-
Notifications
You must be signed in to change notification settings - Fork 144
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CryptoPkg: Fix the pkcs7 get cert fuzz #484
base: OpenSSL11_EOL
Are you sure you want to change the base?
Commits on Jun 1, 2023
-
OvmfPkg/Bhyve: Replace the OVMF-specific SataControllerDxe
Replace the OVMF-specific SataControllerDxe (to be later removed) with the generic, MdeModulePkg one, for the Bhyve platform. Signed-off-by: Pedro Falcato <[email protected]> Acked-by: Gerd Hoffmann <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Reviewed-by: Laszlo Ersek <[email protected]> Acked-by: Peter Grehan <[email protected]> Acked-by: Corvin Köhne <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for d85b84e - Browse repository at this point
Copy the full SHA d85b84eView commit details -
OvmfPkg/CloudHv: Replace the OVMF-specific SataControllerDxe
Replace the OVMF-specific SataControllerDxe (to be later removed) with the generic, MdeModulePkg one, for the CloudHv platform. Signed-off-by: Pedro Falcato <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Acked-by: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b26359c - Browse repository at this point
Copy the full SHA b26359cView commit details -
OvmfPkg/IntelTdx: Replace the OVMF-specific SataControllerDxe
Replace the OVMF-specific SataControllerDxe (to be later removed) with the generic, MdeModulePkg one, for the IntelTdx platform. Signed-off-by: Pedro Falcato <[email protected]> Acked-by: Gerd Hoffmann <[email protected]> Acked-by: Ard Biesheuvel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 069d403 - Browse repository at this point
Copy the full SHA 069d403View commit details -
OvmfPkg/AmdSev: Replace the OVMF-specific SataControllerDxe
Replace the OVMF-specific SataControllerDxe (to be later removed) with the generic, MdeModulePkg one, for the AmdSev platform. Signed-off-by: Pedro Falcato <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Acked-by: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 07c7e68 - Browse repository at this point
Copy the full SHA 07c7e68View commit details -
OvmfPkg/Xen: Replace the OVMF-specific SataControllerDxe
Replace the OVMF-specific SataControllerDxe (to be later removed) with the generic, MdeModulePkg one, for the OvmfXen platform. Signed-off-by: Pedro Falcato <[email protected]> Acked-by: Gerd Hoffmann <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Acked-by: Anthony PERARD <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 77fee3a - Browse repository at this point
Copy the full SHA 77fee3aView commit details -
OvmfPkg: Remove SataControllerDxe
Now that OvmfPkg/SataControllerDxe and its MdeModulePkg counterpart have been unified, and no in-tree uses of the OVMF variant remain, let's delete it. Tested-by: Gerd Hoffmann <[email protected]> Acked-by: Gerd Hoffmann <[email protected]> Signed-off-by: Pedro Falcato <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Reviewed-by: Laszlo Ersek <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 41abf00 - Browse repository at this point
Copy the full SHA 41abf00View commit details
Commits on Jun 2, 2023
-
ShellPkg: Add a condition to print accurate type0 Bios Size in smbios…
…view. As per the SMBIOS spec, in smbios type0 table, if the Bios size is greater than 16MB, extended bios size is used to update size information and bios size is set to 0xff. when this data is printed by smbiosview, both bios size and extended bios size is printed if the smbios version is beyond 3.1, which is incorrect as Bios size is set to 0xff when rom size is more than 16MB. To fix this bug, added a condition to print bios size only when it is not set to 0xff or if the smbios version is older than 3.1. Signed-off-by: Thejaswani Putta <[email protected]> Cc: Ray Ni <[email protected]> Cc: Zhichao Gao <[email protected]> Reviewed-by: Zhichao Gao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7826289 - Browse repository at this point
Copy the full SHA 7826289View commit details -
ShellPkgDisconnect: zero-initialize handles
In case ShellConvertStringToUint64() fails the Handles are left uninitialized. That can for example happen for Handle2 and Handle3 in case only one parameter was specified on the command line. Which can trigger the ASSERT() in line 185. Reproducer: boot ovmf to efi shell in qemu, using q35 machine type, then try disconnect the sata controller in efi shell. Fix that by explicitly setting them to NULL in that case. While being at it also simplify the logic and avoid pointlessly calling ShellConvertStringToUint64() in case ParamN is NULL. Signed-off-by: Gerd Hoffmann <[email protected]> Reviewed-by: Zhichao Gao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a8acc12 - Browse repository at this point
Copy the full SHA a8acc12View commit details -
ArmPkg: Enable AuditMode for Uncrustify CI checks
Uncrustify checks are too rigid, making them counter-productive: - it leads to code that is arguably harder to parse visually (e.g., the changes to ArmPkg/Include/Chipset/AArch64Mmu.h in commit 429309e) - it forces indentation-only changes to code in the vicinity of actual changes, making the code history more bloated than necessary (see commit 7f19832 for an example) - finding out from the web UI what exactly Uncrustify objected to is not straight-forward. So let's enable AuditMode for ArmPkg, so that interested parties can see the uncrustify recommendations if desired, but without preventing the changes from being merged. This leaves it at the discretion of the ArmPkg maintainers to decide which level of conformance is required. Cc: Leif Lindholm <[email protected]> Cc: "Kinney, Michael D" <[email protected]> Cc: Michael Kubacki <[email protected]> Signed-off-by: Ard Biesheuvel <[email protected]> Reviewed-by: Leif Lindholm <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0364ccf - Browse repository at this point
Copy the full SHA 0364ccfView commit details -
ArmPkg: add SMC defines for SiP service calls
They are useful for those platforms where SMC SiP calls exist. Signed-off-by: Marcin Juszkiewicz <[email protected]> Reviewed-by: Leif Lindholm <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4354c22 - Browse repository at this point
Copy the full SHA 4354c22View commit details -
OvmfPkg/RiscVVirt: Remove unimplemented NxForStack configuration
The RISC-V version of the DXE IPL does not implement setting the stack NX, so before switching to an implementation that will ASSERT() on the missing support, drop the PCD setting that enables it. Signed-off-by: Ard Biesheuvel <[email protected]> Reviewed-by: Sunil V L <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8fbf857 - Browse repository at this point
Copy the full SHA 8fbf857View commit details -
OvmfPkg: Create additional PML1 entries for large SEV-SNP VMs
Edk2 was failing, rather than creating more PML4 entries, when they weren't present in the initial memory acceptance flow. Because of that VMs with more than 512G memory were crashing. This code fixes that. This change affects only SEV-SNP VMs. The code was tested by successfully booting a 512G SEV-SNP VM. Signed-off-by: Mikolaj Lisik <[email protected]> Acked-by: Gerd Hoffmann <[email protected]> Acked-by: Tom Lendacky <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c1dd400 - Browse repository at this point
Copy the full SHA c1dd400View commit details
Commits on Jun 6, 2023
-
OvmfPkg/Xen: export search of RSDP into a library function
Xen and bhyve are placing ACPI tables into system memory. So, they can share the same code. Therefore, create a new library which searches and installs ACPI tables from system memory. Signed-off-by: Corvin Köhne <[email protected]> Reviewed-by: Anthony PERARD <[email protected]> Acked-by: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f211292 - Browse repository at this point
Copy the full SHA f211292View commit details -
OvmfPkg/Xen: export AcpiTable installation into AcpiPlatformLib
This makes the function reuseable by bhyve. Signed-off-by: Corvin Köhne <[email protected]> Reviewed-by: Anthony PERARD <[email protected]> Acked-by: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1288c54 - Browse repository at this point
Copy the full SHA 1288c54View commit details -
OvmfPkg/Bhyve: install ACPI tables from memory
It's much easier to create configuration dependent ACPI tables for bhyve than for OVMF. For this reason, don't use the statically created ACPI tables provided by OVMF. Instead, prefer the dynamically created ACPI tables of bhyve. If bhyve provides no ACPI tables or we are unable to detect those, fall back to OVMF tables. Ideally, we use the qemu fwcfg interface to pass the ACPI tables from bhyve to OVMF. bhyve will support this in the future. However, current bhyve executables don't support passing ACPI tables by the qemu fwcfg interface. They just copy the ACPI into main memory. For that reason, pick up the ACPI tables from main memory. Signed-off-by: Corvin Köhne <[email protected]> Reviewed-by: Rebecca Cran <[email protected]> Acked-by: Peter Grehan <[email protected]> Acked-by: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4bd0849 - Browse repository at this point
Copy the full SHA 4bd0849View commit details -
CharEncodingCheckPlugin: Remove Noisy Print
Currently, CharEncodingCheckPlugin prints a message for every file that passes the test, which for some platforms can cause most of the CI build log to be filled with this print. It does not add any value, so this patch removes the noisy print and only prints if the encoding check fails. Cc: Sean Brogan <[email protected]> Cc: Michael Kubacki <[email protected]> Cc: Michael D Kinney <[email protected]> Cc: Liming Gao <[email protected]> Reviewed-by: Michael D Kinney <[email protected]> Reviewed-by: Michael Kubacki <[email protected]> Signed-off-by: Oliver Smith-Denny <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for cdd2063 - Browse repository at this point
Copy the full SHA cdd2063View commit details -
MdePkg ACPI65: Update MADT Revision pre ACPI Spec 6.5
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4474 ACPI_Spec_6_5_Aug29 Table 5.19 page 128 that MADT Revision field is 6. Cc: Michael D Kinney <[email protected]> Cc: Liming Gao <[email protected]> Cc: Zhiguang Liu <[email protected]> Cc: Jiewen Yao <[email protected]> Signed-off-by: Aryeh Chen <[email protected]> Reviewed-by: Michael D Kinney <[email protected]> Reviewed-by: Liming Gao <[email protected]> Tested-by: Aryeh Chen <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for d189de3 - Browse repository at this point
Copy the full SHA d189de3View commit details -
MdePkg/BaseLib: Add SpeculationBarrier implementation for RiscV64
Implement the SpeculationBarrier with implementations consisting of fence instruction which provides finer-grain memory orderings. Perform Data Barrier in RiscV: fence rw,rw Perform Instruction Barrier in RiscV: fence.i; fence r,r More detail is in Appendix A: RVWMO Explanatory Material in https://github.com/riscv/riscv-isa-manual This API is first introduced in the below commits for IA32 and x64 tianocore/edk2@d9f1cac tianocore/edk2@e83d841 and below the commit for ARM and AArch64 implementation tianocore/edk2@c0959b4 This commit is to add the RiscV64 implementation which will be used by variable service under Variable/RuntimeDxe Cc: Andrei Warkentin <[email protected]> Cc: Evan Chai <[email protected]> Cc: Sunil V L <[email protected]> Cc: Tuan Phan <[email protected]> Signed-off-by: Yong Li <[email protected]> Reviewed-by: Sunil V L <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ded0b48 - Browse repository at this point
Copy the full SHA ded0b48View commit details
Commits on Jun 7, 2023
-
MdeModulePkg/Bus: Fix port multiplier port in AhciPei PEIM
If there is no port multiplier, PortMultiplierPort should be converted to 0 to follow AHCI spec. The same logic already applied in AtaAtapiPassThruDxe driver. Signed-off-by: Neo Hsueh <[email protected]> Acked-by: Abner Chang <[email protected]> Reviewed-by: Hao A Wu <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 67fc78d - Browse repository at this point
Copy the full SHA 67fc78dView commit details -
RedfishClientPkg is moved from edk2-staging repository to edk2-redfish-client repository. Update the link in Readme.md to new location. Signed-off-by: Nickle Wang <[email protected]> Cc: Abner Chang <[email protected]> Cc: Igor Kulchytskyy <[email protected]> Reviewed-by: Abner Chang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c082da8 - Browse repository at this point
Copy the full SHA c082da8View commit details -
Maintainers.txt: Remove reviewer for StandaloneMmPkg
Supreeth is no longer [email protected]. Therefore, remove the reviewer entry from StandaloneMmPkg. Signed-off-by: Sami Mujawar <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for aa3ea84 - Browse repository at this point
Copy the full SHA aa3ea84View commit details -
Maintainers.txt: Update maintainers for StandaloneMmPkg
Add Ray, remove Jiewen. Signed-off-by: Ray Ni <[email protected]> Reviewed-by: Sami Mujawar <[email protected]> Reviewed-by: Jiewen Yao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8d238f1 - Browse repository at this point
Copy the full SHA 8d238f1View commit details -
UefiPayloadPkg: Enhance build script for BuildEntryOnly
Currently, have two command for pre-build binary support 1. --BuildEntryOnly: build UPL Entry file 2. --PreBuildUplBinary: build UPL binary based on UPL And these two commands should be exclusived, shouldn't have chance run it in the meantime. Case1: Build UPL entry with CLANGDWARF python UefiPayloadPkg/UniversalPayloadBuild.py --BuildEntryOnly Case2: Use pre-built UPL entry and build other fv by VS2019 python UefiPayloadPkg/UniversalPayloadBuild.py -t VS2019 \ --PreBuildUplBinary UniversalPayload.elf Case3: Build UPL Entry with CLANGDWARF and build other fv by VS2019 python UefiPayloadPkg/UniversalPayloadBuild.py -t VS2019 Cc: Guo Dong <[email protected]> Cc: Ray Ni <[email protected]> Cc: Sean Rhodes <[email protected]> Cc: James Lu <[email protected]> Cc: Gua Guo <[email protected]> Signed-off-by: Gua Guo <[email protected]> Reviewed-by: James Lu <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 69abcf1 - Browse repository at this point
Copy the full SHA 69abcf1View commit details
Commits on Jun 8, 2023
-
ShellPkg/SmbiosView: type 45 and type 46 support.
