Commit Graph

70223 Commits

Author SHA1 Message Date
Peter Maydell
1120827fa1 target/arm: Only implement doubles if the FPU supports them
The architecture permits FPUs which have only single-precision
support, not double-precision; Cortex-M4 and Cortex-M33 are
both like that. Add the necessary checks on the MVFR0 FPDP
field so that we UNDEF any double-precision instructions on
CPUs like this.

Note that even if FPDP==0 the insns like VMOV-to/from-gpreg,
VLDM/VSTM, VLDR/VSTR which take double precision registers
still exist.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Message-id: 20190614104457.24703-3-peter.maydell@linaro.org
2019-06-17 15:15:06 +01:00
Peter Maydell
83655223ac target/arm: Fix typos in trans function prototypes
In several places cut and paste errors meant we were using the wrong
type for the 'arg' struct in trans_ functions called by the
decodetree decoder, because we were using the _sp version of the
struct in the _dp function.  These were harmless, because the two
structs were identical and so decodetree made them typedefs of the
same underlying structure (and we'd have had a compile error if they
were not harmless), but we should clean them up anyway.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190614104457.24703-2-peter.maydell@linaro.org
2019-06-17 15:15:06 +01:00
Peter Maydell
d9eea52c67 target/arm: Remove unused cpu_F0s, cpu_F0d, cpu_F1s, cpu_F1d
Remove the now unused TCG globals cpu_F0s, cpu_F0d, cpu_F1s, cpu_F1d.

cpu_M0 is still used by the iwmmxt code, and cpu_V0 and
cpu_V1 are used by both iwmmxt and Neon.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190613163917.28589-13-peter.maydell@linaro.org
2019-06-17 15:14:19 +01:00
Peter Maydell
b66f6b9981 target/arm: Stop using deprecated functions in NEON_2RM_VCVT_F32_F16
Remove some old constructns from NEON_2RM_VCVT_F16_F32 code:
 * don't use CPU_F0s
 * don't use tcg_gen_st_f32

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190613163917.28589-12-peter.maydell@linaro.org
2019-06-17 15:14:19 +01:00
Peter Maydell
58f2682eee target/arm: stop using deprecated functions in NEON_2RM_VCVT_F16_F32
Remove some old constructs from NEON_2RM_VCVT_F16_F32 code:
 * don't use cpu_F0s
 * don't use tcg_gen_ld_f32

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190613163917.28589-11-peter.maydell@linaro.org
2019-06-17 15:14:19 +01:00
Peter Maydell
c253dd7832 target/arm: Stop using cpu_F0s in Neon VCVT fixed-point ops
Stop using cpu_F0s in the Neon VCVT fixed-point operations.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190613163917.28589-10-peter.maydell@linaro.org
2019-06-17 15:14:19 +01:00
Peter Maydell
60737ed578 target/arm: Stop using cpu_F0s for Neon f32/s32 VCVT
Stop using cpu_F0s for the Neon f32/s32 VCVT operations.
Since this is the last user of cpu_F0s in the Neon 2rm-op
loop, we can remove the handling code for it too.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190613163917.28589-9-peter.maydell@linaro.org
2019-06-17 15:14:19 +01:00
Peter Maydell
9a011fece7 target/arm: Stop using cpu_F0s for NEON_2RM_VRECPE_F and NEON_2RM_VRSQRTE_F
Stop using cpu_F0s for NEON_2RM_VRECPE_F and NEON_2RM_VRSQRTE_F.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190613163917.28589-8-peter.maydell@linaro.org
2019-06-17 15:14:19 +01:00
Peter Maydell
30bf0a018f target/arm: Stop using cpu_F0s for NEON_2RM_VCVT[ANPM][US]
Stop using cpu_F0s for the NEON_2RM_VCVT[ANPM][US] ops.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190613163917.28589-7-peter.maydell@linaro.org
2019-06-17 15:14:19 +01:00
Peter Maydell
3b52ad1fae target/arm: Stop using cpu_F0s for NEON_2RM_VRINT*
Switch NEON_2RM_VRINT* away from using cpu_F0s.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190613163917.28589-6-peter.maydell@linaro.org
2019-06-17 15:14:19 +01:00
Peter Maydell
cedcc96fc7 target/arm: Stop using cpu_F0s for NEON_2RM_VNEG_F
Switch NEON_2RM_VABS_F away from using cpu_F0s.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190613163917.28589-5-peter.maydell@linaro.org
2019-06-17 15:14:19 +01:00
Peter Maydell
fd8a68cdcf target/arm: Stop using cpu_F0s for NEON_2RM_VABS_F
Where Neon instructions are floating point operations, we
mostly use the old VFP utility functions like gen_vfp_abs()
which work on the TCG globals cpu_F0s and cpu_F1s. The
Neon for-each-element loop conditionally loads the inputs
into either a plain old TCG temporary for most operations
or into cpu_F0s for float operations, and similarly stores
back either cpu_F0s or the temporary.

Switch NEON_2RM_VABS_F away from using cpu_F0s, and
update neon_2rm_is_float_op() accordingly.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190613163917.28589-4-peter.maydell@linaro.org
2019-06-17 15:14:19 +01:00
Peter Maydell
9bee50b498 target/arm: Use vfp_expand_imm() for AArch32 VFP VMOV_imm
The AArch32 VMOV (immediate) instruction uses the same VFP encoded
immediate format we already handle in vfp_expand_imm().  Use that
function rather than hand-decoding it.

Suggested-by: Richard Henderson <richard.henderson@linaro.org>
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190613163917.28589-3-peter.maydell@linaro.org
2019-06-17 15:14:19 +01:00
Peter Maydell
d6a092d479 target/arm: Move vfp_expand_imm() to translate.[ch]
We want to use vfp_expand_imm() in the AArch32 VFP decode;
move it from the a64-only header/source file to the
AArch32 one (which is always compiled even for AArch64).

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Tested-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190613163917.28589-2-peter.maydell@linaro.org
2019-06-17 15:14:19 +01:00
Peter Maydell
0edfcc9ec0 hw/intc/arm_gicv3: GICD_TYPER.SecurityExtn is RAZ if GICD_CTLR.DS == 1
The GICv3 specification says that the GICD_TYPER.SecurityExtn bit
is RAZ if GICD_CTLR.DS is 1. We were incorrectly making it RAZ
if the security extension is unsupported. "Security extension
unsupported" always implies GICD_CTLR.DS == 1, but the guest can
also set DS on a GIC which does support the security extension.
Fix the condition to correctly check the GICD_CTLR.DS bit.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Message-id: 20190524124248.28394-3-peter.maydell@linaro.org
2019-06-17 15:13:19 +01:00
Peter Maydell
e40f60730a hw/intc/arm_gicv3: Fix decoding of ID register range
The GIC ID registers cover an area 0x30 bytes in size
(12 registers, 4 bytes each). We were incorrectly decoding
only the first 0x20 bytes.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-id: 20190524124248.28394-2-peter.maydell@linaro.org
2019-06-17 15:13:19 +01:00
Peter Maydell
a90a862b9e hw/arm: Correctly disable FPU/DSP for some ARMSSE-based boards
The SSE-200 hardware has configurable integration settings which
determine whether its two CPUs have the FPU and DSP:
 * CPU0_FPU (default 0)
 * CPU0_DSP (default 0)
 * CPU1_FPU (default 1)
 * CPU1_DSP (default 1)

Similarly, the IoTKit has settings for its single CPU:
 * CPU0_FPU (default 1)
 * CPU0_DSP (default 1)

Of our four boards that use either the IoTKit or the SSE-200:
 * mps2-an505, mps2-an521 and musca-a use the default settings
 * musca-b1 enables FPU and DSP on both CPUs

Currently QEMU models all these boards using CPUs with
both FPU and DSP enabled. This means that we are incorrect
for mps2-an521 and musca-a, which should not have FPU or DSP
on CPU0.

Create QOM properties on the ARMSSE devices corresponding to the
default h/w integration settings, and make the Musca-B1 board
enable FPU and DSP on both CPUs. This fixes the mps2-an521
and musca-a behaviour, and leaves the musca-b1 and mps2-an505
behaviour unchanged.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Message-id: 20190517174046.11146-5-peter.maydell@linaro.org
2019-06-17 15:12:25 +01:00
Peter Maydell
e0cf7b8163 hw/arm/armv7m: Forward "vfp" and "dsp" properties to CPU
Create "vfp" and "dsp" properties on the armv7m container object
which will be forwarded to its CPU object, so that SoCs can
configure whether the CPU has these features.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Message-id: 20190517174046.11146-4-peter.maydell@linaro.org
2019-06-17 15:12:25 +01:00
Peter Maydell
ea90db0af6 target/arm: Allow M-profile CPUs to disable the DSP extension via CPU property
Allow the DSP extension to be disabled via a CPU property for
M-profile CPUs. (A and R-profile CPUs don't have this extension
as a defined separate optional architecture extension, so
they don't need the property.)

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Message-id: 20190517174046.11146-3-peter.maydell@linaro.org
2019-06-17 15:12:25 +01:00
Peter Maydell
97a28b0eea target/arm: Allow VFP and Neon to be disabled via a CPU property
Allow VFP and neon to be disabled via a CPU property. As with
the "pmu" property, we only allow these features to be removed
from CPUs which have it by default, not added to CPUs which
don't have it.

The primary motivation here is to be able to optionally
create Cortex-M33 CPUs with no FPU, but we provide switches
for both VFP and Neon because the two interact:
 * AArch64 can't have one without the other
 * Some ID register fields only change if both are disabled

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Message-id: 20190517174046.11146-2-peter.maydell@linaro.org
2019-06-17 15:12:25 +01:00
Peter Maydell
5e6dbe1e8c hw/arm/boot: Honour image size field in AArch64 Image format kernels
Since Linux v3.17, the kernel's Image header includes a field image_size,
which gives the total size of the kernel including unpopulated data
sections such as the BSS). If this is present, then return it from
load_aarch64_image() as the true size of the kernel rather than
just using the size of the Image file itself. This allows the code
which calculates where to put the initrd to avoid putting it in
the kernel's BSS area.

