render / rpms / edk2

Forked from rpms/edk2 2 months ago
Clone

Blame SPECS/edk2.spec

7439a5
ExclusiveArch: x86_64 aarch64
7439a5
be6997
%define GITDATE        20220526
be6997
%define GITCOMMIT      16779ede2d36
7439a5
%define TOOLCHAIN      GCC5
7439a5
%define OPENSSL_VER    1.1.1k
7439a5
7439a5
%define qosb_testing 0
7439a5
%ifarch x86_64
7439a5
%define qosb_testing 1
7439a5
%endif
7439a5
7439a5
%define qemu_package qemu-kvm-core >= 2.12.0-89
7439a5
%define qemu_binary /usr/libexec/qemu-kvm
7439a5
7439a5
%define build_ovmf 0
7439a5
%define build_aarch64 0
7439a5
%ifarch x86_64
7439a5
  %define build_ovmf 1
7439a5
%endif
7439a5
%ifarch aarch64
7439a5
  %define build_aarch64 1
7439a5
%endif
7439a5
7439a5
Name:       edk2
7439a5
Version:    %{GITDATE}git%{GITCOMMIT}
be6997
Release:    3%{?dist}
7439a5
Summary:    UEFI firmware for 64-bit virtual machines
7439a5
License:    BSD-2-Clause-Patent and OpenSSL and MIT
7439a5
URL:        http://www.tianocore.org
7439a5
7439a5
# The source tarball is created using following commands:
be6997
# COMMIT=16779ede2d36
7439a5
# git archive --format=tar --prefix=edk2-$COMMIT/ $COMMIT \
7439a5
# | xz -9ev >/tmp/edk2-$COMMIT.tar.xz
be6997
Source0:edk2-%{GITCOMMIT}.tar.xz
7439a5
Source1: ovmf-whitepaper-c770f8c.txt
be6997
Source2: openssl-rhel-740e53ace8f6771c205bf84780e26bcd7a3275df.tar.xz
7439a5
Source3: ovmf-vars-generator
7439a5
Source4: LICENSE.qosb
7439a5
Source5: RedHatSecureBootPkKek1.pem
7439a5
7439a5
Source10: edk2-aarch64-verbose.json
7439a5
Source11: edk2-aarch64.json
7439a5
Source12: edk2-ovmf-sb.json
7439a5
Source13: edk2-ovmf.json
7439a5
Source14: edk2-ovmf-cc.json
7439a5
Source15: edk2-ovmf-amdsev.json
7439a5
be6997
Patch0002: 0002-Remove-submodules.patch
be6997
Patch0003: 0003-OvmfPkg-increase-max-debug-message-length-to-512-RHE.patch
be6997
Patch0004: 0004-MdeModulePkg-TerminalDxe-add-other-text-resolutions-.patch
be6997
Patch0005: 0005-MdeModulePkg-TerminalDxe-set-xterm-resolution-on-mod.patch
be6997
Patch0006: 0006-OvmfPkg-take-PcdResizeXterm-from-the-QEMU-command-li.patch
be6997
Patch0007: 0007-ArmVirtPkg-take-PcdResizeXterm-from-the-QEMU-command.patch
be6997
Patch0008: 0008-OvmfPkg-allow-exclusion-of-the-shell-from-the-firmwa.patch
be6997
Patch0009: 0009-ArmPlatformPkg-introduce-fixed-PCD-for-early-hello-m.patch
be6997
Patch0010: 0010-ArmPlatformPkg-PrePeiCore-write-early-hello-message-.patch
be6997
Patch0011: 0011-ArmVirtPkg-set-early-hello-message-RH-only.patch
be6997
Patch0012: 0012-OvmfPkg-enable-DEBUG_VERBOSE-RHEL-only.patch
be6997
Patch0013: 0013-OvmfPkg-silence-DEBUG_VERBOSE-0x00400000-in-QemuVide.patch
be6997
Patch0014: 0014-ArmVirtPkg-silence-DEBUG_VERBOSE-0x00400000-in-QemuR.patch
be6997
Patch0015: 0015-OvmfPkg-QemuRamfbDxe-Do-not-report-DXE-failure-on-Aa.patch
be6997
Patch0016: 0016-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-NvmExpre.patch
be6997
Patch0017: 0017-CryptoPkg-OpensslLib-list-RHEL8-specific-OpenSSL-fil.patch
be6997
Patch0018: 0018-OvmfPkg-QemuKernelLoaderFsDxe-suppress-error-on-no-k.patch
be6997
Patch0019: 0019-SecurityPkg-Tcg2Dxe-suppress-error-on-no-swtpm-in-si.patch
be6997
Patch0021: 0021-OvmfPkg-Remove-EbcDxe-RHEL-only.patch
be6997
Patch0022: 0022-ArmVirtPkg-Remove-EbcDxe-RHEL-only.patch
be6997
Patch0023: 0023-OvmfPkg-Remove-VirtioGpu-device-driver-RHEL-only.patch
be6997
Patch0024: 0024-OvmfPkg-Remove-VirtioFsDxe-filesystem-driver-RHEL-on.patch
be6997
Patch0025: 0025-ArmVirtPkg-Remove-VirtioFsDxe-filesystem-driver-RHEL.patch
be6997
Patch0026: 0026-OvmfPkg-Remove-UdfDxe-filesystem-driver-RHEL-only.patch
be6997
Patch0027: 0027-ArmVirtPkg-Remove-UdfDxe-filesystem-driver-RHEL-only.patch
be6997
Patch0028: 0028-OvmfPkg-Remove-TftpDynamicCommand-from-shell-RHEL-on.patch
be6997
Patch0029: 0029-ArmVirtPkg-Remove-TftpDynamicCommand-from-shell-RHEL.patch
be6997
Patch0030: 0030-OvmfPkg-Remove-HttpDynamicCommand-from-shell-RHEL-on.patch
be6997
Patch0031: 0031-ArmVirtPkg-Remove-HttpDynamicCommand-from-shell-RHEL.patch
be6997
Patch0032: 0032-OvmfPkg-Remove-LinuxInitrdDynamicShellCommand-RHEL-o.patch
be6997
Patch0033: 0033-ArmVirtPkg-Remove-LinuxInitrdDynamicShellCommand-RHE.patch
7439a5
7439a5
7439a5
# python3-devel and libuuid-devel are required for building tools.
7439a5
# python3-devel is also needed for varstore template generation and
7439a5
# verification with "ovmf-vars-generator".
7439a5
BuildRequires:  python3-devel
7439a5
BuildRequires:  libuuid-devel
7439a5
BuildRequires:  /usr/bin/iasl
7439a5
BuildRequires:  binutils gcc git gcc-c++ make
7439a5
7439a5
%if %{build_ovmf}
7439a5
# Only OVMF includes 80x86 assembly files (*.nasm*).
7439a5
BuildRequires:  nasm
7439a5
7439a5
# Only OVMF includes the Secure Boot feature, for which we need to separate out
7439a5
# the UEFI shell.
7439a5
BuildRequires:  dosfstools
7439a5
BuildRequires:  mtools
7439a5
BuildRequires:  xorriso
7439a5
7439a5
# For generating the variable store template with the default certificates
7439a5
# enrolled, we need the qemu-kvm executable.
7439a5
BuildRequires:  %{qemu_package}
7439a5
7439a5
%if %{qosb_testing}
7439a5
# For verifying SB enablement in the above variable store template, we need a
7439a5
# guest kernel that prints "Secure boot enabled".
7439a5
BuildRequires: kernel-core >= 4.18.0-161
7439a5
BuildRequires: rpmdevtools
7439a5
%endif
7439a5
7439a5
# endif build_ovmf
7439a5
%endif
7439a5
7439a5
7439a5
%package ovmf
7439a5
Summary:    UEFI firmware for x86_64 virtual machines
7439a5
BuildArch:  noarch
7439a5
Provides:   OVMF = %{version}-%{release}
7439a5
Obsoletes:  OVMF < 20180508-100.gitee3198e672e2.el7
7439a5
7439a5
# OVMF includes the Secure Boot and IPv6 features; it has a builtin OpenSSL
7439a5
# library.
7439a5
Provides:   bundled(openssl) = %{OPENSSL_VER}
7439a5
License:    BSD-2-Clause-Patent and OpenSSL
7439a5
7439a5
# URL taken from the Maintainers.txt file.
7439a5
URL:        http://www.tianocore.org/ovmf/
7439a5
7439a5
%description ovmf
7439a5
OVMF (Open Virtual Machine Firmware) is a project to enable UEFI support for
7439a5
Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU
7439a5
and KVM.
7439a5
7439a5
7439a5
%package aarch64
7439a5
Summary:    UEFI firmware for aarch64 virtual machines
7439a5
BuildArch:  noarch
7439a5
Provides:   AAVMF = %{version}-%{release}
7439a5
Obsoletes:  AAVMF < 20180508-100.gitee3198e672e2.el7
7439a5
7439a5
# No Secure Boot for AAVMF yet, but we include OpenSSL for the IPv6 stack.
7439a5
Provides:   bundled(openssl) = %{OPENSSL_VER}
7439a5
License:    BSD-2-Clause-Patent and OpenSSL
7439a5
7439a5
# URL taken from the Maintainers.txt file.
7439a5
URL:        https://github.com/tianocore/tianocore.github.io/wiki/ArmVirtPkg
7439a5
7439a5
%description aarch64
7439a5
AAVMF (ARM Architecture Virtual Machine Firmware) is an EFI Development Kit II
7439a5
platform that enables UEFI support for QEMU/KVM ARM Virtual Machines. This
7439a5
package contains a 64-bit build.
7439a5
7439a5
7439a5
%package tools
7439a5
Summary:        EFI Development Kit II Tools
7439a5
License:        BSD-2-Clause-Patent
7439a5
URL:            https://github.com/tianocore/tianocore.github.io/wiki/BaseTools
7439a5
%description tools
7439a5
This package provides tools that are needed to
7439a5
build EFI executables and ROMs using the GNU tools.
7439a5
7439a5
%package tools-doc
7439a5
Summary:        Documentation for EFI Development Kit II Tools
7439a5
BuildArch:      noarch
7439a5
License:        BSD-2-Clause-Patent
7439a5
URL:            https://github.com/tianocore/tianocore.github.io/wiki/BaseTools
7439a5
%description tools-doc
7439a5
This package documents the tools that are needed to
7439a5
build EFI executables and ROMs using the GNU tools.
7439a5
7439a5
%description
7439a5
EDK II is a modern, feature-rich, cross-platform firmware development
7439a5
environment for the UEFI and PI specifications. This package contains sample
7439a5
64-bit UEFI firmware builds for QEMU and KVM.
7439a5
7439a5
%prep
7439a5
# We needs some special git config options that %%autosetup won't give us.
7439a5
# We init the git dir ourselves, then tell %%autosetup not to blow it away.
7439a5
%setup -q -n edk2-%{GITCOMMIT}
7439a5
git init -q
7439a5
git config core.whitespace cr-at-eol
7439a5
git config am.keepcr true
7439a5
# -T is passed to %%setup to not re-extract the archive
7439a5
# -D is passed to %%setup to not delete the existing archive dir
7439a5
%autosetup -T -D -n edk2-%{GITCOMMIT} -S git_am
7439a5
7439a5
cp -a -- %{SOURCE1} %{SOURCE3} .
7439a5
cp -a -- %{SOURCE10} %{SOURCE11} %{SOURCE12} %{SOURCE13} %{SOURCE14} %{SOURCE15} .
7439a5
tar -C CryptoPkg/Library/OpensslLib -a -f %{SOURCE2} -x
7439a5
7439a5
# Format the Red Hat-issued certificate that is to be enrolled as both Platform
7439a5
# Key and first Key Exchange Key, as an SMBIOS OEM String. This means stripping
7439a5
# the PEM header and footer, and prepending the textual representation of the
7439a5
# GUID that identifies this particular OEM String to "EnrollDefaultKeys.efi",
7439a5
# plus the separator ":". For details, see
7439a5
# <https://bugzilla.tianocore.org/show_bug.cgi?id=1747> comments 2, 7, 14.
7439a5
sed \
7439a5
  -e 's/^-----BEGIN CERTIFICATE-----$/4e32566d-8e9e-4f52-81d3-5bb9715f9727:/' \
7439a5
  -e '/^-----END CERTIFICATE-----$/d' \
7439a5
  %{SOURCE5} \
7439a5
  > PkKek1.oemstr
7439a5
7439a5
# Done by %setup, but we do not use it for the auxiliary tarballs
7439a5
chmod -Rf a+rX,u+w,g-w,o-w .