The initial version of Smbios Specification 3.6.0 type 45 and type 46 support. Signed-off-by: Simon Wang <[email protected]> Cc: Ray Ni <[email protected]> Cc: Zhichao Gao <[email protected]> Reviewed-by: Zhichao Gao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8314a85 - Browse repository at this point
Copy the full SHA 8314a85View commit details
Commits on Jun 13, 2023
-
UnitTestFrameworkPkg: Add UnitTestPeiServicesTablePointerLib
This library supports a PeiServicesTablePointerLib implementation that allows code dependent upon PeiServicesTable to operate in an isolated execution environment such as within the context of a host-based unit test framework. The unit test should initialize the PeiServicesTable database with any required elements (e.g. PPIs, Hob etc.) prior to the services being invoked by code under test. It is strongly recommended to clean any global databases by using EFI_PEI_SERVICES.ResetSystem2 after every unit test so the tests execute in a predictable manner from a clean state. Cc: Michael D Kinney <[email protected]> Reviewed-by: Michael Kubacki <[email protected]> Cc: Sean Brogan <[email protected]> Reviewed-by: Ray Ni <[email protected]> Signed-off-by: Zhiguang Liu <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 530f5b0 - Browse repository at this point
Copy the full SHA 530f5b0View commit details -
Maintainers.txt: Remove UEFI Shell Binaries section
The Shell binaries are not generated anymore in each stable tag release. So, remove the section. Reviewed-by: Zhichao Gao <[email protected]> Cc: Leif Lindholm <[email protected]> Reviewed-by: Ard Biesheuvel <[email protected]> Signed-off-by: Ray Ni <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e5b515f - Browse repository at this point
Copy the full SHA e5b515fView commit details -
Maintainers.txt: Remove me from maintainers of UefiPayloadPkg,ShellPkg
Signed-off-by: Ray Ni <[email protected]> Cc: Guo Dong <[email protected]> Cc: Sean Rhodes <[email protected]> Cc: James Lu <[email protected]> Reviewed-by: Gua Guo <[email protected]> Reviewed-by: Zhichao Gao <[email protected]> Reviewed-by: Gua Guo <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6250124 - Browse repository at this point
Copy the full SHA 6250124View commit details -
UefiPayloadPkg: Add CAPSULE_SUPPORT in UPL and set it as FALSE in def…
…ault REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4479 Add CAPSULE_SUPPORT to optionally select CapsuleLib instance, default value is FALSE. Cc: Ray Ni <[email protected]> Cc: Sean Rhodes <[email protected]> Reviewed-by: Gua Guo <[email protected]> Reviewed-by: James Lu <[email protected]> Cc: Guo Dong <[email protected]> Signed-off-by: MarsX Lin <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 51bb8eb - Browse repository at this point
Copy the full SHA 51bb8ebView commit details
Commits on Jun 14, 2023
-
UefiPayloadPkg: Fix incorrect code on AddSectionHeader
Fix incorrect code on AddSectionHeader32() and AddSectionHeader64() Cc: Guo Dong <[email protected]> Cc: Sean Rhodes <[email protected]> Cc: James Lu <[email protected]> Cc: Gua Guo <[email protected]> Signed-off-by: BruceX Wang <[email protected]> Reviewed-by: Gua Guo <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for aad98d9 - Browse repository at this point
Copy the full SHA aad98d9View commit details
Commits on Jun 15, 2023
-
UefiCpuPkg: CpuTimerDxeRiscV64: Fix incorrect value sent to SbiSetTimer
SbiSetTimer expects core tick value. Cc: Andrei Warkentin <[email protected]> Signed-off-by: Tuan Phan <[email protected]> Reviewed-by: Sunil V L <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4dba2a9 - Browse repository at this point
Copy the full SHA 4dba2a9View commit details -
UefiCpuPkg: RISC-V: TimerLib: Fix delay function to use 64-bit
The timer compare register is 64-bit so simplifying the delay function. Cc: Andrei Warkentin <[email protected]> Signed-off-by: Tuan Phan <[email protected]> Reviewed-by: Sunil V L <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ea55bd8 - Browse repository at this point
Copy the full SHA ea55bd8View commit details
Commits on Jun 21, 2023
-
Maintainers.txt: update maintainer for CryptoPkg
Cc: Jiewen Yao <[email protected]> [jyao1] Cc: Yi Li <[email protected]> [liyi77] Cc: Xiaoyu Lu <[email protected]> [xiaoyuxlu] Cc: Guomin Jiang <[email protected]> [guominjia] Signed-off-by: Jian J Wang <[email protected]> Reviewed-by: [email protected] Reviewed-by: Yi Li <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4a0642a - Browse repository at this point
Copy the full SHA 4a0642aView commit details -
UefiCpuPkg/CpuSmm: Add perf-logging for time-consuming BSP procedures
The patch adds perf-logging for the following potential time-consuming BSP procedures: * PiCpuSmmEntry - SmmRelocateBases - ExecuteFirstSmiInit * BSPHandler - SmmWaitForApArrival - PerformRemainingTasks * InitPaging * SetMemMapAttributes * SetUefiMemMapAttributes * SetPageTableAttributes * ConfigSmmCodeAccessCheck * SmmCpuFeaturesCompleteSmmReadyToLock Signed-off-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]> Reviewed-by: Jiaxin Wu <[email protected]> Reviewed-by: Eric Dong <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0da3df7 - Browse repository at this point
Copy the full SHA 0da3df7View commit details -
UefiCpuPkg/CpuSmm: Add perf-logging for MP procedures
MP procedures are those procedures that run in every CPU thread. The EDKII perf infra is not MP safe so it doesn't support to be called from those MP procedures. The patch adds SMM MP perf-logging support in SmmMpPerf.c. The following procedures are perf-logged: * SmmInitHandler * SmmCpuFeaturesRendezvousEntry * PlatformValidSmi * SmmCpuFeaturesRendezvousExit Signed-off-by: Ray Ni <[email protected]> Cc: Eric Dong <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Jiaxin Wu <[email protected]> Reviewed-by: Jiaxin Wu <[email protected]> Reviewed-by: Eric Dong <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ad6c854 - Browse repository at this point
Copy the full SHA ad6c854View commit details -
MdeModulePkg/SmmCore: Add perf-logging for time-consuming procedures
Following procedures are perf-logged: * SmmReadyToBootHandler * SmmReadyToLockHandler * SmmEndOfDxeHandler * SmmEntryPoint (It's the main routine run in BSP when SMI happens.) * SmiManage Signed-off-by: Ray Ni <[email protected]> Cc: Jian J Wang <[email protected]> Cc: Liming Gao <[email protected]> Cc: Jiaxin Wu <[email protected]> Reviewed-by: Jiaxin Wu <[email protected]> Reviewed-by: Eric Dong <[email protected]> Reviewed-by: Jian J Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e4ff852 - Browse repository at this point
Copy the full SHA e4ff852View commit details -
MdeModulePkg/SmmCore: Add perf-logging for SmmDriverDispatchHandler
SmmDriverDispatchHandler is the routine that dispatches SMM drivers from FV. It's a time-consuming routine. Add perf-logging for this routine. Signed-off-by: Ray Ni <[email protected]> Cc: Jian J Wang <[email protected]> Cc: Liming Gao <[email protected]> Cc: Jiaxin Wu <[email protected]> Reviewed-by: Jiaxin Wu <[email protected]> Reviewed-by: Eric Dong <[email protected]> Reviewed-by: Jian J Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0c136bb - Browse repository at this point
Copy the full SHA 0c136bbView commit details -
MdeModulePkg/SmmPerformanceLib: Disable perf-logging after ExitBS
Because SMM perf-logging is migrated to non-SMRAM at ReadyToBoot by DxeCorePerformanceLib, the perf-logging after ExitBS is useless and impact the SMI latency at runtime. Hence the SmmPerformanceLib is updated to disable perf-logging after ExitBS. Signed-off-by: Ray Ni <[email protected]> Cc: Jiaxin Wu <[email protected]> Cc: Dandan Bi <[email protected]> Cc: Liming Gao <[email protected]> Cc: Jian J Wang <[email protected]> Reviewed-by: Jiaxin Wu <[email protected]> Reviewed-by: Eric Dong <[email protected]> Reviewed-by: Jian J Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 92759ee - Browse repository at this point
Copy the full SHA 92759eeView commit details -
MdeModulePkg/SmmCorePerformanceLib: Disable perf-logging at runtime
Because SMM perf-logging is migrated to non-SMRAM at ReadyToBoot by DxeCorePerformanceLib, the perf-logging after ExitBS is useless and impact the SMI latency at runtime. Hence the SmmCorePerformanceLib is updated to disable perf-logging after ExitBS. Signed-off-by: Ray Ni <[email protected]> Cc: Jiaxin Wu <[email protected]> Cc: Dandan Bi <[email protected]> Cc: Liming Gao <[email protected]> Cc: Jian J Wang <[email protected]> Reviewed-by: Jiaxin Wu <[email protected]> Reviewed-by: Eric Dong <[email protected]> Reviewed-by: Jian J Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2d3974a - Browse repository at this point
Copy the full SHA 2d3974aView commit details -
UefiCpuPkg/SmmCpu: Add PcdSmmApPerfLogEnable control AP perf-logging
When a platform has lots of CPU cores/threads, perf-logging on every AP produces lots of records. When this multiplies with number of SMIs during post, the records are even more. So, this patch adds a new PCD PcdSmmApPerfLogEnable (default TRUE) to allow platform to turn off perf-logging on APs. Signed-off-by: Ray Ni <[email protected]> Cc: Eric Dong <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]> Reviewed-by: Jiaxin Wu <[email protected]> Reviewed-by: Eric Dong <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a87f5fd - Browse repository at this point
Copy the full SHA a87f5fdView commit details -
MdeModulePkg/SmmCore: Perf-log PlatformHookBefore/AfterSmmDispatch
Signed-off-by: Ray Ni <[email protected]> Cc: Jian J Wang <[email protected]> Cc: Liming Gao <[email protected]> Cc: Jiaxin Wu <[email protected]> Reviewed-by: Jian J Wang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 56f65e4 - Browse repository at this point
Copy the full SHA 56f65e4View commit details -
MdePkg: Code optimization to SMM InternalAllocateAlignedPages
This commit is code optimization to InternalAllocateAlignedPages of SmmMemoryAllocationLib which can reduce free memory fragments. Also it can reduce one pre-allocation page. Let's take a simple example: The expected pages size is 8KB, Alignment value is 8KB. In original InternalAllocateAlignedPages(), the first step is to allocate 4 pages and then find the first 8KB-aligned address in allocated 4 pages. If the upper limit address of allocated 4 pages is already 8KB aligned, then the allocated 4 pages contains two 8KB-aligned 8KB ranges. The lower 2 pages will be selected and removed from free pages. Then the higher 2 pages will be free. Since the whole memory allocation is from high address to low address, then the higher 2 pages cann't be merged with other free pages, causing the free memory fragments. However, when only allocate 3(2+2-1) pages, we can avoid the free memory fragments in specific case. Also 3 pages must contain a 8KB-aligned 8KB range, which meets the requirement. If the upper limit address of allocated 3 pages is 8KB-aligned, then the higher 2 pages range of allocated 3 pages is 8KB-aligned and will be selected and removed from free pages. The remaining lower one page of allocated 3 pages will be free and merged with left lower free memory. This can reduce free memory fragments in smm. Signed-off-by: Dun Tan <[email protected]> Cc: Ray Ni <[email protected]> Reviewed-by: Michael D Kinney <[email protected]> Cc: Liming Gao <[email protected]> Cc: Zhiguang Liu <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for fcd7164 - Browse repository at this point
Copy the full SHA fcd7164View commit details
Commits on Jun 23, 2023
-
OvmfPkg/RiscVVirt: Fix couple of issues in VarStore
The size of the FV and the WriteQueueSize is incorrect which causes the flash to be re-written during boot. Fix them and update the new checksum value. Signed-off-by: Sunil V L <[email protected]> Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Andrei Warkentin <[email protected]> Cc: Heinrich Schuchardt <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f6c4b0a - Browse repository at this point
Copy the full SHA f6c4b0aView commit details -
OvmfPkg/RiscVVirt: Add VirtNorFlashDeviceTreeLib library
This library is required to support separate code and variable store images. Signed-off-by: Sunil V L <[email protected]> Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Andrei Warkentin <[email protected]> Cc: Heinrich Schuchardt <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 420cd54 - Browse repository at this point
Copy the full SHA 420cd54View commit details -
OvmfPkg/RiscVVirt: Add support for separate code and variable store
Currently, RiscVVirtQemu supports unified code and variable store mainly because only one pflash devices was available in qemu for EDK2. However, this doesn't allow to map the code part as read-only. With recent qemu enhancements, it is now possible for EDK2 to make use of both pflash devices in RISC-V virt machine. So, add support to create code and vars images separately. This also allows easy firmware code updates without losing the variable store. Signed-off-by: Sunil V L <[email protected]> Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Andrei Warkentin <[email protected]> Cc: Heinrich Schuchardt <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 37423fa - Browse repository at this point
Copy the full SHA 37423faView commit details -
OvmfPkg/RiscVVirt: Add a readme for build and test
Add a readme file which provides information regarding how to build and test EDK2 on RISC-V qemu virt platform. Signed-off-by: Sunil V L <[email protected]> Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Andrei Warkentin <[email protected]> Cc: Heinrich Schuchardt <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 49f06b6 - Browse repository at this point
Copy the full SHA 49f06b6View commit details -
MdePkg: PiStatusCode: Add new Host Software class Error Code to MdePkg
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3794 This change introduces a new error code definitions under Host Software class according to PI specification v1.8. The new error code definition will cover system reboot events under the conditions of inconsistent memory map from one boot to another. These error codes could provide helpful datapoints to OEMs to investigate and prevent system failures in general. Cc: Michael D Kinney <[email protected]> Cc: Liming Gao <[email protected]> Cc: Zhiguang Liu <[email protected]> Signed-off-by: Kun Qin <[email protected]> Reviewed-by: Liming Gao <[email protected]> Reviewed-by: Michael D Kinney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e7667b7 - Browse repository at this point
Copy the full SHA e7667b7View commit details -
MdePkg: PiStatusCode: Add TPM subclass definition to MdePkg
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3966 This change introduces a new peripheral subclass definition from PI specification v1.8. The new subclass definition will cover system reboot events under the status reports from Trusted Platform Modules (TPMs). These definition could provide helpful datapoints to OEMs to analyze system security state and healthiness, as well as avoid definition collision with other existing peripheral subclass definitions. Cc: Michael D Kinney <[email protected]> Cc: Liming Gao <[email protected]> Cc: Zhiguang Liu <[email protected]> Signed-off-by: Kun Qin <[email protected]> Reviewed-by: Liming Gao <[email protected]> Reviewed-by: Michael D Kinney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7c703f0 - Browse repository at this point
Copy the full SHA 7c703f0View commit details -
SecurityPkg: SubClassTpm: Updated default value
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3966 This change updated the default value of TPM device subclass PCD to `0x010E0000` in order to match the definition of EFI_PERIPHERAL_TPM from PI specification v1.8. Cc: Jiewen Yao <[email protected]> Cc: Jian J Wang <[email protected]> Cc: Qi Zhang <[email protected]> Cc: Rahul Kumar <[email protected]> Signed-off-by: Kun Qin <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Reviewed-by: Liming Gao <[email protected]> Reviewed-by: Michael D Kinney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6ee981c - Browse repository at this point
Copy the full SHA 6ee981cView commit details -
OvmfPkg/Library: fix definition of GetAcpiRsdpFromMemory
The definition and declaration of GetAcpiRsdpFromMemory doesn't match. We don't get a compile error yet because UINTN is the same as UINT64 on 64bit machines. As the function works on memory addresses, UINTN is the correct type of the input parameters. Signed-off-by: Corvin Köhne <[email protected]> Tested-by: Gerd Hoffmann <[email protected]> Acked-by: Gerd Hoffmann <[email protected]> Acked-by: Peter Grehan <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8f63f41 - Browse repository at this point
Copy the full SHA 8f63f41View commit details -
OvmfPkg: avoid including AcpiPlatformLib twice
Signed-off-by: Corvin Köhne <[email protected]> Acked-by: Peter Grehan <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f5d8516 - Browse repository at this point
Copy the full SHA f5d8516View commit details -
OvmfPkg: move PciEncoding into AcpiPlatformLib
Bhyve supports providing ACPI tables by FwCfg. Therefore, InstallQemuFwCfgTables should be moved to AcpiPlatformLib to reuse the code. As first step, move PciEncoding into AcpiPlatformLib. Signed-off-by: Corvin Köhne <[email protected]> Acked-by: Peter Grehan <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ea88df6 - Browse repository at this point
Copy the full SHA ea88df6View commit details -
OvmfPkg: move BootScript into AcpiPlatformLib
This is required to move InstallQemuFwCfgTables into AcpiPlatformLib. Signed-off-by: Corvin Köhne <[email protected]> Acked-by: Peter Grehan <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0f612c1 - Browse repository at this point
Copy the full SHA 0f612c1View commit details -
OvmfPkg: move QemuFwCfgAcpi into AcpiPlatformLib
This makes the InstallQemuFwcfgTables function reusable by bhyve. Signed-off-by: Corvin Köhne <[email protected]> Acked-by: Peter Grehan <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5a118a6 - Browse repository at this point
Copy the full SHA 5a118a6View commit details -
OvmfPkg/Bhyve: install Acpi tables provided by FwCfg
Signed-off-by: Corvin Köhne <[email protected]> Acked-by: Peter Grehan <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c301291 - Browse repository at this point