This means that we should be able to reliably load kernel images
which are larger than 128MB without accidentally putting the
initrd or dtb in locations that clash with the kernel itself.

Fixes: https://bugs.launchpad.net/qemu/+bug/1823998
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Tested-by: Mark Rutland <mark.rutland@arm.com>
Message-id: 20190516144733.32399-5-peter.maydell@linaro.org
2019-06-17 15:11:18 +01:00
Peter Maydell
e6b2b20d97 hw/arm/boot: Avoid placing the initrd on top of the kernel
We currently put the initrd at the smaller of:
 * 128MB into RAM
 * halfway into the RAM
(with the dtb following it).

However for large kernels this might mean that the kernel
overlaps the initrd. For some kinds of kernel (self-decompressing
32-bit kernels, and ELF images with a BSS section at the end)
we don't know the exact size, but even there we have a
minimum size. Put the initrd at least further into RAM than
that. For image formats that can give us an exact kernel size, this
will mean that we definitely avoid overlaying kernel and initrd.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Tested-by: Mark Rutland <mark.rutland@arm.com>
Message-id: 20190516144733.32399-4-peter.maydell@linaro.org
2019-06-17 15:11:18 +01:00
Peter Maydell
852dc64d66 hw/arm/boot: Diagnose layouts that put initrd or DTB off the end of RAM
We calculate the locations in memory where we want to put the
initrd and the DTB based on the size of the kernel, since they
come after it. Add some explicit checks that these aren't off the
end of RAM entirely.

(At the moment the way we calculate the initrd_start means that
it can't ever be off the end of RAM, but that will change with
the next commit.)

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Tested-by: Mark Rutland <mark.rutland@arm.com>
Message-id: 20190516144733.32399-3-peter.maydell@linaro.org
2019-06-17 15:11:18 +01:00
Peter Maydell
e70af24b42 hw/arm/boot: Don't assume RAM starts at address zero
In the Arm kernel/initrd loading code, in some places we make the
incorrect assumption that info->ram_size can be treated as the
address of the end of RAM, as for instance when we calculate the
available space for the initrd using "info->ram_size - info->initrd_start".
This is wrong, because many Arm boards (including "virt") specify
a non-zero info->loader_start to indicate that their RAM area
starts at a non-zero physical address.

Correct the places which make this incorrect assumption.

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Tested-by: Mark Rutland <mark.rutland@arm.com>
Message-id: 20190516144733.32399-2-peter.maydell@linaro.org
2019-06-17 15:11:18 +01:00
Peter Maydell
5d0e569447 virtio, acpi: fixes, cleanups
A bunch of minor fixes all over the place.
 
 Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
 -----BEGIN PGP SIGNATURE-----
 
 iQEcBAABAgAGBQJdBqqnAAoJECgfDbjSjVRp7isIAK7kmHhPtGNhv+7Nz35Dk5fo
 de2OQO8Luqv58yAbqIIo8JVH/AAN+EZAx1gyI4lW1lzV8DFxCaim9JBriXVchc8l
 1I1oaRh62nVhJnzP+9U1AiAYW/3L/4N1dkGVqSPfAN4P+TxBH4MbavlwUPDJhao/
 iNHF9sxG4fxcBzN/IGbNuSnHAf1Kadd0Lf7hX7ltAHItsrLM7DUy/nT0WikoDVhO
 vT7eDv/9B1Cgzt2mx5pyud+zLsjW/2RIxMDZFc40R5DhqPtnoHxm1zRkXIwvfGNO
 oBoZ05P36kUt0jcRYEcsrz9vDfmBBWp7CtOT4oZW58K4VMGZRoUlU6bnjBf1B2Q=
 =nes2
 -----END PGP SIGNATURE-----

Merge remote-tracking branch 'remotes/mst/tags/for_upstream' into staging

virtio, acpi: fixes, cleanups

A bunch of minor fixes all over the place.

Signed-off-by: Michael S. Tsirkin <mst@redhat.com>

# gpg: Signature made Sun 16 Jun 2019 21:46:31 BST
# gpg:                using RSA key 281F0DB8D28D5469
# gpg: Good signature from "Michael S. Tsirkin <mst@kernel.org>" [full]
# gpg:                 aka "Michael S. Tsirkin <mst@redhat.com>" [full]
# Primary key fingerprint: 0270 606B 6F3C DF3D 0B17  0970 C350 3912 AFBE 8E67
#      Subkey fingerprint: 5D09 FD08 71C8 F85B 94CA  8A0D 281F 0DB8 D28D 5469

* remotes/mst/tags/for_upstream:
  tests/rebuild-expected-aml.sh: blow out difflist
  q35: update DSDT
  q35: fix mmconfig and PCI0._CRS
  hw/acpi: extract acpi_add_rom_blob()
  vhost: fix vhost_log size overflow during migration
  docs/vhost-user.json: some firmware.json copy leftovers
  vhost-user-gpu: initialize msghdr & iov at declaration
  vhost-user-input: check ioctl(EVIOCGNAME) return value
  vhost-user: improve error report
  vhost-user: check unix_listen() return value
  vhost-user-gpu: do not send scanout update if no GPU socket

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2019-06-17 11:55:14 +01:00
Peter Maydell
53defa0570 edk2-stable201905 was released on 2019-06-06:
https://github.com/tianocore/edk2/releases/tag/edk2-stable201905
 
 Advance QEMU's edk2 submodule to edk2-stable201905, and rebuild the
 firmware binaries. This should be the edk2 release that goes into QEMU
 4.1.
 
 Launchpad: https://bugs.launchpad.net/qemu/+bug/1831477
 -----BEGIN PGP SIGNATURE-----
 Version: GnuPG v2.0.22 (GNU/Linux)
 
 iQIcBAABCAAGBQJdA/75AAoJENOdpx4NSWz6YtEP/iEW2F2CXtGmOmBoL67vvbXT
 kFbVyto2Z4agMS4C7TSQyoDQ3eWbDQoaupnKfAhmpLzi9bNOvT53YaO+5vKty7P6
 9uD+G0obdUTTrn510EE6Np5ph5eHakaEnhwSJv0sNQhYA1xgD1ZHmkxQS1swbSA0
 NSWxWpI6puzJyvVO4YNzulVTt7RFoo2jXw2gvyOaJ0KPACigKO0LQpNfmX0CPAGQ
 4RSVajuMSZAhLGnKk5ctt0+ucbi/KYmdy7SP3aifoHm9KvIdqkovH67YGdkVrfCL
 /pwlpmFgkzxXSovOAEJPjmdYvJzWG9GN2Y6ichOLy/2d8ZHh5cFR4mhYa/x16nAV
 eb3EmM1CqqTlmqCJ6Q2NIar8ADD4YsUGX7/s/ETdP5SaWM4dR1oKZe8c3gKDt47T
 vbP/yCIETsYWztS7tSTMnUWEDoZfucUd1PyiKyt9TMmbI8wHRFtVGjLT7HvMUqqk
 +rs9zRbwbOlHWusvjInMX2XDDlfqVfGsZq5EWgXUd0m/yK3/lE36wE3X3KXwva/h
 uYOhUQDvegdvIjg043FX9GNCIm7JRZ1tWhMIujXW0WSqWSiPOqcv6BeC3MbU3WZQ
 TMAjNMRWyBWGbMEfGyBMGkVsv5UkY+pEMwyxuJAcN9oXpeMjYZaSou1CregRt+Sn
 ApLrzSrCkMMCokFuIrPX
 =2MB6
 -----END PGP SIGNATURE-----

Merge remote-tracking branch 'remotes/lersek/tags/edk2-pull-2019-06-14' into staging

edk2-stable201905 was released on 2019-06-06:

  https://github.com/tianocore/edk2/releases/tag/edk2-stable201905

Advance QEMU's edk2 submodule to edk2-stable201905, and rebuild the
firmware binaries. This should be the edk2 release that goes into QEMU
4.1.

Launchpad: https://bugs.launchpad.net/qemu/+bug/1831477

# gpg: Signature made Fri 14 Jun 2019 21:09:29 BST
# gpg:                using RSA key D39DA71E0D496CFA
# gpg: Good signature from "Laszlo Ersek <lersek@redhat.com>" [marginal]
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg:          It is not certain that the signature belongs to the owner.
# Primary key fingerprint: F5D9 660F 1BA5 F310 A95A  C5E0 466A EAE0 6125 3988
#      Subkey fingerprint: B3A5 5D3F 88A8 90ED 2E63  3E8D D39D A71E 0D49 6CFA

* remotes/lersek/tags/edk2-pull-2019-06-14:
  pc-bios: update the README file with edk2-stable201905 information
  pc-bios: refresh edk2 build artifacts for edk2-stable201905
  roms/Makefile.edk2: update input file list for "pc-bios/edk2-licenses.txt"
  roms/Makefile.edk2: remove edk2-stable201903 network feature test macros
  roms/edk2: update submodule from edk2-stable201903 to edk2-stable201905
  roms/Makefile.edk2: define edk2-stable201905 network feature test macros

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2019-06-17 11:07:11 +01:00
Michael S. Tsirkin
5f6b3561bf tests/rebuild-expected-aml.sh: blow out difflist
As expected files have been updated, make sure we
do not forget to remove them from the allowed
diff list.

Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2019-06-16 16:44:44 -04:00
Michael S. Tsirkin
500eb6db5b q35: update DSDT
update expected files and drop them from allowed diff list.

