Skip to content

Releases: microsoft/mu_silicon_arm_tiano

v2024050001.0.2

15 Nov 23:50
Compare
Choose a tag to compare

What's Changed

  • [CHERRY-PICK] Fix while loop in delegated event API @kuqin12 (#309)
    Change Details
      ## Description

    This commit introduced the bug
    de3cf0c#diff-516242aa392b05a93f0222ff1e534b10a1f905124a16abd5704fa938d6590b48R143 where the swtch case and if loop for return status were moved outside the while loop

    For details on how to complete these options and their meaning refer to CONTRIBUTING.md.

    • Impacts functionality?
    • Impacts security?
    • Breaking change?
    • Includes tests?
    • Includes documentation?
    • Backport to release branch?

    How This Was Tested

    Tested on arm platform

    Integration Instructions

    N/A

    (cherry picked from commit bd20dd8)




Full Changelog: v2024050001.0.1...v2024050001.0.2

v2024050001.0.1

11 Nov 20:31
Compare
Choose a tag to compare

What's Changed

  • [REBASE \& FF] ArmPkg: Fix call to BuildCpuHob in CpuPei.c @VivianNK (#296)
    Change Details
      ## Description

    Cherry picking the following commit from dev/202405
    2fb024f

    Fix CpuPei.c for aarch64. Cast type on return value from ArmGetPhysicalAddressBits.

    • Impacts functionality?
    • Impacts security?
    • Breaking change?
    • Includes tests?
    • Includes documentation?

    How This Was Tested

    Tested in dev/202405.
    Validated handoff on virtual platform bringup

    Integration Instructions

    N/A




  • [CHERRY-PICK] [REBASE \& FF] Revert Mu Commit in Favor of edk2 Commit @os-d (#281)
    Change Details
      ## Description

    This reverts a Mu commit that has been upstreamed in favor of the corresponding edk2 commit.

    • Impacts functionality?
    • Impacts security?
    • Breaking change?
    • Includes tests?
    • Includes documentation?

    How This Was Tested

    N/A.

    Integration Instructions

    N/A.

      </blockquote>
      <hr>
    </details>
    

🐛 Bug Fixes

  • ArmPkg: CpuDxe: Fix Bad Cast @os-d (#298)
    Change Details
      ## Description

    When 2405 was done, the inexact order of rebasing caused an old commit 41c7073 to take precedence over a newer commit 38ba4a6.

    This causes the upper attributes to be dropped, which in the case of an invalid entry, will send 0xFFFFFFFF to be set as attributes to set in the GCD, instead of signifying an INVALID_ENTRY, because (UINT32)INVALID_ENTRY != INVALID_ENTRY.

    • Impacts functionality?
    • Impacts security?
    • Breaking change?
    • Includes tests?
    • Includes documentation?

    How This Was Tested

    On a platform where this was failing.

    Integration Instructions

    N/A.




  • [REBASE \& FF] ArmPkg: Remove pragma pack from CpuDxe @VivianNK (#294)
    Change Details
      ## Description

    PageTableMemoryAllocation.c

    The packing was causing an MSVC ARM64 build warning #4366: The result of the unary '&' operator may be unaligned

    Cherry-picked from dev/202405: 1ad3ff0

    • Impacts functionality?
    • Impacts security?
    • Breaking change?
    • Includes tests?
    • Includes documentation?

    How This Was Tested

    Boot to QEMU SBSA

    Integration Instructions

    N/A




Full Changelog: v2024050001.0.0...v2024050001.0.1

v2024050001.0.0

12 Sep 17:37
0cee429
Compare
Choose a tag to compare

What's Changed

⚠️ Breaking Changes

  • [CHERRY-PICK][REBASE \& FF] Revert Mu Commits in Favor of edk2 Commits @os-d (#280)
    Change Details
      ## Description

    This PR represents the set of mu_silicon_arm_tiano changes I have upstreamed to edk2 for 202405 thus far. Some of these were taken directly to edk2 and the others were reverted in release/202405 and then cherry-picked from edk2 to ensure that scripting would catch that we need to drop the old commits when integrating next.

