvmfPkg-raise-the-PCIEXBAR-base-to-2816-MB-on-Q35.patch
51
+ # For bz#1666941 - UEFI guest cannot boot into os when setting some special memory size
52
+ Patch28: edk2-OvmfPkg-PlatformPei-set-32-bit-UC-area-at-PciBase-Pc.patch
53
+ # For bz#1714446 - edk2-aarch64 silent build is not silent enough
54
+ Patch29: edk2-ArmVirtPkg-silence-DEBUG_VERBOSE-masking-0x00400000-.patch
55
+ # For bz#1714446 - edk2-aarch64 silent build is not silent enough
56
+ Patch30: edk2-OvmfPkg-QemuRamfbDxe-Do-not-report-DXE-failure-on-Aa.patch
57
+ # For bz#1714446 - edk2-aarch64 silent build is not silent enough
58
+ Patch31: edk2-ArmPkg-DebugPeCoffExtraActionLib-debugger-commands-a.patch
59
+
60
+
61
+ # python3-devel and libuuid-devel are required for building tools.
62
+ # python3-devel is also needed for varstore template generation and
63
+ # verification with "ovmf-vars-generator".
64
+ BuildRequires: python3-devel
60
- # For bz#1607906 - edk2-tools: Does not use RPM build flags
61
- Patch42: edk2-BaseTools-Source-C-take-EXTRA_LDFLAGS-from-the-calle.patch
62
- # For bz#1607906 - edk2-tools: Does not use RPM build flags
63
- Patch43: edk2-BaseTools-VfrCompile-honor-EXTRA_LDFLAGS.patch
64
- # For bz#1641436 - CVE-2018-3613 edk2: Logic error in MdeModulePkg in EDK II firmware allows for privilege escalation by authenticated users [rhel-8]
65
- Patch44: edk2-MdeModulePkg-Variable-Fix-Timestamp-zeroing-issue-on.patch
66
- # For bz#1641449 - CVE-2017-5732 edk2: Privilege escalation via processing of malformed files in BaseUefiDecompressLib.c [rhel-8]
67
- # For bz#1641453 - CVE-2017-5733 edk2: Privilege escalation via heap-based buffer overflow in MakeTable() function [rhel-8]
68
- # For bz#1641464 - CVE-2017-5734 edk2: Privilege escalation via stack-based buffer overflow in MakeTable() function [rhel-8]
69
- # For bz#1641469 - CVE-2017-5735 edk2: Privilege escalation via heap-based buffer overflow in Decode() function [rhel-8]
70
- Patch45: edk2-MdePkg-Add-more-checker-in-UefiDecompressLib-to-acce.patch
71
- # For bz#1641453 - CVE-2017-5733 edk2: Privilege escalation via heap-based buffer overflow in MakeTable() function [rhel-8]
72
- # For bz#1641464 - CVE-2017-5734 edk2: Privilege escalation via stack-based buffer overflow in MakeTable() function [rhel-8]
73
- # For bz#1641469 - CVE-2017-5735 edk2: Privilege escalation via heap-based buffer overflow in Decode() function [rhel-8]
74
- Patch46: edk2-IntelFrameworkModulePkg-Add-more-checker-in-UefiTian.patch
75
- # For bz#1641445 - CVE-2017-5731 edk2: Privilege escalation via processing of malformed files in TianoCompress.c [rhel-8]
76
- # For bz#1641453 - CVE-2017-5733 edk2: Privilege escalation via heap-based buffer overflow in MakeTable() function [rhel-8]
77
- # For bz#1641464 - CVE-2017-5734 edk2: Privilege escalation via stack-based buffer overflow in MakeTable() function [rhel-8]
78
- # For bz#1641469 - CVE-2017-5735 edk2: Privilege escalation via heap-based buffer overflow in Decode() function [rhel-8]