Copy the full SHA c301291View commit details -
OvmfPkg/Bhyve: include TPM driver
Bhyve will gain support for TPM emulation in the near future. Therefore, prepare OVMF by copying all TPM driver used by qemu's OVMF DSC into the bhyve OVMF DSC. Signed-off-by: Corvin Köhne <[email protected]> Reviewed-by: Rebecca Cran <[email protected]> Acked-by: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5779671 - Browse repository at this point
Copy the full SHA 5779671View commit details
Commits on Jun 26, 2023
-
IntelFsp2WrapperPkg: Get HobListPtr before calling the Multiphase FSPS
REF : https://bugzilla.tianocore.org/show_bug.cgi?id=4480 In the FspsWrapperPeim, before calling FspWrapperVariableRequestHandler and FspWrapperMultiPhaseHandler ,FspHobListPtr should be available so that BL will be able to get the correct FspHobListPtr value Signed-off-by: kurugodx <[email protected]> Cc: Chasel Chiu <[email protected]> Cc: Nate DeSimone <[email protected]> Cc: Duggapu Chinni B <[email protected]> Cc: Chen Gang C <[email protected]> Cc: Star Zeng <[email protected]> Cc: Ted Kuo <[email protected]> Cc: Ashraf Ali S <[email protected]> Cc: Susovan Mohapatra <[email protected]> Reviewed-by: Ashraf Ali S <[email protected]> Reviewed-by: Chasel Chiu <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ac33eee - Browse repository at this point
Copy the full SHA ac33eeeView commit details -
MdeModulePkg: Define memory attribute PPI
Define a PPI interface that may be used by the PEI core or other PEIMs to manage permissions on memory ranges. This is primarily intended for restricting permissions to what is actually needed for correct execution by the code in question, and for limiting the use of memory mappings that are both writable and executable at the same time. Signed-off-by: Ard Biesheuvel <[email protected]> Reviewed-by: Oliver Smith-Denny <[email protected]> Reviewed-by: Michael Kubacki <[email protected]> Reviewed-by: Liming Gao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9eb8f2c - Browse repository at this point
Copy the full SHA 9eb8f2cView commit details -
MdeModulePkg/DxeIpl: Merge EBC, RISCV64 and LOONGARCH code
The Risc-V and LoongArch specific versions of the DXE core handoff code in DxeIpl are essentially copies of the EBC version (modulo the copyright in the header and some debug prints in the code). In preparation for introducing a generic PPI based method to implement the non-executable stack, let's merge these versions, so we only need to add this logic once. Signed-off-by: Ard Biesheuvel <[email protected]> Reviewed-by: Oliver Smith-Denny <[email protected]> Reviewed-by: Michael Kubacki <[email protected]> Reviewed-by: Liming Gao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for dfacaab - Browse repository at this point
Copy the full SHA dfacaabView commit details -
MdeModulePkg/DxeIpl: Use memory attribute PPI to remap the stack NX
If the associated PCD is set to TRUE, use the memory attribute PPI to remap the stack non-executable. This provides a generic method for doing so, which will be used by ARM and AArch64 as well once they move to the generic DxeIpl handoff implementation. Signed-off-by: Ard Biesheuvel <[email protected]> Reviewed-by: Oliver Smith-Denny <[email protected]> Reviewed-by: Michael Kubacki <[email protected]> Reviewed-by: Liming Gao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9df2c0a - Browse repository at this point
Copy the full SHA 9df2c0aView commit details -
ArmPkg/ArmMmuLib: Extend API to manage memory permissions better
Currently, ArmSetMemoryAttributes () takes a combination of EFI_MEMORY_xx constants describing the memory type and permission attributes that should be set on a region of memory. In cases where the memory type is omitted, we assume that the memory permissions being set are final, and that existing memory permissions can be discarded. This is problematic, because we aim to map memory non-executable (EFI_MEMORY_XP) by default, and only relax this requirement for code regions that are mapped read-only (EFI_MEMORY_RO). Currently, setting one permission clears the other, and so code managing these permissions has to be aware of the existing permissions in order to be able to preserve them, and this is not always tractable (e.g., the UEFI memory attribute protocol implements an abstraction that promises to preserve memory permissions that it is not operating on explicitly). So let's add an AttributeMask parameter to ArmSetMemoryAttributes(), which is permitted to be non-zero if no memory type is being provided, in which case only memory permission attributes covered in the mask will be affected by the update. Signed-off-by: Ard Biesheuvel <[email protected]> Reviewed-by: Oliver Smith-Denny <[email protected]> Reviewed-by: Michael Kubacki <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8f5ad63 - Browse repository at this point
Copy the full SHA 8f5ad63View commit details -
ArmPkg/CpuPei: Implement the memory attributes PPI
Implement the newly defined PPI that permits the PEI core and DXE IPL to manage memory permissions on ranges of DRAM, for doing things like mapping the stack non-executable, or granting executable permissions to shadowed PEIMs. Signed-off-by: Ard Biesheuvel <[email protected]> Reviewed-by: Oliver Smith-Denny <[email protected]> Reviewed-by: Michael Kubacki <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4249829 - Browse repository at this point
Copy the full SHA 4249829View commit details -
MdeModulePkg/DxeIpl ARM AARCH64: Switch to generic handoff code
Now that we have a generic method to manage memory permissions using a PPI, we can switch to the generic version of the DXE handoff code in DxeIpl, and drop the ARM specific version. Signed-off-by: Ard Biesheuvel <[email protected]> Reviewed-by: Oliver Smith-Denny <[email protected]> Reviewed-by: Michael Kubacki <[email protected]> Reviewed-by: Liming Gao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a21a994 - Browse repository at this point
Copy the full SHA a21a994View commit details -
ArmPkg/CpuDxe: Simplify memory attributes protocol implementation
Now that ArmSetMemoryAttributes() permits a mask to be provided, we can simplify the implementation the UEFI memory attribute protocol substantially, and just pass on the requested mask to be set or cleared directly. Signed-off-by: Ard Biesheuvel <[email protected]> Reviewed-by: Oliver Smith-Denny <[email protected]> Reviewed-by: Michael Kubacki <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5542e52 - Browse repository at this point
Copy the full SHA 5542e52View commit details -
OvmfPkg/PciHotPlugInitDxe: fix io window size
Smallest IO window size for PCI bridges is 0x1000. Fix default size accordingly. Avoids broken resource assignments like this: [ ... ] PciBus: Resource Map for Root Bridge PciRoot(0x0) Type = Io16; Base = 0x6000; Length = 0x7000; Alignment = 0xFFF [ ... ] Base = 0xC000; Length = 0x200; Alignment = 0xFFF; Owner = PPB [00|02|00:**] Base = 0xC200; Length = 0x40; Alignment = 0x3F; Owner = PCI [00|1F|03:20] Base = 0xC240; Length = 0x20; Alignment = 0x1F; Owner = PCI [00|1F|02:20] [ ... ] ... which the linux kernel fixes up later: [ 0.644657] pci 0000:00:1f.3: BAR 4: assigned [io 0x1000-0x103f] [ 0.646833] pci 0000:00:1f.2: BAR 4: assigned [io 0x1040-0x105f] With the patch applied: { ... ] PciBus: Resource Map for Root Bridge PciRoot(0x0) Type = Io16; Base = 0x6000; Length = 0x8000; Alignment = 0xFFF [ ... ] Base = 0xC000; Length = 0x1000; Alignment = 0xFFF; Owner = PPB [00|02|00:**] Base = 0xD000; Length = 0x40; Alignment = 0x3F; Owner = PCI [00|1F|03:20] Base = 0xD040; Length = 0x20; Alignment = 0x1F; Owner = PCI [00|1F|02:20] [ ... ] Signed-off-by: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 638dfb4 - Browse repository at this point
Copy the full SHA 638dfb4View commit details
Commits on Jun 27, 2023
-
CI: Use latest image for Linux jobs (Qemu 8, gcc 12)
Use the latest Linux container image (from 2023-05-30). It uses Qemu 8.0.0 and gcc 12. REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4324 Signed-off-by: Oliver Steffen <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Reviewed-by: Michael Kubacki <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 81cb037 - Browse repository at this point
Copy the full SHA 81cb037View commit details -
UefiCpuPkg: Include ResetVector in DSC
Since ResetVector source module shares the same GUID as the binary module, the binary INF file is just removed from DSC. Signed-off-by: Ray Ni <[email protected]> Reviewed-by: Eric Dong <[email protected]> Cc: Rahul Kumar <[email protected]> Acked-by: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ab85db3 - Browse repository at this point
Copy the full SHA ab85db3View commit details -
UefiCpuPkg/ResetVector: Add guidance of FDF ffs rule
ResetVector assembly implementation puts "ALIGN 16" in the end to guarantee the final executable file size is multiple of 16 bytes. Because the module uses a special GUID which guarantees it's put in the very end of a FV, which should be also the end of the FD. All of these (file size is multiple of 16B, and the module is put at end of FV, FV is put at end of FD) guarantee the "JMP xxx" instruction is at FFFF_FFF0h. This patch updates INF file and ReadMe.txt to add guidance of FDF ffs rule for the ResetVector. Signed-off-by: Ray Ni <[email protected]> Reviewed-by: Eric Dong <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]> Acked-by: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8ef7e22 - Browse repository at this point
Copy the full SHA 8ef7e22View commit details -
UefiCpuPkg/ResetVector: Remove pre-built binaries
Because it's simpler for a platform to include the ResetVector source and having pre-built binaries add burdens of updating the pre-built binaries. This patch removes the pre-built binaries and the script that buids the pre-built binaries. Signed-off-by: Ray Ni <[email protected]> Reviewed-by: Eric Dong <[email protected]> Cc: Rahul Kumar <[email protected]> Acked-by: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 28eb51d - Browse repository at this point
Copy the full SHA 28eb51dView commit details -
StandaloneMmPkg: Include correct MmuLib header
StandaloneMm has its own version of the ArmMmuLib library class, but includes the ArmMmuLib header. This happens to work because the prototypes that are referenced are the same, but this will no longer be the case after a future patch. So correct the #includes. Signed-off-by: Ard Biesheuvel <[email protected]> Reviewed-by: Leif Lindholm <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7054f1a - Browse repository at this point
Copy the full SHA 7054f1aView commit details -
ArmPkg: Drop individual memory permission helpers
Now that we have a sane API to set and clear memory permissions that works the same on ARM and AArch64, we no longer have a need for the individual set/clear no-access/read-only/no-exec helpers so let's drop them. Signed-off-by: Ard Biesheuvel <[email protected]> Reviewed-by: Leif Lindholm <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8a1f540 - Browse repository at this point
Copy the full SHA 8a1f540View commit details -
ArmPkg/OpteeLib: Map shared communication buffer non-executable
The OP-TEE secure OS exposes a non-secure memory region for communication between the secure OS itself and any clients in the non-secure firmware. This memory is writable by non-secure and is not used for code only data, and so it should be mapped non-executable. Signed-off-by: Ard Biesheuvel <[email protected]> Reviewed-by: Leif Lindholm <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2f8b51d - Browse repository at this point
Copy the full SHA 2f8b51dView commit details -
OvmfPkg/VirtioSerialDxe: Remove noisy debug print on supported() call
The UEFI driver model invokes the supported() method on every driver every time a connection attempt is made on any handle, and so doing an unconditional DEBUG() print inside this method produced a lot of noise. So let's drop this DEBUG() call from the VirtioSerial driver's Supported() method. Signed-off-by: Ard Biesheuvel <[email protected]> Acked-by: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ea7a301 - Browse repository at this point
Copy the full SHA ea7a301View commit details -
BaseTools/tools_def: Add "-fno-unwind-tables" to GCC5_RISCV64_CC_FLAGS
gcc-13 for RISC-V enables unwind tables by default similar to ARM64. This generates .eh_frame_hdr section which is not handled well by GenFw causing failures. Disable the unwind tables by adding -fno-unwind-tables flag similar to [1]. [1] - tianocore/edk2@cbf00651eda6 Signed-off-by: Sunil V L <[email protected]> Cc: Rebecca Cran <[email protected]> Cc: Liming Gao <[email protected]> Cc: Bob Feng <[email protected]> Cc: Yuwei Chen <[email protected]> Cc: Andrei Warkentin <[email protected]> Reviewed-by: Liming Gao <[email protected]> Reviewed-by: Rebecca Cran <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1a39bdf - Browse repository at this point
Copy the full SHA 1a39bdfView commit details
Commits on Jun 28, 2023
-
Maintainers.txt: Update NetworkPkg maintainers and reviewers
Add Zack, Saloni and remove unused IDs Cc: Michael D Kinney <[email protected]> Cc: Andrew Fish <[email protected]> Cc: Leif Lindholm <[email protected]> Cc: Zachary Clark-willilams <[email protected]> Signed-off-by: Saloni Kasbekar <[email protected]> Reviewed-by: Zachary Clark-willilams <[email protected]> Reviewed-by: Michael D Kinney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 44a3d93 - Browse repository at this point
Copy the full SHA 44a3d93View commit details -
NetworkPkg: Correct the length of EAP Identity when in ASCII format
FIX: https://bugzilla.tianocore.org/show_bug.cgi?id=4477 Tls connection fail over WiFi in AMT OCR flow due to invalid identity. This was due to missing conversion between unicode and ascii string which resulted in invalid strlen. Cc: Maciej Rabeda <[email protected]> Cc: Zachary Clark-Williams <[email protected]> Signed-off-by: Yi Li <[email protected]> Reviewed-by: Zachary Clark-Williams <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4416bf3 - Browse repository at this point
Copy the full SHA 4416bf3View commit details -
ArmPkg: MmCommunicationPei: Introduce MM communicate in PEI
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4464 This change introduced the MM communicate support in PEI phase for ARM based platforms. Similar to the DXE counterpart, `PcdMmBufferBase` is used as communicate buffer and SMC will be invoked to communicate to TrustZone when MMI is requested. Cc: Leif Lindholm <[email protected]> Cc: Ard Biesheuvel <[email protected]> Cc: Sami Mujawar <[email protected]> Co-authored-by: Ronny Hansen <[email protected]> Co-authored-by: Shriram Masanamuthu Chinnathurai <[email protected]> Co-authored-by: Preshit Harlikar <[email protected]> Signed-off-by: Kun Qin <[email protected]> Reviewed-by: Ard Biesheuvel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 01ac3d8 - Browse repository at this point
Copy the full SHA 01ac3d8View commit details -
MdeModulePkg: Variable: Introduce MM based variable read service in PEI
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4464 This change introduced the Standalone MM based variable read capability in PEI phase for applicable platforms (such as ARM platforms). Similar to the x86 counterpart, MM communicate PPI is used to request variable information from Standalone MM environment. Cc: Hao A Wu <[email protected]> Cc: Liming Gao <[email protected]> Cc: Jian J Wang <[email protected]> Co-authored-by: Ronny Hansen <[email protected]> Co-authored-by: Shriram Masanamuthu Chinnathurai <[email protected]> Co-authored-by: Preshit Harlikar <[email protected]> Signed-off-by: Kun Qin <[email protected]> Reviewed-by: Liming Gao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6607062 - Browse repository at this point
Copy the full SHA 6607062View commit details
Commits on Jun 30, 2023
-
OvmfPkg:Remove code that apply AddressEncMask to non-leaf entry
Remove code that sets AddressEncMask for non-leaf entries when modifing smm page table by MemEncryptSevLib. In FvbServicesSmm driver, it calls MemEncryptSevClearMmioPageEncMask to clear AddressEncMask bit in page table for a specific range. In AMD SEV feature, this AddressEncMask bit in page table is used to indicate if the memory is guest private memory or shared memory. But all memory accessed by the hardware page table walker is treated as encrypted, regardless of whether the encryption bit is present. So remove the code to set the EncMask bit for smm non-leaf entries doesn't impact AMD SEV feature. The reason encryption mask should not be set for non-leaf entries is because CpuPageTableLib doesn't consume encryption mask PCD. In PiSmmCpuDxeSmm module, it will use CpuPageTableLib to modify smm page table in next patch. The encryption mask is overlapped with the PageTableBaseAddress field of non-leaf page table entries. If the encryption mask is set for smm non-leaf page table entries, issue happens when CpuPageTableLib code use the non-leaf entry PageTableBaseAddress field with the encryption mask set to find the next level page table. Signed-off-by: Dun Tan <[email protected]> Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc: Gerd Hoffmann <[email protected]> Reviewed-by: Tom Lendacky <[email protected]> Reviewed-by: Ray Ni <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a78938f - Browse repository at this point
Copy the full SHA a78938fView commit details -
MdeModulePkg: Remove other attribute protection in UnsetGuardPage
In UnsetGuardPage(), before SmmReadyToLock, remove NX and RO memory attribute protection for guarded page since EfiConventionalMemory in SMRAM is RW and executable before SmmReadyToLock. If UnsetGuardPage() happens after SmmReadyToLock, then apply EFI_MEMORY_XP to the guarded page to make sure EfiConventionalMemory in SMRAM is NX since EfiConventionalMemory in SMRAM is marked as NX in PiSmmCpuDxe driver when SmmReadyToLock. Signed-off-by: Dun Tan <[email protected]> Cc: Liming Gao <[email protected]> Cc: Ray Ni <[email protected]> Reviewed-by: Jian J Wang <[email protected]> Cc: Ard Biesheuvel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8c99839 - Browse repository at this point
Copy the full SHA 8c99839View commit details -
UefiCpuPkg: Use CpuPageTableLib to convert SMM paging attribute.