    • Impacts functionality?
    • Impacts security?
    • Breaking change?
    • Includes tests?
    • Includes documentation?

    How This Was Tested

    N/A.

    Integration Instructions

    ArmPsciResetSystemLib is removed in edk2 as well as release/202405 now. Any users need to move to ArmSmcPsciResetSystemLib.

      </blockquote>
      <hr>
    </details>
    

Full Changelog: v2024050000.0.0...v2024050001.0.0

v2024050000.0.0

26 Aug 22:45
f3c67bd
Compare
Choose a tag to compare

Initial Release notes of 202405 contain a full list of mu changes on top of edk2-stable202405

PR associated with the commit can be found at the bottom of the information pane reached by clicking on the commit hash
image

What's Changed## 🚀 Features & ✨ Enhancements

  • pip: Update all pip-requirements to latest. (#279)
    Change Details
      f3c67bd

  • Repo File Sync: 202405 Branch Transition Updates. (#278)
    Change Details
      3a7ed56

  • Update ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.c
    Change Details
      2a1fc7a

  • .pytool/CISettings: Disable CodeQL Audit Mode.
    Change Details
      45462a1

  • ArmPkg: CodeQL Fixes.
    Change Details
      766364c

  • ArmPlatformPkg: CodeQL Fixes.
    Change Details
      aded147

  • TCMORPH: Squash on Rebase: Delete ArmVirtPkg
    Change Details
      7d946d7

  • DynamicTablesPkg: TableHelperLib: Add Missing Libraries
    Change Details
      e83c9a2

  • Updated Release Notes. (#271)
    Change Details
      ab7596f

  • Revert "ArmPkg: ArmGicLib: Added support to send SGI to NS G1 EL1"
    Change Details
      3ef1cb1

  • Revert "ArmGicLib/ArmGicV3: Update ICC_SG1R register"
    Change Details
      bf2076f

  • MemoryInitPei: Remove Non-RT Types from Mem Type Info HOB
    Change Details
      e957a18

  • [Squash on Rebase] ArmPkg: Update ExceptionSupport.masm
    Change Details
      515de56

  • ArmPkg: Flush the FIFO when initializing the PL011 Serial Lib (#227)
    Change Details
      55d7a01

  • ArmPkg: SmmVariablePei: Introduce variable read service in PEI
    Change Details
      852a5e5

  • ArmPkg: Replace ArmPkg instrinsic lib with MdePkg copy for ARM intrinsics.
    Change Details
      5b44a2e

  • Updated .git-blame-ignore-revs to latest commit updating line endings
    Change Details
      a94bff1

  • Changed all line endings to CRLF in the repo
    Change Details
      be77a30

  • [2405] Revert "ArmPkg: ArmPsciMpServicesDxe: Fix CPU resource leakage" (#256)
    Change Details
      bb6ba6f

  • Install Empty GCD Sync Protocol After SyncCacheConfig() (#228)
    Change Details
      258df5a

  • ArmPlatformPkg: Consume PEI ArmMmuLib
    Change Details
      d0c3da1

  • Implement Memory Attribute Protocol Installation Policy Option (#200)
    Change Details
      702ec3d

  • ArmPlatformPkg: PL031RealTimeClockLib: Set MMIO Memory NX
    Change Details
      f0ce81f

  • ArmVirtPkg: KvmtoolRtcFdtClientLib: Set MMIO Memory NX
    Change Details
      d7aeaa0

  • Sync AARCH64 GCD Capabilities with Page Table (#89)
    Change Details
      fb49fe6

  • Update the ARM MemoryAttributeProtocol to Not Check if Region is System Memory
    Change Details
      3c19214