79
- Patch47: edk2-BaseTools-Add-more-checker-in-Decompress-algorithm-t.patch
80
- # For bz#1643377 - Exception when grubx64.efi used for UEFI netboot
81
- Patch48: edk2-NetworkPkg-UefiPxeBcDxe-Add-EXCLUSIVE-attribute-when.patch
82
- # For bz#1662184 - backport fix for (theoretical?) regression introduced by earlier CVE fixes
83
- Patch49: edk2-BaseTools-Fix-UEFI-and-Tiano-Decompression-logic-iss.patch
84
- # For bz#1662184 - backport fix for (theoretical?) regression introduced by earlier CVE fixes
85
- Patch50: edk2-MdePkg-BaseUefiDecompressLib-Fix-UEFI-Decompression-.patch
86
- # For bz#1662184 - backport fix for (theoretical?) regression introduced by earlier CVE fixes
87
- Patch51: edk2-IntelFrameworkModulePkg-Fix-UEFI-and-Tiano-Decompres.patch
88
- # For bz#1690501 - CVE-2018-12180 edk2: Buffer Overflow in BlockIo service for RAM disk [rhel-8.0.0.z]
89
- Patch52: edk2-MdeModulePkg-PartitionDxe-Ensure-blocksize-holds-MBR.patch
90
- # For bz#1690501 - CVE-2018-12180 edk2: Buffer Overflow in BlockIo service for RAM disk [rhel-8.0.0.z]
91
- Patch53: edk2-MdeModulePkg-RamDiskDxe-Restrict-on-RAM-disk-size-CV.patch
92
-
93
-
94
- # python2-devel and libuuid-devel are required for building tools
95
- BuildRequires: python2-devel
96
65
BuildRequires: libuuid-devel
97
66
BuildRequires: /usr/bin/iasl
98
67
BuildRequires: binutils gcc git
@@ -116,10 +85,6 @@ BuildRequires: qemu-kvm
116
85
BuildRequires: kernel-core
117
86
BuildRequires: rpmdevtools
118
87
119
- # For orchestrating the above two steps (varstore generation and verification),
120
- # we need to launch "ovmf-vars-generator" -- which we run on Python 3.
121
- BuildRequires: python3-devel
122
-
123
88
%package ovmf
124
89
Summary: UEFI firmware for x86_64 virtual machines
125
90
BuildArch: noarch
@@ -186,10 +151,7 @@ environment for the UEFI and PI specifications. This package contains sample
186
151
%prep
187
152
%setup -q -n edk2-%{GITCOMMIT}
188
153
189
- # Ensure old shell and binary packages are not used
154
+ # Ensure binary packages are not used
190
- rm -rf EdkShellBinPkg
191
- rm -rf EdkShellPkg
192
- rm -rf FatBinPkg
193
155
rm -rf ShellBinPkg
194
156
195
157
%{lua:
@@ -228,16 +190,14 @@ echo "Applied $COUNT patches"
228
190
rm -f $PATCHLIST
229
191
230
192
cp -a -- %{SOURCE1} %{SOURCE3} .
193
+ cp -a -- %{SOURCE10} %{SOURCE11} %{SOURCE12} %{SOURCE13} .
231
194
tar -C CryptoPkg/Library/OpensslLib -a -f %{SOURCE2} -x
232
195
233
196
# Done by %setup, but we do not use it for the auxiliary tarballs
234
197
chmod -Rf a+rX,u+w,g-w,o-w .
235
198
236
199
%build
237
- # For the time being, we need Python 2 for the build. See RHBZ 1593429 and
200
+ export PYTHON_COMMAND=%{__python3}
238
- # <https://url.corp.redhat.com/rhel8-py2>.
239
- export RHEL_ALLOW_PYTHON2_FOR_BUILD=1
240
-
241
201
source ./edksetup.sh
242
202
make -C "$EDK_TOOLS_PATH" \
243
203
EXTRA_OPTFLAGS="%{optflags}" \
@@ -255,12 +215,13 @@ CC_FLAGS="$CC_FLAGS -D NETWORK_IP6_ENABLE"