Fixes: 4a4418369d ("q35: fix mmconfig and PCI0._CRS")
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2019-06-16 16:44:44 -04:00
Gerd Hoffmann
4a4418369d q35: fix mmconfig and PCI0._CRS
This patch changes the handling of the mmconfig area.  Thanks to the
pci(e) expander devices we already have the logic to exclude address
ranges from PCI0._CRS.  We can simply add the mmconfig address range
to the list get it excluded as well.

With that in place we can go with a fixed pci hole which covers the
whole area from the end of (low) ram to the ioapic.

This will make the whole logic alot less fragile.  No matter where the
firmware places the mmconfig xbar, things should work correctly.  The
guest also gets a bit more PCI address space (seabios boot):

    # cat /proc/iomem
    [ ... ]
    7ffdd000-7fffffff : reserved
    80000000-afffffff : PCI Bus 0000:00            <<-- this is new
    b0000000-bfffffff : PCI MMCONFIG 0000 [bus 00-ff]
      b0000000-bfffffff : reserved
    c0000000-febfffff : PCI Bus 0000:00
      f8000000-fbffffff : 0000:00:01.0
    [ ... ]

So this is a guest visible change.

Cc: László Érsek <lersek@redhat.com>
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
Reviewed-by: Igor Mammedov <imammedo@redhat.com>
Message-Id: <20190607073429.3436-1-kraxel@redhat.com>
2019-06-16 16:16:52 -04:00
Wei Yang
82f76c6702 hw/acpi: extract acpi_add_rom_blob()
arm and i386 has almost the same function acpi_add_rom_blob(), except
giving different FWCfgCallback function.

This patch moves acpi_add_rom_blob() to utils.c by passing
FWCfgCallback to it.

Signed-off-by: Wei Yang <richardw.yang@linux.intel.com>
Reviewed-by: Igor Mammedov <imammedo@redhat.com>

v7:
  * rebase on top of current master because of conflict
v6:
  * change author from Igor to Michael
v5:
  * remove unnecessary header glib/gprintf.h
  * rearrange include header to make it more suitable
v4:
  * extract -> moves
  * adjust comment in source to make checkpatch happy
v3:
  * put acpi_add_rom_blob() to hw/acpi/utils.c
v2:
  * remove unused header in original source file
Message-Id: <20190610011830.28398-1-richardw.yang@linux.intel.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2019-06-16 16:16:52 -04:00
Li Hangjing
240e647a14 vhost: fix vhost_log size overflow during migration
When a guest which doesn't support multiqueue is migrated with a multi queues
vhost-user-blk deivce, a crash will occur like:

0 qemu_memfd_alloc (name=<value optimized out>, size=562949953421312, seals=<value optimized out>, fd=0x7f87171fe8b4, errp=0x7f87171fe8a8) at util/memfd.c:153
1 0x00007f883559d7cf in vhost_log_alloc (size=70368744177664, share=true) at hw/virtio/vhost.c:186
2 0x00007f88355a0758 in vhost_log_get (listener=0x7f8838bd7940, enable=1) at qemu-2-12/hw/virtio/vhost.c:211
3 vhost_dev_log_resize (listener=0x7f8838bd7940, enable=1) at hw/virtio/vhost.c:263
4 vhost_migration_log (listener=0x7f8838bd7940, enable=1) at hw/virtio/vhost.c:787
5 0x00007f88355463d6 in memory_global_dirty_log_start () at memory.c:2503
6 0x00007f8835550577 in ram_init_bitmaps (f=0x7f88384ce600, opaque=0x7f8836024098) at migration/ram.c:2173
7 ram_init_all (f=0x7f88384ce600, opaque=0x7f8836024098) at migration/ram.c:2192
8 ram_save_setup (f=0x7f88384ce600, opaque=0x7f8836024098) at migration/ram.c:2219
9 0x00007f88357a419d in qemu_savevm_state_setup (f=0x7f88384ce600) at migration/savevm.c:1002
10 0x00007f883579fc3e in migration_thread (opaque=0x7f8837530400) at migration/migration.c:2382
11 0x00007f8832447893 in start_thread () from /lib64/libpthread.so.0
12 0x00007f8832178bfd in clone () from /lib64/libc.so.6

This is because vhost_get_log_size() returns a overflowed vhost-log size.
In this function, it uses the uninitialized variable vqs->used_phys and
vqs->used_size to get the vhost-log size.

Signed-off-by: Li Hangjing <lihangjing@baidu.com>
Reviewed-by: Xie Yongji <xieyongji@baidu.com>
Reviewed-by: Chai Wen <chaiwen@baidu.com>
Message-Id: <20190603061524.24076-1-lihangjing@baidu.com>
Cc: qemu-stable@nongnu.org
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2019-06-16 16:16:52 -04:00
Marc-André Lureau
00ab8cb141 docs/vhost-user.json: some firmware.json copy leftovers
Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Message-Id: <20190605131221.29432-1-marcandre.lureau@redhat.com>
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2019-06-16 16:16:52 -04:00
Marc-André Lureau
c715130a64 vhost-user-gpu: initialize msghdr & iov at declaration
This should fix uninitialized fields found by coverity CID 1401762.

Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Message-Id: <20190605145829.7674-6-marcandre.lureau@redhat.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
2019-06-16 16:16:52 -04:00
Marc-André Lureau
be32fd9ee1 vhost-user-input: check ioctl(EVIOCGNAME) return value
This should fix coverity CID 1401704.

Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Message-Id: <20190605145829.7674-5-marcandre.lureau@redhat.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
2019-06-16 16:16:52 -04:00
Marc-André Lureau
f55411cf14 vhost-user: improve error report
g_printerr() needs a trailing \n

Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Message-Id: <20190605145829.7674-4-marcandre.lureau@redhat.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2019-06-16 16:16:52 -04:00
Marc-André Lureau
24af03b946 vhost-user: check unix_listen() return value
This check shouldn't be necessary, since &error_fatal is given as
argument and will exit() on failure. However, this change should
silence coverity CID 1401761 & 1401705.

Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Message-Id: <20190605145829.7674-3-marcandre.lureau@redhat.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2019-06-16 16:16:52 -04:00
Marc-André Lureau
1e40d19877 vhost-user-gpu: do not send scanout update if no GPU socket
Should fix coverity CID 1401760.

Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Message-Id: <20190605145829.7674-2-marcandre.lureau@redhat.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2019-06-16 16:16:52 -04:00
Laszlo Ersek
541617cad3 pc-bios: update the README file with edk2-stable201905 information
Refresh the "pc-bios/README" file with edk2, OpenSSL, and Berkeley
SoftFloat release info, matching the edk2-stable201905 firmware images
added in the previous patch.

Cc: Philippe Mathieu-Daud <philmd@redhat.com>
Ref: https://bugs.launchpad.net/qemu/+bug/1831477
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Philippe Mathieu-Daud <philmd@redhat.com>
Tested-by: Philippe Mathieu-Daud <philmd@redhat.com>
2019-06-14 21:48:00 +02:00
Laszlo Ersek
3583cb29f2 pc-bios: refresh edk2 build artifacts for edk2-stable201905
Rebuild the pc-bios/edk2-*.fd.bz2 binaries, and regenerate
pc-bios/edk2-licenses.txt, based on the edk2-stable201905 release.

Cc: Philippe Mathieu-Daud <philmd@redhat.com>
Ref: https://bugs.launchpad.net/qemu/+bug/1831477
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Philippe Mathieu-Daud <philmd@redhat.com>
Tested-by: Philippe Mathieu-Daud <philmd@redhat.com>
2019-06-14 21:47:56 +02:00
Laszlo Ersek
9153b9d740 roms/Makefile.edk2: update input file list for "pc-bios/edk2-licenses.txt"
(1) For TianoCore Bugzilla

      https://bugzilla.tianocore.org/show_bug.cgi?id=1373

    the majority of the edk2 tree was relicensed under the
    BSD-2-Clause-Patent license:

      https://spdx.org/licenses/BSD-2-Clause-Patent.html>

    Edk2 commit f53de8aecb12 ("edk2: Add License-History.txt", 2019-04-09)
    added a new file called "License-History.txt", describing license and
    contributor agreement changes over time.

(2) For advacing edk2's OpenSSL git submodule to the 1.1.1b release, a
    more up-to-date ArmSoftFloatLib instance became necessary, on 32-bit
    ARM. Therefore, the embedded (and by now, obsolete) Berkeley SoftFloat
    library was replaced with a git submodule of the same, checked out at
    the latest release ("3e", plus a typo fix on top -- commit
    b64af41c3276). This was implemented for TianoCore Bugzilla

      https://bugzilla.tianocore.org/show_bug.cgi?id=1845

    in edk2 commit range b6cfa686e42d..371e7001e8d5.

Include the edk2 project's "License-History.txt" file, and the Berkeley
SoftFloat library's "COPYING.txt", in our generated
"pc-bios/edk2-licenses.txt" text file.

Cc: Philippe Mathieu-Daud <philmd@redhat.com>
Ref: https://bugs.launchpad.net/qemu/+bug/1831477
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Philippe Mathieu-Daud <philmd@redhat.com>
Tested-by: Philippe Mathieu-Daud <philmd@redhat.com>
2019-06-14 21:47:53 +02:00
Laszlo Ersek
36bf711d17 roms/Makefile.edk2: remove edk2-stable201903 network feature test macros
At tag "edk2-stable201905", the build flags HTTP_BOOT_ENABLE and
TLS_ENABLE have become useless. Their roles have been taken by
NETWORK_HTTP_BOOT_ENABLE and NETWORK_TLS_ENABLE, respectively. Remove the
old build flags.