7439a5
7439a5
%build
7439a5
export PYTHON_COMMAND=%{__python3}
7439a5
source ./edksetup.sh
7439a5
%make_build -C "$EDK_TOOLS_PATH" \
7439a5
  EXTRA_OPTFLAGS="%{optflags}" \
7439a5
  EXTRA_LDFLAGS="%{__global_ldflags}"
7439a5
7439a5
SMP_MFLAGS="%{?_smp_mflags}"
7439a5
if [[ x"$SMP_MFLAGS" = x-j* ]]; then
7439a5
        CC_FLAGS="$CC_FLAGS -n ${SMP_MFLAGS#-j}"
7439a5
elif [ -n "%{?jobs}" ]; then
7439a5
        CC_FLAGS="$CC_FLAGS -n %{?jobs}"
7439a5
fi
7439a5
7439a5
CC_FLAGS="$CC_FLAGS --cmd-len=65536 -t %{TOOLCHAIN} -b DEBUG --hash"
7439a5
CC_FLAGS="$CC_FLAGS -D NETWORK_IP6_ENABLE"
7439a5
CC_FLAGS="$CC_FLAGS -D NETWORK_HTTP_BOOT_ENABLE -D NETWORK_TLS_ENABLE"
7439a5
CC_FLAGS="$CC_FLAGS -D TPM2_ENABLE=TRUE"
7439a5
CC_FLAGS="$CC_FLAGS -D TPM1_ENABLE=FALSE"
7439a5
7439a5
OVMF_FLAGS="${CC_FLAGS}"
7439a5
OVMF_FLAGS="${OVMF_FLAGS} -D FD_SIZE_4MB"
7439a5
OVMF_FLAGS="${OVMF_FLAGS} -D PVSCSI_ENABLE=FALSE -D MPT_SCSI_ENABLE=FALSE"
7439a5
7439a5
OVMF_SB_FLAGS="${OVMF_FLAGS}"
7439a5
OVMF_SB_FLAGS="${OVMF_SB_FLAGS} -D SECURE_BOOT_ENABLE"
7439a5
OVMF_SB_FLAGS="${OVMF_SB_FLAGS} -D SMM_REQUIRE"
7439a5
OVMF_SB_FLAGS="${OVMF_SB_FLAGS} -D EXCLUDE_SHELL_FROM_FD"
7439a5
7439a5
7439a5
build_iso() {
7439a5
  dir="$1"
7439a5
  UEFI_SHELL_BINARY=${dir}/Shell.efi
7439a5
  ENROLLER_BINARY=${dir}/EnrollDefaultKeys.efi
7439a5
  UEFI_SHELL_IMAGE=uefi_shell.img
7439a5
  ISO_IMAGE=${dir}/UefiShell.iso
7439a5
7439a5
  UEFI_SHELL_BINARY_BNAME=$(basename -- "$UEFI_SHELL_BINARY")
7439a5
  UEFI_SHELL_SIZE=$(stat --format=%s -- "$UEFI_SHELL_BINARY")
7439a5
  ENROLLER_SIZE=$(stat --format=%s -- "$ENROLLER_BINARY")
7439a5
7439a5
  # add 1MB then 10% for metadata
7439a5
  UEFI_SHELL_IMAGE_KB=$((
7439a5
    (UEFI_SHELL_SIZE + ENROLLER_SIZE + 1 * 1024 * 1024) * 11 / 10 / 1024
7439a5
  ))
7439a5
7439a5
  # create non-partitioned FAT image
7439a5
  rm -f -- "$UEFI_SHELL_IMAGE"
7439a5
  mkdosfs -C "$UEFI_SHELL_IMAGE" -n UEFI_SHELL -- "$UEFI_SHELL_IMAGE_KB"
7439a5
7439a5
  # copy the shell binary into the FAT image
7439a5
  export MTOOLS_SKIP_CHECK=1
7439a5
  mmd   -i "$UEFI_SHELL_IMAGE"                       ::efi
7439a5
  mmd   -i "$UEFI_SHELL_IMAGE"                       ::efi/boot
7439a5
  mcopy -i "$UEFI_SHELL_IMAGE"  "$UEFI_SHELL_BINARY" ::efi/boot/bootx64.efi
7439a5
  mcopy -i "$UEFI_SHELL_IMAGE"  "$ENROLLER_BINARY"   ::
7439a5
  mdir  -i "$UEFI_SHELL_IMAGE"  -/                   ::
7439a5
7439a5
  # build ISO with FAT image file as El Torito EFI boot image
7439a5
  mkisofs -input-charset ASCII -J -rational-rock \
7439a5
    -e "$UEFI_SHELL_IMAGE" -no-emul-boot \
7439a5
    -o "$ISO_IMAGE" "$UEFI_SHELL_IMAGE"
7439a5
}
7439a5
7439a5
7439a5
%if %{build_ovmf}
7439a5
# Build with neither SB nor SMM; include UEFI shell.
7439a5
build ${OVMF_FLAGS} -a X64 \
7439a5
  -p OvmfPkg/OvmfPkgX64.dsc
7439a5
7439a5
# Build with SB and SMM; exclude UEFI shell.
7439a5
build ${OVMF_SB_FLAGS} -a IA32 -a X64 \
7439a5
  -p OvmfPkg/OvmfPkgIa32X64.dsc
7439a5
7439a5
# Build AmdSev
7439a5
touch OvmfPkg/AmdSev/Grub/grub.efi   # dummy
7439a5
build ${OVMF_FLAGS} -a X64 \
7439a5
  -p OvmfPkg/AmdSev/AmdSevX64.dsc
7439a5
7439a5
# Sanity check: the varstore templates must be identical.
7439a5
cmp Build/OvmfX64/DEBUG_%{TOOLCHAIN}/FV/OVMF_VARS.fd \
7439a5
  Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/FV/OVMF_VARS.fd
7439a5
7439a5
# Prepare an ISO image that boots the UEFI shell.
7439a5
build_iso Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/X64
7439a5
7439a5
# Enroll the default certificates in a separate variable store template.
7439a5
%{__python3} ovmf-vars-generator --verbose --verbose \
7439a5
  --qemu-binary        %{qemu_binary} \
7439a5
  --ovmf-binary        Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/FV/OVMF_CODE.fd \
7439a5
  --ovmf-template-vars Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/FV/OVMF_VARS.fd \
7439a5
  --uefi-shell-iso     Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/X64/UefiShell.iso \
7439a5
  --oem-string         "$(< PkKek1.oemstr)" \
7439a5
  --skip-testing \
7439a5
  Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/FV/OVMF_VARS.secboot.fd
7439a5
7439a5
# endif build_ovmf
7439a5
%endif
7439a5
7439a5
%if %{build_aarch64}
7439a5
# Build with a verbose debug mask first, and stash the binary.
7439a5
build ${CC_FLAGS} -a AARCH64 \
7439a5
  -p ArmVirtPkg/ArmVirtQemu.dsc \
7439a5
  -D DEBUG_PRINT_ERROR_LEVEL=0x8040004F
7439a5
cp -a Build/ArmVirtQemu-AARCH64/DEBUG_%{TOOLCHAIN}/FV/QEMU_EFI.fd \
7439a5
  Build/ArmVirtQemu-AARCH64/DEBUG_%{TOOLCHAIN}/FV/QEMU_EFI.verbose.fd
7439a5
7439a5
# Rebuild with a silent (errors only) debug mask.
7439a5
build ${CC_FLAGS} -a AARCH64 \
7439a5
  -p ArmVirtPkg/ArmVirtQemu.dsc \
7439a5
  -D DEBUG_PRINT_ERROR_LEVEL=0x80000000
7439a5
# endif build_aarch64
7439a5
%endif
7439a5
7439a5
7439a5
%install
7439a5
7439a5
cp -a OvmfPkg/License.txt License.OvmfPkg.txt
7439a5
cp -a CryptoPkg/Library/OpensslLib/openssl/LICENSE LICENSE.openssl
7439a5
mkdir -p %{buildroot}%{_datadir}/qemu/firmware
7439a5
7439a5
# install the tools
7439a5
mkdir -p %{buildroot}%{_bindir} \
7439a5
         %{buildroot}%{_datadir}/%{name}/Conf \
7439a5
         %{buildroot}%{_datadir}/%{name}/Scripts
7439a5
install BaseTools/Source/C/bin/* \
7439a5
        %{buildroot}%{_bindir}
7439a5
install BaseTools/BinWrappers/PosixLike/LzmaF86Compress \
7439a5
        %{buildroot}%{_bindir}
7439a5
install BaseTools/BuildEnv \
7439a5
        %{buildroot}%{_datadir}/%{name}
7439a5
install BaseTools/Conf/*.template \
7439a5
        %{buildroot}%{_datadir}/%{name}/Conf
7439a5
install BaseTools/Scripts/GccBase.lds \
7439a5
        %{buildroot}%{_datadir}/%{name}/Scripts
7439a5
7439a5
7439a5
%if %{build_ovmf}
7439a5
mkdir -p \
7439a5
  %{buildroot}%{_datadir}/OVMF \
7439a5
  %{buildroot}%{_datadir}/%{name}/ovmf
7439a5
7439a5
install -m 0644 Build/OvmfX64/DEBUG_%{TOOLCHAIN}/FV/OVMF_CODE.fd \
7439a5
  %{buildroot}%{_datadir}/%{name}/ovmf/OVMF_CODE.cc.fd
7439a5
install -m 0644 Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/FV/OVMF_CODE.fd \
7439a5
  %{buildroot}%{_datadir}/%{name}/ovmf/OVMF_CODE.secboot.fd
7439a5
7439a5
install -m 0644 Build/OvmfX64/DEBUG_%{TOOLCHAIN}/FV/OVMF_VARS.fd \
7439a5
  %{buildroot}%{_datadir}/%{name}/ovmf/OVMF_VARS.fd
7439a5
install -m 0644 Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/FV/OVMF_VARS.secboot.fd \
7439a5
  %{buildroot}%{_datadir}/%{name}/ovmf/OVMF_VARS.secboot.fd
7439a5
install -m 0644 Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/X64/UefiShell.iso \
7439a5
  %{buildroot}%{_datadir}/%{name}/ovmf/UefiShell.iso
7439a5
7439a5
install -m 0644 Build/AmdSev/DEBUG_%{TOOLCHAIN}/FV/OVMF.fd \
7439a5
  %{buildroot}%{_datadir}/%{name}/ovmf/OVMF.amdsev.fd
7439a5
7439a5
ln -s ../%{name}/ovmf/OVMF_CODE.secboot.fd %{buildroot}%{_datadir}/OVMF/
7439a5
ln -s ../%{name}/ovmf/OVMF_VARS.fd         %{buildroot}%{_datadir}/OVMF/
7439a5
ln -s ../%{name}/ovmf/OVMF_VARS.secboot.fd %{buildroot}%{_datadir}/OVMF/
7439a5
ln -s ../%{name}/ovmf/UefiShell.iso        %{buildroot}%{_datadir}/OVMF/
7439a5
7439a5
install -m 0644 Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/X64/Shell.efi \
7439a5
  %{buildroot}%{_datadir}/%{name}/ovmf/Shell.efi
7439a5
install -m 0644 Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/X64/EnrollDefaultKeys.efi \
7439a5
  %{buildroot}%{_datadir}/%{name}/ovmf/EnrollDefaultKeys.efi
7439a5
7439a5
install -m 0644 edk2-ovmf-sb.json \
7439a5
  %{buildroot}%{_datadir}/qemu/firmware/40-edk2-ovmf-sb.json
7439a5
install -m 0644 edk2-ovmf.json \
7439a5
  %{buildroot}%{_datadir}/qemu/firmware/50-edk2-ovmf.json
7439a5
install -m 0644 edk2-ovmf-cc.json \
7439a5
  %{buildroot}%{_datadir}/qemu/firmware/50-edk2-ovmf-cc.json
7439a5
install -m 0644 edk2-ovmf-amdsev.json \
7439a5
  %{buildroot}%{_datadir}/qemu/firmware/50-edk2-ovmf-amdsev.json
7439a5
7439a5
# endif build_ovmf
7439a5
%endif
7439a5
7439a5
%if %{build_aarch64}
7439a5
mkdir -p \
7439a5
  %{buildroot}%{_datadir}/AAVMF \
7439a5
  %{buildroot}%{_datadir}/%{name}/aarch64
7439a5
7439a5
# Pad and install the verbose binary.
7439a5
cat Build/ArmVirtQemu-AARCH64/DEBUG_%{TOOLCHAIN}/FV/QEMU_EFI.verbose.fd \
7439a5
  /dev/zero \
7439a5
| head -c 64m \
7439a5
  > %{buildroot}%{_datadir}/%{name}/aarch64/QEMU_EFI-pflash.raw
7439a5
7439a5
# Pad and install the silent (default) binary.
7439a5
cat Build/ArmVirtQemu-AARCH64/DEBUG_%{TOOLCHAIN}/FV/QEMU_EFI.fd \
7439a5
  /dev/zero \
7439a5
| head -c 64m \
7439a5
  > %{buildroot}%{_datadir}/%{name}/aarch64/QEMU_EFI-silent-pflash.raw
7439a5
7439a5
# Create varstore template.
7439a5
cat Build/ArmVirtQemu-AARCH64/DEBUG_%{TOOLCHAIN}/FV/QEMU_VARS.fd \
7439a5
  /dev/zero \
7439a5
| head -c 64m \
7439a5
  > %{buildroot}%{_datadir}/%{name}/aarch64/vars-template-pflash.raw
7439a5
7439a5
ln -s ../%{name}/aarch64/QEMU_EFI-pflash.raw \
7439a5
  %{buildroot}%{_datadir}/AAVMF/AAVMF_CODE.verbose.fd
7439a5
ln -s ../%{name}/aarch64/QEMU_EFI-silent-pflash.raw \
7439a5
  %{buildroot}%{_datadir}/AAVMF/AAVMF_CODE.fd
7439a5
ln -s ../%{name}/aarch64/vars-template-pflash.raw \
7439a5
  %{buildroot}%{_datadir}/AAVMF/AAVMF_VARS.fd
7439a5
7439a5
chmod 0644 -- %{buildroot}%{_datadir}/AAVMF/AAVMF_*.fd
7439a5
7439a5
install -m 0644 Build/ArmVirtQemu-AARCH64/DEBUG_%{TOOLCHAIN}/FV/QEMU_EFI.verbose.fd \
