Changelog for
edk2-aarch64-20220126gitbb1bba3d77-13.el8_10.noarch.rpm :
* Thu Mar 14 2024 Miroslav Rezanina
- 20220126gitbb1bba3d77-13- edk2-EmbeddedPkg-Hob-Integer-Overflow-in-CreateHob.patch [RHEL-21158]- edk2-StandaloneMmPkg-Hob-Integer-Overflow-in-CreateHob.patch [RHEL-21158]- Resolves: RHEL-21158 (CVE-2022-36765 edk2: integer overflow in CreateHob() could lead to HOB OOB R/W [rhel-8])
* Tue Feb 27 2024 Miroslav Rezanina - 20220126gitbb1bba3d77-12- edk2-Apply-uncrustify-changes-to-.c-.h-files-in-the-Netwo.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- edk2-NetworkPkg-Ip6Dxe-SECURITY-PATCH-CVE-2023-45231-Patc.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- edk2-NetworkPkg-Ip6Dxe-SECURITY-PATCH-CVE-2023-45231-Unit.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- edk2-NetworkPkg-Ip6Dxe-SECURITY-PATCH-CVE-2023-45232-Patc.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- edk2-NetworkPkg-Ip6Dxe-SECURITY-PATCH-CVE-2023-45232-Unit.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- edk2-NetworkPkg-Apply-uncrustify-changes.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- edk2-NetworkPkg-UefiPxeBcDxe-SECURITY-PATCH-CVE-2023-4523.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- edk2-NetworkPkg-UefiPxeBcDxe-SECURITY-PATCH-CVE-2023-4523p2.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- edk2-NetworkPkg-UefiPxeBcDxe-SECURITY-PATCH-CVE-2023-4523p3.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- edk2-NetworkPkg-UefiPxeBcDxe-SECURITY-PATCH-CVE-2023-4523p4.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- edk2-NetworkPkg-Adds-a-SecurityFix.yaml-file.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- edk2-NetworkPkg-Apply-uncrustify-changes-p2.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- edk2-NetworkPkg-Dhcp6Dxe-SECURITY-PATCH-CVE-2023-45229-Re.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- edk2-NetworkPkg-Dhcp6Dxe-Removes-duplicate-check-and-repl.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- edk2-NetworkPkg-Dhcp6Dxe-Packet-Length-is-not-updated-bef.patch [RHEL-21840 RHEL-21844 RHEL-21846 RHEL-21848 RHEL-21850 RHEL-21852]- Resolves: RHEL-21840 (CVE-2023-45229 edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message [rhel-8])- Resolves: RHEL-21844 (CVE-2023-45231 edk2: Out of Bounds read when handling a ND Redirect message with truncated options [rhel-8])- Resolves: RHEL-21846 (CVE-2023-45232 edk2: Infinite loop when parsing unknown options in the Destination Options header [rhel-8])- Resolves: RHEL-21848 (CVE-2023-45233 edk2: Infinite loop when parsing a PadN option in the Destination Options header [rhel-8])- Resolves: RHEL-21850 (CVE-2023-45234 edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message [rhel-8])- Resolves: RHEL-21852 (CVE-2023-45235 edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message [rhel-8])
* Wed Feb 14 2024 Jon Maloy - 20220126gitbb1bba3d77-11- edk2-SecurityPkg-Change-use-of-EFI_D_-to-DEBUG_.patch [RHEL-21154 RHEL-21156]- edk2-SecurityPkg-Change-OPTIONAL-keyword-usage-style.patch [RHEL-21154 RHEL-21156]- edk2-MdePkg-Introduce-CcMeasurementProtocol-for-CC-Guest-.patch [RHEL-21154 RHEL-21156]- edk2-SecurityPkg-Support-CcMeasurementProtocol-in-DxeTpm2.patch [RHEL-21154 RHEL-21156]- edk2-SecurityPkg-Support-CcMeasurementProtocol-in-DxeTpmM.patch [RHEL-21154 RHEL-21156]- edk2-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-411.patch [RHEL-21154 RHEL-21156]- edk2-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4117.patch [RHEL-21154 RHEL-21156]- edk2-SecurityPkg-Adding-CVE-2022-36763-to-SecurityFixes.y.patch [RHEL-21154 RHEL-21156]- edk2-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-418.patch [RHEL-21154 RHEL-21156]- edk2-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4118.patch [RHEL-21154 RHEL-21156]- edk2-SecurityPkg-DxeTpm2MeasureBootLib-SEC-PATCH-4118-2.patch [RHEL-21154 RHEL-21156]- edk2-SecurityPkg-DxeTpmMeasureBootLib-SEC-PATCH-4117-2.patch [RHEL-21154 RHEL-21156]- edk2-SecurityPkg-Updating-SecurityFixes.yaml-after-symbol.patch [RHEL-21154 RHEL-21156]- edk2-NetworkPkg-Dhcp6Dxe-SECURITY-PATCH-CVE-2023-45230-Pa.patch [RHEL-21840 RHEL-21842]- edk2-NetworkPkg-Add-Unit-tests-to-CI-and-create-Host-Test.patch [RHEL-21840 RHEL-21842]- edk2-NetworkPkg-Dhcp6Dxe-SECURITY-PATCH-CVE-2023-45230-Un.patch [RHEL-21840 RHEL-21842]- edk2-NetworkPkg-Dhcp6Dxe-SECURITY-PATCH-CVE-2023-45229-Pa.patch [RHEL-21840 RHEL-21842]- Resolves: RHEL-21154 (CVE-2022-36763 edk2: heap buffer overflow in Tcg2MeasureGptTable() [rhel-8])- Resolves: RHEL-21156 (CVE-2022-36764 edk2: heap buffer overflow in Tcg2MeasurePeImage() [rhel-8])- Resolves: RHEL-21840 (CVE-2023-45229 edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message [rhel-8])- Resolves: RHEL-21842 (CVE-2023-45230 edk2: Buffer overflow in the DHCPv6 client via a long Server ID option [rhel-8])
* Sat Feb 03 2024 Jon Maloy - 20220126gitbb1bba3d77-10- edk2-OvmfPkg-VirtNorFlashDxe-clone-ArmPlatformPkg-s-NOR-f.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-remove-CheckBlockLocked-feat.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-remove-disk-I-O-protocol-imp.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-drop-block-I-O-protocol-impl.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-avoid-array-mode-switch-afte.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-avoid-switching-between-mode.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-use-EFI_MEMORY_WC-and-drop-A.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-map-flash-memory-as-uncachea.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-stop-accepting-gEfiVariable2.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-sanity-check-variable2.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-add-casts-to-UINTN-and-UINT3.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-clarify-block-write-logic-fi.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-add-a-loop-for-NorFlashWrite.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-allow-larger-writes-without-.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-ValidateFvHeader-unwritten-s.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-move-DoErase-code-block-into.patch [RHEL-17587]- edk2-ArmVirtPkg-ArmVirtQemu-migrate-to-OVMF-s-VirtNorFlas.patch [RHEL-17587]- edk2-OvmfPkg-clone-NorFlashPlatformLib-into-VirtNorFlashP.patch [RHEL-17587]- Resolves: RHEL-17587 ([rhel8] guest fails to boot due to ASSERT error)
