Releases: microsoft/mu_silicon_arm_tiano
v2024050001.0.2
What's Changed
-
[CHERRY-PICK] Fix while loop in delegated event API @kuqin12 (#309)
Change Details
## Description
This commit introduced the bug
de3cf0c#diff-516242aa392b05a93f0222ff1e534b10a1f905124a16abd5704fa938d6590b48R143 where the swtch case and if loop for return status were moved outside the while loopFor details on how to complete these options and their meaning refer to CONTRIBUTING.md.
- Impacts functionality?
- Impacts security?
- Breaking change?
- Includes tests?
- Includes documentation?
- Backport to release branch?
How This Was Tested
Tested on arm platform
Integration Instructions
N/A
(cherry picked from commit bd20dd8)
Full Changelog: v2024050001.0.1...v2024050001.0.2
v2024050001.0.1
What's Changed
-
[REBASE \& FF] ArmPkg: Fix call to BuildCpuHob in CpuPei.c @VivianNK (#296)
Change Details
## Description
Cherry picking the following commit from dev/202405
2fb024fFix CpuPei.c for aarch64. Cast type on return value from ArmGetPhysicalAddressBits.
- Impacts functionality?
- Impacts security?
- Breaking change?
- Includes tests?
- Includes documentation?
How This Was Tested
Tested in dev/202405.
Validated handoff on virtual platform bringupIntegration Instructions
N/A
-
[CHERRY-PICK] [REBASE \& FF] Revert Mu Commit in Favor of edk2 Commit @os-d (#281)
Change Details
## Description
This reverts a Mu commit that has been upstreamed in favor of the corresponding edk2 commit.
- Impacts functionality?
- Impacts security?
- Breaking change?
- Includes tests?
- Includes documentation?
How This Was Tested
N/A.
Integration Instructions
N/A.
</blockquote> <hr> </details>
🐛 Bug Fixes
-
ArmPkg: CpuDxe: Fix Bad Cast @os-d (#298)
Change Details
## Description
When 2405 was done, the inexact order of rebasing caused an old commit 41c7073 to take precedence over a newer commit 38ba4a6.
This causes the upper attributes to be dropped, which in the case of an invalid entry, will send 0xFFFFFFFF to be set as attributes to set in the GCD, instead of signifying an INVALID_ENTRY, because (UINT32)INVALID_ENTRY != INVALID_ENTRY.
- Impacts functionality?
- Impacts security?
- Breaking change?
- Includes tests?
- Includes documentation?
How This Was Tested
On a platform where this was failing.
Integration Instructions
N/A.
-
[REBASE \& FF] ArmPkg: Remove pragma pack from CpuDxe @VivianNK (#294)
Change Details
## Description
PageTableMemoryAllocation.c
The packing was causing an MSVC ARM64 build warning #4366: The result of the unary '&' operator may be unaligned
Cherry-picked from dev/202405: 1ad3ff0
- Impacts functionality?
- Impacts security?
- Breaking change?
- Includes tests?
- Includes documentation?
How This Was Tested
Boot to QEMU SBSA
Integration Instructions
N/A
Full Changelog: v2024050001.0.0...v2024050001.0.1
v2024050001.0.0
What's Changed
⚠️ Breaking Changes
-
[CHERRY-PICK][REBASE \& FF] Revert Mu Commits in Favor of edk2 Commits @os-d (#280)
Change Details
## Description
This PR represents the set of mu_silicon_arm_tiano changes I have upstreamed to edk2 for 202405 thus far. Some of these were taken directly to edk2 and the others were reverted in release/202405 and then cherry-picked from edk2 to ensure that scripting would catch that we need to drop the old commits when integrating next.
- Impacts functionality?
- Impacts security?
- Breaking change?
- Includes tests?
- Includes documentation?
How This Was Tested
N/A.
Integration Instructions
ArmPsciResetSystemLib is removed in edk2 as well as release/202405 now. Any users need to move to ArmSmcPsciResetSystemLib.