  • ArmPkg:CpuDxe: Use the Memory Protection HOB
    Change Details
      3ef1e60

  • ArmVirtPkg: QemuVirtMemInfoPeiLib: Allow PcdSystemMemorySize to be non-fixed
    Change Details
      9a1e08a

  • ArmPlatformPkg: Updated PL011UartLib.c to not wait indefinitely during read
    Change Details
      100b667

  • ArmVirtPkg: Fix MarkdownLint issues in Readme
    Change Details
      d46197e

  • ArmPkg: ArmPsciMpServicesDxe: Fix CPU resource leakage
    Change Details
      05caf20

  • ArmPkg: PlatformBootManagerLib: Add missing function required by Project Mu bds
    Change Details
      8bee9b0

  • ArmPlatformPkg: Update LcdHwNullLib to prevent init
    Change Details
      14e357e

  • ArmPkg: GICv3: Fix ARM_GICD_IROUTER incorrect writes for SPIs
Read more

v2023110001.0.2

09 Aug 18:26
64f23ba
Compare
Choose a tag to compare

What's Changed

  • Set PciFunction to 0xFFFF for \_PRT per specification @Javagedes (#258)
    Change Details
      ## Description

    partially reverts #37 which updated the PciFunction to no longer be 0xFFFF for _PRT which goes against the ACPI specification that states that the PciFunction should be 0xFFFF for _PRT.

    This is per ACPI specification 6.4 section 6.2.13

    image

    • Impacts functionality?
      • Functionality - Does the change ultimately impact how firmware functions?
      • Examples: Add a new library, publish a new PPI, update an algorithm, ...
    • Impacts security?
      • Security - Does the change have a direct security impact on an application,
        flow, or firmware?
      • Examples: Crypto algorithm change, buffer overflow fix, parameter
        validation improvement, ...
    • Breaking change?
      • Breaking change - Will anyone consuming this change experience a break
        in build or boot behavior?
      • Examples: Add a new library class, move a module to a different repo, call
        a function in a new library class in a pre-existing module, ...
    • Includes tests?
      • Tests - Does the change include any explicit test code?
      • Examples: Unit tests, integration tests, robot tests, ...
    • Includes documentation?
      • Documentation - Does the change contain explicit documentation additions
        outside direct code modifications (and comments)?
      • Examples: Update readme file, add feature readme file, link to documentation
        on an a separate Web page, ...

    How This Was Tested

    N/A - Spec compliance

    Integration Instructions

    Platforms should verify PciFunction for _PRT is 0xFFFF




Full Changelog: v2023110001.0.1...v2023110001.0.2

v2023110001.0.1

05 Jun 18:50
dd475da
Compare
Choose a tag to compare

What's Changed

🐛 Bug Fixes

  • [Rebase \& FF] Adding support to build with CLANGPDB @kuqin12 (#231)
    Change Details
      ## Description

    The CLANGPDB does not support directives such as .type and .size. This change removes them from the macro definitions when building with CLANGPDB.

    • Impacts functionality?
      • Functionality - Does the change ultimately impact how firmware functions?
      • Examples: Add a new library, publish a new PPI, update an algorithm, ...
    • Impacts security?
      • Security - Does the change have a direct security impact on an application,
        flow, or firmware?
      • Examples: Crypto algorithm change, buffer overflow fix, parameter
        validation improvement, ...
    • Breaking change?
      • Breaking change - Will anyone consuming this change experience a break
        in build or boot behavior?
      • Examples: Add a new library class, move a module to a different repo, call
        a function in a new library class in a pre-existing module, ...
    • Includes tests?
      • Tests - Does the change include any explicit test code?
      • Examples: Unit tests, integration tests, robot tests, ...
    • Includes documentation?
      • Documentation - Does the change contain explicit documentation additions
        outside direct code modifications (and comments)?
      • Examples: Update readme file, add feature readme file, link to documentation
        on an a separate Web page, ...

    How This Was Tested

    This was tested on QEMU SBSA and booted to UEFI Shell.