Simplify the ConvertMemoryPageAttributes API to convert paging attribute by CpuPageTableLib. In the new API, it calls PageTableMap() to update the page attributes of a memory range. With the PageTableMap() API in CpuPageTableLib, we can remove the complicated page table manipulating code. Signed-off-by: Dun Tan <[email protected]> Cc: Eric Dong <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2d21208 - Browse repository at this point
Copy the full SHA 2d21208View commit details -
UefiCpuPkg: Add DEBUG_CODE for special case when clear RP
In ConvertMemoryPageAttributes() function, when clear RP for a specific range [BaseAddress, BaseAddress + Length], it means to set the present bit to 1 and assign default value for other attributes in page table. The default attributes for the input specific range are NX disabled and ReadOnly. If there is existing present range in [BaseAddress, BaseAddress + Length] and the attributes are not NX disabled or not ReadOnly, then output the DEBUG message to indicate that the NX and ReadOnly attributes of the existing present range are modified in the function. Signed-off-by: Dun Tan <[email protected]> Cc: Eric Dong <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6585ced - Browse repository at this point
Copy the full SHA 6585cedView commit details -
UefiCpuPkg/PiSmmCpuDxeSmm: Avoid setting non-present range to RO/NX
In PiSmmCpuDxeSmm code, SetMemMapAttributes() marks memory ranges in SmmMemoryAttributesTable to RO/NX. There may exist non-present range in these memory ranges. Set other attributes for a non-present range is not permitted in CpuPageTableMapLib. So add code to handle this case. Only map the present ranges in SmmMemoryAttributesTable to RO or NX. Signed-off-by: Dun Tan <[email protected]> Cc: Eric Dong <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f519672 - Browse repository at this point
Copy the full SHA f519672View commit details -
UefiCpuPkg/PiSmmCpuDxeSmm: Add 2 function to disable/enable CR0.WP
Add two functions to disable/enable CR0.WP. These two unctions will also be used in later commits. This commit doesn't change any functionality. Signed-off-by: Dun Tan <[email protected]> Cc: Eric Dong <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7b6e7d0 - Browse repository at this point
Copy the full SHA 7b6e7d0View commit details -
UefiCpuPkg/PiSmmCpuDxeSmm: Clear CR0.WP before modify page table
Clear CR0.WP before modify smm page table. Currently, there is an assumption that smm pagetable is always RW before ReadyToLock. However, when AMD SEV is enabled, FvbServicesSmm driver calls MemEncryptSevClearMmioPageEncMask to clear AddressEncMask bit in smm page table for this range: [PcdOvmfFdBaseAddress,PcdOvmfFdBaseAddress+PcdOvmfFirmwareFdSize] If page slpit happens in this process, new memory for smm page table is allocated. Then the newly allocated page table memory is marked as RO in smm page table in this FvbServicesSmm driver, which may lead to PF if smm code doesn't clear CR0.WP before modify smm page table when ReadyToLock. Signed-off-by: Dun Tan <[email protected]> Cc: Eric Dong <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ef64ae0 - Browse repository at this point
Copy the full SHA ef64ae0View commit details -
UefiCpuPkg: Extern mSmmShadowStackSize in PiSmmCpuDxeSmm.h
Extern mSmmShadowStackSize in PiSmmCpuDxeSmm.h and remove extern for mSmmShadowStackSize in c files to simplify code. Signed-off-by: Dun Tan <[email protected]> Cc: Eric Dong <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for d706d9c - Browse repository at this point
Copy the full SHA d706d9cView commit details -
UefiCpuPkg: Add GenSmmPageTable() to create smm page table
This commit is code refinement to current smm pagetable generation code. Add a new GenSmmPageTable() API to create smm page table based on the PageTableMap() API in CpuPageTableLib. Caller only needs to specify the paging mode and the PhysicalAddressBits to map. This function can be used to create both IA32 pae paging and X64 5level, 4level paging. Signed-off-by: Dun Tan <[email protected]> Cc: Eric Dong <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 701b579 - Browse repository at this point
Copy the full SHA 701b579View commit details -
UefiCpuPkg: Use GenSmmPageTable() to create Smm S3 page table
Use GenSmmPageTable() to create both IA32 and X64 Smm S3 page table. Signed-off-by: Dun Tan <[email protected]> Cc: Eric Dong <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b4dde1a - Browse repository at this point
Copy the full SHA b4dde1aView commit details -
UefiCpuPkg: Sort mSmmCpuSmramRanges in FindSmramInfo
Sort mSmmCpuSmramRanges after get the SMRAM info in FindSmramInfo() function. Signed-off-by: Dun Tan <[email protected]> Cc: Eric Dong <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7132df9 - Browse repository at this point
Copy the full SHA 7132df9View commit details -
UefiCpuPkg: Sort mProtectionMemRange when ReadyToLock
Sort mProtectionMemRange in InitProtectedMemRange() when ReadyToLock. Signed-off-by: Dun Tan <[email protected]> Cc: Eric Dong <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b4394cc - Browse repository at this point
Copy the full SHA b4394ccView commit details -
UefiCpuPkg: Refinement to smm runtime InitPaging() code
This commit is code refinement to current smm runtime InitPaging() page table update code. In InitPaging(), if PcdCpuSmmProfileEnable is TRUE, use ConvertMemoryPageAttributes() API to map the range in mProtectionMemRange to the attrbute recorded in the attribute field of mProtectionMemRange, map the range outside mProtectionMemRange as non-present. If PcdCpuSmmProfileEnable is FALSE, only need to set the ranges not in mSmmCpuSmramRanges as NX. Signed-off-by: Dun Tan <[email protected]> Cc: Eric Dong <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4ceefd6 - Browse repository at this point
Copy the full SHA 4ceefd6View commit details -
UefiCpuPkg/PiSmmCpuDxeSmm: Remove unnecessary function
Remove unnecessary function SetNotPresentPage(). We can directly use ConvertMemoryPageAttributes to set a range to non-present. Signed-off-by: Dun Tan <[email protected]> Cc: Eric Dong <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f5c987f - Browse repository at this point
Copy the full SHA f5c987fView commit details -
RedfishPkg: Fix SortLib library class name typo.
BaseSortLib is the library instance name not the class name. Signed-off-by: Mike Maslenkin <[email protected]> Cc: Abner Chang <[email protected]> Cc: Nickle Wang <[email protected]> Cc: Igor Kulchytskyy <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5a13f5c - Browse repository at this point
Copy the full SHA 5a13f5cView commit details
Commits on Jul 2, 2023
-
UefiCpuPkg: CpuTimerDxeRiscV64: Fix timer event not working correctly
The timer notify function should be called with timer period, not the value read from timer register. Signed-off-by: Tuan Phan <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ad7d3ac - Browse repository at this point
Copy the full SHA ad7d3acView commit details
Commits on Jul 3, 2023
-
MdePkg: Adds AMD SMRAM save state map
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4182 Adds an SMM SMRAM save-state map for AMD processors. SMRAM save state maps for the AMD processor family are now supported. Save state map structure is added based on AMD64 Architecture Programmer's Manual, Volume 2, Section 10.2. The AMD legacy save state map for 32-bit architecture is defined. The AMD64 save state map for 64-bit architecture is defined. Also added Amd/SmramSaveStateMap.h to IgnoreFiles of EccCheck, because structures defined in this file are derived from Intel/SmramSaveStateMap.h. Cc: Paul Grimes <[email protected]> Cc: Abner Chang <[email protected]> Cc: Michael D Kinney <[email protected]> Cc: Liming Gao <[email protected]> Cc: Zhiguang Liu <[email protected]> Signed-off-by: Abdul Lateef Attar <[email protected]> Reviewed-by: Abner Chang <[email protected]> Reviewed-by: Michael D Kinney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8d34c7a - Browse repository at this point
Copy the full SHA 8d34c7aView commit details -
UefiCpuPkg: Adds MmSaveStateLib library class
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4182 Adds MmSaveStateLib Library class in UefiCpuPkg.dec. Adds function declaration header file. Cc: Paul Grimes <[email protected]> Cc: Abner Chang <[email protected]> Cc: Eric Dong <[email protected]> Cc: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]> Signed-off-by: Abdul Lateef Attar <[email protected]> Reviewed-by: Abner Chang <[email protected]> Reviewed-by: Ray Ni <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4f3ddc6 - Browse repository at this point
Copy the full SHA 4f3ddc6View commit details -
UefiCpuPkg: Implements MmSaveStateLib library instance
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4182 Implements MmSaveStateLib Library class for AMD cpu family. Cc: Paul Grimes <[email protected]> Cc: Abner Chang <[email protected]> Cc: Eric Dong <[email protected]> Cc: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]> Signed-off-by: Abdul Lateef Attar <[email protected]> Reviewed-by: Abner Chang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 775b337 - Browse repository at this point
Copy the full SHA 775b337View commit details -
UefiCpuPkg/SmmCpuFeaturesLib: Restructure arch-dependent code
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4182 moves Intel-specific code to the arch-dependent file. Other processor families might have different implementation of these functions. Hence, moving out of the common file. Cc: Abner Chang <[email protected]> Cc: Paul Grimes <[email protected]> Cc: Eric Dong <[email protected]> Cc: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Signed-off-by: Abdul Lateef Attar <[email protected]> Reviewed-by: Abner Chang <[email protected]> Reviewed-by: Ray Ni <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 11dae72 - Browse repository at this point
Copy the full SHA 11dae72View commit details -
UefiCpuPkg: Implements SmmCpuFeaturesLib for AMD Family
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4182 Implements interfaces to read and write save state registers of AMD's processor family. Initializes processor SMMADDR and MASK depends on PcdSmrrEnable flag. Program or corrects the IP once control returns from SMM. Cc: Paul Grimes <[email protected]> Cc: Abner Chang <[email protected]> Cc: Eric Dong <[email protected]> Cc: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Signed-off-by: Abdul Lateef Attar <[email protected]> Reviewed-by: Abner Chang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 867851d - Browse repository at this point
Copy the full SHA 867851dView commit details -
UefiCpuPkg: Implements MmSaveStateLib for Intel
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4182 Implements MmSaveStateLib library interfaces to read and write save state registers for Intel processor family. Moves Intel and AMD common functionality to common area. Cc: Paul Grimes <[email protected]> Cc: Abner Chang <[email protected]> Cc: Eric Dong <[email protected]> Cc: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]> Signed-off-by: Abdul Lateef Attar <[email protected]> Reviewed-by: Abner Chang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 065fa2d - Browse repository at this point
Copy the full SHA 065fa2dView commit details -
UefiCpuPkg: Removes SmmCpuFeaturesReadSaveStateRegister
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4182 Removes SmmCpuFeaturesReadSaveStateRegister and SmmCpuFeaturesWirteSaveStateRegister function from SmmCpuFeaturesLib library. MmSaveStateLib library replaces the functionality of the above functions. Platform old/new need to use MmSaveStateLib library to read/write save state registers. Current implementation supports Intel and AMD. Cc: Paul Grimes <[email protected]> Cc: Abner Chang <[email protected]> Cc: Eric Dong <[email protected]> Cc: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Signed-off-by: Abdul Lateef Attar <[email protected]> Reviewed-by: Abner Chang <[email protected]> Reviewed-by: Ray Ni <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for fbb6f18 - Browse repository at this point
Copy the full SHA fbb6f18View commit details -
OvmfPkg: Uses MmSaveStateLib library
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4182 Uses new MmSaveStateLib library instance. Cc: Paul Grimes <[email protected]> Cc: Abner Chang <[email protected]> Cc: Eric Dong <[email protected]> Cc: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Signed-off-by: Abdul Lateef Attar <[email protected]> Acked-by: Jiewen Yao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f2188fe - Browse repository at this point
Copy the full SHA f2188feView commit details -
ArmPkg: Apply Uncrustify to Non-Compliant Files
This patch applies Uncrustify to the following files: ArmPkg/Drivers/MmCommunicationPei/MmCommunicationPei.c ArmPkg/Include/IndustryStandard/ArmStdSmc.h Signed-off-by: Taylor Beebe <[email protected]> Reviewed-by: Ard Biesheuvel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for cdbdd12 - Browse repository at this point
Copy the full SHA cdbdd12View commit details -
ArmPkg: Update GetMemoryRegion() to Handle No mapping
This patch updates the GetMemoryRegion() function to handle the case where there is no mapping for the requested address. The original logic for the ARM would hit an ASSERT after GetMemoryRegionPage() returned EFI_SUCCESS but did not update The RegionLength parameter. The original logic for the AARCH64 would never initialize the RegionLength parameter to zero and return EFI_SUCCESS after traversing an unknown number of pages. To fix this, update the logic for both architecture to return EFI_NO_MAPPING if the BaseAddress being checked is unmapped. Signed-off-by: Taylor Beebe <[email protected]> Reviewed-by: Ard Biesheuvel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1b25a70 - Browse repository at this point