* Wed Jan 24 2024 Jon Maloy - 20220126gitbb1bba3d77-9- edk2-OvmfPkg-VirtNorFlashDxe-stop-accepting-gEfiVariableG.patch [RHEL-17587]- edk2-OvmfPkg-VirtNorFlashDxe-sanity-check-variables.patch [RHEL-17587]- Resolves: RHEL-17587 ([rhel8] guest fails to boot due to ASSERT error)
* Fri Jan 05 2024 Jon Maloy - 20220126gitbb1bba3d77-8- edk2-Bumped-openssl-submodule-version-to-cf317b2bb227.patch [RHEL-7560]- Resolves: RHEL-7560 (CVE-2023-3446 edk2: openssl: Excessive time spent checking DH keys and parameters [rhel-8])
* Wed Nov 22 2023 Miroslav Rezanina - 20220126gitbb1bba3d77-7- edk2-add-8.6-machine-type-to-edk2-ovmf-cc.json.patch [RHEL-12626]- Resolves: RHEL-12626 (Missing firmware descriptor with secureboot disabled in RHEL 8)
* Fri Aug 04 2023 Jon Maloy - 20220126gitbb1bba3d77-6- edk2-UefiCpuPkg-MpInitLib-fix-apic-mode-for-cpu-hotplug.patch [bz#2150267]- Resolves: bz#2150267 (ovmf must consider max cpu count not boot cpu count for apic mode [rhel-8])
* Thu Apr 06 2023 Miroslav Rezanina - 20220126gitbb1bba3d77-5- edk2-SecurityPkg-DxeImageVerificationLib-Check-result-of-.patch [bz#1861743]- Resolves: bz#1861743 (CVE-2019-14560 edk2: Function GetEfiGlobalVariable2() return value not checked in DxeImageVerificationHandler() [rhel-8])
* Wed Feb 15 2023 Jon Maloy - 20220126gitbb1bba3d77-4- edk2-openssl-update.patch [bz#2164531 bz#2164543 bz#2164558 bz#2164581]- edk2-rh-openssl-add-crypto-bn-rsa_sup_mul.c-to-file-list.patch [bz#2164531 bz#2164543 bz#2164558 bz#2164581]- Resolves: bz#2164531 (CVE-2023-0286 edk2: openssl: X.400 address type confusion in X.509 GeneralName [rhel-8])- Resolves: bz#2164543 (CVE-2022-4304 edk2: openssl: timing attack in RSA Decryption implementation [rhel-8])- Resolves: bz#2164558 (CVE-2023-0215 edk2: openssl: use-after-free following BIO_new_NDEF [rhel-8])- Resolves: bz#2164581 (CVE-2022-4450 edk2: openssl: double free after calling PEM_read_bio_ex [rhel-8])
* Tue Aug 02 2022 Camilla Conte - 20220126gitbb1bba3d77-3- Bumping OpenSSL version [bz# 2074834]- Resolves: bz# 2074834 (edk2: sync openssl sources with rhel openssl rpm)
* Tue Mar 01 2022 Jon Maloy - 20220126gitbb1bba3d77-2- edk2-OvmfPkg-AmdSev-SecretPei-Mark-SEV-launch-secret-area.patch [bz#2112307]- Resolves: bz#2112307 (Mark SEV launch secret area as reserved)
* Wed Feb 02 2022 Jon Maloy - 20220126gitbb1bba3d77-1.el8- Rebase to latest upstream release [bz#2018386]- Resolves: bz#2018386 ([rebase] update edk2 to nov \'21 release (edk2-stable202111xx))
* Fri Aug 06 2021 Miroslav Rezanina - 20210527gite1999b264f1f-3- edk2-MdeModulePkg-PartitionDxe-Ignore-PMBR-BootIndicator-.patch [bz#1988762]- Resolves: bz#1988762 (edk2 does not ignore PMBR protective record BootIndicator as required by UEFI spec)
* Fri Jul 02 2021 Miroslav Rezanina - 20210527gite1999b264f1f-2- edk2-NetworkPkg-IScsiDxe-wrap-IScsiCHAP-source-files-to-8.patch [bz#1956408]- edk2-NetworkPkg-IScsiDxe-simplify-ISCSI_CHAP_AUTH_DATA.In.patch [bz#1956408]- edk2-NetworkPkg-IScsiDxe-clean-up-ISCSI_CHAP_AUTH_DATA.Ou.patch [bz#1956408]- edk2-NetworkPkg-IScsiDxe-clean-up-library-class-dependenc.patch [bz#1956408]- edk2-NetworkPkg-IScsiDxe-fix-potential-integer-overflow-i.patch [bz#1956408]- edk2-NetworkPkg-IScsiDxe-assert-that-IScsiBinToHex-always.patch [bz#1956408]- edk2-NetworkPkg-IScsiDxe-reformat-IScsiHexToBin-leading-c.patch [bz#1956408]- edk2-NetworkPkg-IScsiDxe-fix-IScsiHexToBin-hex-parsing.patch [bz#1956408]- edk2-NetworkPkg-IScsiDxe-fix-IScsiHexToBin-buffer-overflo.patch [bz#1956408]- edk2-NetworkPkg-IScsiDxe-check-IScsiHexToBin-return-value.patch [bz#1956408]- Resolves: bz#1956408 (edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe [rhel-8.5.0])
* Wed Jun 23 2021 Miroslav Rezanina - 20210527gite1999b264f1f-1- Rebase to edk2-stable202105 [bz#1938238]- Resolves: bz#1938238 ((edk2-rebase-rhel-8.5) - rebase edk2 to edk2-stable202105 for RHEL-8.5)
* Wed May 12 2021 Miroslav Rezanina - 20200602gitca407c7246bf-5.el8- edk2-MdeModulePkg-LzmaCustomDecompressLib-catch-4GB-uncom.patch [bz#1892318]- edk2-redhat-add-OVMF-binary-that-will-support-SEV-ES.patch [bz#1956837]- Resolves: bz#1892318 (edk2: possible heap corruption with LzmaUefiDecompressGetInfo [rhel-8])- Resolves: bz#1956837 (Additional build of edk2 without SMM (dual build / sub-package) for SEV-ES)
* Mon Nov 23 2020 Miroslav Rezanina - 20200602gitca407c7246bf-4.el8- edk2-OvmfPkg-SmmControl2Dxe-negotiate-ICH9_LPC_SMI_F_CPU_.patch [bz#1849177]- edk2-OvmfPkg-CpuHotplugSmm-fix-CPU-hotplug-race-just-befo.patch [bz#1849177]- edk2-OvmfPkg-CpuHotplugSmm-fix-CPU-hotplug-race-just-afte.patch [bz#1849177]- edk2-CryptoPkg-OpensslLib-Upgrade-OpenSSL-to-1.1.1g.patch [bz#1893806]- edk2-redhat-bump-OpenSSL-dist-git-submodule-to-1.1.1g-RHE.patch [bz#1893806]- Resolves: bz#1849177 (OVMF: negotiate \"SMI on VCPU hotplug\" with QEMU)- Resolves: bz#1893806 (attempt advancing RHEL8 edk2\'s OpenSSL submodule to RHEL8 OpenSSL 1.1.1g (or later))
* Mon Aug 10 2020 Miroslav Rezanina - 20200602gitca407c7246bf-3.el8- edk2-UefiCpuPkg-PiSmmCpuDxeSmm-pause-in-WaitForSemaphore-.patch [bz#1861718]- Resolves: bz#1861718 (Very slow boot when overcommitting CPU)
* Wed Jun 24 2020 Miroslav Rezanina - 20200602gitca407c7246bf-2.el8- edk2-OvmfPkg-QemuKernelLoaderFsDxe-suppress-error-on-no-k.patch [bz#1844682]- edk2-OvmfPkg-GenericQemuLoadImageLib-log-Not-Found-at-INF.patch [bz#1844682]- edk2-SecurityPkg-Tcg2Dxe-suppress-error-on-no-swtpm-in-si.patch [bz#1844682]- Resolves: bz#1844682 (silent build of edk2-aarch64 logs DEBUG_ERROR messages that don\'t actually report serious errors)
* Sat Jun 13 2020 Miroslav Rezanina - 20200602gitca407c7246bf-1.el8- Rebase to edk2-stable202005 [bz#1817035]- Resolves: bz#1817035 ((edk2-rebase-rhel-8.3) - rebase edk2 to upstream tag edk2-stable202005 for RHEL-8.3)
* Fri Mar 27 2020 Miroslav Rezanina - 20190829git37eef91017ad-9.el8- edk2-OvmfPkg-QemuVideoDxe-unbreak-secondary-vga-and-bochs.patch [bz#1806359]- Resolves: bz#1806359 (bochs-display cannot show graphic wihout driver attach)