7439a5
  %{buildroot}%{_datadir}/%{name}/aarch64/QEMU_EFI.fd
7439a5
install -m 0644 Build/ArmVirtQemu-AARCH64/DEBUG_%{TOOLCHAIN}/FV/QEMU_EFI.fd \
7439a5
  %{buildroot}%{_datadir}/%{name}/aarch64/QEMU_EFI.silent.fd
7439a5
install -m 0644 Build/ArmVirtQemu-AARCH64/DEBUG_%{TOOLCHAIN}/FV/QEMU_VARS.fd \
7439a5
  %{buildroot}%{_datadir}/%{name}/aarch64/QEMU_VARS.fd
7439a5
7439a5
install -m 0644 edk2-aarch64.json \
7439a5
  %{buildroot}%{_datadir}/qemu/firmware/60-edk2-aarch64.json
7439a5
install -m 0644 edk2-aarch64-verbose.json \
7439a5
  %{buildroot}%{_datadir}/qemu/firmware/70-edk2-aarch64-verbose.json
7439a5
# endif build_aarch64
7439a5
%endif
7439a5
7439a5
7439a5
%check
7439a5
7439a5
%if %{qosb_testing}
7439a5
# Of the installed host kernels, boot the one with the highest Version-Release
7439a5
# under OVMF, and check if it prints "Secure boot enabled".
7439a5
KERNEL_PKG=$(rpm -q kernel-core | rpmdev-sort | tail -n 1)
7439a5
KERNEL_IMG=$(rpm -q -l $KERNEL_PKG | egrep '^/lib/modules/[^/]+/vmlinuz$')
7439a5
7439a5
%{__python3} ovmf-vars-generator --verbose --verbose \
7439a5
  --qemu-binary        %{qemu_binary} \
7439a5
  --ovmf-binary        Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/FV/OVMF_CODE.fd \
7439a5
  --ovmf-template-vars Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/FV/OVMF_VARS.fd \
7439a5
  --uefi-shell-iso     Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/X64/UefiShell.iso \
7439a5
  --kernel-path        $KERNEL_IMG \
7439a5
  --skip-enrollment \
7439a5
  --no-download \
7439a5
  Build/Ovmf3264/DEBUG_%{TOOLCHAIN}/FV/OVMF_VARS.secboot.fd
7439a5
7439a5
# endif qosb_testing
7439a5
%endif
7439a5
7439a5
7439a5
%global common_files \
7439a5
  %%license License.txt License.OvmfPkg.txt License-History.txt LICENSE.openssl \
7439a5
  %%dir %%{_datadir}/%%{name}/ \
7439a5
  %%dir %%{_datadir}/qemu \
7439a5
  %%dir %%{_datadir}/qemu/firmware
7439a5
7439a5
%if %{build_ovmf}
7439a5
%files ovmf
7439a5
%common_files
7439a5
%doc OvmfPkg/README
7439a5
%doc ovmf-whitepaper-c770f8c.txt
7439a5
%dir %{_datadir}/OVMF/
7439a5
%dir %{_datadir}/%{name}/ovmf/
7439a5
%{_datadir}/%{name}/ovmf/OVMF_CODE.cc.fd
7439a5
%{_datadir}/%{name}/ovmf/OVMF_CODE.secboot.fd
7439a5
%{_datadir}/%{name}/ovmf/OVMF_VARS.fd
7439a5
%{_datadir}/%{name}/ovmf/OVMF_VARS.secboot.fd
7439a5
%{_datadir}/%{name}/ovmf/OVMF.amdsev.fd
7439a5
%{_datadir}/%{name}/ovmf/UefiShell.iso
7439a5
%{_datadir}/OVMF/OVMF_CODE.secboot.fd
7439a5
%{_datadir}/OVMF/OVMF_VARS.fd
7439a5
%{_datadir}/OVMF/OVMF_VARS.secboot.fd
7439a5
%{_datadir}/OVMF/UefiShell.iso
7439a5
%{_datadir}/%{name}/ovmf/Shell.efi
7439a5
%{_datadir}/%{name}/ovmf/EnrollDefaultKeys.efi
7439a5
%{_datadir}/qemu/firmware/40-edk2-ovmf-sb.json
7439a5
%{_datadir}/qemu/firmware/50-edk2-ovmf-cc.json
7439a5
%{_datadir}/qemu/firmware/50-edk2-ovmf-amdsev.json
7439a5
%{_datadir}/qemu/firmware/50-edk2-ovmf.json
7439a5
# endif build_ovmf
7439a5
%endif
7439a5
7439a5
%if %{build_aarch64}
7439a5
%files aarch64
7439a5
%common_files
7439a5
%dir %{_datadir}/AAVMF/
7439a5
%dir %{_datadir}/%{name}/aarch64/
7439a5
%{_datadir}/%{name}/aarch64/QEMU_EFI-pflash.raw
7439a5
%{_datadir}/%{name}/aarch64/QEMU_EFI-silent-pflash.raw
7439a5
%{_datadir}/%{name}/aarch64/vars-template-pflash.raw
7439a5
%{_datadir}/AAVMF/AAVMF_CODE.verbose.fd
7439a5
%{_datadir}/AAVMF/AAVMF_CODE.fd
7439a5
%{_datadir}/AAVMF/AAVMF_VARS.fd
7439a5
%{_datadir}/%{name}/aarch64/QEMU_EFI.fd
7439a5
%{_datadir}/%{name}/aarch64/QEMU_EFI.silent.fd
7439a5
%{_datadir}/%{name}/aarch64/QEMU_VARS.fd
7439a5
%{_datadir}/qemu/firmware/60-edk2-aarch64.json
7439a5
%{_datadir}/qemu/firmware/70-edk2-aarch64-verbose.json
7439a5
# endif build_aarch64
7439a5
%endif
7439a5
7439a5
%files tools
7439a5
%license License.txt
7439a5
%license License-History.txt
7439a5
%{_bindir}/DevicePath
7439a5
%{_bindir}/EfiRom
7439a5
%{_bindir}/GenCrc32
7439a5
%{_bindir}/GenFfs
7439a5
%{_bindir}/GenFv
7439a5
%{_bindir}/GenFw
7439a5
%{_bindir}/GenSec
7439a5
%{_bindir}/LzmaCompress
7439a5
%{_bindir}/LzmaF86Compress
7439a5
%{_bindir}/TianoCompress
7439a5
%{_bindir}/VfrCompile
7439a5
%{_bindir}/VolInfo
7439a5
%dir %{_datadir}/%{name}
7439a5
%{_datadir}/%{name}/BuildEnv
7439a5
%{_datadir}/%{name}/Conf
7439a5
%{_datadir}/%{name}/Scripts
7439a5
7439a5
%files tools-doc
7439a5
%doc BaseTools/UserManuals/*.rtf
7439a5
7439a5
7439a5
%changelog
be6997
* Mon Aug 01 2022 Miroslav Rezanina <mrezanin@redhat.com> - 20220526git16779ede2d36-3
be6997
- edk2-openssl-jump-to-8.7.0-branch-2022-07-22.patch [bz#2074843]
be6997
- edk2-ovmf-vars-generator-Use-max-cpu.patch [bz#2111567]
be6997
- Resolves: bz#2074843
be6997
  (edk2: sync openssl sources with rhel openssl rpm)
be6997
- Resolves: bz#2111567
be6997
  (EDK2 build stuck with qemu-kvm-7.0.0-8.el9 or newer)
be6997
be6997
* Fri Jun 24 2022 Miroslav Rezanina <mrezanin@redhat.com> - 20220526git16779ede2d36-2
be6997
- edk2-OvmfPkg-Update-target-machines-config.patch [bz#2090752]
be6997
- Resolves: bz#2090752
be6997
  (Add RHEL 8.5, 8,6 and 9.x machine types to firmware descriptor files 50-edk2-ovmf-{amdsev,cc}.json)
be6997
be6997
* Mon Jun 13 2022 Miroslav Rezanina <mrezanin@redhat.com> - 20220526git16779ede2d36-1
be6997
- Rebase to edk2-stable-202205 [bz#2074831]
be6997
- Resolves: bz#2074831
be6997
  (rebase edk2 to May 2022 release (edk2-stable202205))
be6997
be6997
* Thu May 26 2022 Miroslav Rezanina <mrezanin@redhat.com> - 20220221gitb24306f15d-2
be6997
- edk2-Revert-ArmVirtPkg-Remove-QemuRamfbDxe-display-device.patch [bz#2087220]
be6997
- edk2-Revert-OvmfPkg-Remove-QemuRamfbDxe-display-device-dr.patch [bz#2087220]
be6997
- Resolves: bz#2087220
be6997
  (VNC display show "Guest has not initialized the display" when using ramfb + ovmf)
be6997
be6997
* Thu Mar 31 2022 Miroslav Rezanina <mrezanin@redhat.com> - 20220221gitb24306f15d-1
be6997
- Rebae to edk-stable-202202 [bz#2056910]
be6997
- Resolves: bz#2056910
be6997
  ([rebase] update edk2 to feb '22 release (edk2-stable202202xx))
be6997
be6997
* Wed Mar 23 2022 Miroslav Rezanina <mrezanin@redhat.com> - 20220126gitbb1bba3d77-4
be6997
- edk2-Revert-OvmfPkg-Remove-NvmExpressDxe-device-driver-RH.patch [bz#2044196]
be6997
- edk2-Revert-ArmVirtPkg-Remove-NvmExpressDxe-device-driver.patch [bz#2044196]
be6997
- Resolves: bz#2044196
be6997
  (RFE: [nvme-vfio] The virt-install interface throws info "Failed to set new efi boot target"  when install a vm on a hostdev nvme disk)
69e144
7439a5
* Wed Feb 23 2022 Miroslav Rezanina <mrezanin@redhat.com> - 20220126gitbb1bba3d77-3
7439a5
- edk2-spec-build-amdsev-variant.patch [bz#2054661]
7439a5
- edk2-OvmfPkg-AmdSev-SecretPei-Mark-SEV-launch-secret-area.patch [bz#2041755]
7439a5
- Resolves: bz#2054661
7439a5
  (RFE:  Support measured AMD SEV boot with kernel/initrd/cmdline in OVMF)
7439a5
- Resolves: bz#2041755
7439a5
  (Mark SEV launch secret area as reserved)
7439a5
7439a5
* Tue Feb 08 2022 Miroslav Rezanina <mrezanin@redhat.com> - 20220126gitbb1bba3d77-2
7439a5
- edk2-OvmfPkg-remove-unused-TPM-options-from-MicrovmX64.ds.patch [bz#1935497]
7439a5
- edk2-OvmfPkg-move-tcg-configuration-to-dsc-and-fdf-includ.patch [bz#1935497]
7439a5
- edk2-OvmfPkg-drop-TPM_CONFIG_ENABLE.patch [bz#1935497]
7439a5
- edk2-OvmfPkg-create-Tcg12ConfigPei.inf.patch [bz#1935497]
7439a5
- edk2-OvmfPkg-rework-TPM-configuration.patch [bz#1935497]
7439a5
- edk2-spec-adapt-specfile-to-build-option-changes-disable-.patch [bz#1935497]
7439a5
- Resolves: bz#1935497
7439a5
  (edk2  implements and/or uses the deprecated MD5 and SHA-1 algorithms by default)
7439a5
7439a5
* Tue Feb 01 2022 Miroslav Rezanina <mrezanin@redhat.com> - 20220126gitbb1bba3d77-1
7439a5
- Rebase to latest upstream release [bz#2018388]
7439a5
- Resolves: bz#2018388
7439a5
  ([rebase] update edk2 to nov '21 release (edk2-stable202111xx))
7439a5
7439a5
* Fri Jan 14 2022 Miroslav Rezanina <mrezanin@redhat.com> - 20210527gite1999b264f1f-8
7439a5
- edk2-Revert-advertise-OpenSSL-on-TianoCore-splash-screen-.patch [bz#2027286]
7439a5
- Resolves: bz#2027286
7439a5
  (Remove the customized boot splash logo patch)
7439a5
7439a5
* Mon Nov 01 2021 Miroslav Rezanina <mrezanin@redhat.com> - 20210527gite1999b264f1f-7
7439a5
- edk2-fix-tpm-build-options.patch [bz#2000396]
7439a5
- Resolves: bz#2000396
7439a5
  ([aarch64][RHEL9] The lack of TPMFinalLog in efi causes the tpm self-test in the guest to fail)
7439a5
7439a5
* Mon Aug 09 2021 Mohan Boddu <mboddu@redhat.com> - 20210527gite1999b264f1f-6
7439a5
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
7439a5
  Related: rhbz#1991688
7439a5
7439a5
* Fri Aug 06 2021 Miroslav Rezanina <mrezanin@redhat.com> - 20210527gite1999b264f1f-5
7439a5
- edk2-MdeModulePkg-PartitionDxe-Ignore-PMBR-BootIndicator-.patch [bz#1988760]
7439a5
- Resolves: bz#1988760
7439a5
  (edk2 does not ignore PMBR protective record BootIndicator as required by UEFI spec)
7439a5
7439a5
* Fri Jul 30 2021 Miroslav Rezanina <mrezanin@redhat.com> - 20210527gite1999b264f1f-4
7439a5
- edk2-spec-remove-Group-and-defattr.patch [bz#1983789]
7439a5
- edk2-spec-Add-BuildRequires-make.patch [bz#1983789]
7439a5
- edk2-spec-don-t-conditionalize-package-definitions.patch [bz#1983789]
7439a5
- edk2-spec-Use-autosetup-with-our-required-git-config-opti.patch [bz#1983789]
7439a5
- edk2-spec-Replace-ifarch-else-conditionals-with-build_XXX.patch [bz#1983789]
7439a5
- edk2-spec-Move-D-TPM_ENABLE-to-common-CC_FLAGS.patch [bz#1983789]
7439a5
- edk2-spec-Add-qemu_package-and-qemu_binary.patch [bz#1983789]
7439a5
- edk2-spec-Remove-extra-true-at-end-of-check.patch [bz#1983789]
7439a5