Cc: Philippe Mathieu-Daud <philmd@redhat.com>
Ref: https://bugs.launchpad.net/qemu/+bug/1831477
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Philippe Mathieu-Daud <philmd@redhat.com>
Tested-by: Philippe Mathieu-Daud <philmd@redhat.com>
2019-06-14 21:47:50 +02:00
Laszlo Ersek
6b364d2abf roms/edk2: update submodule from edk2-stable201903 to edk2-stable201905
Update the edk2 submodule from release edk2-stable201903 to
edk2-stable201905. The release notes can be read at

  https://github.com/tianocore/edk2/releases/tag/edk2-stable201905

Below is a list of commits in the new release:

    1 c9e1e28b6195 Maintainers.txt: clarify Reviewer requirements and responsibilities
    2 a24a37dba42c StdLib: Update resolv.conf to use Google's DNS servers
    3 690d60c0ada5 MdeModulePkg/SdMmcPciHcDxe: Add V3 64b DMA Support
    4 326598e9b759 StandaloneMmPkg/Library: Install Variable Arch Protocol
    5 56edfb174ad6 StandaloneMmPkg: drop redundant definition of gEfiMmConfigurationProtocolGuid
    6 8edde27a3835 StandaloneMmPkg: switch to NULL DebugLib resolution
    7 4b771927c801 StandaloneMmPkg/StandaloneMmCoreEntryPoint: drop explicit SerialPortLib call
    8 d65e0e4881b7 StandaloneMmPkg/Core: permit encapsulated firmware volumes
    9 84249babd703 StandaloneMmPkg/Core: dispatch all drivers at init time
   10 094c0bc7d7a5 StandaloneMmPkg/Core: drop support for dispatching FVs into MM
   11 b2877855c7ec StandaloneMmPkg/Core: remove legacy boot support
   12 4d275961d8d6 StandaloneMmPkg: drop unused PCD PcdStandaloneMmEnable
   13 d6253d2f9a33 StandaloneMmPkg: remove redundant StandaloneMmDriverEntryPoint driver
   14 fb94f83131f0 BaseTools: Enable compiler cache support in edk2 build
   15 c8eada5ca07b SecurityPkg: Remove duplicated BSD license
   16 5835c054f4ce Vlv2TbltDevicePkg: Remove duplicated BSD license
   17 b2a0a4ffd4d6 ShellPkg/UefiShellAcpiViewCommandLib: Change the note in uni
   18 d868846a4ecc BaseTool/Build: Add --disable-include-path-check.
   19 dbe05cb1c038 BaseTools: Fixed the issue of BaseTools Make cleanall failed.
   20 b0189eac00a5 BaseTools: Explicitly close files after readlines
   21 c49f298d28cb EmbeddedPkg/MmcDxe: Enable 4-bit mode even if SD_HIGH_SPEED is not supported
   22 34b162d078aa UefiCpuPkg/CpuCommonFeaturesLib: Aesni.c uses BIT0 and BIT1 reversedly
   23 d0abf8bb3e09 MdePkg/MdePkg.uni: Add the prompt and help information
   24 6ef95e4da714 SecurityPkg/SecurityPkg.uni: Add the prompt and help information
   25 792396bec919 UefiCpuPkg/UefiCpuPkg.uni: Add the prompt and help information
   26 43b1be74a8f6 ShellPkg: Correct a parameter's name
   27 2ac896a67b8e MdePkg/PciSegmentLibSegmentInfo: Change parameters type
   28 7681a891cec6 BaseTools: Add missing license and copyright info
   29 432a2ba1a0d7 DynamicTablesPkg: correct LibraryClass dependencies for Arm/DBG2
   30 fbdfef35cb82 DynamicTablesPkg: add package .dsc file
   31 a4712bea79a7 Vlv2TbltDevicePkg: ECP Cleanup.
   32 46002a4a379b Vlv2TbltDevicePkg: Fix build failure issue after ECP cleanup
   33 2cb2b6d6fa9c Vlv2TbltDevicePkg: Fix 32bit BIOS build failure issue
   34 4f93ff22b983 DynamicTablesPkg: Fix protocol section
   35 98a4a7a99bf5 DynamicTablesPkg: Rename enum used for ID Mapping
   36 e12bdeb1c2ad DynamicTablesPkg: Add OEM Info
   37 1018bd4c79a6 DynamicTablesPkg: DGB2: Update DBG2_DEBUG_PORT_DDI
   38 24534823b281 DynamicTablesPkg: Remove GIC Distributor Id field
   39 c606f47291e4 DynamicTablesPkg: Minor updates and fix typos
   40 6c27a4d337d0 MdeModulePkg/UefiBootManangerLib: Fix exception issue
   41 bb2c9ccb3388 MdeModulePkg/PiSmmCore: Control S3 related functionality through flag.
   42 f4c5200926df SecurityPkg/OpalPassword: Fix incorrect line ending issue.
   43 210bd16aff81 Document: Remove obsolete user manuals
   44 f293841f9335 BaseTools: Remove EDKI related logic from Trim tool
   45 2f2c51acfb70 BaseTools: Remove the logic SourceOverridePath
   46 b669adebd01d Fix links in Maintainers.txt and remove slow outdated sourceforge git mirror
   47 cf85ba23d58c OvmfPkg: retire "create-release.py"
   48 4da419e2deb9 IntelSiliconPkg/IntelSiliconPkg.dsc: Add a driver to build
   49 fa888c7ee9ba PcAtChipsetPkg/PcatChipsetPkg.dsc: Add a driver to build
   50 4a1f6b85c184 MdeModulePkg: add LockBoxNullLib for !IA32/X64 in .dsc
   51 a004d17d01a9 BaseTool: Fixed an issue of Structure PCD
   52 fdebdc961bfd Nt32Pkg/Nt32Pkg.dsc: Remove EdkCompatibilityPkg information
   53 5bca07268aca Maintainers.txt: Remove EdkCompatibilityPkg information
   54 c455bc8c8d78 EdkCompatibilityPkg: Remove EdkCompatibilityPkg
   55 e259ad9b6452 OvmfPkg: Drop the ISA Floppy device support
   56 a5cc178aeb1a OvmfPkg: Add an Super IO bus driver
   57 a06810229618 OvmfPkg: Add a build flag to select ISA driver stack
   58 f67786e38171 BaseTools/TianoCompress: Improve performance of boundary validation
   59 55756c88aec9 BaseTools/C/Common: Improve performance of boundary validation
   60 8028f0303218 MdePkg/BaseUefiDecompressLib: Improve performance of boundary validation
   61 58742d79457e BaseTools:Trim will trig exception when input asl UTF8 format file
   62 1c27ec423635 BaseTools:Coding problems caused by special characters
   63 b02873340b2d Vlv2TbltDevicePkg: Remove PACKAGES_PATH
   64 a89fd3a359b8 MdeModulePkg/CapsuleRuntimeDxe: Add cache flush for IA32 and X64
   65 9338e2301785 MdeModulePkg/ResetSystemRuntimeDxe: Remove DoS3 in warm reset
   66 b87a9a76ebc3 MdePkg/DebugLib.h: Add new APIs for DebugLib
   67 b04bdd154add MdePkg/BaseDebugLibNull: Add new APIs for DebugLib
   68 f13202874c9c MdePkg/BaseDebugLibSerialPort: Add new APIs
   69 ec81dba51f0b MdePkg/UefidebugLibConOut: Add new APIs
   70 8055c3d5ee3f MdePkg/UefiDebugLibStdErr: Add new APIs
   71 b22b4f5aeed9 MdePkg/DxeRuntimeDebugLibSerialPort: Add new APIs
   72 27d86bc12b1d MdePkg/UefiDebuglibDebugPortProtocol: Add new APIs
   73 92c0bbd18b8b ArmPkg/SemiHostingDebugLib: Add new APIs
   74 2fe5f2f52918 OvmfPkg/PlatformDebugLibIoPort: Add new APIs
   75 446be24d0bd2 IntelFsp2Pkg/BaseFspDebugLibSerialPort: Add new APIs
   76 0bb4eff6a0bb IntelFspPkg/BaseFspDebugLibSerialPort: Add new APIs
   77 9fb1f7efc90a IntelFramworkModulePkg/PeiDxeDebugLibReportStatusCode: Add new APIs
   78 bd68cddc6b5f MdeModulePkg/PeiDxeDebugLibReportStatusCode: Add new APIs
   79 52e22c60eab7 MdeModulePkg: Add definitions for EDKII DEBUG PPI
   80 2bc82244638a MdeModulePkg: Add a PEIM to install Debug PPI
   81 66f50a4b0d49 MdeModulePkg/PeiDebugLibDebugPpi: Add PEI debug lib
   82 a8ac75b8eeb8 MdeModulePkg: Add PEIM and lib to dsc file
   83 475a4317c037 UefiCpuPkg/SmmCpuFeaturesLib: Remove .S files for IA32 and X64 arch
   84 b2d13be506fb UefiCpuPkg/BaseUefiCpuLib: Remove .S files for IA32 and X64 arch
   85 df6c5f01e182 UefiCpuPkg/CpuExceptionHandlerLib:Remove.S files for IA32 and X64 arch
   86 4eea7627ef0d MdePkg/BaseCpuLib: Remove .S files for IA32 and X64 arch
   87 1ee58b7103f3 MdePkg/BaseLib: Remove .S files for IA32 and X64 arch
   88 f578386cc49d MdePkg/BaseMemoryLibMmx: Remove .S files for IA32 and X64 arch
   89 fbce3e064cdd MdePkg/BaseMemoryLibOptDxe: Remove .S files for IA32 and X64 arch
   90 ef008cd706b8 MdePkg/BaseMemoryLibOptPei: Remove .S files for IA32 and X64 arch
   91 42b7b15d2798 MdePkg/BaseMemoryLibRepStr: Remove .S files for IA32 and X64 arch