* Tue Feb 18 2020 Miroslav Rezanina - 20190829git37eef91017ad-8.el8- edk2-MdeModulePkg-Enable-Disable-S3BootScript-dynamically.patch [bz#1801274]- edk2-MdeModulePkg-PiDxeS3BootScriptLib-Fix-potential-nume.patch [bz#1801274]- Resolves: bz#1801274 (CVE-2019-14563 edk2: numeric truncation in MdeModulePkg/PiDxeS3BootScriptLib [rhel-8])
* Tue Feb 11 2020 Miroslav Rezanina - 20190829git37eef91017ad-7.el8- edk2-SecurityPkg-Fix-spelling-errors-PARTIAL-PICK.patch [bz#1751993]- edk2-SecurityPkg-DxeImageVerificationHandler-simplify-Ver.patch [bz#1751993]- edk2-SecurityPkg-DxeImageVerificationHandler-remove-else-.patch [bz#1751993]- edk2-SecurityPkg-DxeImageVerificationHandler-keep-PE-COFF.patch [bz#1751993]- edk2-SecurityPkg-DxeImageVerificationHandler-narrow-down-.patch [bz#1751993]- edk2-SecurityPkg-DxeImageVerificationHandler-fix-retval-o.patch [bz#1751993]- edk2-SecurityPkg-DxeImageVerificationHandler-remove-super.patch [bz#1751993]- edk2-SecurityPkg-DxeImageVerificationHandler-unnest-AddIm.patch [bz#1751993]- edk2-SecurityPkg-DxeImageVerificationHandler-eliminate-St.patch [bz#1751993]- edk2-SecurityPkg-DxeImageVerificationHandler-fix-retval-f.patch [bz#1751993]- edk2-SecurityPkg-DxeImageVerificationHandler-fix-imgexec-.patch [bz#1751993]- edk2-SecurityPkg-DxeImageVerificationHandler-fix-defer-vs.patch [bz#1751993]- Resolves: bz#1751993 (DxeImageVerificationLib handles \"DENY execute on security violation\" like \"DEFER execute on security violation\" [rhel8])
* Tue Jan 21 2020 Miroslav Rezanina - 20190829git37eef91017ad-6.el8- edk2-UefiCpuPkg-PiSmmCpuDxeSmm-fix-2M-4K-page-splitting-r.patch [bz#1789335]- Resolves: bz#1789335 (VM with edk2 can\'t boot when setting memory with \'-m 2001\')
* Thu Jan 16 2020 Miroslav Rezanina - 20190829git37eef91017ad-5.el8- edk2-MdeModulePkg-UefiBootManagerLib-log-reserved-mem-all.patch [bz#1789797]- edk2-NetworkPkg-HttpDxe-fix-32-bit-truncation-in-HTTPS-do.patch [bz#1789797]- Resolves: bz#1789797 (Backport upstream patch series: \"UefiBootManagerLib, HttpDxe: tweaks for large HTTP(S) downloads\" to improve HTTP(S) Boot experience with large (4GiB+) files)
* Wed Dec 11 2019 Miroslav Rezanina - 20190829git37eef91017ad-4.el8- edk2-redhat-set-guest-RAM-size-to-768M-for-SB-varstore-te.patch [bz#1778301]- edk2-redhat-re-enable-Secure-Boot-varstore-template-verif.patch [bz#1778301]- Resolves: bz#1778301 (re-enable Secure Boot (varstore template) verification in %check)
* Thu Dec 05 2019 Miroslav Rezanina - 20190829git37eef91017ad-3.el8- Update used openssl version [bz#1616029]- Resolves: bz#1616029 (rebuild edk2 against the final RHEL-8.2.0 version of OpenSSL-1.1.1)
* Mon Dec 02 2019 Miroslav Rezanina - 20190829git37eef91017ad-2.el8- edk2-MdePkg-Include-Protocol-Tls.h-Add-the-data-type-of-E.patch [bz#1536624]- edk2-CryptoPkg-TlsLib-Add-the-new-API-TlsSetVerifyHost-CV.patch [bz#1536624]- edk2-CryptoPkg-Crt-turn-strchr-into-a-function-CVE-2019-1.patch [bz#1536624]- edk2-CryptoPkg-Crt-satisfy-inet_pton.c-dependencies-CVE-2.patch [bz#1536624]- edk2-CryptoPkg-Crt-import-inet_pton.c-CVE-2019-14553.patch [bz#1536624]- edk2-CryptoPkg-TlsLib-TlsSetVerifyHost-parse-IP-address-l.patch [bz#1536624]- edk2-NetworkPkg-TlsDxe-Add-the-support-of-host-validation.patch [bz#1536624]- edk2-NetworkPkg-HttpDxe-Set-the-HostName-for-the-verifica.patch [bz#1536624]- edk2-redhat-enable-HTTPS-Boot.patch [bz#1536624]- Resolves: bz#1536624 (HTTPS enablement in OVMF)
* Fri Nov 29 2019 Miroslav Rezanina - 20190829git37eef91017ad-1.el8- Rebase to edk2-stable201908 [bz#1748180]- Resolves: bz#1748180 ((edk2-rebase-rhel-8.2) - rebase edk2 to upstream tag edk2-stable201908 for RHEL-8.2)
* Mon Aug 05 2019 Miroslav Rezanina - 20190308git89910a39dcfd-6.el8- edk2-ArmVirtPkg-silence-DEBUG_VERBOSE-masking-0x00400000-.patch [bz#1714446]- edk2-OvmfPkg-QemuRamfbDxe-Do-not-report-DXE-failure-on-Aa.patch [bz#1714446]- edk2-ArmPkg-DebugPeCoffExtraActionLib-debugger-commands-a.patch [bz#1714446]- Resolves: bz#1714446 (edk2-aarch64 silent build is not silent enough)
* Tue Jul 02 2019 Miroslav Rezanina - 20190308git89910a39dcfd-5.el8- edk2-redhat-add-D-TPM2_ENABLE-to-the-edk2-ovmf-build-flag.patch [bz#1693205]- Resolves: bz#1693205 (edk2: Enable TPM2 support)
* Tue Jun 11 2019 Miroslav Rezanina - 20190308git89910a39dcfd-4.el8- edk2-OvmfPkg-raise-the-PCIEXBAR-base-to-2816-MB-on-Q35.patch [bz#1666941]- edk2-OvmfPkg-PlatformPei-set-32-bit-UC-area-at-PciBase-Pc.patch [bz#1666941]- Resolves: bz#1666941 (UEFI guest cannot boot into os when setting some special memory size)
* Tue Apr 09 2019 Danilo Cesar Lemes de Paula - 20190308git89910a39dcfd-2.el8- edk2-redhat-provide-firmware-descriptor-meta-files.patch [bz#1600230]- Resolves: bz#1600230 ([RHEL 8.1] RFE: provide firmware descriptor meta-files for the edk2-ovmf and edk2-aarch64 firmware images)
* Mon Apr 08 2019 Danilo Cesar Lemes de Paula - 20190308git89910a39dcfd-1.el8- Rebase to edk2-20190308git89910a39dcfd
* Mon Jan 21 2019 Danilo Cesar Lemes de Paula - 20180508gitee3198e672e2-9.el8- edk2-BaseTools-Fix-UEFI-and-Tiano-Decompression-logic-iss.patch [bz#1662184]- edk2-MdePkg-BaseUefiDecompressLib-Fix-UEFI-Decompression-.patch [bz#1662184]- edk2-IntelFrameworkModulePkg-Fix-UEFI-and-Tiano-Decompres.patch [bz#1662184]- edk2-git-Use-HTTPS-support.patch []- Resolves: bz#1662184 (backport fix for (theoretical?) regression introduced by earlier CVE fixes)
* Wed Nov 21 2018 Danilo Cesar Lemes de Paula - 20180508gitee3198e672e2-8.el8- edk2-NetworkPkg-UefiPxeBcDxe-Add-EXCLUSIVE-attribute-when.patch [bz#1643377]- Resolves: bz#1643377 (Exception when grubx64.efi used for UEFI netboot)