- edk2-spec-Move-check-to-between-install-and-files.patch [bz#1983789]
7439a5
- edk2-spec-Add-qosb_testing-macro.patch [bz#1983789]
7439a5
- edk2-spec-Split-out-build_iso-function.patch [bz#1983789]
7439a5
- edk2-spec-Replace-RPM_BUILD_ROOT-with-buildroot.patch [bz#1983789]
7439a5
- edk2-spec-Use-make_build-macro.patch [bz#1983789]
7439a5
- edk2-spec-Factor-out-OVMF_FLAGS-and-OVMF_SB_FLAGS.patch [bz#1983789]
7439a5
- edk2-spec-Don-t-put-build-output-in-the-top-directory.patch [bz#1983789]
7439a5
- edk2-spec-Centralize-non-firmware-install-files-at-the-to.patch [bz#1983789]
7439a5
- Resolves: bz#1983789
7439a5
  (Make spec easier to share with Fedora)
7439a5
7439a5
* Mon Jul 12 2021 Miroslav Rezanina <mrezanin@redhat.com> - 20210527gite1999b264f1f-3
7439a5
- edk2-OvmfPkg-Remove-PrintDxe-RHEL-only.patch [bz#1967747]
7439a5
- edk2-OvmfPkg-Remove-EbcDxe-RHEL-only.patch [bz#1967747]
7439a5
- edk2-ArmVirtPkg-Remove-EbcDxe-RHEL-only.patch [bz#1967747]
7439a5
- edk2-OvmfPkg-Remove-VirtioGpu-device-driver-RHEL-only.patch [bz#1967747]
7439a5
- edk2-OvmfPkg-Remove-QemuRamfbDxe-display-device-driver-RH.patch [bz#1967747]
7439a5
- edk2-ArmVirtPkg-Remove-QemuRamfbDxe-display-device-driver.patch [bz#1967747]
7439a5
- edk2-OvmfPkg-Remove-NvmExpressDxe-device-driver-RHEL-only.patch [bz#1967747]
7439a5
- edk2-ArmVirtPkg-Remove-NvmExpressDxe-device-driver-RHEL-o.patch [bz#1967747]
7439a5
- edk2-OvmfPkg-Remove-VirtioFsDxe-filesystem-driver-RHEL-on.patch [bz#1967747]
7439a5
- edk2-ArmVirtPkg-Remove-VirtioFsDxe-filesystem-driver-RHEL.patch [bz#1967747]
7439a5
- edk2-OvmfPkg-Remove-UdfDxe-filesystem-driver-RHEL-only.patch [bz#1967747]
7439a5
- edk2-ArmVirtPkg-Remove-UdfDxe-filesystem-driver-RHEL-only.patch [bz#1967747]
7439a5
- edk2-OvmfPkg-Remove-TftpDynamicCommand-from-shell-RHEL-on.patch [bz#1967747]
7439a5
- edk2-ArmVirtPkg-Remove-TftpDynamicCommand-from-shell-RHEL.patch [bz#1967747]
7439a5
- edk2-OvmfPkg-Remove-HttpDynamicCommand-from-shell-RHEL-on.patch [bz#1967747]
7439a5
- edk2-ArmVirtPkg-Remove-HttpDynamicCommand-from-shell-RHEL.patch [bz#1967747]
7439a5
- edk2-OvmfPkg-Remove-LinuxInitrdDynamicShellCommand-RHEL-o.patch [bz#1967747]
7439a5
- edk2-ArmVirtPkg-Remove-LinuxInitrdDynamicShellCommand-RHE.patch [bz#1967747]
7439a5
- edk2-OvmfPkg-Remove-Xen-Drivers-RHEL-only.patch [bz#1967747]
7439a5
- Resolves: bz#1967747
7439a5
  (edk2: review features and drivers shipped in RHEL)
7439a5
7439a5
* Fri Jul 02 2021 Miroslav Rezanina <mrezanin@redhat.com> - 20210527gite1999b264f1f-2
7439a5
- edk2-NetworkPkg-IScsiDxe-wrap-IScsiCHAP-source-files-to-8.patch [bz#1961100]
7439a5
- edk2-NetworkPkg-IScsiDxe-simplify-ISCSI_CHAP_AUTH_DATA.In.patch [bz#1961100]
7439a5
- edk2-NetworkPkg-IScsiDxe-clean-up-ISCSI_CHAP_AUTH_DATA.Ou.patch [bz#1961100]
7439a5
- edk2-NetworkPkg-IScsiDxe-clean-up-library-class-dependenc.patch [bz#1961100]
7439a5
- edk2-NetworkPkg-IScsiDxe-fix-potential-integer-overflow-i.patch [bz#1961100]
7439a5
- edk2-NetworkPkg-IScsiDxe-assert-that-IScsiBinToHex-always.patch [bz#1961100]
7439a5
- edk2-NetworkPkg-IScsiDxe-reformat-IScsiHexToBin-leading-c.patch [bz#1961100]
7439a5
- edk2-NetworkPkg-IScsiDxe-fix-IScsiHexToBin-hex-parsing.patch [bz#1961100]
7439a5
- edk2-NetworkPkg-IScsiDxe-fix-IScsiHexToBin-buffer-overflo.patch [bz#1961100]
7439a5
- edk2-NetworkPkg-IScsiDxe-check-IScsiHexToBin-return-value.patch [bz#1961100]
7439a5
- edk2-redhat-build-UefiShell.iso-with-xorriso-rather-than-.patch [bz#1971840]
7439a5
- Resolves: bz#1961100
7439a5
  (edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe [rhel-9.0])
7439a5
- Resolves: bz#1971840
7439a5
  (Please replace genisoimage with xorriso)
7439a5
7439a5
* Wed Jun 23 2021 Miroslav Rezanina <mrezanin@redhat.com> - 20210527gite1999b264f1f-1
7439a5
- Rebase to edk2-stable202105 [bz#1938254]
7439a5
- Sync edk2-MdeModulePkg-LzmaCustomDecompressLib-catch-4GB-uncom.patch from RHEL-8
7439a5
- Sync edk2-redhat-add-OVMF-binary-that-will-support-SEV-ES.patch from RHEL-8
7439a5
- Resolves: bz#1938254
7439a5
  ((edk2-rebase-rhel-9.0) - rebase edk2 to edk2-stable202105 for RHEL-9-Beta)
7439a5
7439a5
* Fri Jan 08 2021 Miroslav Rezanina <mrezanin@redhat.com> - 20200602gitca407c7246bf-1.el9
7439a5
- Include fixes to build in RHEL 9 environment (bz#1906468)
7439a5
- Resolves: bz#1906468
7439a5
  ([RHEL9][FTBFS] edk2 FTBFS on Red Hat Enterprise Linux 9.0.0 Alpha)
7439a5
7439a5
* Mon Nov 23 2020 Miroslav Rezanina <mrezanin@redhat.com> - 20200602gitca407c7246bf-4.el8
7439a5
- edk2-OvmfPkg-SmmControl2Dxe-negotiate-ICH9_LPC_SMI_F_CPU_.patch [bz#1849177]
7439a5
- edk2-OvmfPkg-CpuHotplugSmm-fix-CPU-hotplug-race-just-befo.patch [bz#1849177]
7439a5
- edk2-OvmfPkg-CpuHotplugSmm-fix-CPU-hotplug-race-just-afte.patch [bz#1849177]
7439a5
- edk2-CryptoPkg-OpensslLib-Upgrade-OpenSSL-to-1.1.1g.patch [bz#1893806]
7439a5
- edk2-redhat-bump-OpenSSL-dist-git-submodule-to-1.1.1g-RHE.patch [bz#1893806]
7439a5
- Resolves: bz#1849177
7439a5
  (OVMF: negotiate "SMI on VCPU hotplug" with QEMU)
7439a5
- Resolves: bz#1893806
7439a5
  (attempt advancing RHEL8 edk2's OpenSSL submodule to RHEL8 OpenSSL 1.1.1g (or later))
7439a5
7439a5
* Mon Aug 10 2020 Miroslav Rezanina <mrezanin@redhat.com> - 20200602gitca407c7246bf-3.el8
7439a5
- edk2-UefiCpuPkg-PiSmmCpuDxeSmm-pause-in-WaitForSemaphore-.patch [bz#1861718]
7439a5
- Resolves: bz#1861718
7439a5
  (Very slow boot when overcommitting CPU)
7439a5
7439a5
* Wed Jun 24 2020 Miroslav Rezanina <mrezanin@redhat.com> - 20200602gitca407c7246bf-2.el8
7439a5
- edk2-OvmfPkg-QemuKernelLoaderFsDxe-suppress-error-on-no-k.patch [bz#1844682]
7439a5
- edk2-OvmfPkg-GenericQemuLoadImageLib-log-Not-Found-at-INF.patch [bz#1844682]
7439a5
- edk2-SecurityPkg-Tcg2Dxe-suppress-error-on-no-swtpm-in-si.patch [bz#1844682]
7439a5
- Resolves: bz#1844682
7439a5
  (silent build of edk2-aarch64 logs DEBUG_ERROR messages that don't actually report serious errors)
7439a5
7439a5
* Sat Jun 13 2020 Miroslav Rezanina <mrezanin@redhat.com> - 20200602gitca407c7246bf-1.el8
7439a5
- Rebase to edk2-stable202005 [bz#1817035]
7439a5
- Resolves: bz#1817035
7439a5
  ((edk2-rebase-rhel-8.3) - rebase edk2 to upstream tag edk2-stable202005 for RHEL-8.3)
7439a5
7439a5
* Fri Mar 27 2020 Miroslav Rezanina <mrezanin@redhat.com> - 20190829git37eef91017ad-9.el8
7439a5
- edk2-OvmfPkg-QemuVideoDxe-unbreak-secondary-vga-and-bochs.patch [bz#1806359]
7439a5
- Resolves: bz#1806359
7439a5
  (bochs-display cannot show graphic wihout driver attach)
7439a5
7439a5
* Tue Feb 18 2020 Miroslav Rezanina <mrezanin@redhat.com> - 20190829git37eef91017ad-8.el8
7439a5
- edk2-MdeModulePkg-Enable-Disable-S3BootScript-dynamically.patch [bz#1801274]
7439a5
- edk2-MdeModulePkg-PiDxeS3BootScriptLib-Fix-potential-nume.patch [bz#1801274]
7439a5
- Resolves: bz#1801274
7439a5
  (CVE-2019-14563 edk2: numeric truncation in MdeModulePkg/PiDxeS3BootScriptLib [rhel-8])
7439a5
7439a5
* Tue Feb 11 2020 Miroslav Rezanina <mrezanin@redhat.com> - 20190829git37eef91017ad-7.el8
7439a5
- edk2-SecurityPkg-Fix-spelling-errors-PARTIAL-PICK.patch [bz#1751993]
7439a5
- edk2-SecurityPkg-DxeImageVerificationHandler-simplify-Ver.patch [bz#1751993]
7439a5
- edk2-SecurityPkg-DxeImageVerificationHandler-remove-else-.patch [bz#1751993]
7439a5
- edk2-SecurityPkg-DxeImageVerificationHandler-keep-PE-COFF.patch [bz#1751993]
7439a5
- edk2-SecurityPkg-DxeImageVerificationHandler-narrow-down-.patch [bz#1751993]
7439a5
- edk2-SecurityPkg-DxeImageVerificationHandler-fix-retval-o.patch [bz#1751993]
7439a5
- edk2-SecurityPkg-DxeImageVerificationHandler-remove-super.patch [bz#1751993]
7439a5
- edk2-SecurityPkg-DxeImageVerificationHandler-unnest-AddIm.patch [bz#1751993]
7439a5
- edk2-SecurityPkg-DxeImageVerificationHandler-eliminate-St.patch [bz#1751993]
7439a5
- edk2-SecurityPkg-DxeImageVerificationHandler-fix-retval-f.patch [bz#1751993]
7439a5
- edk2-SecurityPkg-DxeImageVerificationHandler-fix-imgexec-.patch [bz#1751993]
7439a5
- edk2-SecurityPkg-DxeImageVerificationHandler-fix-defer-vs.patch [bz#1751993]
7439a5
- Resolves: bz#1751993
7439a5
  (DxeImageVerificationLib handles "DENY execute on security violation" like "DEFER execute on security violation" [rhel8])
7439a5
7439a5
* Tue Jan 21 2020 Miroslav Rezanina <mrezanin@redhat.com> - 20190829git37eef91017ad-6.el8
7439a5
- edk2-UefiCpuPkg-PiSmmCpuDxeSmm-fix-2M-4K-page-splitting-r.patch [bz#1789335]
7439a5
- Resolves: bz#1789335
7439a5
  (VM with edk2 can't boot when setting memory with '-m 2001')
7439a5
7439a5
* Thu Jan 16 2020 Miroslav Rezanina <mrezanin@redhat.com> - 20190829git37eef91017ad-5.el8
7439a5
- edk2-MdeModulePkg-UefiBootManagerLib-log-reserved-mem-all.patch [bz#1789797]
7439a5
- edk2-NetworkPkg-HttpDxe-fix-32-bit-truncation-in-HTTPS-do.patch [bz#1789797]
7439a5
- Resolves: bz#1789797
7439a5
  (Backport upstream patch series: "UefiBootManagerLib, HttpDxe: tweaks for large HTTP(S) downloads" to improve HTTP(S) Boot experience with large (4GiB+) files)
7439a5
7439a5
* Wed Dec 11 2019 Miroslav Rezanina <mrezanin@redhat.com> - 20190829git37eef91017ad-4.el8
7439a5
- edk2-redhat-set-guest-RAM-size-to-768M-for-SB-varstore-te.patch [bz#1778301]
7439a5
- edk2-redhat-re-enable-Secure-Boot-varstore-template-verif.patch [bz#1778301]
7439a5
- Resolves: bz#1778301
7439a5
  (re-enable Secure Boot (varstore template) verification in %check)
7439a5
7439a5
* Thu Dec 05 2019 Miroslav Rezanina <mrezanin@redhat.com> - 20190829git37eef91017ad-3.el8
7439a5
- Update used openssl version [bz#1616029]
7439a5
- Resolves: bz#1616029
7439a5
  (rebuild edk2 against the final RHEL-8.2.0 version of OpenSSL-1.1.1)