    Integration Instructions

    N/A




Full Changelog: v2023110001.0.0...v2023110001.0.1

v2023110001.0.0

22 May 17:46
d52a3ed
Compare
Choose a tag to compare

What's Changed

  • Flush the FIFO when initializing the PL011 Serial Lib @cfernald (#227)
    Change Details
      ## Description

    Adds logic to the PL011 initialization that will flush the FIFO. Without this change it's possible for garbage or stale data to be read from the UART which can causes unexpected behavior or hangs during boot.

    • Impacts functionality?
    • Impacts security?
    • Breaking change?
    • Includes tests?
    • Includes documentation?

    How This Was Tested

    Tested on physical and virtual platform

    Integration Instructions

    N/A

      </blockquote>
      <hr>
    </details>
    

⚠️ Breaking Changes

  • Pre-Allocate Page Table Memory in ArmMmuLib @TaylorBeebe (#220)
    Change Details
      ## Description

    Allocating memory when memory protection is active can cause the below infinite loop:

    1. MemoryAttributeProtocol->SetMemoryAttributes(EFI_MEMORY_RO)
    2. ArmSetMemoryRegionReadOnly ()
    3. SetMemoryRegionAttribute()
    4. UpdateRegionMapping()
    5. UpdateRegionMappingRecursive()
    6. AllocatePages() -> Need memory for a translation table entry
    7. CoreAllocatePages()
    8. ApplyMemoryProtectionPolicy() -> Policy says new page should be XN
    9. gCpu->SetMemoryAttributes()
    10. Back to 3

    To fix this previously, CpuDxe would update conventional memory to be XN prior to installing the CpuArch protocol. However, when we transition to setting EFI_MEMORY_RP on free memory, this will no longer work.

    This PR updates ArmMmuLib to reserve page table memory for allocation during table spits to prevent the infinite loop.

    • Impacts functionality?
      • Functionality - Does the change ultimately impact how firmware functions?
      • Examples: Add a new library, publish a new PPI, update an algorithm, ...
    • Impacts security?
      • Security - Does the change have a direct security impact on an application,
        flow, or firmware?
      • Examples: Crypto algorithm change, buffer overflow fix, parameter
        validation improvement, ...
    • Breaking change?
      • Breaking change - Will anyone consuming this change experience a break
        in build or boot behavior?
      • Examples: Add a new library class, move a module to a different repo, call
        a function in a new library class in a pre-existing module, ...
    • Includes tests?
      • Tests - Does the change include any explicit test code?
      • Examples: Unit tests, integration tests, robot tests, ...
    • Includes documentation?
      • Documentation - Does the change contain explicit documentation additions
        outside direct code modifications (and comments)?
      • Examples: Update readme file, add feature readme file, link to documentation
        on an a separate Web page, ...

    How This Was Tested

    Tested on SBSA by creating the scenario where the infinite loop (without the XN remap routine in place) and booting successfully. This was also tested using the EFI_MEMORY_RP on free memory feature branch.

    Integration Instructions

    Platforms which are using ArmMmuBaseLib for PEIM, PEI_CORE, and SEC modules will need to switch those module types to use ArmMmuPeiLib.

    [LibraryClasses.common.SEC, LibraryClasses.common.PEIM, LibraryClasses.common.PEI_CORE]
      ArmMmuLib|ArmPkg/Library/ArmMmuLib/ArmMmuPeiLib.inf
    
      </blockquote>
      <hr>
    </details>
    

🚀 Features & ✨ Enhancements

  • Pre-Allocate Page Table Memory in ArmMmuLib @TaylorBeebe (#220)
    Change Details
      ## Description

    Allocating memory when memory protection is active can cause the below infinite loop:

    1. MemoryAttributeProtocol->SetMemoryAttributes(EFI_MEMORY_RO)
    2. ArmSetMemoryRegionReadOnly ()
    3. SetMemoryRegionAttribute()
    4. UpdateRegionMapping()
    5. UpdateRegionMappingRecursive()
    6. AllocatePages() -> Need memory for a translation table entry
    7. CoreAllocatePages()
    8. ApplyMemoryProtectionPolicy() -> Policy says new page should be XN
    9. gCpu->SetMemoryAttributes()
    10. Back to 3

    To fix this previously, CpuDxe would update conventional memory to be XN prior to installing the CpuArch protocol. However, when we transition to setting EFI_MEMORY_RP on free memory, this will no longer work.