</blockquote> <hr> </details>
Full Changelog: v2024050000.0.0...v2024050001.0.0
v2024050000.0.0
Initial Release notes of 202405 contain a full list of mu changes on top of edk2-stable202405
PR associated with the commit can be found at the bottom of the information pane reached by clicking on the commit hash
What's Changed## 🚀 Features & ✨ Enhancements
-
pip: Update all pip-requirements to latest. (#279)
-
Repo File Sync: 202405 Branch Transition Updates. (#278)
-
Update ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.c
-
.pytool/CISettings: Disable CodeQL Audit Mode.
-
ArmPkg: CodeQL Fixes.
-
ArmPlatformPkg: CodeQL Fixes.
-
TCMORPH: Squash on Rebase: Delete ArmVirtPkg
-
DynamicTablesPkg: TableHelperLib: Add Missing Libraries
-
Updated Release Notes. (#271)
-
Revert "ArmPkg: ArmGicLib: Added support to send SGI to NS G1 EL1"
-
Revert "ArmGicLib/ArmGicV3: Update ICC_SG1R register"
-
MemoryInitPei: Remove Non-RT Types from Mem Type Info HOB
-
[Squash on Rebase] ArmPkg: Update ExceptionSupport.masm
-
ArmPkg: Flush the FIFO when initializing the PL011 Serial Lib (#227)
-
ArmPkg: SmmVariablePei: Introduce variable read service in PEI
-
ArmPkg: Replace ArmPkg instrinsic lib with MdePkg copy for ARM intrinsics.
-
Updated .git-blame-ignore-revs to latest commit updating line endings
-
Changed all line endings to CRLF in the repo
-
[2405] Revert "ArmPkg: ArmPsciMpServicesDxe: Fix CPU resource leakage" (#256)
-
Install Empty GCD Sync Protocol After SyncCacheConfig() (#228)
-
ArmPlatformPkg: Consume PEI ArmMmuLib
-
Implement Memory Attribute Protocol Installation Policy Option (#200)
-
ArmPlatformPkg: PL031RealTimeClockLib: Set MMIO Memory NX
-
ArmVirtPkg: KvmtoolRtcFdtClientLib: Set MMIO Memory NX
-
Sync AARCH64 GCD Capabilities with Page Table (#89)
-
Update the ARM MemoryAttributeProtocol to Not Check if Region is System Memory
-
ArmPkg:CpuDxe: Use the Memory Protection HOB
-
ArmVirtPkg: QemuVirtMemInfoPeiLib: Allow PcdSystemMemorySize to be non-fixed
-
ArmPlatformPkg: Updated PL011UartLib.c to not wait indefinitely during read
-
ArmVirtPkg: Fix MarkdownLint issues in Readme
-
ArmPkg: ArmPsciMpServicesDxe: Fix CPU resource leakage
-
ArmPkg: PlatformBootManagerLib: Add missing function required by Project Mu bds
-
ArmPlatformPkg: Update LcdHwNullLib to prevent init
-
ArmPkg: GICv3: Fix ARM_GICD_IROUTER incorrect writes for SPIs
v2023110001.0.2
What's Changed
-
Set PciFunction to 0xFFFF for \_PRT per specification @Javagedes (#258)
Change Details
## Description
partially reverts #37 which updated the PciFunction to no longer be 0xFFFF for _PRT which goes against the ACPI specification that states that the PciFunction should be 0xFFFF for _PRT.
This is per ACPI specification 6.4 section 6.2.13
- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
N/A - Spec compliance
Integration Instructions
Platforms should verify PciFunction for _PRT is 0xFFFF
- Impacts functionality?
Full Changelog: v2023110001.0.1...v2023110001.0.2
v2023110001.0.1
What's Changed
🐛 Bug Fixes
-
[Rebase \& FF] Adding support to build with CLANGPDB @kuqin12 (#231)
Change Details
## Description
The CLANGPDB does not support directives such as
.type
and.size
. This change removes them from the macro definitions when building with CLANGPDB.- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
This was tested on QEMU SBSA and booted to UEFI Shell.
Integration Instructions
N/A
- Impacts functionality?
Full Changelog: v2023110001.0.0...v2023110001.0.1
v2023110001.0.0
What's Changed
-
Flush the FIFO when initializing the PL011 Serial Lib @cfernald (#227)
Change Details
## Description
Adds logic to the PL011 initialization that will flush the FIFO. Without this change it's possible for garbage or stale data to be read from the UART which can causes unexpected behavior or hangs during boot.