Copy the full SHA 1b25a70View commit details -
ArmPkg: Fix Unsafe ASSERTs in MMU Logic
There are ASSERTs present in the MMU logic to ensure various functions return successfully, but these ASSERTs may be ignored on release builds causing unsafe behavior. This patch updates the logic to handle unexpected return values and branch safely. Signed-off-by: Taylor Beebe <[email protected]> Reviewed-by: Ard Biesheuvel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3b74b03 - Browse repository at this point
Copy the full SHA 3b74b03View commit details -
ArmPkg: Add Function Headers to MMU Logic
Much of the MMU logic was written without function headers. This patch adds function headers where absent and updates function headers which do not match the EDK2 standard. Signed-off-by: Taylor Beebe <[email protected]> Reviewed-by: Ard Biesheuvel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6c74446 - Browse repository at this point
Copy the full SHA 6c74446View commit details
Commits on Jul 5, 2023
-
UefiCpuPkg: Get processor extended information for SmmCpuServiceProtocol
Some features like RAS need to use processor extended information under smm, So add code to support it Signed-off-by: Hongbin1 Zhang <[email protected]> Cc: Eric Dong <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Acked-by: Gerd Hoffmann <[email protected]> Cc: Star Zeng <[email protected]> Reviewed-by: Jiaxin Wu <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1fadd18 - Browse repository at this point
Copy the full SHA 1fadd18View commit details -
OvmfPkg/PlatformCI: Skip GCC5_OVMF_IA32X64_FULL_NOOPT build
The effect of LTO is limited with optimization turned off, and blocked the upgrade of Openssl3.0. We already skipped this build with VS2019, skip the GCC NOOPT build also. Signed-off-by: Yi Li <[email protected]> Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc: Gerd Hoffmann <[email protected]> Acked-by: Gerd Hoffmann <[email protected]> Reviewed-by: Jiewen Yao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for af8859b - Browse repository at this point
Copy the full SHA af8859bView commit details
Commits on Jul 6, 2023
-
RedfishPkg/RedfishRestExDxe: fix CPU exception in RedfishRestExDxe
RedfishRestExDxe driver failed to uninstall service binding protocol when driver binding stop is called. Application drivers may still use RedfishRestExDxe after it is disconnected in system. Signed-off-by: Nickle Wang <[email protected]> Cc: Abner Chang <[email protected]> Cc: Igor Kulchytskyy <[email protected]> Cc: Nick Ramirez <[email protected]> Reviewed-by: Abner Chang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 98ab6e8 - Browse repository at this point
Copy the full SHA 98ab6e8View commit details -
RedfishPkg/RedfishPlatformConfigDxe: hide debug message
Change debug message level of showing ordered list op-code to REDFISH_PLATFORM_CONFIG_DEBUG. Signed-off-by: Nickle Wang <[email protected]> Cc: Abner Chang <[email protected]> Cc: Igor Kulchytskyy <[email protected]> Cc: Nick Ramirez <[email protected]> Reviewed-by: Abner Chang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b164b6d - Browse repository at this point
Copy the full SHA b164b6dView commit details -
RedfishPkg/JsonLib: add object clear interface
-Add JsonObjectClear() interface for application to clear all elements in JSON object. -Fix typo. Signed-off-by: Nickle Wang <[email protected]> Cc: Abner Chang <[email protected]> Cc: Igor Kulchytskyy <[email protected]> Cc: Nick Ramirez <[email protected]> Reviewed-by: Abner Chang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6047516 - Browse repository at this point
Copy the full SHA 6047516View commit details -
RedfishPkg/RedfishDebugLib: add new interfaces
Introduce DumpHiiStatementValue() and DumpRedfishValue() to RedfishDebugLib. Application uses these functions to debug print the value of HII_STATEMENT_VALUE and EDKII_REDFISH_VALUE. Signed-off-by: Nickle Wang <[email protected]> Cc: Abner Chang <[email protected]> Cc: Igor Kulchytskyy <[email protected]> Reviewed-by: Abner Chang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 96d6911 - Browse repository at this point
Copy the full SHA 96d6911View commit details
Commits on Jul 10, 2023
-
MdeModulePkg/Variable: TcgMorLockSmm Key Mismatch changes lock state
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4410 Inside TcgMorLockSmm.c, the SetVariableCheckHandlerMorLock() function contains a scenario to prevent a possible dictionary attack on the MorLock Key in accordance with the TCG Platform Reset Mitigation Spec v1.10. The mechanism to prevent this attack must also change the MorLock Variable Value to 0x01 to indicate Locked Without Key. ASSERT_EFI_ERROR is added for error visibility since SetMorLockVariable returns a status code Cc: Jian J Wang <[email protected]> Cc: Liming Gao <[email protected]> Signed-off-by: Abhi Singh <[email protected]> Acked-by: Michael Kubacki <[email protected]> Reviewed-by: Liming Gao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 63923a5 - Browse repository at this point
Copy the full SHA 63923a5View commit details
Commits on Jul 11, 2023
-
UefiCpuPkg: Refactor the logic for placing APs in HltLoop.
Refactor the logic for placing APs in HltLoop into a separate function. Tested-by: Gerd Hoffmann <[email protected]> Acked-by: Gerd Hoffmann <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Eric Dong <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Tom Lendacky <[email protected]> Signed-off-by: Yuanhao Xie <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 88f4368 - Browse repository at this point
Copy the full SHA 88f4368View commit details -
UefiCpuPkg: Refactor the logic for placing APs in Mwait/Runloop.
Refactor the logic for placing APs in Mwait/Runloop into a separate function. Tested-by: Gerd Hoffmann <[email protected]> Acked-by: Gerd Hoffmann <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Eric Dong <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Tom Lendacky <[email protected]> Signed-off-by: Yuanhao Xie <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 243212b - Browse repository at this point
Copy the full SHA 243212bView commit details -
Initially, the purpose of the Hob was twofold: it served as a way to transfer information from PEI to DXE. However, during the DXE phase, only a few fields from the CPU_MP_DATA which collected in PEI phase were needed. A new Hob was specifically created to transfer information to the DXE phase. This new Hob contained only the essential fields required for reuse in DXE. For instance, instead of directly including the BspNumber in MpHandOff, the DXE phase introduced the use of GetBspNumber() to collect the BspNumber from ApicID and CpuCount. The SaveCpuMpData() function was updated to construct the MP_HAND_OFF Hob. Additionally, the function introduced the MP_HAND_OFF_SIGNAL, which solely served the purpose of awakening the APs and transitioning their context from PEI to DXE. The WaitLoopExecutionMode field indicated whether the bit mode of PEI matched that of DXE. Both of them were filled only if the ApLoopMode was not ApInHltLoop. In the case of ApInHltLoop, it remained necessary to wake up the APs using the init-sipi-sipi sequence. This improvement still allow INIT-SIPI-SIPI even APs are wait in Run/Mwait loop mode. The function GetMpHandOffHob() was added to facilitate access to the collected MpHandOff in the DXE phase. The CpuMpData in the DXE phase was updated by gathering information from MpHandOff. Since MpHandOff replaced the usage of OldCpuMpData and contained essential information from the PEI phase to the DXE phase. AmdSevUpdateCpuMpData was included to maintain the original implementation of AmdSev, ensuring that OldCpuMpData->NewCpuMpData pointed to CpuMpData. Tested-by: Gerd Hoffmann <[email protected]> Acked-by: Gerd Hoffmann <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Eric Dong <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Tom Lendacky <[email protected]> Signed-off-by: Yuanhao Xie <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8bb018a - Browse repository at this point
Copy the full SHA 8bb018aView commit details -
UefiCpuPkg: ApWakeupFunction directly use CpuMpData.
In the original design, once the APs finished executing their assembly code and switched to executing C code, they would enter a continuous loop within a function. In this function, they would collect CpuMpData using the MP_CPU_EXCHANGE_INFO mechanism. However, in the updated approach, CpuMpData can now be passed directly to the ApWakeUpFunction, bypassing the need for MP_CPU_EXCHANGE_INFO. This modification is made in preparation for eliminating the requirement of a second INIT-SIPI-SIPI sequence in the DXE phase. Tested-by: Gerd Hoffmann <[email protected]> Acked-by: Gerd Hoffmann <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Eric Dong <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Tom Lendacky <[email protected]> Signed-off-by: Yuanhao Xie <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 629c1da - Browse repository at this point
Copy the full SHA 629c1daView commit details -
UefiCpuPkg: Eliminate the second INIT-SIPI-SIPI sequence.
When both the PEI and DXE phases operate in the same execution mode(32-bit/64-bit), the BSP send a special start-up signal during the DXE phase to awaken the Application APs. To eliminate the need for the INIT-SIPI-SIPI sequence at the beginning of the DXE phase, the BSP call the SwitchApContext function to trigger the special start-up signal. By writing the specified StartupSignalValue to the designated StartupSignalAddress, the BSP wakes up the APs from mwait mode. Once the APs receive the MP_HAND_OFF_SIGNAL value, they are awakened and proceed to execute the SwitchContextPerAp procedure. They enter another while loop, transitioning their context from the PEI phase to the DXE phase. The original state transitions for an AP during the procedure are as follows: Idle ----> Ready ----> Busy ----> Idle [BSP] [AP] [AP] Instead of init-sipi-sipi sequence, we make use of a start-up signal to awaken the APs and transfer their context from PEI to DXE. Consequently, APs, rather than the BSP, to set their state to CpuStateReady. Tested-by: Gerd Hoffmann <[email protected]> Acked-by: Gerd Hoffmann <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Eric Dong <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Tom Lendacky <[email protected]> Signed-off-by: Yuanhao Xie <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 964a4f0 - Browse repository at this point
Copy the full SHA 964a4f0View commit details -
UefiPayloadPkg: Integrate UiApp and BootManagerMenuApp into MultiFv
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4347 To put UiApp.inf and BootManagerMenuApp.inf to proper FV(BDSFV) Cc: Guo Dong <[email protected]> Cc: Ray Ni <[email protected]> Cc: Sean Rhodes <[email protected]> Reviewed-by: James Lu <[email protected]> Reviewed-by: Gua Guo <[email protected]> Signed-off-by: MarsX Lin <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8dab4ee - Browse repository at this point
Copy the full SHA 8dab4eeView commit details
Commits on Jul 13, 2023
-
MdeModulePkg/Bus/Usb/UsbNetwork/UsbRndis: Add USB RNDIS devices support
This driver provides UEFI driver for USB RNDIS device Signed-off-by: Richard Ho <[email protected]> Cc: Andrew Fish <[email protected]> Cc: Leif Lindholm <[email protected]> Cc: Michael D Kinney <[email protected]> Cc: Michael Kubacki <[email protected]> Cc: Zhiguang Liu <[email protected]> Cc: Liming Gao <[email protected]> Cc: Hao A Wu <[email protected]> Cc: Ray Ni <[email protected]> Tested-by: Tinh Nguyen <[email protected]> Acked-by: Hao A Wu <[email protected]> Reviewed-by: Rebecca Cran <[email protected]> Reviewed-by: Tony Lo <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for fc0d592 - Browse repository at this point
Copy the full SHA fc0d592View commit details -
MdeModulePkg/Bus/Usb/UsbNetwork/UsbCdcEcm: Add USB Cdc ECM devices su…
…pport This driver provides UEFI driver for USB CDC ECM device Signed-off-by: Richard Ho <[email protected]> Cc: Andrew Fish <[email protected]> Cc: Leif Lindholm <[email protected]> Cc: Michael D Kinney <[email protected]> Cc: Michael Kubacki <[email protected]> Cc: Zhiguang Liu <[email protected]> Cc: Liming Gao <[email protected]> Cc: Hao A Wu <[email protected]> Cc: Ray Ni <[email protected]> Tested-by: Tinh Nguyen <[email protected]> Acked-by: Hao A Wu <[email protected]> Reviewed-by: Rebecca Cran <[email protected]> Reviewed-by: Tony Lo <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5e400d2 - Browse repository at this point
Copy the full SHA 5e400d2View commit details -
MdeModulePkg/Bus/Usb/UsbNetwork/UsbCdcNcm: Add USB Cdc NCM devices su…
…pport This driver provides UEFI driver for USB CDC NCM device Signed-off-by: Richard Ho <[email protected]> Cc: Andrew Fish <[email protected]> Cc: Leif Lindholm <[email protected]> Cc: Michael D Kinney <[email protected]> Cc: Michael Kubacki <[email protected]> Cc: Zhiguang Liu <[email protected]> Cc: Liming Gao <[email protected]> Cc: Hao A Wu <[email protected]> Cc: Ray Ni <[email protected]> Tested-by: Tinh Nguyen <[email protected]> Acked-by: Hao A Wu <[email protected]> Reviewed-by: Rebecca Cran <[email protected]> Reviewed-by: Tony Lo <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ff3382a - Browse repository at this point