    This PR updates ArmMmuLib to reserve page table memory for allocation during table spits to prevent the infinite loop.

    • Impacts functionality?
      • Functionality - Does the change ultimately impact how firmware functions?
      • Examples: Add a new library, publish a new PPI, update an algorithm, ...
    • Impacts security?
      • Security - Does the change have a direct security impact on an application,
        flow, or firmware?
      • Examples: Crypto algorithm change, buffer overflow fix, parameter
        validation improvement, ...
    • Breaking change?
      • Breaking change - Will anyone consuming this change experience a break
        in build or boot behavior?
      • Examples: Add a new library class, move a module to a different repo, call
        a function in a new library class in a pre-existing module, ...
    • Includes tests?
      • Tests - Does the change include any explicit test code?
      • Examples: Unit tests, integration tests, robot tests, ...
    • Includes documentation?
      • Documentation - Does the change contain explicit documentation additions
        outside direct code modifications (and comments)?
      • Examples: Update readme file, add feature readme file, link to documentation
        on an a separate Web page, ...

    How This Was Tested

    Tested on SBSA by creating the scenario where the infinite loop (without the XN remap routine in place) and booting successfully. This was also tested using the EFI_MEMORY_RP on free memory feature branch.

    Integration Instructions

    Platforms which are using ArmMmuBaseLib for PEIM, PEI_CORE, and SEC modules will need to switch those module types to use ArmMmuPeiLib.

    [LibraryClasses.common.SEC, LibraryClasses.common.PEIM, LibraryClasses.common.PEI_CORE]
      ArmMmuLib|ArmPkg/Library/ArmMmuLib/ArmMmuPeiLib.inf
    
      </blockquote>
      <hr>
    </details>
    

🔐 Security Impacting

  • Install Empty GCD Sync Protocol After SyncCacheConfig() @TaylorBeebe (#228)
    Change Details
      ## Description

    With the addition of the following commit in MU_BASECORE, the ordering of memory protection initialization and the GCD sync has been flipped so the GCD sync occurs first: microsoft/mu_basecore@144e3fe

    This reverse ordering was done to support RP on free memory because if the initialization was done first then the allocate memory calls during GCD sync would cause page faults because the attributes cannot be changed during the syncing process.

    This PR installs the GCD sync complete protocol so the memory protection initialization routine is signaled.

    • Impacts functionality?
      • Functionality - Does the change ultimately impact how firmware functions?
      • Examples: Add a new library, publish a new PPI, update an algorithm, ...
    • Impacts security?
      • Security - Does the change have a direct security impact on an application,
        flow, or firmware?
      • Examples: Crypto algorithm change, buffer overflow fix, parameter
        validation improvement, ...
    • Breaking change?
      • Breaking change - Will anyone consuming this change experience a break
        in build or boot behavior?
      • Examples: Add a new library class, move a module to a different repo, call
        a function in a new library class in a pre-existing module, ...
    • Includes tests?
      • Tests - Does the change include any explicit test code?
      • Examples: Unit tests, integration tests, robot tests, ...
    • Includes documentation?
      • Documentation - Does the change contain explicit documentation additions
        outside direct code modifications (and comments)?
      • Examples: Update readme file, add feature readme file, link to documentation
        on an a separate Web page, ...