* Tue Nov 06 2018 Danilo Cesar Lemes de Paula - 20180508gitee3198e672e2-5.el8- edk2-MdeModulePkg-Variable-Fix-Timestamp-zeroing-issue-on.patch [bz#1641436]- edk2-MdePkg-Add-more-checker-in-UefiDecompressLib-to-acce.patch [bz#1641449 bz#1641453 bz#1641464 bz#1641469]- edk2-IntelFrameworkModulePkg-Add-more-checker-in-UefiTian.patch [bz#1641453 bz#1641464 bz#1641469]- edk2-BaseTools-Add-more-checker-in-Decompress-algorithm-t.patch [bz#1641445 bz#1641453 bz#1641464 bz#1641469]- Resolves: bz#1641436 (CVE-2018-3613 edk2: Logic error in MdeModulePkg in EDK II firmware allows for privilege escalation by authenticated users [rhel-8])- Resolves: bz#1641445 (CVE-2017-5731 edk2: Privilege escalation via processing of malformed files in TianoCompress.c [rhel-8])- Resolves: bz#1641449 (CVE-2017-5732 edk2: Privilege escalation via processing of malformed files in BaseUefiDecompressLib.c [rhel-8])- Resolves: bz#1641453 (CVE-2017-5733 edk2: Privilege escalation via heap-based buffer overflow in MakeTable() function [rhel-8])- Resolves: bz#1641464 (CVE-2017-5734 edk2: Privilege escalation via stack-based buffer overflow in MakeTable() function [rhel-8])- Resolves: bz#1641469 (CVE-2017-5735 edk2: Privilege escalation via heap-based buffer overflow in Decode() function [rhel-8])
* Tue Sep 04 2018 Danilo Cesar Lemes de Paula - 20180508gitee3198e672e2-5.el8- edk2-BaseTools-footer.makefile-expand-BUILD_CFLAGS-last-f.patch [bz#1607906]- edk2-BaseTools-header.makefile-remove-c-from-BUILD_CFLAGS.patch [bz#1607906]- edk2-BaseTools-Source-C-split-O2-to-BUILD_OPTFLAGS.patch [bz#1607906]- edk2-BaseTools-Source-C-take-EXTRA_OPTFLAGS-from-the-call.patch [bz#1607906]- edk2-BaseTools-Source-C-take-EXTRA_LDFLAGS-from-the-calle.patch [bz#1607906]- edk2-BaseTools-VfrCompile-honor-EXTRA_LDFLAGS.patch [bz#1607906]- edk2-redhat-inject-the-RPM-compile-and-link-options-to-th.patch [bz#1607906]- Resolves: bz#1607906 (edk2-tools: Does not use RPM build flags)
* Wed Aug 08 2018 Danilo Cesar Lemes de Paula - 20180508gitee3198e672e2-4.el8- edk2-redhat-provide-virtual-bundled-OpenSSL-in-edk2-ovmf-.patch [bz#1607801]- Resolves: bz#1607801 (add \'Provides: bundled(openssl) = 1.1.0h\' to the spec file)
* Tue Jul 24 2018 Danilo Cesar Lemes de Paula - 20180508gitee3198e672e2-3.el8- edk2-redhat-Provide-and-Obsolete-OVMF-and-AAVMF.patch [bz#1596148]- edk2-ArmVirtPkg-unify-HttpLib-resolutions-in-ArmVirt.dsc..patch [bz#1536627]- edk2-ArmVirtPkg-ArmVirtQemu-enable-the-IPv6-stack.patch [bz#1536627]- edk2-advertise-OpenSSL-due-to-IPv6-enablement-too-RHEL-on.patch [bz#1536627]- edk2-redhat-add-D-NETWORK_IP6_ENABLE-to-the-build-flags.patch [bz#1536627]- edk2-redhat-update-license-fields-and-files-in-the-spec-f.patch [bz#1536627]- Resolves: bz#1536627 (IPv6 enablement in OVMF)- Resolves: bz#1596148 (restore Provides/Obsoletes macros for OVMF and AAVMF, from RHEL-8 Alpha)
* Tue Jul 10 2018 Danilo C. L. de Paula - 20180508gitee3198e672e2-2.el8- Rebase edk2 on top of 20180508gitee3198e672e2
* Fri Jun 08 2018 Miroslav Rezanina - 20180508-2.gitee3198e672e2- OvmfPkg/PlatformBootManagerLib: connect consoles unconditionally [bz#1577546]- build OVMF varstore template with SB enabled / certs enrolled [bz#1561128]- connect Virtio RNG devices again [bz#1579518]- Resolves: bz#1577546 (no input consoles connected under certain circumstances)- Resolves: bz#1561128 (OVMF Secure boot enablement (enrollment of default keys))- Resolves: bz#1579518 (EFI_RNG_PROTOCOL no longer produced for virtio-rng)
* Wed Dec 06 2017 Miroslav Rezanina - 20171011-4.git92d07e48907f.el7- ovmf-MdeModulePkg-Core-Dxe-log-informative-memprotect-msg.patch [bz#1520485]- ovmf-MdeModulePkg-BdsDxe-fall-back-to-a-Boot-Manager-Menu.patch [bz#1515418]- Resolves: bz#1515418 (RFE: Provide diagnostics for failed boot)- Resolves: bz#1520485 (AAVMF: two new messages with silent build)
* Fri Dec 01 2017 Miroslav Rezanina - 20171011-3.git92d07e48907f.el7- ovmf-UefiCpuPkg-CpuDxe-Fix-multiple-entries-of-RT_CODE-in.patch [bz#1518308]- ovmf-MdeModulePkg-DxeCore-Filter-out-all-paging-capabilit.patch [bz#1518308]- ovmf-MdeModulePkg-Core-Merge-memory-map-after-filtering-p.patch [bz#1518308]- Resolves: bz#1518308 (UEFI memory map regression (runtime code entry splitting) introduced by c1cab54ce57c)
* Mon Nov 27 2017 Miroslav Rezanina - 20171011-2.git92d07e48907f.el7- ovmf-MdeModulePkg-Bds-Remove-assertion-in-BmCharToUint.patch [bz#1513632]- ovmf-MdeModulePkg-Bds-Check-variable-name-even-if-OptionN.patch [bz#1513632]- ovmf-MdeModulePkg-PciBus-Fix-bug-that-PCI-BUS-claims-too-.patch [bz#1514105]- ovmf-OvmfPkg-make-it-a-proper-BASE-library.patch [bz#1488247]- ovmf-OvmfPkg-create-a-separate-PlatformDebugLibIoPort-ins.patch [bz#1488247]- ovmf-OvmfPkg-save-on-I-O-port-accesses-when-the-debug-por.patch [bz#1488247]- ovmf-OvmfPkg-enable-DEBUG_VERBOSE-RHEL-only.patch [bz#1488247]- ovmf-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-QemuVide.patch [bz#1488247]- ovmf-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-NvmExpre.patch [bz#1488247]- ovmf-Revert-redhat-introduce-separate-silent-and-verbose-.patch [bz#1488247]- Resolves: bz#1488247 (make debug logging no-op unless a debug console is active)- Resolves: bz#1513632 ([RHEL-ALT 7.5] AAVMF fails to boot after setting BootNext)- Resolves: bz#1514105 (backport edk2 commit 6e3287442774 so that PciBusDxe not over-claim resources)
* Wed Oct 18 2017 Miroslav Rezanina - 20171011-1.git92d07e48907f.el7- Rebase to 92d07e48907f [bz#1469787]- Resolves: bz#1469787 ((ovmf-rebase-rhel-7.5) Rebase OVMF for RHEL-7.5)- Resolves: bz#1434740 (OvmfPkg/PciHotPlugInitDxe: don\'t reserve IO space when IO support is disabled)- Resolves: bz#1434747 ([Q35] code12 error when hotplug x710 device in win2016)- Resolves: bz#1447027 (Guest cannot boot with 240 or above vcpus when using ovmf)- Resolves: bz#1458192 ([Q35] recognize \"usb-storage\" devices in XHCI ports)- Resolves: bz#1468526 (>1TB RAM support)- Resolves: bz#1488247 (provide \"OVMF_CODE.secboot.verbose.fd\" for log capturing; silence \"OVMF_CODE.secboot.fd\")- Resolves: bz#1496170 (Inconsistent MOR control variables exposed by OVMF, breaks Windows Device Guard)
* Fri May 12 2017 Miroslav Rezanina - 20170228-5.gitc325e41585e3.el7- ovmf-OvmfPkg-EnrollDefaultKeys-update-SignatureOwner-GUID.patch [bz#1443351]- ovmf-OvmfPkg-EnrollDefaultKeys-expose-CertType-parameter-.patch [bz#1443351]- ovmf-OvmfPkg-EnrollDefaultKeys-blacklist-empty-file-in-db.patch [bz#1443351]- ovmf-OvmfPkg-introduce-the-FD_SIZE_IN_KB-macro-build-flag.patch [bz#1443351]- ovmf-OvmfPkg-OvmfPkg.fdf.inc-extract-VARS_LIVE_SIZE-and-V.patch [bz#1443351]- ovmf-OvmfPkg-introduce-4MB-flash-image-mainly-for-Windows.patch [bz#1443351]- ovmf-OvmfPkg-raise-max-variable-size-auth-non-auth-to-33K.patch [bz#1443351]- ovmf-OvmfPkg-PlatformPei-handle-non-power-of-two-spare-si.patch [bz#1443351]- ovmf-redhat-update-local-build-instructions-with-D-FD_SIZ.patch [bz#1443351]- ovmf-redhat-update-OVMF-build-commands-with-D-FD_SIZE_4MB.patch [bz#1443351]- Resolves: bz#1443351 ([svvp][ovmf] job \"Secure Boot Logo Test\" failed with q35&ovmf)