255
215
256
216
%ifarch x86_64
257
217
# Build with neither SB nor SMM; include UEFI shell.
258
- build ${CC_FLAGS} -D FD_SIZE_4MB -a X64 -p OvmfPkg/OvmfPkgX64.dsc
218
+ build ${CC_FLAGS} -D TPM2_ENABLE -D FD_SIZE_4MB -a X64 \
219
+ -p OvmfPkg/OvmfPkgX64.dsc
259
220
260
221
# Build with SB and SMM; exclude UEFI shell.
261
222
build -D SECURE_BOOT_ENABLE -D EXCLUDE_SHELL_FROM_FD ${CC_FLAGS} \
262
223
-a IA32 -a X64 -p OvmfPkg/OvmfPkgIa32X64.dsc -D SMM_REQUIRE \
263
- -D FD_SIZE_4MB
224
+ -D TPM2_ENABLE -D FD_SIZE_4MB
264
225
265
226
# Sanity check: the varstore templates must be identical.
266
227
cmp Build/OvmfX64/DEBUG_%{TOOLCHAIN}/FV/OVMF_VARS.fd \
@@ -326,6 +287,7 @@ build ${CC_FLAGS} -a AARCH64 \
326
287
%install
327
288
328
289
cp -a License.txt License.edk2.txt
290
+ mkdir -p $RPM_BUILD_ROOT%{_datadir}/qemu/firmware
329
291
330
292
%ifarch x86_64
331
293
mkdir -p \
@@ -358,6 +320,11 @@ install -m 0644 Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/X64/Shell.efi \
358
320
install -m 0644 Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/X64/EnrollDefaultKeys.efi \
359
321
$RPM_BUILD_ROOT%{_datadir}/%{name}/ovmf/EnrollDefaultKeys.efi
360
322
323
+ install -m 0644 edk2-ovmf-sb.json \
324
+ $RPM_BUILD_ROOT%{_datadir}/qemu/firmware/40-edk2-ovmf-sb.json
325
+ install -m 0644 edk2-ovmf.json \
326
+ $RPM_BUILD_ROOT%{_datadir}/qemu/firmware/50-edk2-ovmf.json
327
+
361
328
%else
362
329
mkdir -p \
363
330
$RPM_BUILD_ROOT%{_datadir}/AAVMF \
@@ -397,6 +364,11 @@ install -m 0644 Build/ArmVirtQemu-AARCH64/DEBUG_%{TOOLCHAIN}/FV/QEMU_EFI.fd \
397
364
install -m 0644 Build/ArmVirtQemu-AARCH64/DEBUG_%{TOOLCHAIN}/FV/QEMU_VARS.fd \
398
365
$RPM_BUILD_ROOT%{_datadir}/%{name}/aarch64/QEMU_VARS.fd
399
366
367
+ install -m 0644 edk2-aarch64.json \
368
+ $RPM_BUILD_ROOT%{_datadir}/qemu/firmware/60-edk2-aarch64.json
369
+ install -m 0644 edk2-aarch64-verbose.json \
370
+ $RPM_BUILD_ROOT%{_datadir}/qemu/firmware/70-edk2-aarch64-verbose.json
371
+
400
372
%endif
401
373
402
374
cp -a CryptoPkg/Library/OpensslLib/openssl/LICENSE LICENSE.openssl
@@ -427,6 +399,8 @@ install BaseTools/Scripts/GccBase.lds \
427
399
%license OvmfPkg/License.txt
428
400
%license LICENSE.openssl
429
401
%dir %{_datadir}/%{name}/
402
+ %dir %{_datadir}/qemu
403
+ %dir %{_datadir}/qemu/firmware
430
404
431
405
%ifarch x86_64
432
406
%doc OvmfPkg/README
@@ -447,6 +421,8 @@ install BaseTools/Scripts/GccBase.lds \
447
421
%{_datadir}/OVMF/UefiShell.iso
448
422
%{_datadir}/%{name}/ovmf/Shell.efi
449
423
%{_datadir}/%{name}/ovmf/EnrollDefaultKeys.efi
424
+ %{_datadir}/qemu/firmware/40-edk2-ovmf-sb.json
425
+ %{_datadir}/qemu/firmware/50-edk2-ovmf.json
450
426
451
427
%else
452
428
%dir %{_datadir}/AAVMF/
@@ -460,23 +436,20 @@ install BaseTools/Scripts/GccBase.lds \
460
436
%{_datadir}/%{name}/aarch64/QEMU_EFI.fd
461
437
%{_datadir}/%{name}/aarch64/QEMU_EFI.silent.fd
462
438
%{_datadir}/%{name}/aarch64/QEMU_VARS.fd
439
+ %{_datadir}/qemu/firmware/60-edk2-aarch64.json
440
+ %{_datadir}/qemu/firmware/70-edk2-aarch64-verbose.json
463
441
%endif
464
442
465
443
%files tools
466
444
%license License.txt
467
- %{_bindir}/BootSectImage
468
445
%{_bindir}/Brotli
469
446
%{_bindir}/DevicePath
470
- %{_bindir}/EfiLdrImage
471