   92 94cf7d235a48 MdePkg/BaseMemoryLibSse2: Remove .S files for IA32 and X64 arch
   93 fcc61ca4b122 CryptoPkg/IntrinsicLib: Remove .S files for IA32 arch
   94 c7d22535f7dc SourceLevelDebugPkg/DebugAgentCommon: Remove .S files
   95 fb5c9ed8439b SourceLevelDebugPkg/PeCoffExtraActionLibDebug: Remove .S files
   96 57b6844503e7 CorebootModulePkg/SecCore: Remove .S files for IA32 arch
   97 7ed72121b753 SourceLevelDebugPkg/DebugAgent: Remove AsmFuncs.S in INF
   98 e4ff6349bf9e UefiCpuPkg/MpInitLib: Fix MemTest86 failure.
   99 37f9fea5b88d UefiCpuPkg\CpuSmm: Save & restore CR2 on-demand paging in SMM
  100 79be3d27517c UefiCpuPkg/RegisterCpuFeaturesLib: Remove useless functions.
  101 6214ffb41079 UefiCpuPkg/RegisterCpuFeaturesLib: Optimize PCD PcdCpuFeaturesUserConfiguration.
  102 001c2c80333f UefiCpuPkg/RegisterCpuFeaturesLib: Simplify PcdCpuFeaturesSupport.
  103 f664032e063b UefiCpuPkg/RegisterCpuFeaturesLib: Correct comments.
  104 516e33972f0a UefiCpuPkg/Cpuid.h: Remove duplicated struct definition for leaf 1FH
  105 079141ebe7f1 UefiCpuPkg/Cpuid: Dump leaf 1FH information correctly
  106 7f33d4f22836 UefiCpuPkg/LocalApicLib: Add GetProcessorLocation2ByApicId() API
  107 f8113e25001e UefiCpuPkg/Cpuid.h: Update CPUID.7H.ECX structure for 5-level paging
  108 f53de8aecb12 edk2: Add License-History.txt
  109 304bff7223a8 edk2: Change License.txt from 2-Clause BSD to BSD+Patent
  110 9ca2b9b9abef edk2: Replace BSD License with BSD+Patent License
  111 2e351cbe8e19 BaseTools: Replace BSD License with BSD+Patent License
  112 4059386c7080 ArmPkg: Replace BSD License with BSD+Patent License
  113 f4dfad05dda2 ArmPlatformPkg: Replace BSD License with BSD+Patent License
  114 9792fb0e65ff ArmVirtPkg: Replace BSD License with BSD+Patent License
  115 a1594be9c788 BeagleBoardPkg: Replace BSD License with BSD+Patent License
  116 f3342b7a69bd CorebootModulePkg: Replace BSD License with BSD+Patent License
  117 d2e8b7e1462f CorebootPayloadPkg: Replace BSD License with BSD+Patent License
  118 2009f6b4c5cb CryptoPkg: Replace BSD License with BSD+Patent License
  119 9cd9bdc620b4 DynamicTablesPkg: Replace BSD License with BSD+Patent License
  120 878b807a435e EmbeddedPkg: Replace BSD License with BSD+Patent License
  121 e3ba31da1cd1 EmulatorPkg: Replace BSD License with BSD+Patent License
  122 eb6cb4ce755f FatPkg: Replace BSD License with BSD+Patent License
  123 bcef758cbac5 FmpDevicePkg: Replace BSD License with BSD+Patent License
  124 c0a00b143853 IntelFrameworkModulePkg: Replace BSD License with BSD+Patent License
  125 22a69a5efe1d IntelFrameworkPkg: Replace BSD License with BSD+Patent License
  126 9672cd30563b IntelFsp2Pkg: Replace BSD License with BSD+Patent License
  127 512e23a3339d IntelFsp2WrapperPkg: Replace BSD License with BSD+Patent License
  128 16a16ea6e39a IntelFspPkg: Replace BSD License with BSD+Patent License
  129 194863604898 IntelFspWrapperPkg: Replace BSD License with BSD+Patent License
  130 8f7a05e13966 IntelSiliconPkg: Replace BSD License with BSD+Patent License
  131 9d510e61fcee MdeModulePkg: Replace BSD License with BSD+Patent License
  132 9344f0921518 MdePkg: Replace BSD License with BSD+Patent License
  133 ecf98fbcf858 NetworkPkg: Replace BSD License with BSD+Patent License
  134 9d2eedba985b Nt32Pkg: Replace BSD License with BSD+Patent License
  135 538311f7d3f6 Omap35xxPkg: Replace BSD License with BSD+Patent License
  136 96ae5934cfc3 OptionRomPkg: Replace BSD License with BSD+Patent License
  137 b26f0cf9ee09 OvmfPkg: Replace BSD License with BSD+Patent License
  138 e1d302e55472 PcAtChipsetPkg: Replace BSD License with BSD+Patent License
  139 0eb3de2edc2a QuarkPlatformPkg: Replace BSD License with BSD+Patent License
  140 c9f231d08bdb QuarkSocPkg: Replace BSD License with BSD+Patent License
  141 289b714b7700 SecurityPkg: Replace BSD License with BSD+Patent License
  142 616bb7577171 ShellBinPkg: Replace BSD License with BSD+Patent License
  143 56ba37463a5f ShellPkg: Replace BSD License with BSD+Patent License
  144 fbf06957b9fd SignedCapsulePkg: Replace BSD License with BSD+Patent License
  145 85f7e11021b3 SourceLevelDebugPkg: Replace BSD License with BSD+Patent License
  146 86094561f674 StandaloneMmPkg: Replace BSD License with BSD+Patent License
  147 0acd869796de UefiCpuPkg: Replace BSD License with BSD+Patent License
  148 7ede80607b3f Vlv2DeviceRefCodePkg: Replace BSD License with BSD+Patent License
  149 9dc8036ddf6f Vlv2TbltDevicePkg: Replace BSD License with BSD+Patent License
  150 bcb966958adc AppPkg: Replace BSD License with BSD+Patent License
  151 0a2530ea7f53 StdLib: Replace BSD License with BSD+Patent License
  152 be41238497e9 StdLibPrivateInternalFiles: Replace BSD License with BSD+Patent License
  153 75fae505b735 OvmfPkg: Change License.txt from 2-Clause BSD to BSD+Patent
  154 3806e1fd1397 edk2: Remove Contributions.txt and update Readme.md
  155 a281361014de BaseTools/PatchCheck: Generate error if Contributed-under found
  156 ae2fb9ead47b CorebootPayloadPkg/FbGop: Locate correct framebuffer device
  157 b1e27d175abb BaseTools: Fixed issue in MultiThread Genfds function
  158 2914e8153dd3 BaseTools: Fix corner-cases of --hash feature
  159 1b8caf0d87ea BaseTools: Fix corner-cases of --hash feature
  160 f2b5e04acad2 BaseTools: Fix corner-cases of --hash feature
  161 db4d47fd3ae9 BaseTools: Fix corner-cases of --hash feature
  162 746c5b6238f1 ArmVirtPkg: Update UefiDecompressLib instance
  163 4ffc5aa1d14f BeagleBoardPkg: Update UefiDecompressLib instance
  164 0108a91c5526 EmulatorPkg: Update UefiDecompressLib instance
  165 58e8a1d8044f MdeModulePkg: Move BaseUefiTianoCustomDecompressLib to
  166 9c0f90ffe163 Nt32Pkg: Update to use UefiDecompressLib in MdeModulePkg
  167 8c3677c33f59 Quark: Update to use UefiDecompressLib in MdeModulePkg
  168 f9f757fd098a Vlv2TbltDevicePkg: Update to use UefiDecompressLib in MdeModulePkg
  169 ddb8cedce7e0 IntelFrameworkModulePkg: Fix comments and improve E820 debug output
  170 9a86fd33e941 OvmfPkg: Copy 8259InterruptControllerDxe driver from PcAtChipsetPkg
  171 10fa47e53829 OvmfPkg: Copy Legacy8259 protocol definitions from IntelFrameworkPkg
  172 460ffed242af OvmfPkg/OvmfPkg.dec: Add 8259-related PCDs in OVMF DEC file
  173 c01852433f37 OvmfPkg/8259InterruptControllerDxe: Update to make it build for OVMF
  174 682888a6d236 OvmfPkg/AcpiPlatformDxe: Consume the 8259 PCD defined in OvmfPkg
  175 1a3ffdff82e6 OvmfPkg: Copy 8254TimerDxe driver from PcAtChipsetPkg
  176 e3c787af8c04 OvmfPkg/8254TimerDxe: Update to make it build for OVMF
  177 6d70ade90cab OvmfPkg: Update DSC/FDF files to consume 8259/8254 drivers in OvmfPkg
  178 e0fd9ece26c9 ShellPkg: Clarify the description of acpiview option '-s'
  179 cff96d43730c OvmfPkg/License.txt: remove XenPvBlkDxe from the MIT licensed dir list
  180 07a0f27b0e00 OvmfPkg/License.txt: refresh the MIT license text and include the SPDX ID
  181 6f21d772aa6b OvmfPkg/IndustryStandard/Xen: replace MIT license text with SPDX ID
  182 34131e1b5c09 OvmfPkg/XenBusDxe: replace MIT license text with SPDX ID
  183 174232fa9a90 MdePkg/BaseLib: Remove LongJump.c and SetJump.c
  184 f72f81777b39 MdeModulePkg: introduce PE/COFF image emulator protocol
  185 57df17fe26cd MdeModulePkg/DxeCore: invoke the emulator protocol for foreign images