7439a5
7439a5
* Mon Dec 02 2019 Miroslav Rezanina <mrezanin@redhat.com> - 20190829git37eef91017ad-2.el8
7439a5
- edk2-MdePkg-Include-Protocol-Tls.h-Add-the-data-type-of-E.patch [bz#1536624]
7439a5
- edk2-CryptoPkg-TlsLib-Add-the-new-API-TlsSetVerifyHost-CV.patch [bz#1536624]
7439a5
- edk2-CryptoPkg-Crt-turn-strchr-into-a-function-CVE-2019-1.patch [bz#1536624]
7439a5
- edk2-CryptoPkg-Crt-satisfy-inet_pton.c-dependencies-CVE-2.patch [bz#1536624]
7439a5
- edk2-CryptoPkg-Crt-import-inet_pton.c-CVE-2019-14553.patch [bz#1536624]
7439a5
- edk2-CryptoPkg-TlsLib-TlsSetVerifyHost-parse-IP-address-l.patch [bz#1536624]
7439a5
- edk2-NetworkPkg-TlsDxe-Add-the-support-of-host-validation.patch [bz#1536624]
7439a5
- edk2-NetworkPkg-HttpDxe-Set-the-HostName-for-the-verifica.patch [bz#1536624]
7439a5
- edk2-redhat-enable-HTTPS-Boot.patch [bz#1536624]
7439a5
- Resolves: bz#1536624
7439a5
  (HTTPS enablement in OVMF)
7439a5
7439a5
* Fri Nov 29 2019 Miroslav Rezanina <mrezanin@redhat.com> - 20190829git37eef91017ad-1.el8
7439a5
- Rebase to edk2-stable201908 [bz#1748180]
7439a5
- Resolves: bz#1748180
7439a5
  ((edk2-rebase-rhel-8.2) - rebase edk2 to upstream tag edk2-stable201908 for RHEL-8.2)
7439a5
7439a5
* Mon Aug 05 2019 Miroslav Rezanina <mrezanin@redhat.com> - 20190308git89910a39dcfd-6.el8
7439a5
- edk2-ArmVirtPkg-silence-DEBUG_VERBOSE-masking-0x00400000-.patch [bz#1714446]
7439a5
- edk2-OvmfPkg-QemuRamfbDxe-Do-not-report-DXE-failure-on-Aa.patch [bz#1714446]
7439a5
- edk2-ArmPkg-DebugPeCoffExtraActionLib-debugger-commands-a.patch [bz#1714446]
7439a5
- Resolves: bz#1714446
7439a5
  (edk2-aarch64 silent build is not silent enough)
7439a5
7439a5
* Tue Jul 02 2019 Miroslav Rezanina <mrezanin@redhat.com> - 20190308git89910a39dcfd-5.el8
7439a5
- edk2-redhat-add-D-TPM2_ENABLE-to-the-edk2-ovmf-build-flag.patch [bz#1693205]
7439a5
- Resolves: bz#1693205
7439a5
  (edk2: Enable TPM2 support)
7439a5
7439a5
* Tue Jun 11 2019 Miroslav Rezanina <mrezanin@redhat.com> - 20190308git89910a39dcfd-4.el8
7439a5
- edk2-OvmfPkg-raise-the-PCIEXBAR-base-to-2816-MB-on-Q35.patch [bz#1666941]
7439a5
- edk2-OvmfPkg-PlatformPei-set-32-bit-UC-area-at-PciBase-Pc.patch [bz#1666941]
7439a5
- Resolves: bz#1666941
7439a5
  (UEFI guest cannot boot into os when setting some special memory size)
7439a5
7439a5
* Tue Apr 09 2019 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20190308git89910a39dcfd-2.el8
7439a5
- edk2-redhat-provide-firmware-descriptor-meta-files.patch [bz#1600230]
7439a5
- Resolves: bz#1600230
7439a5
  ([RHEL 8.1] RFE: provide firmware descriptor meta-files for the edk2-ovmf and edk2-aarch64 firmware images)
7439a5
7439a5
* Mon Apr 08 2019 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20190308git89910a39dcfd-1.el8
7439a5
- Rebase to edk2-20190308git89910a39dcfd
7439a5
7439a5
* Mon Jan 21 2019 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20180508gitee3198e672e2-9.el8
7439a5
- edk2-BaseTools-Fix-UEFI-and-Tiano-Decompression-logic-iss.patch [bz#1662184]
7439a5
- edk2-MdePkg-BaseUefiDecompressLib-Fix-UEFI-Decompression-.patch [bz#1662184]
7439a5
- edk2-IntelFrameworkModulePkg-Fix-UEFI-and-Tiano-Decompres.patch [bz#1662184]
7439a5
- edk2-git-Use-HTTPS-support.patch []
7439a5
- Resolves: bz#1662184
7439a5
  (backport fix for (theoretical?) regression introduced by earlier CVE fixes)
7439a5
7439a5
* Wed Nov 21 2018 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20180508gitee3198e672e2-8.el8
7439a5
- edk2-NetworkPkg-UefiPxeBcDxe-Add-EXCLUSIVE-attribute-when.patch [bz#1643377]
7439a5
- Resolves: bz#1643377
7439a5
  (Exception when grubx64.efi used for UEFI netboot)
7439a5
7439a5
* Tue Nov 06 2018 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20180508gitee3198e672e2-5.el8
7439a5
- edk2-MdeModulePkg-Variable-Fix-Timestamp-zeroing-issue-on.patch [bz#1641436]
7439a5
- edk2-MdePkg-Add-more-checker-in-UefiDecompressLib-to-acce.patch [bz#1641449 bz#1641453 bz#1641464 bz#1641469]
7439a5
- edk2-IntelFrameworkModulePkg-Add-more-checker-in-UefiTian.patch [bz#1641453 bz#1641464 bz#1641469]
7439a5
- edk2-BaseTools-Add-more-checker-in-Decompress-algorithm-t.patch [bz#1641445 bz#1641453 bz#1641464 bz#1641469]
7439a5
- Resolves: bz#1641436
7439a5
  (CVE-2018-3613 edk2: Logic error in MdeModulePkg in EDK II firmware allows for privilege escalation by authenticated users [rhel-8])
7439a5
- Resolves: bz#1641445
7439a5
  (CVE-2017-5731 edk2: Privilege escalation via processing of malformed files in TianoCompress.c [rhel-8])
7439a5
- Resolves: bz#1641449
7439a5
  (CVE-2017-5732 edk2: Privilege escalation via processing of malformed files in BaseUefiDecompressLib.c [rhel-8])
7439a5
- Resolves: bz#1641453
7439a5
  (CVE-2017-5733 edk2: Privilege escalation via heap-based buffer overflow in MakeTable() function [rhel-8])
7439a5
- Resolves: bz#1641464
7439a5
  (CVE-2017-5734 edk2: Privilege escalation via stack-based buffer overflow in MakeTable() function [rhel-8])
7439a5
- Resolves: bz#1641469
7439a5
  (CVE-2017-5735 edk2: Privilege escalation via heap-based buffer overflow in Decode() function [rhel-8])
7439a5
7439a5
* Tue Sep 04 2018 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20180508gitee3198e672e2-5.el8
7439a5
- edk2-BaseTools-footer.makefile-expand-BUILD_CFLAGS-last-f.patch [bz#1607906]
7439a5
- edk2-BaseTools-header.makefile-remove-c-from-BUILD_CFLAGS.patch [bz#1607906]
7439a5
- edk2-BaseTools-Source-C-split-O2-to-BUILD_OPTFLAGS.patch [bz#1607906]
7439a5
- edk2-BaseTools-Source-C-take-EXTRA_OPTFLAGS-from-the-call.patch [bz#1607906]
7439a5
- edk2-BaseTools-Source-C-take-EXTRA_LDFLAGS-from-the-calle.patch [bz#1607906]
7439a5
- edk2-BaseTools-VfrCompile-honor-EXTRA_LDFLAGS.patch [bz#1607906]
7439a5
- edk2-redhat-inject-the-RPM-compile-and-link-options-to-th.patch [bz#1607906]
7439a5
- Resolves: bz#1607906
7439a5
  (edk2-tools: Does not use RPM build flags)
7439a5
7439a5
* Wed Aug 08 2018 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20180508gitee3198e672e2-4.el8
7439a5
- edk2-redhat-provide-virtual-bundled-OpenSSL-in-edk2-ovmf-.patch [bz#1607801]
7439a5
- Resolves: bz#1607801
7439a5
  (add 'Provides: bundled(openssl) = 1.1.0h' to the spec file)
7439a5
7439a5
* Tue Jul 24 2018 Danilo Cesar Lemes de Paula <ddepaula@redhat.com> - 20180508gitee3198e672e2-3.el8
7439a5
- edk2-redhat-Provide-and-Obsolete-OVMF-and-AAVMF.patch [bz#1596148]
7439a5
- edk2-ArmVirtPkg-unify-HttpLib-resolutions-in-ArmVirt.dsc..patch [bz#1536627]
7439a5
- edk2-ArmVirtPkg-ArmVirtQemu-enable-the-IPv6-stack.patch [bz#1536627]
7439a5
- edk2-advertise-OpenSSL-due-to-IPv6-enablement-too-RHEL-on.patch [bz#1536627]
7439a5
- edk2-redhat-add-D-NETWORK_IP6_ENABLE-to-the-build-flags.patch [bz#1536627]
7439a5
- edk2-redhat-update-license-fields-and-files-in-the-spec-f.patch [bz#1536627]
7439a5
- Resolves: bz#1536627
7439a5
  (IPv6 enablement in OVMF)
7439a5
- Resolves: bz#1596148
7439a5
  (restore Provides/Obsoletes macros for OVMF and AAVMF, from RHEL-8 Alpha)
7439a5
7439a5
* Tue Jul 10 2018 Danilo C. L. de Paula <ddepaula@redhat.com> - 20180508gitee3198e672e2-2.el8
7439a5
- Rebase edk2 on top of 20180508gitee3198e672e2
7439a5
7439a5
* Fri Jun 08 2018 Miroslav Rezanina <mrezanin@redhat.com> - 20180508-2.gitee3198e672e2
7439a5
- OvmfPkg/PlatformBootManagerLib: connect consoles unconditionally [bz#1577546]
7439a5
- build OVMF varstore template with SB enabled / certs enrolled [bz#1561128]
7439a5
- connect Virtio RNG devices again [bz#1579518]
7439a5
- Resolves: bz#1577546
7439a5
  (no input consoles connected under certain circumstances)
7439a5
- Resolves: bz#1561128
7439a5
  (OVMF Secure boot enablement (enrollment of default keys))
7439a5
- Resolves: bz#1579518
7439a5
  (EFI_RNG_PROTOCOL no longer produced for virtio-rng)
7439a5
* Wed Dec 06 2017 Miroslav Rezanina <mrezanin@redhat.com> - 20171011-4.git92d07e48907f.el7
7439a5
- ovmf-MdeModulePkg-Core-Dxe-log-informative-memprotect-msg.patch [bz#1520485]
7439a5
- ovmf-MdeModulePkg-BdsDxe-fall-back-to-a-Boot-Manager-Menu.patch [bz#1515418]
7439a5
- Resolves: bz#1515418
7439a5
  (RFE: Provide diagnostics for failed boot)
7439a5
- Resolves: bz#1520485
7439a5
  (AAVMF: two new messages with silent build)
7439a5
7439a5
* Fri Dec 01 2017 Miroslav Rezanina <mrezanin@redhat.com> - 20171011-3.git92d07e48907f.el7
7439a5
- ovmf-UefiCpuPkg-CpuDxe-Fix-multiple-entries-of-RT_CODE-in.patch [bz#1518308]
7439a5
- ovmf-MdeModulePkg-DxeCore-Filter-out-all-paging-capabilit.patch [bz#1518308]
7439a5
- ovmf-MdeModulePkg-Core-Merge-memory-map-after-filtering-p.patch [bz#1518308]
7439a5
- Resolves: bz#1518308
7439a5
  (UEFI memory map regression (runtime code entry splitting) introduced by c1cab54ce57c)
7439a5
7439a5
* Mon Nov 27 2017 Miroslav Rezanina <mrezanin@redhat.com> - 20171011-2.git92d07e48907f.el7
7439a5
- ovmf-MdeModulePkg-Bds-Remove-assertion-in-BmCharToUint.patch [bz#1513632]
7439a5
- ovmf-MdeModulePkg-Bds-Check-variable-name-even-if-OptionN.patch [bz#1513632]
7439a5
- ovmf-MdeModulePkg-PciBus-Fix-bug-that-PCI-BUS-claims-too-.patch [bz#1514105]
7439a5
- ovmf-OvmfPkg-make-it-a-proper-BASE-library.patch [bz#1488247]
7439a5
- ovmf-OvmfPkg-create-a-separate-PlatformDebugLibIoPort-ins.patch [bz#1488247]
7439a5
- ovmf-OvmfPkg-save-on-I-O-port-accesses-when-the-debug-por.patch [bz#1488247]
7439a5
- ovmf-OvmfPkg-enable-DEBUG_VERBOSE-RHEL-only.patch [bz#1488247]
7439a5
- ovmf-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-QemuVide.patch [bz#1488247]
7439a5
- ovmf-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-NvmExpre.patch [bz#1488247]