- Impacts functionality?
- Impacts security?
- Breaking change?
- Includes tests?
- Includes documentation?
How This Was Tested
Tested on physical and virtual platform
Integration Instructions
N/A
</blockquote> <hr> </details>
⚠️ Breaking Changes
-
Pre-Allocate Page Table Memory in ArmMmuLib @TaylorBeebe (#220)
Change Details
## Description
Allocating memory when memory protection is active can cause the below infinite loop:
- MemoryAttributeProtocol->SetMemoryAttributes(EFI_MEMORY_RO)
- ArmSetMemoryRegionReadOnly ()
- SetMemoryRegionAttribute()
- UpdateRegionMapping()
- UpdateRegionMappingRecursive()
- AllocatePages() -> Need memory for a translation table entry
- CoreAllocatePages()
- ApplyMemoryProtectionPolicy() -> Policy says new page should be XN
- gCpu->SetMemoryAttributes()
- Back to 3
To fix this previously, CpuDxe would update conventional memory to be XN prior to installing the CpuArch protocol. However, when we transition to setting EFI_MEMORY_RP on free memory, this will no longer work.
This PR updates ArmMmuLib to reserve page table memory for allocation during table spits to prevent the infinite loop.
- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
Tested on SBSA by creating the scenario where the infinite loop (without the XN remap routine in place) and booting successfully. This was also tested using the EFI_MEMORY_RP on free memory feature branch.
Integration Instructions
Platforms which are using ArmMmuBaseLib for PEIM, PEI_CORE, and SEC modules will need to switch those module types to use ArmMmuPeiLib.
[LibraryClasses.common.SEC, LibraryClasses.common.PEIM, LibraryClasses.common.PEI_CORE] ArmMmuLib|ArmPkg/Library/ArmMmuLib/ArmMmuPeiLib.inf
</blockquote> <hr> </details>
🚀 Features & ✨ Enhancements
-
Pre-Allocate Page Table Memory in ArmMmuLib @TaylorBeebe (#220)
Change Details
## Description
Allocating memory when memory protection is active can cause the below infinite loop:
- MemoryAttributeProtocol->SetMemoryAttributes(EFI_MEMORY_RO)
- ArmSetMemoryRegionReadOnly ()
- SetMemoryRegionAttribute()
- UpdateRegionMapping()
- UpdateRegionMappingRecursive()
- AllocatePages() -> Need memory for a translation table entry
- CoreAllocatePages()
- ApplyMemoryProtectionPolicy() -> Policy says new page should be XN
- gCpu->SetMemoryAttributes()
- Back to 3
To fix this previously, CpuDxe would update conventional memory to be XN prior to installing the CpuArch protocol. However, when we transition to setting EFI_MEMORY_RP on free memory, this will no longer work.
This PR updates ArmMmuLib to reserve page table memory for allocation during table spits to prevent the infinite loop.
- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
Tested on SBSA by creating the scenario where the infinite loop (without the XN remap routine in place) and booting successfully. This was also tested using the EFI_MEMORY_RP on free memory feature branch.
Integration Instructions
Platforms which are using ArmMmuBaseLib for PEIM, PEI_CORE, and SEC modules will need to switch those module types to use ArmMmuPeiLib.
[LibraryClasses.common.SEC, LibraryClasses.common.PEIM, LibraryClasses.common.PEI_CORE] ArmMmuLib|ArmPkg/Library/ArmMmuLib/ArmMmuPeiLib.inf
</blockquote> <hr> </details>
🔐 Security Impacting
-
Install Empty GCD Sync Protocol After SyncCacheConfig() @TaylorBeebe (#228)
Change Details
## Description
With the addition of the following commit in MU_BASECORE, the ordering of memory protection initialization and the GCD sync has been flipped so the GCD sync occurs first: microsoft/mu_basecore@144e3fe
This reverse ordering was done to support RP on free memory because if the initialization was done first then the allocate memory calls during GCD sync would cause page faults because the attributes cannot be changed during the syncing process.
This PR installs the GCD sync complete protocol so the memory protection initialization routine is signaled.
- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
Tested by booting SBSA to shell with RP on free memory active
Integration Instructions
N/A
- Impacts functionality?
Full Changelog: v2023110000.0.1...v2023110001.0.0
v2023110000.0.1
What's Changed
-
Fixing the target list to support GIC v3 and above @kuqin12 (#226)
Change Details
# Preface
Please ensure you have read the contribution docs prior
to submitting the pull request. In particular,
pull request guidelines.Description
The edk2 change recently updated the CPU target list to be UINT8 only. However, when it comes to GIC v3 and above, we need to prepare the register value from the MPIDR value of the target core, which is a UINTN.
This change update the edk2 change to remain the expectation of GIC v3+ usage.
For each item, place an "x" in between
[
and]
if true. Example:[x]
.
(you can also check items in the GitHub UI)- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
Tested on QEMU SBSA and proprietary physical platforms.
Integration Instructions
N/A
</blockquote> <hr> </details>
- Impacts functionality?
-
[CHERRY-PICK] Add StackCheckLib Instances to Platform DSC Files (#216) @TaylorBeebe (#217)
Change Details
## Description
An instance of StackCheckLib must be in each DSC to accommodate -fstack-protector and /GS flags.
- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware?- Examples: Crypto algorithm change, buffer overflow fix, parameter validation improvement, ...
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ... - Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
How This Was Tested
Tested in pipelines
Integration Instructions
N/A
</blockquote> <hr> </details>
-
remove edk2-basetools @Javagedes (#211)
Change Details
## Description
Removes edk2-basetools from pip-requirements.txt and any usage of it in the CISettings.py. The is done as there are changes in the build tools python source code that are available locally in BaseTools (as it is managed by Project Mu) that is not available in edk2-basetools.
- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
Verified the build system continues to use the local python source
Integration Instructions
N/A - only effects this repository's CI system.
</blockquote> <hr> </details>
- Impacts functionality?
Full Changelog: v2023110000.0.0...v2023110000.0.1
v2023110000.0.0
What's Changed
First 202311 Mu Silicon Arm Tiano release 🎉.
-
[Rebase \& FF] [Cherry-pick] Get all the missing commits from 202302 into 202311 @kenlautner (#205)
Change Details
## Description
Cherry-pick the commits from 202302 that are missing from 202311 since the creation of the release branch.
- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
CI
Integration Instructions
N/A
- Impacts functionality?
-
[REBASE \& FF] Fix CodeQL Issues in AmlLib and PL061GPIO @os-d (#202)
Change Details
## Description
Both of these components failed a CodeQL check for comparing non-equal width types in a loop. This fixes the issue.
For each item, place an "x" in between
[
and]
if true. Example:[x]
.
(you can also check items in the GitHub UI)- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
Confirmed CI passed
Integration Instructions
N/A
- Impacts functionality?
-
Added a few additional functions to MSFT version of AArch64Support ass… @apop5 (#196)
Change Details
## Description `ArmReadIdAA64Dfr0` and `ArmReadIdAA64Mmfr0` are defined in the ArmLib, but the functions did not exist in the MSFT version of the assembly file.
Adding the functions to being MSFT assembly inline with the GCC assembly file.
- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
CI compilation of the library using MSVC AARCH64 completed successfully.
Integration Instructions
N/A
- Impacts functionality?
-
Updated CISettings.py to use the edk2toolext codeql helpers @kenlautner (#195)
Change Details
## Description
The 202311 rebase moved the codeql plugin from .pytool to Basetools. This requires a change in CISettings.py to reference the correct codeql helper functions. Instead of using the internal versions we instead move to the edk2 pytool extensions version.
- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
Tested with CI.
Integration Instructions
N/A
- Impacts functionality?
Full Changelog: ...v0.1.0
v2023020000.1.5
What's Changed
-
Update pip-requirements.txt @Javagedes (#199)
Change Details
## Description
Updates edk2-pytool-extensions and edk2-pytool-library to work with the latest commit of MU_BASECORE
For each item, place an "x" in between
[
and]
if true. Example:[x]
.
(you can also check items in the GitHub UI)- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
N/A
Integration Instructions
N/A
- Impacts functionality?
Full Changelog: v2023020000.1.4...v2023020000.1.5