Copy the full SHA ff3382aView commit details
Commits on Jul 14, 2023
-
OvmfPkg/ResetVector: Fix assembler bit test flag check
Commit 63c50d3 changed the check that is used to determine if SEV-ES is active. Originally, a CMP instruction with a supporting JZ instruction was used for the check. It was changed to use the BT instruction but not JZ instruction. The result of a BT instruction changes the the carry flag (CF) and not the zero flag (ZF). As a result, the wrong condition is being checked. Update the JZ to a JNC to properly detect if SEV-ES is active. Fixes: 63c50d3 ("OvmfPkg/ResetVector: cache the SEV status MSR...") Signed-off-by: Tom Lendacky <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e674096 - Browse repository at this point
Copy the full SHA e674096View commit details
Commits on Jul 15, 2023
-
MdePkg/BaseLib: RISC-V: Support getting satp register value
Add an API to retrieve satp register value. Signed-off-by: Tuan Phan <[email protected]> Reviewed-by: Andrei Warkentin <[email protected]> Reviewed-by: Sunil V L <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7178047 - Browse repository at this point
Copy the full SHA 7178047View commit details -
MdePkg/Register: RISC-V: Add satp mode bits shift definition
The satp mode bits shift is used cross modules. It should be defined in one place. Signed-off-by: Tuan Phan <[email protected]> Reviewed-by: Andrei Warkentin <[email protected]> Reviewed-by: Sunil V L <[email protected]> Reviewed-by: Michael D Kinney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for fbec9ae - Browse repository at this point
Copy the full SHA fbec9aeView commit details -
OvmfPkg/RiscVVirt: VirtNorFlashPlatformLib: Fix wrong flash size
The size should be for single region, not the whole firmware FD. Signed-off-by: Tuan Phan <[email protected]> Reviewed-by: Andrei Warkentin <[email protected]> Reviewed-by: Sunil V L <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a9fc9bb - Browse repository at this point
Copy the full SHA a9fc9bbView commit details -
OvmfPkg/RiscVVirt: SEC: Add IO memory resource hob for platform devices
Normally, DXE driver would add device resource to GCD before start using. But some key resources such as uart used for printing info at very early stage. Those resources should be populated to HOB in SEC phase so they are added to GCD before MMU enabled. Signed-off-by: Tuan Phan <[email protected]> Reviewed-by: Andrei Warkentin <[email protected]> Reviewed-by: Sunil V L <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a8a72fc - Browse repository at this point
Copy the full SHA a8a72fcView commit details -
OvmfPkg/RiscVVirt: Add VirtNorFlashDxe to APRIORI list
Make sure VirtNorFlashDxe loaded before VariableRuntimeDxe as it is the backend flash driver. Signed-off-by: Tuan Phan <[email protected]> Reviewed-by: Sunil V L <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 33d0a3c - Browse repository at this point
Copy the full SHA 33d0a3cView commit details -
OvmfPkg: RiscVVirt: Remove satp bare mode setting
There is no point to set satp to bare mode as that should be the default mode when booting edk2. Signed-off-by: Tuan Phan <[email protected]> Reviewed-by: Andrei Warkentin <[email protected]> Reviewed-by: Sunil V L <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for cc13dcc - Browse repository at this point
Copy the full SHA cc13dccView commit details -
UefiCpuPkg: RISC-V: Support MMU with SV39/48/57 mode
During CpuDxe initialization, MMU will be setup with the highest mode that HW supports. Signed-off-by: Tuan Phan <[email protected]> Reviewed-by: Andrei Warkentin <[email protected]> Reviewed-by: Sunil V L <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f220dcb - Browse repository at this point
Copy the full SHA f220dcbView commit details
Commits on Jul 17, 2023
-
MdeModulePkg/Bus/Pci/EhciDxe: Fix FORWARD_NULL Coverity issues
The function UsbHcGetPciAddressForHostMem has ASSERT ((Block != NULL)); and the UsbHcFreeMem has ASSERT (Block != NULL); statement after for loop, but these are applicable only in DEBUG mode. In RELEASE mode, if for whatever reasons there is no match inside the for loop and the loop exits because of Block != NULL; condition, then there is no "Block" NULL pointer check afterwards and the code proceeds to do dereferencing "Block" which will lead to CRASH. Hence, for safety add NULL pointer checks always. Cc: Hao A Wu <[email protected]> Cc: Ray Ni <[email protected]> REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4210 Signed-off-by: Ranbir Singh <[email protected]> Signed-off-by: Ranbir Singh <[email protected]> Reviewed-by: Hao A Wu <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for dd49d44 - Browse repository at this point
Copy the full SHA dd49d44View commit details -
RedfishPkg/RedfishRestExDxe: reset session when TCP timeout happens
Call ResetHttpTslSession() to reset HTTP session when TCP timeout failure happens. So that application can perform retry to the same URI. Signed-off-by: Nickle Wang <[email protected]> Cc: Abner Chang <[email protected]> Cc: Igor Kulchytskyy <[email protected]> Cc: Nick Ramirez <[email protected]> Reviewed-by: Abner Chang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3399f64 - Browse repository at this point
Copy the full SHA 3399f64View commit details -
OvmfPkg/PeilessStartupLib: Updated with PcdSecureBootSupported
SECURE_BOOT_FEATURE_ENABLED was dropped by the commit(92da8a1), but the PeilessStartupLib was not updated with PcdSecureBootSupported, that made SecureBoot no longer work in IntelTdxX64. Fix this by replacing SECURE_BOOT_FEATURE_ENABLED with PcdSecureBootSupported in PeilessStartupLib. Cc: Erdem Aktas <[email protected]> Cc: James Bottomley <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Min Xu <[email protected]> Cc: Tom Lendacky <[email protected]> Cc: Michael Roth <[email protected]> Signed-off-by: Ceping Sun <[email protected]> Acked-by: Gerd Hoffmann <[email protected]> Reviewed-by: Jiewen Yao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 39ded59 - Browse repository at this point
Copy the full SHA 39ded59View commit details -
UefiCpuPkg: Uses gMmst in MmSaveStateLib
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4182 Use gMmst instead of gSmst. Replace SmmServicesTableLib with MmServicesTableLib. Cc: Eric Dong <[email protected]> Reviewed-by: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]> Acked-by: Abner Chang <[email protected]> Signed-off-by: Abdul Lateef Attar <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4d10140 - Browse repository at this point
Copy the full SHA 4d10140View commit details
Commits on Jul 19, 2023
-
OvmfPkg/CloudHv: update Maintainers.txt entry
Add Jianyong Wu and Anatol Belski as co-reviewer for OvmfPkg/CloudHv to replace Sebastien Boeuf. Signed-off-by: Jianyong Wu <[email protected]> Signed-off-by: Anatol Belski <[email protected]> Reviewed-by: Jiewen Yao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 08aacbf - Browse repository at this point
Copy the full SHA 08aacbfView commit details -
OvmfPkg/IoMmuDxe: add locking to IoMmuAllocateBounceBuffer
Searching for an unused bounce buffer in mReservedMemBitmap and reserving the buffer by flipping the bit is a critical section which must not be interrupted. Raise the TPL level to ensure that. Without this fix it can happen that IoMmuDxe hands out the same bounce buffer twice, causing trouble down the road. Seen happening in practice with VirtioNetDxe setting up the network interface (and calling into IoMmuDxe from a polling timer callback) in parallel with Boot Manager doing some disk I/O. An ASSERT() in VirtioNet caught the buffer inconsistency. Full story with lots of details and discussions is available here: https://bugzilla.redhat.com/show_bug.cgi?id=2211060 Signed-off-by: Gerd Hoffmann <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a52044a - Browse repository at this point
Copy the full SHA a52044aView commit details
Commits on Jul 20, 2023
-
NetworkPkg/HttpDxe: fix driver binding start issue.
When failure happens in HttpDxeStart, the error handling code release the memory buffer but it does not uninstall HTTP service binding protocol. As the result, application can still locate this protocol and invoke service binding functions in released memory pool. Cc: Maciej Rabeda <[email protected]> Cc: Siyuan Fu <[email protected]> Cc: Abner Chang <[email protected]> Cc: Igor Kulchytskyy <[email protected]> Cc: Nick Ramirez <[email protected]> Signed-off-by: Nickle Wang <[email protected]> Reviewed-by: Saloni Kasbekar <[email protected]> Acked-by: Michael D Kinney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6510dcf - Browse repository at this point
Copy the full SHA 6510dcfView commit details -
CryptoPkg/OpensslLib: Upgrade OpenSSL to 1.1.1u
Cc: Jian J Wang <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Signed-off-by: Sheng Wei <[email protected]> Reviewed-by: Jiewen Yao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b2de9ec - Browse repository at this point
Copy the full SHA b2de9ecView commit details -
UnitTestFrameworkPkg: UnitTestPersistenceLib: Save Unit Test Cache Op…
…tion REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4467 Current implementation of UnitTestFrameworkPkg for shell-based unit test will save the unit test cache to the same volume as the test application itself. This works as long as the test application is on a writable volume, such as USB or EFI partition. Instead of saving the files to the same file system of unit test application, this change will save the cache file to the path where the user ran this test application. This change then added an input argument to allow user to specify where to save such cache file through `--CachePath` shell argument to allow even more flexibility. This change was tested on proprietary physical hardware platforms and QEMU based virtual platform. Cc: Sean Brogan <[email protected]> Cc: Michael Kubacki <[email protected]> Cc: Michael D Kinney <[email protected]> Signed-off-by: Kun Qin <[email protected]> Reviewed-by: Michael Kubacki <[email protected]> Reviewed-by: Michael D Kinney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c6b5129 - Browse repository at this point
Copy the full SHA c6b5129View commit details
Commits on Jul 21, 2023
-
OvmfPkg/RiscVVirt: Check "no-map" and mark EfiReservedMemoryType
OpenSBI now marks PMP regions with "no-map" attribute. So, remove the workaround and add the ReservedMemory only when no-map is set so that it follows DT spec. Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Andrei Warkentin <[email protected]> Signed-off-by: Sunil V L <[email protected]> Reviewed-by: Ranbir Singh <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7427dd3 - Browse repository at this point
Copy the full SHA 7427dd3View commit details -
OvmfPkg/RiscVVirt: Avoid printing hard coded timeout value
Print the timeout value set in the PCD variable instead of hard coded 10 seconds. Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Andrei Warkentin <[email protected]> Signed-off-by: Sunil V L <[email protected]> Reviewed-by: Andrei Warkentin <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 925c445 - Browse repository at this point
Copy the full SHA 925c445View commit details
Commits on Jul 24, 2023
-
EmulatorPkg/Win/Host: Fix RUNTIME_FUNCTION redefinition error
Update WinInclude.h to prevent error due to redefinition of RUNTIME_FUNCTION using same technique that has been used in the past for structure types such as LIST_ENTRY. Cc: Gerd Hoffmann <[email protected]> Cc: Rebecca Cran <[email protected]> Cc: Andrew Fish <[email protected]> Cc: Ray Ni <[email protected]> Signed-off-by: Michael D Kinney <[email protected]> Reviewed-by: Ray Ni <[email protected]> Reviewed-by: Liming Gao <[email protected]> Reviewed-by: Rebecca Cran <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5309ddc - Browse repository at this point
Copy the full SHA 5309ddcView commit details -
MdePkg/Include/IndustryStandard: Remove VS20xx workaround
Remove workaround for the redefinition of the type RUNTIME_FUNCTION that is generated when building with VS20xx tool chains and using windows include files. The correct location for this fix is in the EmulatorPkg in the WinInclude.h file that addresses all the name collisions between edk2 types and windows types. The commit that added the workaround is: tianocore/edk2@ff52068 Cc: Gerd Hoffmann <[email protected]> Cc: Rebecca Cran <[email protected]> Cc: Liming Gao <[email protected]> Cc: Zhiguang Liu <[email protected]> Signed-off-by: Michael D Kinney <[email protected]> Reviewed-by: Liming Gao <[email protected]> Reviewed-by: Rebecca Cran <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for dcf05f9 - Browse repository at this point
Copy the full SHA dcf05f9View commit details
Commits on Jul 26, 2023
-
RedfishPkg/RedfishDiscoverDxe: fix netmask check issue
- Add NTOHL() for coverting IP address from EFI_IPv4_ADDRESS to IP4_ADDR so that IP4_IS_VALID_NETMASK() return correct value. - Add DumpIpv4Address() in RedfishDebugLib and print IP address when invalid IP or subnet mask address is detected. Signed-off-by: Nickle Wang <[email protected]> Cc: Abner Chang <[email protected]> Cc: Igor Kulchytskyy <[email protected]> Cc: Nick Ramirez <[email protected]> Reviewed-by: Igor Kulchytskyy <[email protected]> Reviewed-by: Abner Chang <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 25a6745 - Browse repository at this point
Copy the full SHA 25a6745View commit details
Commits on Jul 27, 2023
-
UefiCpuPkg: Decouple the SEV-ES functionality.