    How This Was Tested

    Tested by booting SBSA to shell with RP on free memory active

    Integration Instructions

    N/A




Full Changelog: v2023110000.0.1...v2023110001.0.0

v2023110000.0.1

17 Apr 21:53
1819a69
Compare
Choose a tag to compare

What's Changed

  • Fixing the target list to support GIC v3 and above @kuqin12 (#226)
    Change Details
      # Preface

    Please ensure you have read the contribution docs prior
    to submitting the pull request. In particular,
    pull request guidelines.

    Description

    The edk2 change recently updated the CPU target list to be UINT8 only. However, when it comes to GIC v3 and above, we need to prepare the register value from the MPIDR value of the target core, which is a UINTN.

    This change update the edk2 change to remain the expectation of GIC v3+ usage.

    For each item, place an "x" in between [ and ] if true. Example: [x].
    (you can also check items in the GitHub UI)

    • Impacts functionality?
      • Functionality - Does the change ultimately impact how firmware functions?
      • Examples: Add a new library, publish a new PPI, update an algorithm, ...
    • Impacts security?
      • Security - Does the change have a direct security impact on an application,
        flow, or firmware?
      • Examples: Crypto algorithm change, buffer overflow fix, parameter
        validation improvement, ...
    • Breaking change?
      • Breaking change - Will anyone consuming this change experience a break
        in build or boot behavior?
      • Examples: Add a new library class, move a module to a different repo, call
        a function in a new library class in a pre-existing module, ...
    • Includes tests?
      • Tests - Does the change include any explicit test code?
      • Examples: Unit tests, integration tests, robot tests, ...
    • Includes documentation?
      • Documentation - Does the change contain explicit documentation additions
        outside direct code modifications (and comments)?
      • Examples: Update readme file, add feature readme file, link to documentation
        on an a separate Web page, ...

    How This Was Tested

    Tested on QEMU SBSA and proprietary physical platforms.

    Integration Instructions

    N/A

      </blockquote>
      <hr>
    </details>
    
  • [CHERRY-PICK] Add StackCheckLib Instances to Platform DSC Files (#216) @TaylorBeebe (#217)
    Change Details
      ## Description

    An instance of StackCheckLib must be in each DSC to accommodate -fstack-protector and /GS flags.

    • Impacts functionality?
    • Functionality - Does the change ultimately impact how firmware functions?
    • Examples: Add a new library, publish a new PPI, update an algorithm, ...
    • Impacts security?
    • Security - Does the change have a direct security impact on an application,
      flow, or firmware?
      • Examples: Crypto algorithm change, buffer overflow fix, parameter validation improvement, ...
    • Breaking change?
    • Breaking change - Will anyone consuming this change experience a break
      in build or boot behavior?
    • Examples: Add a new library class, move a module to a different repo, call
      a function in a new library class in a pre-existing module, ...
    • Includes tests?
      • Tests - Does the change include any explicit test code?
      • Examples: Unit tests, integration tests, robot tests, ...
    • Includes documentation?
    • Documentation - Does the change contain explicit documentation additions
      outside direct code modifications (and comments)?
    • Examples: Update readme file, add feature readme file, link to documentation
      on an a separate Web page, ...

    How This Was Tested

    Tested in pipelines

    Integration Instructions

    N/A

      </blockquote>
      <hr>
    </details>
    
  • remove edk2-basetools @Javagedes (#211)
    Change Details
      ## Description

    Removes edk2-basetools from pip-requirements.txt and any usage of it in the CISettings.py. The is done as there are changes in the build tools python source code that are available locally in BaseTools (as it is managed by Project Mu) that is not available in edk2-basetools.