  186 615a72400bca MdeModulePkg/PciBusDxe: dispatch option ROMs for foreign architectures
  187 26d60374b87d MdeModulePkg/UefiBootManagerLib: allow foreign Driver#### images
  188 095fcfc606bd MdeModulePkg/EbcDxe: implement the PE/COFF emulator protocol
  189 431390dc1f7d MdePkg/UefiBaseType.h: treat EBC as a non-native machine type
  190 2e21e8c4b896 MdeModulePkg/DxeCore: remove explicit EBC handling
  191 87fcc6e8634e CorebootPayloadPkg: Remove the dependency of ShellBinPkg
  192 04af8bf262f1 UefiPayloadPkg: Enhance UEFI payload for coreboot and Slim Bootloader
  193 eb33b3994d06 EmulatorPkg/Unix: Rename GdbRun to GdbRun.sh
  194 68d47eea422d IntelFsp2WrapperPkg: Perform post FSP-S process.
  195 85b01932765d MdeModulePkg/CapsulePei: Change debug MACRO
  196 42d8be0eaac5 MdeModulePkg/CapsulePei: Update the debug code to print 64bit data
  197 05217d210e8d BaseTools:Enable the /MP option of MSVC compiler
  198 87bfb9bcb744 BaseTools:Coding problems cause can not encode FMP Auth Header
  199 0eccea3fbe2f BaseTools: Hash false success with back to back builds
  200 cfb29d2bda57 BaseTools:update ConvertFceToStructurePcd.py with the char order PCD name.
  201 d43056888790 MdeModulePkg/UefiBootManagerLib: fix crash on uninitialized ExitData
  202 2980988575c9 Vlv2TbltDevicePkg: Remove ResetSystem declaration
  203 07accfe398a2 Vlv2TbltDevicePkg: Retire 8254 timer and 8259 module
  204 e2a673b85336 CryptoPkg/BaseCryptLib.h: Add new API to get organization name
  205 912e1e1ee27e CryptoPkg/BaseCryptLib: Add new API to get organization name
  206 1796a39493b2 CryptoPkg/BaseCryptLib.h: Add new API VerifyEKUsInPkcs7Signature
  207 23c3178c4d45 CryptoPkg/BaseCryptLib: Add new API VerifyEKUsInPkcs7Signature
  208 aed90beee510 CryptoPkg/BaseCryptLib.h: Add PKCS1v2 (RSAES-OAEP) support.
  209 933f1990f583 CryptoPkg/BaseCryptLib: Add PKCS1v2 (RSAES-OAEP) support.
  210 52d229238b2d OvmfPkg/QemuVideoDxe: avoid arithmetic on null pointer
  211 dc5bbf10741c OvmfPkg/AcpiPlatformDxe: suppress invalid "deref of undef pointer" warning
  212 e30991740d18 OvmfPkg/AcpiPlatformDxe: catch theoretical nullptr deref in Xen code
  213 c2f643479eb3 OvmfPkg/BasePciCapLib: suppress invalid "nullptr deref" warning
  214 b29e6365c37f NetworkPkg/UefiPxeBcDxe:Add two PCD to control PXE.
  215 1dc1da58306f MdeModulePkg: Change the SMM debug lib instance
  216 c0b2816d69a2 SignedCapsulePkg: Change the SMM debug lib instance
  217 2b5778c68b63 MdePkg/UefiDebugLibDebugPortProtocol: Make it runtime safe
  218 452702d0bc51 MdePkg/UefidebugLibConOut: Make it runtime safe
  219 e72920ec617b MdePkg/UefiDebugLibStdErr: Make it runtime safe
  220 0b836855fb4d BaseTools: Sometime write file not immediate to disk
  221 452b5ad61ddd BaseTools: Enhance Bin Cache database to support save the cache
  222 35c2af00d8c3 BaseTools:fixed the incorrect autogen makefile which cause build failure.
  223 56008eb7f68c BaseTools: Hash false success.. minor change in hash invalidation
  224 00e3e4801467 IntelFsp2WrapperPkg/FspsWrapperPeim: Fix coding style.
  225 40ffb6dc635d Change package maintainer and reviewer of CryptoPkg.
  226 2c0d39ac4704 MdeModulePkg/DxeCapsuleLibFmp: clone ESRT for runtime access
  227 ab7e02a4f86a MdeModulePkg/HiiDatabaseDxe: Release lock on all error return path
  228 81a8a52a6bb2 ShellBinPkg: Remove ShellBinPkg
  229 e7ee4e0da153 MdePkg/BaseIoLibIntrinsic: Remove IoLibIcc.c
  230 5b7255e3d909 MdePkg/BaseLib: Remove support of INTEL tool chain
  231 36082dffd48d BaseTools: Remove ICC tool chain in tools_def.template
  232 04c7a5febd82 MdeModulePkg/AhciPei: Limit max transfer blocknum for 48-bit address
  233 b2b8e872fd1b MdeModulePkg/AhciPei: Add PEI BlockIO support
  234 1a734ed85fda CryptoPkg: add issetugid declaration to fix openssl build on FreeBSD
  235 d976f09d99b7 MdePkg/PiFirmwareFile: express IS_SECTION2 in terms of SECTION_SIZE
  236 fc76bbd94df7 MdePkg/PiFirmwareFile: fix undefined behavior in SECTION_SIZE
  237 d3b3ee09a675 BaseTools/PiFirmwareFile: fix undefined behavior in SECTION_SIZE
  238 1fd227dd2607 MdePkg/PiFirmwareFile: fix undefined behavior in FFS_FILE_SIZE
  239 b9d4847ec258 OvmfPkg/Sec: fix out-of-bounds reads
  240 20029ca22baa EmbeddedPkg: Allow DXE_DRIVER to depend on NvVarStoreFormattedLib
  241 dfaa565559ba MdeModulePkg/DxeCore: Please static checker for false report
  242 c9b3fe1586eb BaseTools: Support customized compiling command
  243 00d2aef80c9a MdeModulePkg/BMMUiLib: Set Handle to NULL after uninstall protocol
  244 5a4f3a3453e7 MdeModulePkg/FileExplorer: Set Handle to NULL after uninstall protocol
  245 60a86abf95aa MdeModulePkg/HiiDB: Minimize memory allocation times after ReadyToBoot
  246 ec4e1af5b94f BaseTools/tools_def.template: Remove tools chain with ASL tool
  247 228a9c2999bd MdePkg/UefiSpec.h: Change comments of EFI_RESET_SYSTEM
  248 efaed0ab678a MdePkg/PiPeiCis.h: Change comments of EFI_PEI_RESET2_SYSTEM
  249 1abe0959f0ea MdePkg/PeiServicesLib.h: Change comments of PeiServicesResetSystem2
  250 d821151e814f MdePkg/PeiServicesLib.c: Change comments of PeiServicesResetSystem2
  251 930fcd9f3acf SecurityPkg/Tcg2Dxe: Change comments of ShutdownTpmOnReset
  252 173cd4723444 MdeModulePkg/ResetSystemLib.h: Change comments of ResetSystem
  253 2662528d9695 MdeModulePkg/DxeResetSystemLib.c: Change comments of ResetSystem
  254 1cff74bb0f2e MdeModulePkg/BaseResetSystemLibNull.c: Change comments of ResetSystem
  255 32f555385fc8 MdeModulePkg/RuntimeResetSystemLib.c: Change comments
  256 99d7570a7a7f MdeModulePkg/PeiResetSystemlib.c: Change comments of ResetSystem
  257 f69cb1082831 MdeModulePkg/ResetSystemRuntimeDxe: Change comments
  258 3bb9b1fad3c6 MdeModulePkg/ResetSystemPei: Change comments of ResetSystem2
  259 eac49c837b32 MdeModulePkg/PeiMain: Change comments of PeiResetSystem2
  260 c676cf740256 MdeModulePkg/NvmExpressHci.c: Change comments
  261 7701cd048712 BeagleBoardPkg/ResetSystemLib: Add new API ResetSystem
  262 446bb6516e94 CorebootPayloadPkg/ResetSystemLib: Add new API ResetSystem
  263 96ed5b28f9ab Nt32Pkg/ResetSystemLib: Add new API ResetSystem
  264 84c0b80de716 OvmfPkg/ResetSystemLib: Add new API ResetSystem
  265 b700a8271912 PcAtChipsetPkg/ResetSystemLib: Add new API ResetSystem
  266 c35bbeebbed2 QuarkSocPkg/ResetSystemLib: Add new API ResetSystem
  267 b5fddfaf477a Vlv2TbltdevicePkg/ResetSystemLib: Add new API ResetSystem
  268 bda4d5be7c97 ArmPkg/ArmSmcPsciResetSystemLib: Add a new API ResetSystem
  269 d943e5ad3b2b ArmVirtPkg/ArmVirtPsciResetSystemLib: Add a new API ResetSystem
  270 06aaf2f82cd1 MdeModulePkg/ResetUtilityLib: Add a new API ResetSystemWithSubtype
  271 0851d7a53a1d MdeModulePkg/ResetUtilityLib: Add a new API ResetSystemWithSubtype
  272 a8a8b408b7de OvmfPkg/PlatformBootManagerLib: Remove dependency on Mps.h
  273 f4c874c45dbc ShellPkg/UefiShellDebug1CommandsLib
  274 5a1ca93a1fa1 ShellPkg/UefiHandleParsingLib: Remove some unused Guids
  275 4e1daa60f537 MdePkg: Removed IPF related code
  276 c17e4a2f5371 MdePkg/UefiDebugLibConOut: make global variable static
  277 7eef381378b7 MdePkg/UefiDebugLibDebugPortProtocol: make global variable static
  278 ffe48f4b6c65 MdePkg/UefiDebugLibStdErr: make global variable static
  279 ea305ce3f8b5 IntelFrameworkModulePkg: make global variable static
  280 2410ac023016 MdeModulePkg/FirmwarePerformanceDxe: make global variable static