* Fri Apr 28 2017 Miroslav Rezanina - 20170228-4.gitc325e41585e3.el7- ovmf-ShellPkg-Shell-clean-up-bogus-member-types-in-SPLIT_.patch [bz#1442908]- ovmf-ShellPkg-Shell-eliminate-double-free-in-RunSplitComm.patch [bz#1442908]- Resolves: bz#1442908 (Guest hang when running a wrong command in Uefishell)
* Tue Apr 04 2017 Miroslav Rezanina - 20170228-3.gitc325e41585e3.el7- ovmf-ArmVirtPkg-FdtClientDxe-supplement-missing-EFIAPI-ca.patch [bz#1430262]- ovmf-ArmVirtPkg-ArmVirtPL031FdtClientLib-unconditionally-.patch [bz#1430262]- ovmf-MdeModulePkg-RamDiskDxe-fix-C-string-literal-catenat.patch [bz#1430262]- ovmf-EmbeddedPkg-introduce-EDKII-Platform-Has-ACPI-GUID.patch [bz#1430262]- ovmf-EmbeddedPkg-introduce-PlatformHasAcpiLib.patch [bz#1430262]- ovmf-EmbeddedPkg-introduce-EDKII-Platform-Has-Device-Tree.patch [bz#1430262]- ovmf-ArmVirtPkg-add-PlatformHasAcpiDtDxe.patch [bz#1430262]- ovmf-ArmVirtPkg-enable-AcpiTableDxe-and-EFI_ACPI_TABLE_PR.patch [bz#1430262]- ovmf-ArmVirtPkg-FdtClientDxe-install-DT-as-sysconfig-tabl.patch [bz#1430262]- ovmf-ArmVirtPkg-PlatformHasAcpiDtDxe-don-t-expose-DT-if-Q.patch [bz#1430262]- ovmf-ArmVirtPkg-remove-PURE_ACPI_BOOT_ENABLE-and-PcdPureA.patch [bz#1430262]- Resolves: bz#1430262 (AAVMF: forward QEMU\'s DT to the guest OS only if ACPI payload is unavailable)
* Mon Mar 27 2017 Miroslav Rezanina - 20170228-2.gitc325e41585e3.el7- ovmf-MdeModulePkg-Core-Dxe-downgrade-CodeSegmentCount-is-.patch [bz#1433428]- Resolves: bz#1433428 (AAVMF: Fix error message during ARM guest VM installation)
* Wed Mar 08 2017 Laszlo Ersek - ovmf-20170228-1.gitc325e41585e3.el7- Rebase to upstream c325e41585e3 [bz#1416919]- Resolves: bz#1373812 (guest boot from network even set \'boot order=1\' for virtio disk with OVMF)- Resolves: bz#1380282 (Update OVMF to openssl-1.0.2k-hobbled)- Resolves: bz#1412313 (select broadcast SMI if available)- Resolves: bz#1416919 (Rebase OVMF for RHEL-7.4)- Resolves: bz#1426330 (disable libssl in CryptoPkg)
* Mon Sep 12 2016 Laszlo Ersek - ovmf-20160608b-1.git988715a.el7- rework downstream-only commit dde83a75b566 \"setup the tree for the secure boot feature (RHEL only)\", excluding patent-encumbered files from the upstream OpenSSL 1.0.2g tarball [bz#1374710]- rework downstream-only commit dfc3ca1ee509 \"CryptoPkg/OpensslLib: Upgrade OpenSSL version to 1.0.2h\", excluding patent-encumbered files from the upstream OpenSSL 1.0.2h tarball [bz#1374710]
* Thu Aug 04 2016 Miroslav Rezanina - OVMF-20160608-3.git988715a.el7- ovmf-MdePkg-PCI-Add-missing-PCI-PCIE-definitions.patch [bz#1332408]- ovmf-ArmPlatformPkg-NorFlashDxe-accept-both-non-secure-an.patch [bz#1353494]- ovmf-ArmVirtPkg-ArmVirtQemu-switch-secure-boot-build-to-N.patch [bz#1353494]- ovmf-ArmPlatformPkg-NorFlashAuthenticatedDxe-remove-this-.patch [bz#1353494]- ovmf-ArmVirtPkg-add-FDF-definition-for-empty-varstore.patch [bz#1353494]- ovmf-redhat-package-the-varstore-template-produced-by-the.patch [bz#1353494]- ovmf-ArmVirtPkg-Re-add-the-Driver-Health-Manager.patch [bz#1353494]- ovmf-ArmVirtPkg-HighMemDxe-allow-patchable-PCD-for-PcdSys.patch [bz#1353494]- ovmf-ArmVirtPkg-ArmVirtQemuKernel-make-ACPI-support-AARCH.patch [bz#1353494]- ovmf-ArmVirtPkg-align-ArmVirtQemuKernel-with-ArmVirtQemu.patch [bz#1353494]- ovmf-ArmVirtPkg-ArmVirtQemu-factor-out-shared-FV.FvMain-d.patch [bz#1353494]- ovmf-ArmVirtPkg-factor-out-Rules-FDF-section.patch [bz#1353494]- ovmf-ArmVirtPkg-add-name-GUIDs-to-FvMain-instances.patch [bz#1353494]- ovmf-OvmfPkg-add-a-Name-GUID-to-each-Firmware-Volume.patch [bz#1353494]- ovmf-OvmfPkg-PlatformBootManagerLib-remove-stale-FvFile-b.patch [bz#1353494]- ovmf-MdePkg-IndustryStandard-introduce-EFI_PCI_CAPABILITY.patch [bz#1332408]- ovmf-MdeModulePkg-PciBusDxe-look-for-the-right-capability.patch [bz#1332408]- ovmf-MdeModulePkg-PciBusDxe-recognize-hotplug-capable-PCI.patch [bz#1332408]- ovmf-OvmfPkg-add-PciHotPlugInitDxe.patch [bz#1332408]- ovmf-ArmPkg-ArmGicLib-manage-GICv3-SPI-state-at-the-distr.patch [bz#1356655]- ovmf-ArmVirtPkg-PlatformBootManagerLib-remove-stale-FvFil.patch [bz#1353494]- ovmf-OvmfPkg-EnrollDefaultKeys-assign-Status-before-readi.patch [bz#1356913]- ovmf-OvmfPkg-EnrollDefaultKeys-silence-VS2015x86-warning-.patch [bz#1356913]- ovmf-CryptoPkg-update-openssl-to-ignore-RVCT-3079.patch [bz#1356184]- ovmf-CryptoPkg-Fix-typos-in-comments.patch [bz#1356184]- ovmf-CryptoPkg-BaseCryptLib-Avoid-passing-NULL-ptr-to-fun.patch [bz#1356184]- ovmf-CryptoPkg-BaseCryptLib-Init-the-content-of-struct-Ce.patch [bz#1356184]- ovmf-CryptoPkg-OpensslLib-Upgrade-OpenSSL-version-to-1.0..patch [bz#1356184]- Resolves: bz#1332408 (Q35 machine can not hot-plug scsi controller under switch)- Resolves: bz#1353494 ([OVMF] \"EFI Internal Shell\" should be removed from \"Boot Manager\")- Resolves: bz#1356184 (refresh embedded OpenSSL to 1.0.2h)- Resolves: bz#1356655 (AAVMF: stop accessing unmapped gicv3 registers)- Resolves: bz#1356913 (fix use-without-initialization in EnrollDefaultKeys.efi)
* Tue Jul 12 2016 Miroslav Rezanina - OVMF-20160608-2.git988715a.el7- ovmf-ArmPkg-ArmGicV3Dxe-configure-all-interrupts-as-non-s.patch [bz#1349407]- ovmf-ArmVirtPkg-PlatformBootManagerLib-Postpone-the-shell.patch [bz#1353689]- Resolves: bz#1349407 (AArch64: backport fix to run over gicv3 emulation)- Resolves: bz#1353689 (AAVMF: Drops to shell with uninitialized NVRAM file)
* Thu Jun 09 2016 Laszlo Ersek - ovmf-20160608-1.git988715a.el7- Resolves: bz#1341733 (prevent SMM stack overflow in OVMF while enrolling certificates in \"db\")- Resolves: bz#1257882 (FEAT: support to boot from virtio 1.0 modern devices)- Resolves: bz#1333238 (Q35 machine can not boot up successfully with more than 3 virtio-scsi storage controller under switch)- Resolves: bz#1330955 (VM can not be booted up from hard disk successfully when with a passthrough USB stick)
* Thu May 19 2016 Laszlo Ersek - ovmf-20160419-2.git90bb4c5.el7- Submit scratch builds from the exploded tree again to supp-rhel-7.3-candidate, despite FatPkg being OSS at this point; see bz#1329559.