447
%{_bindir}/EfiRom
472
448
%{_bindir}/GenCrc32
473
449
%{_bindir}/GenFfs
474
450
%{_bindir}/GenFv
475
451
%{_bindir}/GenFw
476
- %{_bindir}/GenPage
477
452
%{_bindir}/GenSec
478
- %{_bindir}/GenVtf
479
- %{_bindir}/GnuGenBootSector
480
453
%{_bindir}/LzmaCompress
481
454
%{_bindir}/LzmaF86Compress
482
455
%{_bindir}/Split
@@ -515,11 +488,31 @@ true
515
488
%endif
516
489
517
490
%changelog
518
- * Tue Mar 26 2019 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20180508gitee3198e672e2-9.el8_0
519
- - edk2-MdeModulePkg-PartitionDxe-Ensure-blocksize-holds-MBR.patch [bz#1690501]
520
- - edk2-MdeModulePkg-RamDiskDxe-Restrict-on-RAM-disk-size-CV.patch [bz#1690501]
521
- - Resolves: bz#1690501
522
- (CVE-2018-12180 edk2: Buffer Overflow in BlockIo service for RAM disk [rhel-8.0.0.z])
491
+ * Mon Aug 05 2019 Miroslav Rezanina <mrezanin@redhat.com> - 20190308git89910a39dcfd-6.el8
492
+ - edk2-ArmVirtPkg-silence-DEBUG_VERBOSE-masking-0x00400000-.patch [bz#1714446]
493
+ - edk2-OvmfPkg-QemuRamfbDxe-Do-not-report-DXE-failure-on-Aa.patch [bz#1714446]
494
+ - edk2-ArmPkg-DebugPeCoffExtraActionLib-debugger-commands-a.patch [bz#1714446]
495
+ - Resolves: bz#1714446
496
+ (edk2-aarch64 silent build is not silent enough)
497
+
498
+ * Tue Jul 02 2019 Miroslav Rezanina <mrezanin@redhat.com> - 20190308git89910a39dcfd-5.el8
499
+ - edk2-redhat-add-D-TPM2_ENABLE-to-the-edk2-ovmf-build-flag.patch [bz#1693205]
500
+ - Resolves: bz#1693205
501
+ (edk2: Enable TPM2 support)
502
+
503
+ * Tue Jun 11 2019 Miroslav Rezanina <mrezanin@redhat.com> - 20190308git89910a39dcfd-4.el8
504
+ - edk2-OvmfPkg-raise-the-PCIEXBAR-base-to-2816-MB-on-Q35.patch [bz#1666941]
505
+ - edk2-OvmfPkg-PlatformPei-set-32-bit-UC-area-at-PciBase-Pc.patch [bz#1666941]
506
+ - Resolves: bz#1666941
507
+ (UEFI guest cannot boot into os when setting some special memory size)
508
+
509
+ * Tue Apr 09 2019 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20190308git89910a39dcfd-2.el8
510
+ - edk2-redhat-provide-firmware-descriptor-meta-files.patch [bz#1600230]
511
+ - Resolves: bz#1600230
512
+ ([RHEL 8.1] RFE: provide firmware descriptor meta-files for the edk2-ovmf and edk2-aarch64 firmware images)
513
+
514
+ * Mon Apr 08 2019 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20190308git89910a39dcfd-1.el8
515
+ - Rebase to edk2-20190308git89910a39dcfd
523
516
524
517
* Mon Jan 21 2019 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20180508gitee3198e672e2-9.el8
525
518
- edk2-BaseTools-Fix-UEFI-and-Tiano-Decompression-logic-iss.patch [bz#1662184]
@@ -534,11 +527,6 @@ true
534
527
- Resolves: bz#1643377
535
528
(Exception when grubx64.efi used for UEFI netboot)
536
529
537
- * Fri Nov 16 2018 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20180508gitee3198e672e2-7.el8
538
- - Rebuilding edk2 outside the module branch
539
- - Resolves: bz#1637650
540
- (Move ipxe and edk2 out of the virt module.)
541
-
542
530
* Tue Nov 06 2018 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20180508gitee3198e672e2-5.el8
543
531
- edk2-MdeModulePkg-Variable-Fix-Timestamp-zeroing-issue-on.patch [bz#1641436]
544
532
- edk2-MdePkg-Add-more-checker-in-UefiDecompressLib-to-acce.patch [bz#1641449 bz#1641453 bz#1641464 bz#1641469]