  281 9ed8c3a8068a IntelFsp2WrapperPkg/FspWrapperNotifyDxe: make global variable static
  282 4e4b23040786 IntelFrameworkModulePkg: make global variable static
  283 af51cb48a22d MdeModulePkg/StatusCodeHandlerRuntimeDxe: make global variable static
  284 d55d9d066436 NetworkPkg: Remove IpSec driver and application
  285 679906d9bd41 NetworkPkg: Add missing string token in NetworkPkg.uni
  286 8a472b1915fb MdeModulePkg: BaseSerialPortLib16550: Add Mmio32 support
  287 038f929c921c CryptoPkg/BaseCryptLib: Remove the blank line in the comments
  288 e2d3a25f1a31 EmbeddedPkg: Extend NvVarStoreFormattedLib LIBRARY_CLASS
  289 964f432b9b0a edk2: Remove AppPkg, StdLib, StdLibPrivateInternalFiles
  290 5c5d8d0b2086 edk2: Update ReadMe.md and Maintainer.txt for edk2-libc repo
  291 137cbff041fc QuarkPlatformPkg/AcpiTables: Resolve iASL warnings
  292 b11636239f84 OvmfPkg: introduce EnrollDefaultKeys application
  293 3defea06b2b7 OvmfPkg/EnrollDefaultKeys: update @file comment blocks
  294 05d7f3c3fce5 OvmfPkg/EnrollDefaultKeys: refresh INF file
  295 034dec6ca19d ArmVirtPkg: build EnrollDefaultKeys.efi
  296 85d96998a470 OvmfPkg/EnrollDefaultKeys: clean up minor whitespace wart
  297 32d1440aaddd OvmfPkg/EnrollDefaultKeys: clean up global variable name prefixes
  298 e0d612356e84 OvmfPkg/EnrollDefaultKeys: clean up acronym capitalization in identifiers
  299 a2491a6c82e4 OvmfPkg/EnrollDefaultKeys: remove unneeded EFIAPI call. conv. specifiers
  300 1c9418fcafe3 OvmfPkg/EnrollDefaultKeys: extract typedefs to a header file
  301 a79b115adeab OvmfPkg/EnrollDefaultKeys: split out certificate and signature constants
  302 7eeaa7585a98 OvmfPkg/EnrollDefaultKeys: extract MICROSOFT_VENDOR_GUID
  303 86bf2672a35a OvmfPkg/EnrollDefaultKeys: describe functions with leading comment blocks
  304 c9727ff1df0d OvmfPkg/EnrollDefaultKeys: document the steps of the entry point function
  305 392404167fb1 OvmfPkg: introduce OVMF_PK_KEK1_APP_PREFIX_GUID
  306 be9470b3c91f OvmfPkg/EnrollDefaultKeys: enroll PK/KEK1 from the Type 11 SMBIOS table
  307 9fb2ce2f465d OvmfPkg/EnrollDefaultKeys: remove Red Hat's hard-coded PK/KEK1
  308 27e4d6ae25a0 OvmfPkg/XenSupport: remove usage of prefetchable PCI host bridge aperture
  309 d63610df60f7 OvmfPkg/XenSupport: use a correct PCI host bridge aperture for BAR64
  310 0c40c9c925ca OvmfPkg/XenSupport: turn off address decoding before BAR sizing
  311 a41b12574ee1 MdePkg: Add PcdSpeculationBarrierType
  312 aec74656893a MdePkg/BaseLib: Use PcdSpeculationBarrierType
  313 24f4547c5c12 QuarkPlatformPkg: Set PcdSpeculationBarrierType to CPUID
  314 6dd88437b1d9 UefiCpuPkg/MpInitLibUp: Add uniprocessor MpInitLib
  315 ba1362d882e9 UefiCpuPkg/CpuMpPei: Add missing CpuLib class
  316 c793d24b0103 QuarkPlatformPkg: Use uniprocessor MpInitLibUp
  317 0edaa8c16204 QuarkSocPkg/SmmAccessDxe: Set region to UC on SMRAM close
  318 80d28ddeb2ce QuarkPlatformPkg/PlatformInit: Resolve ResetSystemLib name collision
  319 0d6de095a5ae BaseTools: split long line into multiple short lines.
  320 c4c8c340ef01 BaseTools: Add GCC flags to Basetool build.
  321 273190e18975 BaseTools:Fixed an issue where the order of GuidS changed in guid.xref
  322 727d7ebaa9f3 OvmfPkg/EnrollDefaultKeys: suppress incorrect compiler warning
  323 d02741225887 Vlv2TbltDevicePkg: Remove NetworkPkg/IpSecDxe module
  324 fbb0ec7ea4c0 BaseTools: support arm64 as a platform name in addition to aarch64
  325 f5245a1db144 SecurityPkg/OpalPassword: Add warning message for Secure Erase
  326 8b4b2fb9a183 BaseTools:corrected error message for the DatumType error
  327 0cb3f77153b7 BaseTools:ECC report errors on account of analyze special characters
  328 26e2b295ec7a BaseTools:Remove unused BaseTools\Source\Python\UPT\Dll
  329 df7c81b5b219 BaseTools:The code used to test python module is moved to edksetup
  330 a642e2b42ed5 MdeModulePkg/DumpDynPcd: Add application to dump dynamic PCD settings
  331 da815cf390cc NetworkPkg DSC: Add the required ARM library to pass ARM build
  332 1e948802e755 NetworkPkg: Add DSC/FDF include segment files to NetworkPkg.
  333 23ea5bfea2a2 NetworkPkg: Add package level include DSC file
  334 792f0d4f12ad EmulatorPkg: Support a second GOP window
  335 1b72fd5121b5 BaseTools/VfrCompile: Remove framework VFR support
  336 8dc1f4ec0f54 FatPkg/FatPei: Remove PcdFrameworkCompatibilitySupport usage
  337 9feffce9c6b5 IntelFrameworkModulePkg: Remove PcdFrameworkCompatibilitySupport usage
  338 728c7ffac317 MdeModulePkg/Core: Remove PcdFrameworkCompatibilitySupport usage
  339 2e217e402215 MdeModulePkg/CdExpress: Remove PcdFrameworkCompatibilitySupport usage
  340 059cf575eb6c MdeModulePkg/Setup: Remove PcdFrameworkCompatibilitySupport usage
  341 1df91bb772a1 QuarkPlatformPkg: Remove PcdFrameworkCompatibilitySupport usage
  342 868f139b086a SignedCapsulePkg: Remove PcdFrameworkCompatibilitySupport usage
  343 3e2ec1891f98 UefiCpuPkg: Remove PcdFrameworkCompatibilitySupport usage
  344 2c835dee82a4 Vlv2TbltDevicePkg: Remove PcdFrameworkCompatibilitySupport usage
  345 4acc5750f055 MdeModulePkg: Remove PcdFrameworkCompatibilitySupport
  346 e0972cfc7df1 SecurityPkg/SecurityPkg.dec: Change BlockSID default policy
  347 539a6c931884 SecurityPkg/OpalPassword: Change send BlockSID policy
  348 46e696088a0a SecurityPkg/OpalPassword: Fix "Enable Feature" Menu disappear issue
  349 7d83e9e84793 BaseTools:Delete FrameworkDatabase from BaseTools/Conf
  350 c648e9058717 BaseTools: Fix the issue that build report missing Module Size
  351 51e9be0cc3d1 Vlv2TbltDevicePkg:Delete FrameworkDatabase from Vlv2TbltDevicePkg
  352 49693202ec9c Revert "BaseTools:code of test python module is moved to edksetup"
  353 20af3a7a3ec4 FatPkg/FatPei: Remove BootInRecoveryMode PPI DEPEX.
  354 0a506fc7ab8b MdeModulePkg: Remove BootInRecoveryMode PPI
  355 30a888b5a0a0 IntelSiliconPkg/IntelVTdDxe: Do global invalidation before boot
  356 8522ce2c9f88 Maintainers.txt: Update the name of 'Hao Wu' to 'Hao A Wu'
  357 ad9df9377028 EmulatorPkg: Change the cpu frequency to a non-zero value
  358 0e92957eaa50 EmulatorPkg: Make the shell be the first boot option
  359 68cafc7bf057 EmulatorPkg: Save the modified order after rebooting
  360 21d5bf86b223 EmulatorPkg: Remove framework pkgs dependency from EmulatorPkg
  361 3eac7496bef1 Vlv2TbltDevicePkg/PlatformFlashAccessLib: Add error return
  362 f635a42e14f4 Vlv2TbltDevicePkg/AcpiPlatform: Change Size type to UINTN
  363 24990e84d323 Vlv2TbltDevicePkg/AcpiPlatform: Add variable protocols to depex
  364 e5a0cf912531 Vlv2TbltDevicePkg/PpmPolicy: Fix call to MP Services Protocol
  365 f4aa56e7cc38 Vlv2TbltDevicePkg/SmBiosMiscDxe: Fix GCC build issue
  366 927926f45485 Vlv2TbltDevicePkg: Find UEFI Shell using gUefiShellFileGuid
  367 5cf0cb1582af Vlv2TbltDevicePkg: Build full UEFI Shell from sources
  368 86be1a2eaa8a Vlv2TbltDevicePkg: Use CpuDxe from UefiCpuPkg
  369 76386f4292c3 Vlv2TbltDevicePkg: Add PchInitSmm module
  370 a4390a28b8ac Vlv2TbltDevicePkg: Always enable QuietBoot to produce BGRT
  371 ef81f9f12af4 Vlv2TbltDevicePkg/Stitch/Gcc: Update default setting binary
  372 9d87197edadc Vlv2TbltDevicePkg: Remove directory assumptions from build scripts
  373 447597f123c0 Vlv2TbltDevicePkg/Capsule: Do not clear UEFI varstore
  374 f2197f0d0c3d Vlv2TbltDevicePkg/Capsule: Remove path to openssl tools