* Wed Apr 20 2016 Laszlo Ersek - ovmf-20160419-1.git90bb4c5.el7- FatPkg is under the 2-clause BSDL now; \"ovmf\" has become OSS- upgrade to openssl-1.0.2g- Resolves: bz#1323363 (remove \"-D SECURE_BOOT_ENABLE\" from AAVMF)- Resolves: bz#1257882 (FEAT: support to boot from virtio 1.0 modern devices)- Resolves: bz#1308678 (clearly separate SB-less, SMM-less OVMF binary from SB+SMM OVMF binary)
* Fri Feb 19 2016 Miroslav Rezanina - OVMF-20160202-2.gitd7c0dfa.el7- ovmf-restore-TianoCore-splash-logo-without-OpenSSL-advert.patch [bz#1308678]- ovmf-OvmfPkg-ArmVirtPkg-show-OpenSSL-less-logo-without-Se.patch [bz#1308678]- ovmf-OvmfPkg-simplify-VARIABLE_STORE_HEADER-generation.patch [bz#1308678]- ovmf-redhat-bring-back-OVMF_CODE.fd-but-without-SB-and-wi.patch [bz#1308678]- ovmf-redhat-rename-OVMF_CODE.smm.fd-to-OVMF_CODE.secboot..patch [bz#1308678]
* Tue Feb 02 2016 Laszlo Ersek - ovmf-20160202-1.gitd7c0dfa.el7- rebase to upstream d7c0dfa- update OpenSSL to 1.0.2e (upstream)- update FatPkg to SVN r97 (upstream)- drive NVMe devices (upstream)- resize xterm on serial console mode change, when requested with -fw_cfg name=opt/(ovmf|aavmf)/PcdResizeXterm,string=y (downstream)- Resolves: bz#1259395 (revert / roll back AAVMF fix for BZ 1188054)- Resolves: bz#1202819 (OVMF: secure boot limitations)- Resolves: bz#1182495 (OVMF rejects iPXE oprom when Secure Boot is enabled)
* Thu Nov 05 2015 Laszlo Ersek - ovmf-20151104-1.gitb9ffeab.el7- rebase to upstream b9ffeab- Resolves: bz#1207554 ([AAVMF] AArch64: populate SMBIOS)- Resolves: bz#1270279 (AAVMF: output improvements)
* Thu Jun 25 2015 Miroslav Rezanina - OVMF-20150414-2.gitc9e5618.el7- ovmf-OvmfPkg-PlatformPei-set-SMBIOS-entry-point-version-d.patch [bz#1232876]- Resolves: bz#1232876 (OVMF should install a version 2.8 SMBIOS entry point)
* Sat Apr 18 2015 Laszlo Ersek - 20150414-1.gitc9e5618.el7- rebase from upstream 9ece15a to c9e5618- adapt .gitignore files- update to openssl-0.9.8zf- create Logo-OpenSSL.bmp rather than modifying Logo.bmp in-place- update to FatPkg SVN r93 (git 8ff136aa)- drop the following downstream-only patches (obviated by upstream counterparts): \"tools_def.template: use forward slash with --add-gnu-debuglink (RHEL only)\" \"tools_def.template: take GCC48 prefixes from environment (RHEL only)\" \"OvmfPkg: set video resolution of text setup to 640x480 (RHEL only)\" \"OvmfPkg: resolve OrderedCollectionLib with base red-black tree instance\" \"OvmfPkg: AcpiPlatformDxe: actualize QemuLoader.h comments\" \"OvmfPkg: AcpiPlatformDxe: remove current ACPI table loader\" \"OvmfPkg: AcpiPlatformDxe: implement QEMU\'s full ACPI table loader interface\" \"OvmfPkg: QemuVideoDxe: fix querying of QXL\'s drawable buffer size\" \"OvmfPkg: disable stale fork of SecureBootConfigDxe\" \"OvmfPkg: SecureBootConfigDxe: remove stale fork\" \"Try to read key strike even when ...\" \"OvmfPkg: BDS: remove dead call to PlatformBdsEnterFrontPage()\" \"OvmfPkg: BDS: drop useless return statement\" \"OvmfPkg: BDS: don\'t overwrite the BDS Front Page timeout\" \"OvmfPkg: BDS: optimize second argument in PlatformBdsEnterFrontPage() call\" \'OvmfPkg: BDS: drop superfluous \"connect first boot option\" logic\' \"OvmfPkg: BDS: drop custom boot timeout, revert to IntelFrameworkModulePkg\'s\" \"Add comments to clarify mPubKeyStore buffer MemCopy. ...\" \"MdeModulePkg/SecurityPkg Variable: Add boundary check...\" \"OvmfPkg: AcpiPlatformDxe: make dependency on PCI enumeration explicit\" \"MdePkg: UefiScsiLib: do not encode LUN in CDB for READ and WRITE\" \"MdePkg: UefiScsiLib: do not encode LUN in CDB for other SCSI commands\"- merge downstream AAVMF patch \"adapt packaging to Arm64\", which forces us to rename the main package from \"OVMF\" to \"ovmf\"- drop the following ARM BDS specific tweaks (we\'ll only build the Intel BDS): \"ArmPlatformPkg/Bds: generate ESP Image boot option if user pref is unset (Acadia)\" \"ArmPlatformPkg/Bds: check for other defaults too if user pref is unset (Acadia)\" \"ArmPlatformPkg/ArmVirtualizationPkg: auto-detect boot path (Acadia)\" \"ArmPlatformPkg/Bds: initialize ConIn/ConOut/ErrOut before connecting terminals\" \"ArmPlatformPkg/Bds: let FindCandidate() search all filesystems\" \"ArmPlatformPkg/Bds: FindCandidateOnHandle(): log full device path\" \"ArmPlatformPkg/Bds: fall back to Boot Menu when no default option was found\" \"ArmPlatformPkg/Bds: always connect drivers before looking at boot options\"- drop patch \"ArmPlatformPkg/ArmVirtualizationPkg: enable DEBUG_VERBOSE (Acadia only)\", obsoleted by fixed bug 1197141- tweak patch \"write up build instructions (for interactive, local development) (RHELSA)\". The defaults in \"BaseTools/Conf/target.template\", ie. ACTIVE_PLATFORM and TARGET_ARCH, are set for OVMF / X64. The AAVMF build instructions now spell out the necessary override options (-p and -a, respectively).- extend patch \"build FAT driver from source (RHELSA)\" to the Xen build as well (only for consistency; we don\'t build for Xen).