    • Impacts functionality?
      • Functionality - Does the change ultimately impact how firmware functions?
      • Examples: Add a new library, publish a new PPI, update an algorithm, ...
    • Impacts security?
      • Security - Does the change have a direct security impact on an application,
        flow, or firmware?
      • Examples: Crypto algorithm change, buffer overflow fix, parameter
        validation improvement, ...
    • Breaking change?
      • Breaking change - Will anyone consuming this change experience a break
        in build or boot behavior?
      • Examples: Add a new library class, move a module to a different repo, call
        a function in a new library class in a pre-existing module, ...
    • Includes tests?
      • Tests - Does the change include any explicit test code?
      • Examples: Unit tests, integration tests, robot tests, ...
    • Includes documentation?
      • Documentation - Does the change contain explicit documentation additions
        outside direct code modifications (and comments)?
      • Examples: Update readme file, add feature readme file, link to documentation
        on an a separate Web page, ...

    How This Was Tested

    Verified the build system continues to use the local python source

    Integration Instructions

    N/A - only effects this repository's CI system.

      </blockquote>
      <hr>
    </details>
    

Full Changelog: v2023110000.0.0...v2023110000.0.1

v2023110000.0.0

05 Feb 15:21
4e4f172
Compare
Choose a tag to compare

What's Changed

First 202311 Mu Silicon Arm Tiano release 🎉.

  • [Rebase \& FF] [Cherry-pick] Get all the missing commits from 202302 into 202311 @kenlautner (#205)
    Change Details
      ## Description

    Cherry-pick the commits from 202302 that are missing from 202311 since the creation of the release branch.

    • Impacts functionality?
      • Functionality - Does the change ultimately impact how firmware functions?
      • Examples: Add a new library, publish a new PPI, update an algorithm, ...
    • Impacts security?
      • Security - Does the change have a direct security impact on an application,
        flow, or firmware?
      • Examples: Crypto algorithm change, buffer overflow fix, parameter
        validation improvement, ...
    • Breaking change?
      • Breaking change - Will anyone consuming this change experience a break
        in build or boot behavior?
      • Examples: Add a new library class, move a module to a different repo, call
        a function in a new library class in a pre-existing module, ...
    • Includes tests?
      • Tests - Does the change include any explicit test code?
      • Examples: Unit tests, integration tests, robot tests, ...
    • Includes documentation?
      • Documentation - Does the change contain explicit documentation additions
        outside direct code modifications (and comments)?
      • Examples: Update readme file, add feature readme file, link to documentation
        on an a separate Web page, ...

    How This Was Tested

    CI

    Integration Instructions

    N/A




  • [REBASE \& FF] Fix CodeQL Issues in AmlLib and PL061GPIO @os-d (#202)
    Change Details
      ## Description

    Both of these components failed a CodeQL check for comparing non-equal width types in a loop. This fixes the issue.

    For each item, place an "x" in between [ and ] if true. Example: [x].
    (you can also check items in the GitHub UI)

    • Impacts functionality?
      • Functionality - Does the change ultimately impact how firmware functions?
      • Examples: Add a new library, publish a new PPI, update an algorithm, ...
    • Impacts security?
      • Security - Does the change have a direct security impact on an application,
        flow, or firmware?
      • Examples: Crypto algorithm change, buffer overflow fix, parameter
        validation improvement, ...
    • Breaking change?
      • Breaking change - Will anyone consuming this change experience a break
        in build or boot behavior?
      • Examples: Add a new library class, move a module to a different repo, call
        a function in a new library class in a pre-existing module, ...
    • Includes tests?
      • Tests - Does the change include any explicit test code?
      • Examples: Unit tests, integration tests, robot tests, ...
    • Includes documentation?
      • Documentation - Does the change contain explicit documentation additions
        outside direct code modifications (and comments)?
      • Examples: Update readme file, add feature readme file, link to documentation
        on an a separate Web page, ...

    How This Was Tested

    Confirmed CI passed

    Integration Instructions

    N/A




  • Added a few additional functions to MSFT version of AArch64Support ass… @apop5 (#196)
    Change Details
      ## Description `ArmReadIdAA64Dfr0` and `ArmReadIdAA64Mmfr0` are defined in the ArmLib, but the functions did not exist in the MSFT version of the assembly file.

    Adding the functions to being MSFT assembly inline with the GCC assembly file.