7439a5
- ovmf-Revert-redhat-introduce-separate-silent-and-verbose-.patch [bz#1488247]
7439a5
- Resolves: bz#1488247
7439a5
  (make debug logging no-op unless a debug console is active)
7439a5
- Resolves: bz#1513632
7439a5
  ([RHEL-ALT 7.5] AAVMF fails to boot after setting BootNext)
7439a5
- Resolves: bz#1514105
7439a5
  (backport edk2 commit 6e3287442774 so that PciBusDxe not over-claim resources)
7439a5
7439a5
* Wed Oct 18 2017 Miroslav Rezanina <mrezanin@redhat.com> - 20171011-1.git92d07e48907f.el7
7439a5
- Rebase to 92d07e48907f [bz#1469787]
7439a5
- Resolves: bz#1469787
7439a5
  ((ovmf-rebase-rhel-7.5) Rebase OVMF for RHEL-7.5)
7439a5
- Resolves: bz#1434740
7439a5
  (OvmfPkg/PciHotPlugInitDxe: don't reserve IO space when IO support is disabled)
7439a5
- Resolves: bz#1434747
7439a5
  ([Q35] code12 error when hotplug x710 device in win2016)
7439a5
- Resolves: bz#1447027
7439a5
  (Guest cannot boot with 240 or above vcpus when using ovmf)
7439a5
- Resolves: bz#1458192
7439a5
  ([Q35] recognize "usb-storage" devices in XHCI ports)
7439a5
- Resolves: bz#1468526
7439a5
  (>1TB RAM support)
7439a5
- Resolves: bz#1488247
7439a5
  (provide "OVMF_CODE.secboot.verbose.fd" for log capturing; silence "OVMF_CODE.secboot.fd")
7439a5
- Resolves: bz#1496170
7439a5
  (Inconsistent MOR control variables exposed by OVMF, breaks Windows Device Guard)
7439a5
7439a5
* Fri May 12 2017 Miroslav Rezanina <mrezanin@redhat.com> - 20170228-5.gitc325e41585e3.el7
7439a5
- ovmf-OvmfPkg-EnrollDefaultKeys-update-SignatureOwner-GUID.patch [bz#1443351]
7439a5
- ovmf-OvmfPkg-EnrollDefaultKeys-expose-CertType-parameter-.patch [bz#1443351]
7439a5
- ovmf-OvmfPkg-EnrollDefaultKeys-blacklist-empty-file-in-db.patch [bz#1443351]
7439a5
- ovmf-OvmfPkg-introduce-the-FD_SIZE_IN_KB-macro-build-flag.patch [bz#1443351]
7439a5
- ovmf-OvmfPkg-OvmfPkg.fdf.inc-extract-VARS_LIVE_SIZE-and-V.patch [bz#1443351]
7439a5
- ovmf-OvmfPkg-introduce-4MB-flash-image-mainly-for-Windows.patch [bz#1443351]
7439a5
- ovmf-OvmfPkg-raise-max-variable-size-auth-non-auth-to-33K.patch [bz#1443351]
7439a5
- ovmf-OvmfPkg-PlatformPei-handle-non-power-of-two-spare-si.patch [bz#1443351]
7439a5
- ovmf-redhat-update-local-build-instructions-with-D-FD_SIZ.patch [bz#1443351]
7439a5
- ovmf-redhat-update-OVMF-build-commands-with-D-FD_SIZE_4MB.patch [bz#1443351]
7439a5
- Resolves: bz#1443351
7439a5
  ([svvp][ovmf] job "Secure Boot Logo Test" failed  with q35&ovmf)
7439a5
7439a5
* Fri Apr 28 2017 Miroslav Rezanina <mrezanin@redhat.com> - 20170228-4.gitc325e41585e3.el7
7439a5
- ovmf-ShellPkg-Shell-clean-up-bogus-member-types-in-SPLIT_.patch [bz#1442908]
7439a5
- ovmf-ShellPkg-Shell-eliminate-double-free-in-RunSplitComm.patch [bz#1442908]
7439a5
- Resolves: bz#1442908
7439a5
  (Guest hang when running a wrong command in Uefishell)
7439a5
7439a5
* Tue Apr 04 2017 Miroslav Rezanina <mrezanin@redhat.com> - 20170228-3.gitc325e41585e3.el7
7439a5
- ovmf-ArmVirtPkg-FdtClientDxe-supplement-missing-EFIAPI-ca.patch [bz#1430262]
7439a5
- ovmf-ArmVirtPkg-ArmVirtPL031FdtClientLib-unconditionally-.patch [bz#1430262]
7439a5
- ovmf-MdeModulePkg-RamDiskDxe-fix-C-string-literal-catenat.patch [bz#1430262]
7439a5
- ovmf-EmbeddedPkg-introduce-EDKII-Platform-Has-ACPI-GUID.patch [bz#1430262]
7439a5
- ovmf-EmbeddedPkg-introduce-PlatformHasAcpiLib.patch [bz#1430262]
7439a5
- ovmf-EmbeddedPkg-introduce-EDKII-Platform-Has-Device-Tree.patch [bz#1430262]
7439a5
- ovmf-ArmVirtPkg-add-PlatformHasAcpiDtDxe.patch [bz#1430262]
7439a5
- ovmf-ArmVirtPkg-enable-AcpiTableDxe-and-EFI_ACPI_TABLE_PR.patch [bz#1430262]
7439a5
- ovmf-ArmVirtPkg-FdtClientDxe-install-DT-as-sysconfig-tabl.patch [bz#1430262]
7439a5
- ovmf-ArmVirtPkg-PlatformHasAcpiDtDxe-don-t-expose-DT-if-Q.patch [bz#1430262]
7439a5
- ovmf-ArmVirtPkg-remove-PURE_ACPI_BOOT_ENABLE-and-PcdPureA.patch [bz#1430262]
7439a5
- Resolves: bz#1430262
7439a5
  (AAVMF: forward QEMU's DT to the guest OS only if ACPI payload is unavailable)
7439a5
7439a5
* Mon Mar 27 2017 Miroslav Rezanina <mrezanin@redhat.com> - 20170228-2.gitc325e41585e3.el7
7439a5
- ovmf-MdeModulePkg-Core-Dxe-downgrade-CodeSegmentCount-is-.patch [bz#1433428]
7439a5
- Resolves: bz#1433428
7439a5
  (AAVMF: Fix error message during ARM guest VM installation)
7439a5
7439a5
* Wed Mar 08 2017 Laszlo Ersek <lersek@redhat.com> - ovmf-20170228-1.gitc325e41585e3.el7
7439a5
- Rebase to upstream c325e41585e3 [bz#1416919]
7439a5
- Resolves: bz#1373812
7439a5
  (guest boot from network even set 'boot order=1' for virtio disk with OVMF)
7439a5
- Resolves: bz#1380282
7439a5
  (Update OVMF to openssl-1.0.2k-hobbled)
7439a5
- Resolves: bz#1412313
7439a5
  (select broadcast SMI if available)
7439a5
- Resolves: bz#1416919
7439a5
  (Rebase OVMF for RHEL-7.4)
7439a5
- Resolves: bz#1426330
7439a5
  (disable libssl in CryptoPkg)
7439a5
7439a5
* Mon Sep 12 2016 Laszlo Ersek <lersek@redhat.com> - ovmf-20160608b-1.git988715a.el7
7439a5
- rework downstream-only commit dde83a75b566 "setup the tree for the secure
7439a5
  boot feature (RHEL only)", excluding patent-encumbered files from the
7439a5
  upstream OpenSSL 1.0.2g tarball [bz#1374710]
7439a5
- rework downstream-only commit dfc3ca1ee509 "CryptoPkg/OpensslLib: Upgrade
7439a5
  OpenSSL version to 1.0.2h", excluding patent-encumbered files from the
7439a5
  upstream OpenSSL 1.0.2h tarball [bz#1374710]
7439a5
7439a5
* Thu Aug 04 2016 Miroslav Rezanina <mrezanin@redhat.com> - OVMF-20160608-3.git988715a.el7
7439a5
- ovmf-MdePkg-PCI-Add-missing-PCI-PCIE-definitions.patch [bz#1332408]
7439a5
- ovmf-ArmPlatformPkg-NorFlashDxe-accept-both-non-secure-an.patch [bz#1353494]
7439a5
- ovmf-ArmVirtPkg-ArmVirtQemu-switch-secure-boot-build-to-N.patch [bz#1353494]
7439a5
- ovmf-ArmPlatformPkg-NorFlashAuthenticatedDxe-remove-this-.patch [bz#1353494]
7439a5
- ovmf-ArmVirtPkg-add-FDF-definition-for-empty-varstore.patch [bz#1353494]
7439a5
- ovmf-redhat-package-the-varstore-template-produced-by-the.patch [bz#1353494]
7439a5
- ovmf-ArmVirtPkg-Re-add-the-Driver-Health-Manager.patch [bz#1353494]
7439a5
- ovmf-ArmVirtPkg-HighMemDxe-allow-patchable-PCD-for-PcdSys.patch [bz#1353494]
7439a5
- ovmf-ArmVirtPkg-ArmVirtQemuKernel-make-ACPI-support-AARCH.patch [bz#1353494]
7439a5
- ovmf-ArmVirtPkg-align-ArmVirtQemuKernel-with-ArmVirtQemu.patch [bz#1353494]
7439a5
- ovmf-ArmVirtPkg-ArmVirtQemu-factor-out-shared-FV.FvMain-d.patch [bz#1353494]
7439a5
- ovmf-ArmVirtPkg-factor-out-Rules-FDF-section.patch [bz#1353494]
7439a5
- ovmf-ArmVirtPkg-add-name-GUIDs-to-FvMain-instances.patch [bz#1353494]
7439a5
- ovmf-OvmfPkg-add-a-Name-GUID-to-each-Firmware-Volume.patch [bz#1353494]
7439a5
- ovmf-OvmfPkg-PlatformBootManagerLib-remove-stale-FvFile-b.patch [bz#1353494]
7439a5
- ovmf-MdePkg-IndustryStandard-introduce-EFI_PCI_CAPABILITY.patch [bz#1332408]
7439a5
- ovmf-MdeModulePkg-PciBusDxe-look-for-the-right-capability.patch [bz#1332408]
7439a5
- ovmf-MdeModulePkg-PciBusDxe-recognize-hotplug-capable-PCI.patch [bz#1332408]
7439a5
- ovmf-OvmfPkg-add-PciHotPlugInitDxe.patch [bz#1332408]
7439a5
- ovmf-ArmPkg-ArmGicLib-manage-GICv3-SPI-state-at-the-distr.patch [bz#1356655]
7439a5
- ovmf-ArmVirtPkg-PlatformBootManagerLib-remove-stale-FvFil.patch [bz#1353494]
7439a5
- ovmf-OvmfPkg-EnrollDefaultKeys-assign-Status-before-readi.patch [bz#1356913]
7439a5
- ovmf-OvmfPkg-EnrollDefaultKeys-silence-VS2015x86-warning-.patch [bz#1356913]
7439a5
- ovmf-CryptoPkg-update-openssl-to-ignore-RVCT-3079.patch [bz#1356184]
7439a5
- ovmf-CryptoPkg-Fix-typos-in-comments.patch [bz#1356184]
7439a5
- ovmf-CryptoPkg-BaseCryptLib-Avoid-passing-NULL-ptr-to-fun.patch [bz#1356184]
7439a5
- ovmf-CryptoPkg-BaseCryptLib-Init-the-content-of-struct-Ce.patch [bz#1356184]
7439a5
- ovmf-CryptoPkg-OpensslLib-Upgrade-OpenSSL-version-to-1.0..patch [bz#1356184]
7439a5
- Resolves: bz#1332408
7439a5
  (Q35 machine can not hot-plug scsi controller under switch)
7439a5
- Resolves: bz#1353494
7439a5
  ([OVMF] "EFI Internal Shell" should be removed from "Boot Manager")
7439a5
- Resolves: bz#1356184
7439a5
  (refresh embedded OpenSSL to 1.0.2h)
7439a5
- Resolves: bz#1356655
7439a5
  (AAVMF: stop accessing unmapped gicv3 registers)
7439a5
- Resolves: bz#1356913
7439a5
  (fix use-without-initialization in EnrollDefaultKeys.efi)
7439a5
7439a5
* Tue Jul 12 2016 Miroslav Rezanina <mrezanin@redhat.com> - OVMF-20160608-2.git988715a.el7
7439a5
- ovmf-ArmPkg-ArmGicV3Dxe-configure-all-interrupts-as-non-s.patch [bz#1349407]
7439a5
- ovmf-ArmVirtPkg-PlatformBootManagerLib-Postpone-the-shell.patch [bz#1353689]
7439a5
- Resolves: bz#1349407
7439a5
  (AArch64: backport fix to run over gicv3 emulation)
7439a5
- Resolves: bz#1353689
7439a5
  (AAVMF: Drops to shell with uninitialized NVRAM file)
7439a5
7439a5
* Thu Jun 9 2016 Laszlo Ersek <lersek@redhat.com> - ovmf-20160608-1.git988715a.el7
7439a5
- Resolves: bz#1341733
7439a5
  (prevent SMM stack overflow in OVMF while enrolling certificates in "db")
7439a5
- Resolves: bz#1257882
7439a5
  (FEAT: support to boot from virtio 1.0 modern devices)
7439a5
- Resolves: bz#1333238
7439a5
  (Q35 machine can not boot up successfully with more than 3 virtio-scsi
7439a5
  storage controller under switch)
7439a5
- Resolves: bz#1330955
7439a5
  (VM can not be booted up from hard disk successfully when with a passthrough
7439a5
  USB stick)
7439a5
7439a5
* Thu May 19 2016 Laszlo Ersek <lersek@redhat.com> - ovmf-20160419-2.git90bb4c5.el7
7439a5
- Submit scratch builds from the exploded tree again to
7439a5
  supp-rhel-7.3-candidate, despite FatPkg being OSS at this point; see
7439a5
  bz#1329559.