- drop the following downstream-only AAVMF patches, due to the 77d5dac -> c9e5618 AAVMF rebase & join: \"redhat/process-rh-specific.sh: fix check for hunk-less filtered patches\" \"redhat/process-rh-specific.sh: suppress missing files in final \'rm\'\" \"ArmVirtualizationQemu: build UEFI shell from source (Acadia only)\" \"MdePkg: UefiScsiLib: do not encode LUN in CDB for READ and WRITE\" \"MdePkg: UefiScsiLib: do not encode LUN in CDB for other SCSI commands\" \"ArmVirtualizationPkg: work around cache incoherence on KVM affecting DTB\" \"Changed build target to supp-rhel-7.1-candidate\" \"ArmVirtualizationPkg: VirtFdtDxe: forward FwCfg addresses from DTB to PCDs\" \"ArmVirtualizationPkg: introduce QemuFwCfgLib instance for DXE drivers\" \"ArmVirtualizationPkg: clone PlatformIntelBdsLib from ArmPlatformPkg\" \"ArmVirtualizationPkg: PlatformIntelBdsLib: add basic policy\" \"OvmfPkg: extract QemuBootOrderLib\" \"OvmfPkg: QemuBootOrderLib: featurize PCI-like device path translation\" \"OvmfPkg: introduce VIRTIO_MMIO_TRANSPORT_GUID\" \"ArmVirtualizationPkg: VirtFdtDxe: use dedicated VIRTIO_MMIO_TRANSPORT_GUID\" \"OvmfPkg: QemuBootOrderLib: widen ParseUnitAddressHexList() to UINT64\" \"OvmfPkg: QemuBootOrderLib: OFW-to-UEFI translation for virtio-mmio\" \"ArmVirtualizationPkg: PlatformIntelBdsLib: adhere to QEMU\'s boot order\" \"ArmVirtualizationPkg: identify \"new shell\" as builtin shell for Intel BDS\" \"ArmVirtualizationPkg: Intel BDS: load EFI-stubbed Linux kernel from fw_cfg\" \'Revert \"ArmVirtualizationPkg: work around cache incoherence on KVM affecting DTB\"\' \"OvmfPkg: QemuBootOrderLib: expose QEMU\'s \"-boot menu=on[, splash-time=N]\"\" \"OvmfPkg: PlatformBdsLib: get front page timeout from QEMU\" \"ArmVirtualizationPkg: PlatformIntelBdsLib: get front page timeout from QEMU\" \"ArmPkg: ArmArchTimerLib: clean up comments\" \"ArmPkg: ArmArchTimerLib: use edk2-conformant (UINT64
* UINT32) / UINT32\" \"ArmPkg: ArmArchTimerLib: conditionally rebase to actual timer frequency\" \"ArmVirtualizationQemu: ask the hardware for the timer frequency\" \"ArmPkg: DebugPeCoffExtraActionLib: debugger commands are not errors\" \"ArmPlatformPkg: PEIM startup is not an error\" \"ArmVirtualizationPkg: PlatformIntelBdsLib: lack of QEMU kernel is no error\" \"ArmVirtualizationPkg: expose debug message bitmask on build command line\"- tweak patch \"rebase to upstream 77d5dac (Acadia only)\": update spec changelog only- tweak patch \"spec: build AAVMF with the Intel BDS driver (RHELSA only)\": apply \"-D INTEL_BDS\" to manual build instructions in redhat/README too- tweak patch \"spec: build and install verbose and silent (default) AAVMF binaries\": apply DEBUG_PRINT_ERROR_LEVEL setting to interactive build instructions in redhat/README too- install OVMF whitepaper as part of the OVMF build\'s documentation- Resolves: bz#1211337 (merge AAVMF into OVMF)- Resolves: bz#1206523 ([AAVMF] fix missing cache maintenance)
* Fri Mar 06 2015 Miroslav Rezanina - AAVMF-20141113-5.git77d5dac.el7_1- aavmf-ArmPkg-DebugPeCoffExtraActionLib-debugger-commands-a.patch [bz#1197141]- aavmf-ArmPlatformPkg-PEIM-startup-is-not-an-error.patch [bz#1197141]- aavmf-ArmVirtualizationPkg-PlatformIntelBdsLib-lack-of-QEM.patch [bz#1197141]- aavmf-ArmVirtualizationPkg-expose-debug-message-bitmask-on.patch [bz#1197141]- aavmf-spec-build-and-install-verbose-and-silent-default-AA.patch [bz#1197141]- Resolves: bz#1197141 (create silent & verbose builds)
* Tue Feb 10 2015 Miroslav Rezanina - AAVMF-20141113-4.git77d5dac.el7- aavmf-ArmPkg-ArmArchTimerLib-clean-up-comments.patch [bz#1188247]- aavmf-ArmPkg-ArmArchTimerLib-use-edk2-conformant-UINT64-UI.patch [bz#1188247]- aavmf-ArmPkg-ArmArchTimerLib-conditionally-rebase-to-actua.patch [bz#1188247]- aavmf-ArmVirtualizationQemu-ask-the-hardware-for-the-timer.patch [bz#1188247]- aavmf-ArmPkg-TimerDxe-smack-down-spurious-timer-interrupt-.patch [bz#1188054]- Resolves: bz#1188054 (guest reboot (asked from within AAVMF) regressed in 3.19.0-0.rc5.58.aa7a host kernel)- Resolves: bz#1188247 (backport \"fix gBS->Stall()\" series)
* Mon Jan 19 2015 Miroslav Rezanina - AAVMF-20141113-3.git77d5dac.el7- aavmf-OvmfPkg-QemuBootOrderLib-expose-QEMU-s-boot-menu-on-.patch [bz#1172756]- aavmf-OvmfPkg-PlatformBdsLib-get-front-page-timeout-from-Q.patch [bz#1172756]- aavmf-ArmVirtualizationPkg-PlatformIntelBdsLib-get-front-p.patch [bz#1172756]- Resolves: bz#1172756 ([RFE]Expose boot-menu shortcut to domain via AAVMF)
* Wed Jan 14 2015 Miroslav Rezanina - AAVMF-20141113-2.git77d5dac.el7- aavmf-ArmVirtualizationPkg-VirtFdtDxe-forward-FwCfg-addres.patch [bz#1172749]- aavmf-ArmVirtualizationPkg-introduce-QemuFwCfgLib-instance.patch [bz#1172749]- aavmf-ArmVirtualizationPkg-clone-PlatformIntelBdsLib-from-.patch [bz#1172749]- aavmf-ArmVirtualizationPkg-PlatformIntelBdsLib-add-basic-p.patch [bz#1172749]- aavmf-OvmfPkg-extract-QemuBootOrderLib.patch [bz#1172749]- aavmf-OvmfPkg-QemuBootOrderLib-featurize-PCI-like-device-p.patch [bz#1172749]- aavmf-OvmfPkg-introduce-VIRTIO_MMIO_TRANSPORT_GUID.patch [bz#1172749]- aavmf-ArmVirtualizationPkg-VirtFdtDxe-use-dedicated-VIRTIO.patch [bz#1172749]- aavmf-OvmfPkg-QemuBootOrderLib-widen-ParseUnitAddressHexLi.patch [bz#1172749]- aavmf-OvmfPkg-QemuBootOrderLib-OFW-to-UEFI-translation-for.patch [bz#1172749]- aavmf-ArmVirtualizationPkg-PlatformIntelBdsLib-adhere-to-Q.patch [bz#1172749]- aavmf-ArmVirtualizationPkg-identify-new-shell-as-builtin-s.patch [bz#1172749]- aavmf-ArmVirtualizationPkg-Intel-BDS-load-EFI-stubbed-Linu.patch [bz#1172749]- aavmf-spec-build-AAVMF-with-the-Intel-BDS-driver-RHELSA-on.patch [bz#1172749]- aavmf-Revert-ArmVirtualizationPkg-work-around-cache-incohe.patch [bz#1172910]- Resolves: bz#1172749 (implement fw_cfg, boot order handling, and -kernel booting in ArmVirtualizationQemu)- Resolves: bz#1172910 (revert Acadia-only workaround (commit df7bca4e) once Acadia host kernel (KVM) is fixed)