The purpose is to fix an issue where an exception occurs at the start of the DXE phase by applying the following patch series on INTEL-based systems. UefiCpuPkg: Refactor the logic for placing APs in HltLoop. UefiCpuPkg: Refactor the logic for placing APs in Mwait/Runloop. UefiCpuPkg: Create MpHandOff. UefiCpuPkg: ApWakeupFunction directly use CpuMpData. UefiCpuPkg: Eliminate the second INIT-SIPI-SIPI sequence. This series of patches makes changes to the way the APs are initialized and woken up. It removes the 2nd time INIT-SIPI-SIPI and introduces a special startup signal to wake up APs. These patches also create a new HOB identified by the mMpHandOffGuid, which stores only the minimum information required from the PEI phase to the DXE phase. As a result, the original HOB (mCpuInitMpLibHobGuid) is now used only as a global variable in the PEI phase and is no longer necessary in the DXE phase for INTEL-based systems. The AMD SEV-ES related code still relies on the OldCpuMpData in the DXE phase. This patch decouple the SEV-ES functionality of assigning CpuMpData to OldCpuMpData->NewCpuMpData from the Intel logic. Cc: Eric Dong <[email protected]> Cc: Rahul Kumar <[email protected]> Reviewed-by: Tom Lendacky <[email protected]> Reviewed-by: Ray Ni <[email protected]> Signed-off-by: Yuanhao Xie <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c7a7f09 - Browse repository at this point
Copy the full SHA c7a7f09View commit details
Commits on Jul 31, 2023
-
Revert "OvmfPkg/Bhyve: consume PciHostBridgeLibScan"
We like to enable bus enumartion for bhyve. Therefore, this patch needs to be reverted. This reverts commit c2f24ba. Signed-off-by: Corvin Köhne <[email protected]> Acked-by: Peter Grehan <[email protected]> Reviewed-by: Rebecca Cran <[email protected]> Cc: Ard Biesheuvel <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc: Rebecca Cran <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1c923b9 - Browse repository at this point
Copy the full SHA 1c923b9View commit details -
Revert "OvmfPkg/Bhyve: remove IncompatiblePciDeviceSupport DXE driver"
We like to enable bus enumeration for bhyve. Therefore, this patch needs to be reverted. This reverts commit 8c8f886. Signed-off-by: Corvin Köhne <[email protected]> Acked-by: Peter Grehan <[email protected]> Reviewed-by: Rebecca Cran <[email protected]> Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Rebecca Cran <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f284981 - Browse repository at this point
Copy the full SHA f284981View commit details -
OvmfPkg/BhyvePkg: enable bus enumeration
bhyve supports adding a ROM to PCI devices. It was added to support GPU passthrough of dedicated AMD GPUs. At the moment, this ROM file is mostly useless as it's not shadowed and executed by firmware. Change that by enabling bus enumeration. Signed-off-by: Corvin Köhne <[email protected]> Acked-by: Peter Grehan <[email protected]> Reviewed-by: Rebecca Cran <[email protected]> Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Rebecca Cran <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 70f3e62 - Browse repository at this point
Copy the full SHA 70f3e62View commit details -
OvmfPkg/RiscVVirt: use 'auto' alignment and FIXED for XIP modules
Use auto alignment and FIXED FFS attribute for XIP modules similar to [1]. Without this change, the CLANGDWARF toolchain will fail to build with below error. GenFfs: ERROR 1000: Unknown option SectionAlign option must be specified with section file. [1] - tianocore/edk2@7669f73 Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc Gerd Hoffmann <[email protected]> Cc: Andrei Warkentin <[email protected]> Signed-off-by: Sunil V L <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> # Debian clang version 14.0.6
Configuration menu - View commit details
-
Copy full SHA for 8543840 - Browse repository at this point
Copy the full SHA 8543840View commit details -
OvmfPkg/RiscVVirt: SecEntry: Remove unnecessary assembly directives
llvm fails to resolve _ModuleEntry when these extra directives are present. ASM_FUNC already takes care what is required. Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Andrei Warkentin <[email protected]> Signed-off-by: Sunil V L <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> # Debian clang version 14.0.6
Configuration menu - View commit details
-
Copy full SHA for 0f9fd06 - Browse repository at this point
Copy the full SHA 0f9fd06View commit details -
BaseTools/tools_def: Add CLANGDWARF support for RISC-V
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4478 Add tools_def definitions to support CLANGDWARF toolchain for RISC-V. This uses clang and the llvm LLD linker. This helps people by not requiring to install multiple cross compilers for different architectures. Cc: Rebecca Cran <[email protected]> Cc: Liming Gao <[email protected]> Cc: Bob Feng <[email protected]> Cc: Yuwei Chen <[email protected]> Cc: Ard Biesheuvel <[email protected]> Signed-off-by: Sunil V L <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> # Debian clang version 14.0.6 Reviewed-by: Rebecca Cran <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3f49462 - Browse repository at this point
Copy the full SHA 3f49462View commit details -
OvmfPkg/RiscVVirt: Update README for CLANGDWARF support
Update the README with instruction to build using CLANGDWARF toolchain. Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Andrei Warkentin <[email protected]> Signed-off-by: Sunil V L <[email protected]> Reviewed-by: Heinrich Schuchardt <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> # Debian clang version 14.0.6
Configuration menu - View commit details
-
Copy full SHA for 677f2c6 - Browse repository at this point
Copy the full SHA 677f2c6View commit details
Commits on Aug 2, 2023
-
MdeModulePkg/Bus/Ata/AtaAtapiPassThru: Fix SIGN_EXTENSION Coverity issue
Line number 1348 does contain a typecast with UINT32, but it is after all the operations (16-bit left shift followed by OR'ing) are over. To avoid any SIGN_EXTENSION, typecast the intermediate result after 16-bit left shift operation immediately with UINT32. REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4204 Cc: Hao A Wu <[email protected]> Cc: Ray Ni <[email protected]> Signed-off-by: Ranbir Singh <[email protected]> Signed-off-by: Ranbir Singh <[email protected]> Reviewed-by: Hao A Wu <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c7c1170 - Browse repository at this point
Copy the full SHA c7c1170View commit details -
MdeModulePkg/Bus/Ata/AtaAtapiPassThru: Fix UNUSED_VALUE Coverity issue
The return value stored in Status after call to SetDriveParameters is not made of any use thereafter and hence it remains as UNUSED. Based on Hao's findings (https://edk2.groups.io/g/devel/message/106844), the successful execution of SetDriveParameters() is not mandatory for initializing IDE mode of a hard disk device. Hence remove the 'Status' assignment of the return value from SetDriveParameters() and instead add error checks & DEBUG_WARN level messages within SetDriveParameters() function after sending INIT_DRIVE_PARAM & SET_MULTIPLE_MODE ATA commands. REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4204 Cc: Hao A Wu <[email protected]> Cc: Ray Ni <[email protected]> Signed-off-by: Ranbir Singh <[email protected]> Signed-off-by: Ranbir Singh <[email protected]> Reviewed-by: Hao A Wu <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for d11968f - Browse repository at this point
Copy the full SHA d11968fView commit details -
BaseTools: BinToPcd: Resolve xdrlib deprecation
Removes the dependency on xdrlib and replaces it with custom logic to pack a per the xdr requirements. Necessary as xdrlib is being deprecated in python 3.13. Cc: Rebecca Cran <[email protected]> Cc: Liming Gao <[email protected]> Cc: Bob Feng <[email protected]> Cc: Yuwei Chen <[email protected]> Cc: Michael D Kinney <[email protected]> Signed-off-by: Joey Vagedes <[email protected]> Reviewed-by: Liming Gao <[email protected]> Reviewed-by: Michael D Kinney <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5cadb8c - Browse repository at this point
Copy the full SHA 5cadb8cView commit details -
BaseTools: scan Edk2ToolsBuild.py make output
Adds edk2_logging.scan_compiler_output() to Edk2ToolsBuild.py to catch some compilation errors and log them as an error. Cc: Rebecca Cran <[email protected]> Cc: Liming Gao <[email protected]> Cc: Bob Feng <[email protected]> Cc: Yuwei Chen <[email protected]> Signed-off-by: Joey Vagedes <[email protected]> Reviewed-by: Rebecca Cran <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for fa789cc - Browse repository at this point
Copy the full SHA fa789ccView commit details
Commits on Aug 3, 2023
-
MdeModulePkg/SetupBrowser: Load storage via GetVariable for EfiVarStore
For EfiVarStore (EFI_HII_VARSTORE_EFI_VARIABLE_BUFFER), it will call ExtractConfig-GetVariable-HiiBlockToConfig-ConfigToBlock when load storage value in LoadStorage function. It's not necessary and costs lots of time to do the conversion between config and block. So now enhance it to call GetVariable directly. Cc: Liming Gao <[email protected]> Cc: Eric Dong <[email protected]> Signed-off-by: Dandan Bi <[email protected]> Reviewed-by: Liming Gao <[email protected]> Reviewed-by: Eric Dong <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7672d1c - Browse repository at this point
Copy the full SHA 7672d1cView commit details -
ArmPkg: DefaultExceptionHandlerLib: Do Not Allocate Memory
If gST->ConOut is available when Arm's DefaultExceptionHandler is running, AsciiPrint will get called to attempt to print to ConOut, in addition to the serial output. AsciiPrint calls AsciiInternalPrint in UefiLibPrint.c which in turn calls AllocatePool to allocate a buffer to convert the Ascii input string to a Unicode string to pass to ConOut->OutputString. Per the comment on DefaultExceptionHandler, we should not be allocating memory in the exception handler, as this can cause the exception handler to fail if we had a memory exception or the system state is such that we cannot allocate memory. It has been observed on ArmVirtQemu that exceptions generated in the memory handling code will fail to output the stack dump and CPU state that is critical to debugging because the AllocatePool will fail. This patch fixes the Arm and AARCH64 DefaultExceptionHandlers to not allocate memory when ConOut is available and instead use stack memory to convert the Ascii string needed for SerialPortWrite to the Unicode string needed for ConOut->OutputString. Correspondingly, ArmVirtQemu can now output the stack dump and CPU state when hitting an exception in memory code. Signed-off-by: Oliver Smith-Denny <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ef05145 - Browse repository at this point
Copy the full SHA ef05145View commit details
Commits on Aug 4, 2023
-
MdeModulePkg: Solve boot hang Xhci driver when use USB DVD with empty…
… disk Signed-off-by: likun su <[email protected]> Reviewed-by: Liming Gao <[email protected]> Reviewed-by: lichao <[email protected]> Acked-by: Hao A Wu <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 01ad413 - Browse repository at this point
Copy the full SHA 01ad413View commit details -
OvmfPkg/PlatformCI: Use recent Qemu on Windows
Bump the version of the Qemu chocolatey package up to 2023.7.25. The Linux CI is already using Qemu 8. REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4324 Signed-off-by: Oliver Steffen <[email protected]> Reviewed-by: Laszlo Ersek <[email protected]> Reviewed-by: Michael Kubacki <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 744c42b - Browse repository at this point
Copy the full SHA 744c42bView commit details -
OvmfPkg/PlatformCI VS2019: Disable workaround for cpuhp bugfix
This reverts commit 3beb8c9. Both Windows and Linux CI jobs are now using Qemu 8, this workaround is no longer needed. REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4324 Signed-off-by: Oliver Steffen <[email protected]> Reviewed-by: Laszlo Ersek <[email protected]> Reviewed-by: Michael Kubacki <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for bae848e - Browse repository at this point
Copy the full SHA bae848eView commit details -
OvmfPkg/PlatformCI: Boot OVMF in SMP mode.
Increase the chance that CI finds bugs in MP changes. Signed-off-by: Gerd Hoffmann <[email protected]> (cherry picked from commit f92a9dc) Reapplying, since the CI (Windows and Linux) use Qemu 8 now, which works with SMP again. REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4324 Signed-off-by: Oliver Steffen <[email protected]> [ardb: use single-threaded TCG for SMM]
Configuration menu - View commit details
-
Copy full SHA for 2d8c17a - Browse repository at this point
Copy the full SHA 2d8c17aView commit details
Commits on Aug 7, 2023
-
MdePkg: Add missing status codes
REF: https://uefi.org/specs/UEFI/2.10/Apx_D_Status_Codes.html Upon review it has been found that MdePkg is missing two status code definitions: 1. EFI_IP_ADDRESS_CONFLICT - Added in UEFI Spec v2.5 2. EFI_WARN_RESET_REQUIRED - Added in UEFI Spec v2.6 These missing status codes have been added. Reviewed-by: Michael D Kinney <[email protected]> Cc: Liming Gao <[email protected]> Cc: Zhiguang Liu <[email protected]> Signed-off-by: Nate DeSimone <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 107ddf1 - Browse repository at this point
Copy the full SHA 107ddf1View commit details -
MdePkg: Add new status codes to PrintLib
PrintLib does not correctly decode the follow status codes: 1. EFI_IP_ADDRESS_CONFLICT 2. EFI_HTTP_ERROR 3. EFI_WARN_FILE_SYSTEM 4. EFI_WARN_RESET_REQUIRED These missing status codes have been added. Reviewed-by: Michael D Kinney <[email protected]> Cc: Liming Gao <[email protected]> Cc: Zhiguang Liu <[email protected]> Signed-off-by: Nate DeSimone <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3c274c0 - Browse repository at this point
Copy the full SHA 3c274c0View commit details
Commits on Aug 9, 2023
-
MedPkg/Include: Add PCI_EXPRESS_EXTENDED_CAPABILITY_DVSEC_ID
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=4515 Add PCI_EXPRESS_EXTENDED_CAPABILITY_DESIGNATED_VENDOR_SPECIFIC_ID 0x0023 in PciExpress40.h Signed-off-by: Foster Nong <[email protected]> Cc: Michael D Kinney <[email protected]> Cc: Liming Gao <[email protected]> Cc: Ray Ni <[email protected]> Reviewed-by: Liming Gao <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 136931c - Browse repository at this point
Copy the full SHA 136931cView commit details -
CryptoPkg/openssl: update submodule to openssl-3.0.9
Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9d6d237 - Browse repository at this point
Copy the full SHA 9d6d237View commit details -
CryptoPkg/openssl: cleanup all openssl1.1.1 generated files and code
Signed-off-by: Gerd Hoffmann <[email protected]> Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 49a113a - Browse repository at this point
Copy the full SHA 49a113aView commit details -
CryptoPkg/openssl: update Openssl*.inf files for openssl 3.0
The configure workflow as changed, see the commit adding the configure script for details. Adapt the *.inf files to the changes. The configuration define handling has changed a bit. The new configure script will build a single per-arch file list, which simplifies the Accel configs. Signed-off-by: Gerd Hoffmann <[email protected]> Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7cede6d - Browse repository at this point
Copy the full SHA 7cede6dView commit details -
CryptoPkg/openssl: add openssl3 configure scripts
Rewrite the script to configure openssl 3.0 from scratch. It's two scripts now: * Tiny helper script, dumping the perl configdata as json. * Actual configure.py script, written in python, which copies over the generated files to openssl-gen and updates the OpensslLib*.inf file lists and build flags. The configuration workflow has changed a bit: * All generated files are stored in the OpensslGen directory tree. * For ec/no-ec builds two different header files are used. Default is the ec variant, and the new EDK2_OPENSSL_NOEC define is used to select the no-ec build. A five line wrapper include is used to pick the one or the other. * For non-accel builds -DOPENSSL_NO_ASM on the command line is used (same as before). * For configration defines the OPENSSL_FLAGS_$(variant) variable is used, where variant is the architecture for the accelerated builds and 'NOASM' for the non-accelerated builds. Signed-off-by: Gerd Hoffmann <[email protected]> Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 81f5aa0 - Browse repository at this point
Copy the full SHA 81f5aa0View commit details -
CryptoPkg/openssl: UefiAsm.conf update for openssl 3.0
New naming convention for the configs: UEFI-${efiarch}-${compiler}. Signed-off-by: Gerd Hoffmann <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ac492c3 - Browse repository at this point
Copy the full SHA ac492c3View commit details -
CryptoPkg/BaseCryptLib: no openssl deprecation warnings please
Stop using deprecated interfaces is left as exercise for another day. So please don't warn for now so -Werror builds can work. Signed-off-by: Gerd Hoffmann <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 84158d0 - Browse repository at this point
Copy the full SHA 84158d0View commit details -
CryptoPkg/BaseCryptLib: adapt CryptSm3.c to openssl 3.0 changes.