7439a5
7439a5
* Wed Apr 20 2016 Laszlo Ersek <lersek@redhat.com> - ovmf-20160419-1.git90bb4c5.el7
7439a5
- FatPkg is under the 2-clause BSDL now; "ovmf" has become OSS
7439a5
- upgrade to openssl-1.0.2g
7439a5
- Resolves: bz#1323363
7439a5
  (remove "-D SECURE_BOOT_ENABLE" from AAVMF)
7439a5
- Resolves: bz#1257882
7439a5
  (FEAT: support to boot from virtio 1.0 modern devices)
7439a5
- Resolves: bz#1308678
7439a5
  (clearly separate SB-less, SMM-less OVMF binary from SB+SMM OVMF binary)
7439a5
7439a5
* Fri Feb 19 2016 Miroslav Rezanina <mrezanin@redhat.com> - OVMF-20160202-2.gitd7c0dfa.el7
7439a5
- ovmf-restore-TianoCore-splash-logo-without-OpenSSL-advert.patch [bz#1308678]
7439a5
- ovmf-OvmfPkg-ArmVirtPkg-show-OpenSSL-less-logo-without-Se.patch [bz#1308678]
7439a5
- ovmf-OvmfPkg-simplify-VARIABLE_STORE_HEADER-generation.patch [bz#1308678]
7439a5
- ovmf-redhat-bring-back-OVMF_CODE.fd-but-without-SB-and-wi.patch [bz#1308678]
7439a5
- ovmf-redhat-rename-OVMF_CODE.smm.fd-to-OVMF_CODE.secboot..patch [bz#1308678]
7439a5
7439a5
* Tue Feb 2 2016 Laszlo Ersek <lersek@redhat.com> - ovmf-20160202-1.gitd7c0dfa.el7
7439a5
- rebase to upstream d7c0dfa
7439a5
- update OpenSSL to 1.0.2e (upstream)
7439a5
- update FatPkg to SVN r97 (upstream)
7439a5
- drive NVMe devices (upstream)
7439a5
- resize xterm on serial console mode change, when requested with
7439a5
  -fw_cfg name=opt/(ovmf|aavmf)/PcdResizeXterm,string=y
7439a5
  (downstream)
7439a5
- Resolves: bz#1259395
7439a5
  (revert / roll back AAVMF fix for BZ 1188054)
7439a5
- Resolves: bz#1202819
7439a5
  (OVMF: secure boot limitations)
7439a5
- Resolves: bz#1182495
7439a5
  (OVMF rejects iPXE oprom when Secure Boot is enabled)
7439a5
7439a5
* Thu Nov 5 2015 Laszlo Ersek <lersek@redhat.com> - ovmf-20151104-1.gitb9ffeab.el7
7439a5
- rebase to upstream b9ffeab
7439a5
- Resolves: bz#1207554
7439a5
  ([AAVMF] AArch64: populate SMBIOS)
7439a5
- Resolves: bz#1270279
7439a5
  (AAVMF: output improvements)
7439a5
7439a5
* Thu Jun 25 2015 Miroslav Rezanina <mrezanin@redhat.com> - OVMF-20150414-2.gitc9e5618.el7
7439a5
- ovmf-OvmfPkg-PlatformPei-set-SMBIOS-entry-point-version-d.patch [bz#1232876]
7439a5
- Resolves: bz#1232876
7439a5
  (OVMF should install a version 2.8 SMBIOS entry point)
7439a5
7439a5
* Sat Apr 18 2015 Laszlo Ersek <lersek@redhat.com> - 20150414-1.gitc9e5618.el7
7439a5
- rebase from upstream 9ece15a to c9e5618
7439a5
- adapt .gitignore files
7439a5
- update to openssl-0.9.8zf
7439a5
- create Logo-OpenSSL.bmp rather than modifying Logo.bmp in-place
7439a5
- update to FatPkg SVN r93 (git 8ff136aa)
7439a5
- drop the following downstream-only patches (obviated by upstream
7439a5
  counterparts):
7439a5
  "tools_def.template: use forward slash with --add-gnu-debuglink (RHEL only)"
7439a5
  "tools_def.template: take GCC48 prefixes from environment (RHEL only)"
7439a5
  "OvmfPkg: set video resolution of text setup to 640x480 (RHEL only)"
7439a5
  "OvmfPkg: resolve OrderedCollectionLib with base red-black tree instance"
7439a5
  "OvmfPkg: AcpiPlatformDxe: actualize QemuLoader.h comments"
7439a5
  "OvmfPkg: AcpiPlatformDxe: remove current ACPI table loader"
7439a5
  "OvmfPkg: AcpiPlatformDxe: implement QEMU's full ACPI table loader interface"
7439a5
  "OvmfPkg: QemuVideoDxe: fix querying of QXL's drawable buffer size"
7439a5
  "OvmfPkg: disable stale fork of SecureBootConfigDxe"
7439a5
  "OvmfPkg: SecureBootConfigDxe: remove stale fork"
7439a5
  "Try to read key strike even when ..."
7439a5
  "OvmfPkg: BDS: remove dead call to PlatformBdsEnterFrontPage()"
7439a5
  "OvmfPkg: BDS: drop useless return statement"
7439a5
  "OvmfPkg: BDS: don't overwrite the BDS Front Page timeout"
7439a5
  "OvmfPkg: BDS: optimize second argument in PlatformBdsEnterFrontPage() call"
7439a5
  'OvmfPkg: BDS: drop superfluous "connect first boot option" logic'
7439a5
  "OvmfPkg: BDS: drop custom boot timeout, revert to IntelFrameworkModulePkg's"
7439a5
  "Add comments to clarify mPubKeyStore buffer MemCopy. ..."
7439a5
  "MdeModulePkg/SecurityPkg Variable: Add boundary check..."
7439a5
  "OvmfPkg: AcpiPlatformDxe: make dependency on PCI enumeration explicit"
7439a5
  "MdePkg: UefiScsiLib: do not encode LUN in CDB for READ and WRITE"
7439a5
  "MdePkg: UefiScsiLib: do not encode LUN in CDB for other SCSI commands"
7439a5
- merge downstream AAVMF patch "adapt packaging to Arm64", which forces us to
7439a5
  rename the main package from "OVMF" to "ovmf"
7439a5
- drop the following ARM BDS specific tweaks (we'll only build the Intel BDS):
7439a5
  "ArmPlatformPkg/Bds: generate ESP Image boot option if user pref is unset
7439a5
   (Acadia)"
7439a5
  "ArmPlatformPkg/Bds: check for other defaults too if user pref is unset
7439a5
   (Acadia)"
7439a5
  "ArmPlatformPkg/ArmVirtualizationPkg: auto-detect boot path (Acadia)"
7439a5
  "ArmPlatformPkg/Bds: initialize ConIn/ConOut/ErrOut before connecting
7439a5
   terminals"
7439a5
  "ArmPlatformPkg/Bds: let FindCandidate() search all filesystems"
7439a5
  "ArmPlatformPkg/Bds: FindCandidateOnHandle(): log full device path"
7439a5
  "ArmPlatformPkg/Bds: fall back to Boot Menu when no default option was found"
7439a5
  "ArmPlatformPkg/Bds: always connect drivers before looking at boot options"
7439a5
- drop patch "ArmPlatformPkg/ArmVirtualizationPkg: enable DEBUG_VERBOSE (Acadia
7439a5
  only)", obsoleted by fixed bug 1197141
7439a5
- tweak patch "write up build instructions (for interactive, local development)
7439a5
  (RHELSA)". The defaults in "BaseTools/Conf/target.template", ie.
7439a5
  ACTIVE_PLATFORM and TARGET_ARCH, are set for OVMF / X64. The AAVMF build
7439a5
  instructions now spell out the necessary override options (-p and -a,
7439a5
  respectively).
7439a5
- extend patch "build FAT driver from source (RHELSA)" to the Xen build as well
7439a5
  (only for consistency; we don't build for Xen).
7439a5
- drop the following downstream-only AAVMF patches, due to the 77d5dac ->
7439a5
  c9e5618 AAVMF rebase & join:
7439a5
  "redhat/process-rh-specific.sh: fix check for hunk-less filtered patches"
7439a5
  "redhat/process-rh-specific.sh: suppress missing files in final 'rm'"
7439a5
  "ArmVirtualizationQemu: build UEFI shell from source (Acadia only)"
7439a5
  "MdePkg: UefiScsiLib: do not encode LUN in CDB for READ and WRITE"
7439a5
  "MdePkg: UefiScsiLib: do not encode LUN in CDB for other SCSI commands"
7439a5
  "ArmVirtualizationPkg: work around cache incoherence on KVM affecting DTB"
7439a5
  "Changed build target to supp-rhel-7.1-candidate"
7439a5
  "ArmVirtualizationPkg: VirtFdtDxe: forward FwCfg addresses from DTB to PCDs"
7439a5
  "ArmVirtualizationPkg: introduce QemuFwCfgLib instance for DXE drivers"
7439a5
  "ArmVirtualizationPkg: clone PlatformIntelBdsLib from ArmPlatformPkg"
7439a5
  "ArmVirtualizationPkg: PlatformIntelBdsLib: add basic policy"
7439a5
  "OvmfPkg: extract QemuBootOrderLib"
7439a5
  "OvmfPkg: QemuBootOrderLib: featurize PCI-like device path translation"
7439a5
  "OvmfPkg: introduce VIRTIO_MMIO_TRANSPORT_GUID"
7439a5
  "ArmVirtualizationPkg: VirtFdtDxe: use dedicated VIRTIO_MMIO_TRANSPORT_GUID"
7439a5
  "OvmfPkg: QemuBootOrderLib: widen ParseUnitAddressHexList() to UINT64"
7439a5
  "OvmfPkg: QemuBootOrderLib: OFW-to-UEFI translation for virtio-mmio"
7439a5
  "ArmVirtualizationPkg: PlatformIntelBdsLib: adhere to QEMU's boot order"
7439a5
  "ArmVirtualizationPkg: identify "new shell" as builtin shell for Intel BDS"
7439a5
  "ArmVirtualizationPkg: Intel BDS: load EFI-stubbed Linux kernel from fw_cfg"
7439a5
  'Revert "ArmVirtualizationPkg: work around cache incoherence on KVM affecting
7439a5
   DTB"'
7439a5
  "OvmfPkg: QemuBootOrderLib: expose QEMU's "-boot menu=on[, splash-time=N]""
7439a5
  "OvmfPkg: PlatformBdsLib: get front page timeout from QEMU"
7439a5
  "ArmVirtualizationPkg: PlatformIntelBdsLib: get front page timeout from QEMU"
7439a5
  "ArmPkg: ArmArchTimerLib: clean up comments"
7439a5
  "ArmPkg: ArmArchTimerLib: use edk2-conformant (UINT64 * UINT32) / UINT32"
7439a5
  "ArmPkg: ArmArchTimerLib: conditionally rebase to actual timer frequency"
7439a5
  "ArmVirtualizationQemu: ask the hardware for the timer frequency"
7439a5
  "ArmPkg: DebugPeCoffExtraActionLib: debugger commands are not errors"
7439a5
  "ArmPlatformPkg: PEIM startup is not an error"
7439a5
  "ArmVirtualizationPkg: PlatformIntelBdsLib: lack of QEMU kernel is no error"
7439a5
  "ArmVirtualizationPkg: expose debug message bitmask on build command line"
7439a5
- tweak patch "rebase to upstream 77d5dac (Acadia only)": update spec changelog
7439a5
  only
7439a5
- tweak patch "spec: build AAVMF with the Intel BDS driver (RHELSA only)":
7439a5
  apply "-D INTEL_BDS" to manual build instructions in redhat/README too
7439a5
- tweak patch "spec: build and install verbose and silent (default) AAVMF
7439a5
  binaries": apply DEBUG_PRINT_ERROR_LEVEL setting to interactive build
7439a5
  instructions in redhat/README too
7439a5
- install OVMF whitepaper as part of the OVMF build's documentation
7439a5
- Resolves: bz#1211337
7439a5
  (merge AAVMF into OVMF)
7439a5
- Resolves: bz#1206523
7439a5
  ([AAVMF] fix missing cache maintenance)
7439a5
7439a5
* Fri Mar 06 2015 Miroslav Rezanina <mrezanin@redhat.com> - AAVMF-20141113-5.git77d5dac.el7_1
7439a5
- aavmf-ArmPkg-DebugPeCoffExtraActionLib-debugger-commands-a.patch [bz#1197141]
7439a5