* Fri Dec 05 2014 Miroslav Rezanina - OVMF-20140822-7.git9ece15a.el7- ovmf-MdePkg-UefiScsiLib-do-not-encode-LUN-in-CDB-for-READ.patch [bz#1166971]- ovmf-MdePkg-UefiScsiLib-do-not-encode-LUN-in-CDB-for-othe.patch [bz#1166971]- Resolves: bz#1166971 (virtio-scsi disks and cd-roms with nonzero LUN are rejected with errors)
* Tue Nov 25 2014 Miroslav Rezanina - OVMF-20140822-6.git9ece15a.el7- ovmf-OvmfPkg-AcpiPlatformDxe-make-dependency-on-PCI-enume.patch [bz#1166027]- Resolves: bz#1166027 (backport \"OvmfPkg: AcpiPlatformDxe: make dependency on PCI enumeration explicit\")
* Tue Nov 18 2014 Miroslav Rezanina - OVMF-20140822-4.git9ece15a.el7- ovmf-Add-comments-to-clarify-mPubKeyStore-buffer-MemCopy.patch [bz#1162314]- ovmf-MdeModulePkg-SecurityPkg-Variable-Add-boundary-check.patch [bz#1162314]- Resolves: bz#1162314 (EMBARGOED OVMF: uefi: INTEL-TA-201410-001 && INTEL-TA-201410-002 [rhel-7.1])
* Thu Nov 13 2014 Laszlo Ersek - AAVMF-20141113-1.git77d5dac- rebased to upstream 77d5dac - patch \"ArmVirtualizationPkg: FdtPL011SerialPortLib: support UEFI_APPLICATION\" is now upstream (SVN r16219, git edb5073)
* Thu Nov 13 2014 Miroslav Rezanina - OVMF-20140822-3.git9ece15a.el7- ovmf-Revert-OvmfPkg-set-video-resolution-of-text-setup-to.patch [bz#1153927]- ovmf-Try-to-read-key-strike-even-when-the-TimeOuts-value-.patch [bz#1153927]- ovmf-OvmfPkg-BDS-remove-dead-call-to-PlatformBdsEnterFron.patch [bz#1153927]- ovmf-OvmfPkg-BDS-drop-useless-return-statement.patch [bz#1153927]- ovmf-OvmfPkg-BDS-don-t-overwrite-the-BDS-Front-Page-timeo.patch [bz#1153927]- ovmf-OvmfPkg-BDS-optimize-second-argument-in-PlatformBdsE.patch [bz#1153927]- ovmf-OvmfPkg-BDS-drop-superfluous-connect-first-boot-opti.patch [bz#1153927]- ovmf-OvmfPkg-BDS-drop-custom-boot-timeout-revert-to-Intel.patch [bz#1153927]- ovmf-OvmfPkg-set-video-resolution-of-text-setup-to-640x48.patch [bz#1153927]- Resolves: bz#1153927 (set NEXTBOOT to uefi setting failed from Windows Recovery console)
* Tue Nov 11 2014 Miroslav Rezanina - OVMF-20140822-2.git9ece15a- ovmf-redhat-process-rh-specific.sh-suppress-missing-files.patch [bz#1145784]- ovmf-Revert-RH-only-OvmfPkg-QemuVideoDxe-fix-querying-of-.patch [bz#1145784]- ovmf-Revert-RH-only-OvmfPkg-AcpiPlatformDxe-implement-QEM.patch [bz#1145784]- ovmf-Revert-RH-only-OvmfPkg-AcpiPlatformDxe-remove-curren.patch [bz#1145784]- ovmf-Revert-RH-only-OvmfPkg-AcpiPlatformDxe-actualize-Qem.patch [bz#1145784]- ovmf-Revert-RH-only-OvmfPkg-resolve-OrderedCollectionLib-.patch [bz#1145784]- ovmf-OvmfPkg-QemuVideoDxe-work-around-misreported-QXL-fra.patch [bz#1145784]- ovmf-OvmfPkg-resolve-OrderedCollectionLib-with-base-red-b.patch [bz#1145784]- ovmf-OvmfPkg-AcpiPlatformDxe-actualize-QemuLoader.h-comme.patch [bz#1145784]- ovmf-OvmfPkg-AcpiPlatformDxe-remove-current-ACPI-table-lo.patch [bz#1145784]- ovmf-OvmfPkg-AcpiPlatformDxe-implement-QEMU-s-full-ACPI-t.patch [bz#1145784]- ovmf-spec-build-small-bootable-ISO-with-standalone-UEFI-s.patch [bz#1147592]- ovmf-OvmfPkg-allow-exclusion-of-the-shell-from-the-firmwa.patch [bz#1147592]- ovmf-spec-exclude-the-UEFI-shell-from-the-SecureBoot-enab.patch [bz#1147592]- ovmf-OvmfPkg-EnrollDefaultKeys-application-for-enrolling-.patch [bz#1148296]- ovmf-spec-package-EnrollDefaultKeys.efi-on-UefiShell.iso-.patch [bz#1148296]- ovmf-OvmfPkg-disable-stale-fork-of-SecureBootConfigDxe.patch [bz#1148294]- ovmf-OvmfPkg-SecureBootConfigDxe-remove-stale-fork.patch [bz#1148294]- Resolves: bz#1145784 (OVMF sync with QXL and ACPI patches up to edk2 7a9612ce)- Resolves: bz#1147592 (the binary RPM should include a small ISO file with a directly bootable UEFI shell binary)- Resolves: bz#1148294 (drop OvmfPkg\'s stale fork of SecureBootConfigDxe)- Resolves: bz#1148296 (provide a non-interactive way to auto-enroll important SecureBoot certificates)
* Wed Oct 15 2014 Laszlo Ersek - AAVMF-20141015-1.gitc373687- ported packaging to aarch64 / AAVMF
* Fri Aug 22 2014 Laszlo Ersek - 20140822-1.git9ece15a.el7- rebase from upstream 3facc08 to 9ece15a- update to openssl-0.9.8zb- update to FatPkg SVN r86 (git 2355ea2c)- the following patches of Paolo Bonzini have been merged in upstream; drop the downstream-only copies: 7bc1421 edksetup.sh: Look for BuildEnv under EDK_TOOLS_PATH d549344 edksetup.sh: Ensure that WORKSPACE points to the top of an edk2 checkout 1c023eb BuildEnv: remove useless check before setting $WORKSPACE- include the following patches that have been pending review on the upstream list for a long time: [PATCH 0/4] OvmfPkg: complete client for QEMU\'s ACPI loader interface http://thread.gmane.org/gmane.comp.bios.tianocore.devel/8369 [PATCH] OvmfPkg: QemuVideoDxe: fix querying of QXL\'s drawable buffer size http://thread.gmane.org/gmane.comp.bios.tianocore.devel/8515- nasm is a build-time dependency now because upstream BuildTools has started to call it directly
* Wed Jul 23 2014 Laszlo Ersek - 20140723-1.git3facc08.el7- rebase from upstream a618eaa to 3facc08- update to openssl-0.9.8za- drop downstream-only split varstore patch, rely on upstream\'s
* Tue Jun 24 2014 Miroslav Rezanina - 20140619-1.gita618eaa.el7- Initial version