Functions have been renamed. Signed-off-by: Gerd Hoffmann <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 63c8d16 - Browse repository at this point
Copy the full SHA 63c8d16View commit details -
CryptoPkg/BaseCryptLib: drop BIO_* dummy functions
openssl 3.0 requires a functional BIO_sprintf() implementation. Signed-off-by: Gerd Hoffmann <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2a6dc12 - Browse repository at this point
Copy the full SHA 2a6dc12View commit details -
CryptoPkg/TlsLib: ERR_GET_FUNC is gone
Signed-off-by: Gerd Hoffmann <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for eac38f7 - Browse repository at this point
Copy the full SHA eac38f7View commit details -
CryptoPkg/openssl: adapt rand_pool.c to openssl 3.0 changes
Some functions have been renamed. Signed-off-by: Gerd Hoffmann <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c638d1f - Browse repository at this point
Copy the full SHA c638d1fView commit details -
CryptoPkg/openssl: move compiler_flags to buildinf.c
Seems with openssl 3.0 this is used by multiple source files, so we get duplicate symbol errors when linking. Fix that by moving compiler_flags from header file to a source file. Signed-off-by: Gerd Hoffmann <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3af00ae - Browse repository at this point
Copy the full SHA 3af00aeView commit details -
CryptoPkg/openssl: store dummy update for openssl 3.0
Signed-off-by: Gerd Hoffmann <[email protected]> Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 174a306 - Browse repository at this point
Copy the full SHA 174a306View commit details -
CryptoPkg/openssl: adapt EcSm2Null.c for openssl 3.0
Signed-off-by: Gerd Hoffmann <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5e1900f - Browse repository at this point
Copy the full SHA 5e1900fView commit details -
CryptoPkg: Move all UEFI implement of openssl to OpensslStub
Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9b9b331 - Browse repository at this point
Copy the full SHA 9b9b331View commit details -
CryptoPkg: use UEFI provider as default
Added UEFI provider which removed unused features to optimize the size of openssl3. Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ea7a37d - Browse repository at this point
Copy the full SHA ea7a37dView commit details -
CryptoPkg: adapt 3.0 change in SslNull.c
Type of input params changed in openssl30. Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for cea8e3b - Browse repository at this point
Copy the full SHA cea8e3bView commit details -
CryptoPkg: Add instrinsics to support building openssl3 on IA32 windows
This dependency is needed to build openssl lib with openssl3 under IA32 Windows, so added implementation for _alldiv, _aulldiv, _aullrem and _alldvrm instrinsics. Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for bf1ff73 - Browse repository at this point
Copy the full SHA bf1ff73View commit details -
CryptoPkg: disable C4133 warning in openssl libraries
Disable warning as error of C4133: v3_genn.c(101): warning C4133: 'function': incompatible types - from 'ASN1_TYPE *' to 'const ASN1_STRING *'. Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 20193b2 - Browse repository at this point
Copy the full SHA 20193b2View commit details -
CryptoPkg/TlsLib: use unsigned long for ErrorCode
Signed-off-by: Gerd Hoffmann <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for bdf3142 - Browse repository at this point
Copy the full SHA bdf3142View commit details -
CryptoPkg: Align with 4096 when build with OpensslFullAccel
Should align to 4096 when build ecp_nistz256 related asm files. ecp_nistz256-x86.S Line3: .globl ecp_nistz256_precomputed .align 4096 Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f0d3e59 - Browse repository at this point
Copy the full SHA f0d3e59View commit details -
CryptoPkg: Enable memcpy sys call in RISCV64 build
When build Openssl30, compiler optimization may use memcpy() for memory copy. Need enable it in RISCV64 build also. Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 43e0ede - Browse repository at this point
Copy the full SHA 43e0edeView commit details -
CryptoPkg: add missing gcc instructions
Used when build IA32 CryptoPkg by gcc, the definition of the instructions can be found at: https://gcc.gnu.org/onlinedocs/gccint/Integer-library-routines.html Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4b5faa5 - Browse repository at this point
Copy the full SHA 4b5faa5View commit details -
CryptoPkg: add define of maximum unsigned size_t
Used by openssl30 source code. Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b2ff8e4 - Browse repository at this point
Copy the full SHA b2ff8e4View commit details -
CryptoPkg: add implemention of _ftol2_sse() to avoid build error
Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2bead79 - Browse repository at this point
Copy the full SHA 2bead79View commit details -
CryptoPkg: add more dummy implement of openssl for size optimization
Add dummy implement of Encoder, Pkcs12 and sslserver. OpenSSL libraries which don't need these features can include these files to reduce the size of output. Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for dfa6147 - Browse repository at this point
Copy the full SHA dfa6147View commit details -
CryptoPkg: run configure.py to update all generated files
cd */edk2/CryptoPkg/Library/OpensslLib python configure.py Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c0aeb92 - Browse repository at this point
Copy the full SHA c0aeb92View commit details -
CryptoPkg: remove strcmp to syscall
In rare cases the platform may not provide the full IntrinsicLib. But openssl30 build always require strcmp, provide this function by moving it into CrtWrapper.c. Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 46226fb - Browse repository at this point
Copy the full SHA 46226fbView commit details -
CryptoPkg/openssl: update CI config for openssl 3.0
Signed-off-by: Gerd Hoffmann <[email protected]> Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e91bfff - Browse repository at this point
Copy the full SHA e91bfffView commit details -
CryptoPkg: remove BN and EC accel for size optimization
BN and EC have not been fully tested, and will greatly increase the size of the Crypto driver(>150KB). Signed-off-by: Yi Li <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Xiaoyu Lu <[email protected]> Cc: Guomin Jiang <[email protected]> Reviewed-by: Jiewen Yao <[email protected]> Acked-by: Ard Biesheuvel <[email protected]> Tested-by: Ard Biesheuvel <[email protected]> Tested-by: Brian J. Johnson <[email protected]> Tested-by: Kenneth Lautner <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 991515a - Browse repository at this point
Copy the full SHA 991515aView commit details
Commits on Aug 14, 2023
-
UefiCpuPkg: Add SendStartupIpiAllExcludingSelf
Add new API SendStartupIpiAllExcludingSelf(), and modify SendInitSipiSipiAllExcludingSelf() by let it call the new API. Cc: Eric Dong <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Ray Ni <[email protected]> Signed-off-by: Ray Ni <[email protected]> Signed-off-by: Yuanhao Xie <[email protected]> Reviewed-by: Ray Ni <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 055c7bd - Browse repository at this point
Copy the full SHA 055c7bdView commit details -
UefiCpuPkg: Add PcdFirstTimeWakeUpAPsBySipi
Add PcdFirstTimeWakeUpAPsBySipi to check if it is in the OVMF environment and necessary to wake up APs by INIT-SIPI-SIPI. Cc: Eric Dong <[email protected]> Cc: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]> Signed-off-by: Yuanhao Xie <[email protected]> Reviewed-by: Ray Ni <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 98e9d29 - Browse repository at this point
Copy the full SHA 98e9d29View commit details -
OvmfPkg: Disable PcdFirstTimeWakeUpAPsBySipi.
Disable PcdFirstTimeWakeUpAPsBySipi for OVMF to let BSP wake up APs by INIT-SIPI-SIPI. Cc: Eric Dong <[email protected]> Cc: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Ard Biesheuvel <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Signed-off-by: Yuanhao Xie <[email protected]> Reviewed-by: Ray Ni <[email protected]> Reviewed-by: Ard Biesheuvel <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1d76560 - Browse repository at this point
Copy the full SHA 1d76560View commit details -
UefiCpuPkg:Wake up APs after power-up or RESET through SIPI.
The implementation of this new behavior aligns with the guidelines outlined in the Intel SDM. Following a power-up or RESET of an MP system, system hardware dynamically selects one of the processors on the system bus as the BSP. The remaining processors are designated as APs. The APs complete a minimal self-configuration, then wait for a startup signal (a SIPI message) from the BSP processor. Additionally, the MP protocol is executed only after a power-up or RESET. If the MP protocol has completed and a BSP is chosen, subsequent INITs (either to a specific processor or system wide) do not cause the MP protocol to be repeated. Instead, each logical processor examines its BSP flag (in the IA32_APIC_BASE MSR) to determine whether it should execute the BIOS boot-strap code (if it is the BSP) or enter a wait-for-SIPI state (if it is an AP). Cc: Eric Dong <[email protected]> Cc: Ray Ni <[email protected]> Cc: Rahul Kumar <[email protected]> Cc: Gerd Hoffmann <[email protected]> Signed-off-by: Ray Ni <[email protected]> Signed-off-by: Yuanhao Xie <[email protected]> Reviewed-by: Ray Ni <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for eaffa1d - Browse repository at this point
Copy the full SHA eaffa1dView commit details
Commits on Aug 17, 2023
-
CryptoPkg: Size optimization: trim objects structure
Run object_trim.py to generated obj_mac.h and obj_dat.h Signed-off-by: Yi Li <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 32531ef - Browse repository at this point
Copy the full SHA 32531efView commit details -
CryptoPkg: Size optimization: Enable openssl legacy code path
And remove unused providers. uefiprov.c is for libraries with tls/ssl. uefiprovcrypto.c is for libraries only with BaseCrypto. Signed-off-by: Yi Li <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for adc1c9e - Browse repository at this point
Copy the full SHA adc1c9eView commit details -
CryptoPkg: Size optimization: remove INTEL unused feature
Remove ECX in full libraries. Remove DH and PEI in crypto library. Signed-off-by: Yi Li <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ec9e95a - Browse repository at this point
Copy the full SHA ec9e95aView commit details -
CryptoPkg: Size optimization: Disable AUTOALGINIT for non-tls build
Signed-off-by: Yi Li <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 872df82 - Browse repository at this point
Copy the full SHA 872df82View commit details -
CryptoPkg: Size optimization: add Accel library without TLS
Signed-off-by: Yi Li <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6cf31e9 - Browse repository at this point
Copy the full SHA 6cf31e9View commit details -
CryptoPkg: Add readme for OpenSSL30 optimization
Signed-off-by: Yi Li <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 81f3578 - Browse repository at this point
Copy the full SHA 81f3578View commit details -
Add mbedtls submodule for EDKII
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 71bb668 - Browse repository at this point
Copy the full SHA 71bb668View commit details -
Check mbedtls to version 3.3.0
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f3b36c5 - Browse repository at this point
Copy the full SHA f3b36c5View commit details -
Add mbedtls_config and MbedTlsLib.inf to support MbedTlsLib
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for d4fc61b - Browse repository at this point
Copy the full SHA d4fc61bView commit details -
Add Bignumber functions based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2d4dad7 - Browse repository at this point
Copy the full SHA 2d4dad7View commit details -
Add Cipher functions based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 423fb0f - Browse repository at this point
Copy the full SHA 423fb0fView commit details -
Add MD5/SHA1/SHA2 functions based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a968e78 - Browse repository at this point
Copy the full SHA a968e78View commit details -
Add HMAC functions based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8ef929e - Browse repository at this point
Copy the full SHA 8ef929eView commit details -
Add HKDF functions based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 92e0137 - Browse repository at this point
Copy the full SHA 92e0137View commit details -
Add PEM functions based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0cba476 - Browse repository at this point
Copy the full SHA 0cba476View commit details -
Add DH functions based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for a52e111 - Browse repository at this point
Copy the full SHA a52e111View commit details -
Add EC functions based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 68a0afd - Browse repository at this point
Copy the full SHA 68a0afdView commit details -
Add RSA functions based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for f9d3fab - Browse repository at this point
Copy the full SHA f9d3fabView commit details -
Add PKCS1 functions based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5358c0e - Browse repository at this point
Copy the full SHA 5358c0eView commit details -
Add PKCS5 functions based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ecb7970 - Browse repository at this point
Copy the full SHA ecb7970View commit details -
Add X509 functions based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3024e8b - Browse repository at this point
Copy the full SHA 3024e8bView commit details -
Add PKCS7 null functions based on Mbedtls to pass build
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 6bf9694 - Browse repository at this point
Copy the full SHA 6bf9694View commit details -
Add Rand functions based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for b825a9b - Browse repository at this point
Copy the full SHA b825a9bView commit details -
Add SysCall for BaseCryptLibMbedTls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 21f471e - Browse repository at this point
Copy the full SHA 21f471eView commit details -
Add all the inf files for BaseCryptLibMbedTls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 755c4d6 - Browse repository at this point
Copy the full SHA 755c4d6View commit details -
Add CryptoPkgMbedTls.dsc for CryptoPkgMbedTls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 1e7e153 - Browse repository at this point
Copy the full SHA 1e7e153View commit details -
Add CryptoPkgMbedHostUnitTest.dsc for UnitTest
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 2ff52a7 - Browse repository at this point
Copy the full SHA 2ff52a7View commit details -
Add PKCS7 all functions(WIP) based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e5d7a5b - Browse repository at this point
Copy the full SHA e5d7a5bView commit details -
Add TlsLibMbedtls(WIP) based on Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7f57b77 - Browse repository at this point
Copy the full SHA 7f57b77View commit details -
Add dummy API for Openssl raw API
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 292af06 - Browse repository at this point
Copy the full SHA 292af06View commit details -
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 4b3cd52 - Browse repository at this point
Copy the full SHA 4b3cd52View commit details -
Add SHA3/SM3 functions with openssl for Mbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9f843a2 - Browse repository at this point
Copy the full SHA 9f843a2View commit details -
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for d88d0de - Browse repository at this point
Copy the full SHA d88d0deView commit details -
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 46ce37f - Browse repository at this point
Copy the full SHA 46ce37fView commit details
Commits on Aug 25, 2023
-
Fix Bignumber: Add more check for input parameters
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c6fe53c - Browse repository at this point
Copy the full SHA c6fe53cView commit details
Commits on Aug 31, 2023
-
Readme: update status of auto init
Signed-off-by: Yi Li <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8daf258 - Browse repository at this point
Copy the full SHA 8daf258View commit details
Commits on Sep 12, 2023
-
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 8447433 - Browse repository at this point
Copy the full SHA 8447433View commit details -
CryptoPkg: Make the use of BnCtx in mbedtls clear
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 940dd51 - Browse repository at this point
Copy the full SHA 940dd51View commit details
Commits on Dec 5, 2023
-
CryptoPkg: Enable MBEDTLS_AESNI_C
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e3f4cc0 - Browse repository at this point
Copy the full SHA e3f4cc0View commit details -
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 73d1bb6 - Browse repository at this point
Copy the full SHA 73d1bb6View commit details
Commits on Dec 7, 2023
-
CryptoPkg: Fix MbedtlsPkcs7SignedDataVerifySigners
In Pkcs7 spec RFC2315: The IMPLICIT [0] tag in the authenticatedAttributes field is not part of the Attributes value. The Attributes value’s tag is SET OF, and the DER encoding of the SET OF tag, rather than of the IMPLICIT [0] tag, is to be digested along with the length and contents octets of the Attributes value. And this operation is same with Openssl code ``` alen = ASN1_item_i2d((ASN1_VALUE *)sk, &abuf, ASN1_ITEM_rptr(PKCS7_ATTR_VERIFY)); ``` in PKCS7_signatureVerify API. Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 3f1bf45 - Browse repository at this point
Copy the full SHA 3f1bf45View commit details
Commits on Jan 4, 2024
-
CryptoPkg: Fix hardcode in CryptPkcs7VerifyCommon
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 33ac7ec - Browse repository at this point
Copy the full SHA 33ac7ecView commit details -
CryptoPkg: Update ReadmeMbedtls
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for c40618f - Browse repository at this point
Copy the full SHA c40618fView commit details
Commits on Jan 12, 2024
-
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 5134115 - Browse repository at this point
Copy the full SHA 5134115View commit details
Commits on Jan 25, 2024
-
CryptoPkg: Delete hardcode for buffer usage
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 7b61160 - Browse repository at this point
Copy the full SHA 7b61160View commit details -
CryptoPkg: Fix Pkcs7GetSigners
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 578445f - Browse repository at this point
Copy the full SHA 578445fView commit details -
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 08b4438 - Browse repository at this point
Copy the full SHA 08b4438View commit details
Commits on Mar 7, 2024
-
CryptoPkg: Fix ASN1 tag hardcode
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for dae7bfe - Browse repository at this point
Copy the full SHA dae7bfeView commit details
Commits on Mar 19, 2024
-
CryptoPkg: Update code format, copyright and GUID
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 9c3a481 - Browse repository at this point
Copy the full SHA 9c3a481View commit details -
CryptoPkg: Update parameter check to fix Fuzz
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for e83fbd8 - Browse repository at this point
Copy the full SHA e83fbd8View commit details -
CryptoPkg: Add Sha3 in unittest
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for ca87871 - Browse repository at this point
Copy the full SHA ca87871View commit details
Commits on Mar 20, 2024
-
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 0ae8e4e - Browse repository at this point
Copy the full SHA 0ae8e4eView commit details -
CryptoPkg: Fix the pkcs7 get cert fuzz
Signed-off-by: Wenxing Hou <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 707ab22 - Browse repository at this point
Copy the full SHA 707ab22View commit details