- aavmf-ArmPlatformPkg-PEIM-startup-is-not-an-error.patch [bz#1197141]
7439a5
- aavmf-ArmVirtualizationPkg-PlatformIntelBdsLib-lack-of-QEM.patch [bz#1197141]
7439a5
- aavmf-ArmVirtualizationPkg-expose-debug-message-bitmask-on.patch [bz#1197141]
7439a5
- aavmf-spec-build-and-install-verbose-and-silent-default-AA.patch [bz#1197141]
7439a5
- Resolves: bz#1197141
7439a5
  (create silent & verbose builds)
7439a5
7439a5
* Tue Feb 10 2015 Miroslav Rezanina <mrezanin@redhat.com> - AAVMF-20141113-4.git77d5dac.el7
7439a5
- aavmf-ArmPkg-ArmArchTimerLib-clean-up-comments.patch [bz#1188247]
7439a5
- aavmf-ArmPkg-ArmArchTimerLib-use-edk2-conformant-UINT64-UI.patch [bz#1188247]
7439a5
- aavmf-ArmPkg-ArmArchTimerLib-conditionally-rebase-to-actua.patch [bz#1188247]
7439a5
- aavmf-ArmVirtualizationQemu-ask-the-hardware-for-the-timer.patch [bz#1188247]
7439a5
- aavmf-ArmPkg-TimerDxe-smack-down-spurious-timer-interrupt-.patch [bz#1188054]
7439a5
- Resolves: bz#1188054
7439a5
  (guest reboot (asked from within AAVMF) regressed in 3.19.0-0.rc5.58.aa7a host kernel)
7439a5
- Resolves: bz#1188247
7439a5
  (backport "fix gBS->Stall()" series)
7439a5
7439a5
* Mon Jan 19 2015 Miroslav Rezanina <mrezanin@redhat.com> - AAVMF-20141113-3.git77d5dac.el7
7439a5
- aavmf-OvmfPkg-QemuBootOrderLib-expose-QEMU-s-boot-menu-on-.patch [bz#1172756]
7439a5
- aavmf-OvmfPkg-PlatformBdsLib-get-front-page-timeout-from-Q.patch [bz#1172756]
7439a5
- aavmf-ArmVirtualizationPkg-PlatformIntelBdsLib-get-front-p.patch [bz#1172756]
7439a5
- Resolves: bz#1172756
7439a5
  ([RFE]Expose boot-menu shortcut to domain via AAVMF)
7439a5
7439a5
* Wed Jan 14 2015 Miroslav Rezanina <mrezanin@redhat.com> - AAVMF-20141113-2.git77d5dac.el7
7439a5
- aavmf-ArmVirtualizationPkg-VirtFdtDxe-forward-FwCfg-addres.patch [bz#1172749]
7439a5
- aavmf-ArmVirtualizationPkg-introduce-QemuFwCfgLib-instance.patch [bz#1172749]
7439a5
- aavmf-ArmVirtualizationPkg-clone-PlatformIntelBdsLib-from-.patch [bz#1172749]
7439a5
- aavmf-ArmVirtualizationPkg-PlatformIntelBdsLib-add-basic-p.patch [bz#1172749]
7439a5
- aavmf-OvmfPkg-extract-QemuBootOrderLib.patch [bz#1172749]
7439a5
- aavmf-OvmfPkg-QemuBootOrderLib-featurize-PCI-like-device-p.patch [bz#1172749]
7439a5
- aavmf-OvmfPkg-introduce-VIRTIO_MMIO_TRANSPORT_GUID.patch [bz#1172749]
7439a5
- aavmf-ArmVirtualizationPkg-VirtFdtDxe-use-dedicated-VIRTIO.patch [bz#1172749]
7439a5
- aavmf-OvmfPkg-QemuBootOrderLib-widen-ParseUnitAddressHexLi.patch [bz#1172749]
7439a5
- aavmf-OvmfPkg-QemuBootOrderLib-OFW-to-UEFI-translation-for.patch [bz#1172749]
7439a5
- aavmf-ArmVirtualizationPkg-PlatformIntelBdsLib-adhere-to-Q.patch [bz#1172749]
7439a5
- aavmf-ArmVirtualizationPkg-identify-new-shell-as-builtin-s.patch [bz#1172749]
7439a5
- aavmf-ArmVirtualizationPkg-Intel-BDS-load-EFI-stubbed-Linu.patch [bz#1172749]
7439a5
- aavmf-spec-build-AAVMF-with-the-Intel-BDS-driver-RHELSA-on.patch [bz#1172749]
7439a5
- aavmf-Revert-ArmVirtualizationPkg-work-around-cache-incohe.patch [bz#1172910]
7439a5
- Resolves: bz#1172749
7439a5
  (implement fw_cfg, boot order handling, and -kernel booting in ArmVirtualizationQemu)
7439a5
- Resolves: bz#1172910
7439a5
  (revert Acadia-only workaround (commit df7bca4e) once Acadia host kernel (KVM) is fixed)
7439a5
7439a5
* Fri Dec 05 2014 Miroslav Rezanina <mrezanin@redhat.com> - OVMF-20140822-7.git9ece15a.el7
7439a5
- ovmf-MdePkg-UefiScsiLib-do-not-encode-LUN-in-CDB-for-READ.patch [bz#1166971]
7439a5
- ovmf-MdePkg-UefiScsiLib-do-not-encode-LUN-in-CDB-for-othe.patch [bz#1166971]
7439a5
- Resolves: bz#1166971
7439a5
  (virtio-scsi disks and cd-roms with nonzero LUN are rejected with errors)
7439a5
7439a5
* Tue Nov 25 2014 Miroslav Rezanina <mrezanin@redhat.com> - OVMF-20140822-6.git9ece15a.el7
7439a5
- ovmf-OvmfPkg-AcpiPlatformDxe-make-dependency-on-PCI-enume.patch [bz#1166027]
7439a5
- Resolves: bz#1166027
7439a5
  (backport "OvmfPkg: AcpiPlatformDxe: make dependency on PCI enumeration explicit")
7439a5
7439a5
* Tue Nov 18 2014 Miroslav Rezanina <mrezanin@redhat.com> - OVMF-20140822-4.git9ece15a.el7
7439a5
- ovmf-Add-comments-to-clarify-mPubKeyStore-buffer-MemCopy.patch [bz#1162314]
7439a5
- ovmf-MdeModulePkg-SecurityPkg-Variable-Add-boundary-check.patch [bz#1162314]
7439a5
- Resolves: bz#1162314
7439a5
 (EMBARGOED OVMF: uefi: INTEL-TA-201410-001 && INTEL-TA-201410-002 [rhel-7.1])
7439a5
7439a5
* Thu Nov 13 2014 Laszlo Ersek <lersek@redhat.com> - AAVMF-20141113-1.git77d5dac
7439a5
- rebased to upstream 77d5dac
7439a5
  <https://bugzilla.redhat.com/show_bug.cgi?id=1162314#c1>
7439a5
- patch "ArmVirtualizationPkg: FdtPL011SerialPortLib: support UEFI_APPLICATION"
7439a5
  is now upstream (SVN r16219, git edb5073)
7439a5
7439a5
* Thu Nov 13 2014 Miroslav Rezanina <mrezanin@redhat.com> - OVMF-20140822-3.git9ece15a.el7
7439a5
- ovmf-Revert-OvmfPkg-set-video-resolution-of-text-setup-to.patch [bz#1153927]
7439a5
- ovmf-Try-to-read-key-strike-even-when-the-TimeOuts-value-.patch [bz#1153927]
7439a5
- ovmf-OvmfPkg-BDS-remove-dead-call-to-PlatformBdsEnterFron.patch [bz#1153927]
7439a5
- ovmf-OvmfPkg-BDS-drop-useless-return-statement.patch [bz#1153927]
7439a5
- ovmf-OvmfPkg-BDS-don-t-overwrite-the-BDS-Front-Page-timeo.patch [bz#1153927]
7439a5
- ovmf-OvmfPkg-BDS-optimize-second-argument-in-PlatformBdsE.patch [bz#1153927]
7439a5
- ovmf-OvmfPkg-BDS-drop-superfluous-connect-first-boot-opti.patch [bz#1153927]
7439a5
- ovmf-OvmfPkg-BDS-drop-custom-boot-timeout-revert-to-Intel.patch [bz#1153927]
7439a5
- ovmf-OvmfPkg-set-video-resolution-of-text-setup-to-640x48.patch [bz#1153927]
7439a5
- Resolves: bz#1153927
7439a5
  (set NEXTBOOT to uefi setting failed from Windows Recovery console)
7439a5
7439a5
* Tue Nov 11 2014 Miroslav Rezanina <mrezanin@redhat.com> - OVMF-20140822-2.git9ece15a
7439a5
- ovmf-redhat-process-rh-specific.sh-suppress-missing-files.patch [bz#1145784]
7439a5
- ovmf-Revert-RH-only-OvmfPkg-QemuVideoDxe-fix-querying-of-.patch [bz#1145784]
7439a5
- ovmf-Revert-RH-only-OvmfPkg-AcpiPlatformDxe-implement-QEM.patch [bz#1145784]
7439a5
- ovmf-Revert-RH-only-OvmfPkg-AcpiPlatformDxe-remove-curren.patch [bz#1145784]
7439a5
- ovmf-Revert-RH-only-OvmfPkg-AcpiPlatformDxe-actualize-Qem.patch [bz#1145784]
7439a5
- ovmf-Revert-RH-only-OvmfPkg-resolve-OrderedCollectionLib-.patch [bz#1145784]
7439a5
- ovmf-OvmfPkg-QemuVideoDxe-work-around-misreported-QXL-fra.patch [bz#1145784]
7439a5
- ovmf-OvmfPkg-resolve-OrderedCollectionLib-with-base-red-b.patch [bz#1145784]
7439a5
- ovmf-OvmfPkg-AcpiPlatformDxe-actualize-QemuLoader.h-comme.patch [bz#1145784]
7439a5
- ovmf-OvmfPkg-AcpiPlatformDxe-remove-current-ACPI-table-lo.patch [bz#1145784]
7439a5
- ovmf-OvmfPkg-AcpiPlatformDxe-implement-QEMU-s-full-ACPI-t.patch [bz#1145784]
7439a5
- ovmf-spec-build-small-bootable-ISO-with-standalone-UEFI-s.patch [bz#1147592]
7439a5
- ovmf-OvmfPkg-allow-exclusion-of-the-shell-from-the-firmwa.patch [bz#1147592]
7439a5
- ovmf-spec-exclude-the-UEFI-shell-from-the-SecureBoot-enab.patch [bz#1147592]
7439a5
- ovmf-OvmfPkg-EnrollDefaultKeys-application-for-enrolling-.patch [bz#1148296]
7439a5
- ovmf-spec-package-EnrollDefaultKeys.efi-on-UefiShell.iso-.patch [bz#1148296]
7439a5
- ovmf-OvmfPkg-disable-stale-fork-of-SecureBootConfigDxe.patch [bz#1148294]
7439a5
- ovmf-OvmfPkg-SecureBootConfigDxe-remove-stale-fork.patch [bz#1148294]
7439a5
- Resolves: bz#1145784
7439a5
  (OVMF sync with QXL and ACPI patches up to edk2 7a9612ce)
7439a5
- Resolves: bz#1147592
7439a5
  (the binary RPM should include a small ISO file with a directly bootable UEFI shell binary)
7439a5
- Resolves: bz#1148294
7439a5
  (drop OvmfPkg's stale fork of SecureBootConfigDxe)
7439a5
- Resolves: bz#1148296
7439a5
  (provide a non-interactive way to auto-enroll important SecureBoot certificates)
7439a5
7439a5
* Wed Oct 15 2014 Laszlo Ersek <lersek@redhat.com> - AAVMF-20141015-1.gitc373687
7439a5
- ported packaging to aarch64 / AAVMF
7439a5
7439a5
* Fri Aug 22 2014 Laszlo Ersek <lersek@redhat.com> - 20140822-1.git9ece15a.el7
7439a5
- rebase from upstream 3facc08 to 9ece15a
7439a5
- update to openssl-0.9.8zb
7439a5
- update to FatPkg SVN r86 (git 2355ea2c)
7439a5
- the following patches of Paolo Bonzini have been merged in upstream; drop the
7439a5
  downstream-only copies:
7439a5
  7bc1421 edksetup.sh: Look for BuildEnv under EDK_TOOLS_PATH
7439a5
  d549344 edksetup.sh: Ensure that WORKSPACE points to the top of an edk2
7439a5
          checkout
7439a5
  1c023eb BuildEnv: remove useless check before setting $WORKSPACE
7439a5
- include the following patches that have been pending review on the upstream
7439a5
  list for a long time:
7439a5
  [PATCH 0/4] OvmfPkg: complete client for QEMU's ACPI loader interface
7439a5
  http://thread.gmane.org/gmane.comp.bios.tianocore.devel/8369
7439a5
  [PATCH] OvmfPkg: QemuVideoDxe: fix querying of QXL's drawable buffer size
7439a5
  http://thread.gmane.org/gmane.comp.bios.tianocore.devel/8515
7439a5
- nasm is a build-time dependency now because upstream BuildTools has started
7439a5
  to call it directly
7439a5
7439a5
* Wed Jul 23 2014 Laszlo Ersek <lersek@redhat.com> - 20140723-1.git3facc08.el7
7439a5
- rebase from upstream a618eaa to 3facc08
7439a5
- update to openssl-0.9.8za
7439a5
- drop downstream-only split varstore patch, rely on upstream's
7439a5
7439a5
* Tue Jun 24 2014 Miroslav Rezanina <mrezanin@redhat.com> - 20140619-1.gita618eaa.el7
7439a5
- Initial version