    • Impacts functionality?
      • Functionality - Does the change ultimately impact how firmware functions?
      • Examples: Add a new library, publish a new PPI, update an algorithm, ...
    • Impacts security?
      • Security - Does the change have a direct security impact on an application,
        flow, or firmware?
      • Examples: Crypto algorithm change, buffer overflow fix, parameter
        validation improvement, ...
    • Breaking change?
      • Breaking change - Will anyone consuming this change experience a break
        in build or boot behavior?
      • Examples: Add a new library class, move a module to a different repo, call
        a function in a new library class in a pre-existing module, ...
    • Includes tests?
      • Tests - Does the change include any explicit test code?
      • Examples: Unit tests, integration tests, robot tests, ...
    • Includes documentation?
      • Documentation - Does the change contain explicit documentation additions
        outside direct code modifications (and comments)?
      • Examples: Update readme file, add feature readme file, link to documentation
        on an a separate Web page, ...

    How This Was Tested

    CI compilation of the library using MSVC AARCH64 completed successfully.

    Integration Instructions

    N/A




  • Updated CISettings.py to use the edk2toolext codeql helpers @kenlautner (#195)
    Change Details
      ## Description

    The 202311 rebase moved the codeql plugin from .pytool to Basetools. This requires a change in CISettings.py to reference the correct codeql helper functions. Instead of using the internal versions we instead move to the edk2 pytool extensions version.

    • Impacts functionality?
      • Functionality - Does the change ultimately impact how firmware functions?
      • Examples: Add a new library, publish a new PPI, update an algorithm, ...
    • Impacts security?
      • Security - Does the change have a direct security impact on an application,
        flow, or firmware?
      • Examples: Crypto algorithm change, buffer overflow fix, parameter
        validation improvement, ...
    • Breaking change?
      • Breaking change - Will anyone consuming this change experience a break
        in build or boot behavior?
      • Examples: Add a new library class, move a module to a different repo, call
        a function in a new library class in a pre-existing module, ...
    • Includes tests?
      • Tests - Does the change include any explicit test code?
      • Examples: Unit tests, integration tests, robot tests, ...
    • Includes documentation?
      • Documentation - Does the change contain explicit documentation additions
        outside direct code modifications (and comments)?
      • Examples: Update readme file, add feature readme file, link to documentation
        on an a separate Web page, ...

    How This Was Tested

    Tested with CI.

    Integration Instructions

    N/A




Full Changelog: ...v0.1.0

v2023020000.1.5

05 Feb 15:20
b0de314
Compare
Choose a tag to compare

What's Changed

  • Update pip-requirements.txt @Javagedes (#199)
    Change Details
      ## Description

    Updates edk2-pytool-extensions and edk2-pytool-library to work with the latest commit of MU_BASECORE

    For each item, place an "x" in between [ and ] if true. Example: [x].
    (you can also check items in the GitHub UI)

    • Impacts functionality?
      • Functionality - Does the change ultimately impact how firmware functions?
      • Examples: Add a new library, publish a new PPI, update an algorithm, ...
    • Impacts security?
      • Security - Does the change have a direct security impact on an application,
        flow, or firmware?
      • Examples: Crypto algorithm change, buffer overflow fix, parameter
        validation improvement, ...
    • Breaking change?
      • Breaking change - Will anyone consuming this change experience a break
        in build or boot behavior?
      • Examples: Add a new library class, move a module to a different repo, call
        a function in a new library class in a pre-existing module, ...
    • Includes tests?
      • Tests - Does the change include any explicit test code?
      • Examples: Unit tests, integration tests, robot tests, ...
    • Includes documentation?
      • Documentation - Does the change contain explicit documentation additions
        outside direct code modifications (and comments)?
      • Examples: Update readme file, add feature readme file, link to documentation
        on an a separate Web page, ...

    How This Was Tested

    N/A

    Integration Instructions

    N/A




Full Changelog: v2023020000.1.4...v2023020000.1.5