  375 1bb262ea0440 Vlv2TbltDevicePkg/Capsule: Add Linux/LVFS generation scripts
  376 62fdb9bbc505 Vlv2TbltDevicePkg: Update Readme.md
  377 cd5147734cbe OvmfPkg/QemuVideoDxe: Remove dependency on OptionRomPkg
  378 70023bab7efe MdeModulePkg: BaseSerialPortLib16550: Add missing Pcd to UNI
  379 afe8c4110c07 BaseTools: Correct the value assignment for StructurePcd
  380 6b74ccf0f8b5 BaseTools:Enables FFS to support the GUID value format
  381 ae3c247dbc94 BaseTools: Check the fread function and avoid dead loop
  382 f684c3f5eef4 Coreboot*Pkg: Retire CorebootPayloadPkg and CorebootModulePkg
  383 e2aaec4b080c UefiCpuPkg: Remove double \r
  384 4ff689d98277 BaseTools/VfrCompile: clean Framework Vfr support
  385 c4521157bf57 ArmPkg/CompilerIntrinsicsLib: Remove unused sources and clean up .inf
  386 482704df27cc ArmPkg/CompilerIntrinsicsLib: Add memcmp, memmove intrinsics for MSFT
  387 d039044be43d ArmPkg/CompilerIntrinsicsLib: Add lasr ARM assembly source for GCC
  388 96ef5a8e30a8 ArmPkg/CompilerIntrinsicsLib: Add uread, uwrite GCC assembly sources
  389 5347c48016f2 edk2: Remove packages moved to edk2-platforms
  390 83f997e58dca edk2: Update Maintainers.txt for packages moved to edk2-platforms
  391 cf574f0a1838 UefiCpuPkg PiSmmCpuDxeSmm: Only support IN/OUT IO save state read (CVE-2018-12182)
  392 4000f249ba5c SecurityPkg: Remove double \r
  393 e90ea9470a88 SecurityPkg/AuthSeriableLib: Always delete variable in certdb
  394 f0b8166505d2 EmbeddedPkg DSC: Use ReportStatusCodeLib (DXE) in MdeModulePkg
  395 32f345eba719 EmbeddedPkg/PrePiLib: Drop dependency on IntelFramework[Module]Pkg
  396 a11d371ef660 OvmfPkg: Remove duplicated library classes in dxe drivers section in DSC
  397 a40f30398ab0 MdePkg: Add ACPI 6.3 header file
  398 3f0055c8de8a MdePkg: Merge TianoCustomDecompress algorithm into
  399 805313dbac3a Nt32Pkg: Update UefiDecompressLib instance path
  400 bf502ae44919 MdeModulePkg/Library: Remove BaseUefiTianoCustomDecompressLib
  401 89d7c543cf71 OvmfPkg/EnrollDefaultKeys: import the non-default key into db
  402 631195044ff0 OvmfPkg: Update DSC/FDF to use NetworkPkg's include fragment file.
  403 bc01f4971d63 Nt32Pkg: Update DSC/FDF to use NetworkPkg's include fragment file.
  404 157a3b1aa50f ArmVirtPkg: Update DSC/FDF to use NetworkPkg's include fragment file.
  405 3b7a897cd8e3 EmulatorPkg: Update DSC/FDF to use NetworkPkg's include fragment file.
  406 60e95bf5094f OvmfPkg/PlatformPei: assign PciSize on both i440fx/q35 branches explicitly
  407 9a2e8d7c65ef OvmfPkg/PlatformPei: hoist PciBase assignment above the i440fx/q35 branching
  408 75136b29541b OvmfPkg/PlatformPei: reorder the 32-bit PCI window vs. the PCIEXBAR on q35
  409 39b9a5ffe661 OvmfPkg/PlatformPei: fix MTRR for low-RAM sizes that have many bits clear
  410 4d5d7812786d UefiCpuPkg: Remove double \r
  411 7afa0cea8f2c Nt32Pkg: Remove it
  412 147e6e70f2be Maintainers.txt: Remove Nt32Pkg reference after Nt32Pkg is removed
  413 c2eab535c679 CryptoPkg/BaseCryptLib: remove unused code for IPF
  414 fb5573b83007 Maintainers.txt: Add 'Zhichao Gao' for ShellPkg review
  415 8da8daafc905 ShellPkg: acpiview: Add GT Frame Number validation to GTDT parser
  416 1887b995a359 ShellPkg/UefiShellAcpiViewCommandLib: Fix PPTT cache attributes validation
  417 41ac2076a7c6 UefiCpuPkg CpuCommonFeaturesLib: Remove CPU generation check
  418 59f20e8d7100 ShellPkg: Update DSC to use NetworkPkg's include fragment file
  419 48f43c2c56ee EmbeddedPkg: Update DSC to use NetworkPkg's include fragment file
  420 7b84de939489 ShellPkg: Display VENDOR_ID in ASCII when parsing PPTT
  421 911efe279ec3 ShellPkg: Add NetworkPkg/NetworkPkg.dec as the package dependency
  422 110d4729b58e EmulatorPkg: Add NetworkPkg/NetworkPkg.dec as the package dependency
  423 cc99ea9422be Maintainers.txt: remove UTF-8 BOM wrongly added in commit 147e6e70
  424 66b845ae06f1 BaseTools: Fix private includes for FILE_GUID override
  425 a7ef158b0752 BaseTools: Library hashing fix and optimization for --hash feature
  426 c1387446edbb BaseTools:Update mailing list address in BaseTools error messages
  427 9ca1f1446a5a BaseTools: Remove './SecMain' from 'run' target
  428 3604174718e2 IntelFrameworkModulePkg/DebugLib: Fix string copy issue
  429 4718129bf94e BaseTools: Update Conf/target.template with the default EmulatorPkg.dsc
  430 01e074bfbcf0 MdeModulePkg: Update MdeModulePkg.dsc to remove Network related modules
  431 e812a812c1a0 BaseTools: Remove './SecMain' from 'run' target
  432 c0fd7f734e2d BaseTools:Change the path of the file that Binary Cache
  433 4542f8b8135f NetworkPkg: Move Network library and drivers from MdeModulePkg to NetworkPkg
  434 07135c122058 NetworkPkg: Move Network library header file from MdeModulePkg to NetworkPkg
  435 ec56fa278428 MdeModulePkg: Remove network library header file from package DEC file
  436 005a5f2dea5c UefiPayloadPkg: Update Package DSC files to refer to NetworkLibs.dsc.inc
  437 da82eb1c93b4 ArmPkg: Update Package DSC to remove unused NetLib
  438 21d9dc21f818 SignedCapsulePkg: Update Package DSC to remove unused network libs
  439 5a9e23ceb991 Maintainers.txt: update mailing list information
  440 4abfc66db088 Maintainers.txt: update UEFI payload information
  441 591b8cb7f3d0 IntelFsp2Pkg/SplitFspBin.py: Support rebasing 1.x binary.
  442 9d73c5608d22 IntelFsp2Pkg/SplitFspBin.py: Revert FSP 1.x support.
  443 e2afc8ab59c3 MdeModulePkg/AhciPei: Fix device cannot be found in non-S3 path
  444 3a0b998bf3b5 BaseTools:Extend the binary cache to support library cache
  445 b6cfa686e42d BaseTools:Update binary cache restore time to current time
  446 85af0b8116f3 ArmPkg: import Berkeley Softfloat library as git submodule
  447 3cc57695df5a ArmPkg/ArmSoftFloatLib: switch to new version of softfloat library
  448 99243102b467 ArmPkg/ArmSoftFloatLib: remove source files that are no longer used
  449 8594c2073cdb ArmPkg/ArmLib ARM: set .fpu to let Clang 7 assemble ArmV7Support.S
  450 371e7001e8d5 ArmPkg/ArmSoftFloatLib GCC4x: fix build failure
  451 6fcc3d68eb02 CryptoPkg/OpensslLib: Modify process_files.pl for upgrading OpenSSL
  452 7eee0488944f CryptoPkg/OpensslLib: Exclude unnecessary files in process_files.pl
  453 96dbfad9b00b CryptoPkg/IntrinsicLib: Fix possible unresolved external symbol issue
  454 5db2fbff23ae CryptoPkg/OpensslLib: Prepare for upgrading OpenSSL
  455 9c3c5c91ce6d CryptoPkg/OpensslLib: Fix cross-build problem for AARCH64
  456 c51f8bae7cab CryptoPkg: Fix possible build problem with Clang
  457 b73967891824 CryptoPkg/OpensslLib: Add functions for upgrading OpenSSL1_1_1b
  458 456dd8b99f00 CryptoPkg: Upgrade OpenSSL to 1.1.1b
  459 acfb90911840 CryptoPkg/BaseCryptLib: Make HMAC_CTX size backward compatible
  460 f03859ea6c8f CryptoPkg CLANG35: add -std=c99 to dodge OpenSSL C atomics issue
  461 305cd4f783fe Revert "OvmfPkg/PlatformPei: fix MTRR for low-RAM sizes that have many bits clear"
  462 eb4d62b0779c Revert "OvmfPkg/PlatformPei: reorder the 32-bit PCI window vs. the PCIEXBAR on q35"
  463 753d3d6f43b2 Revert "OvmfPkg/PlatformPei: hoist PciBase assignment above the i440fx/q35 branching"
  464 d45349841113 Revert "OvmfPkg/PlatformPei: assign PciSize on both i440fx/q35 branches explicitly"
  465 b07de0974b65 OvmfPkg: raise the PCIEXBAR base to 2816 MB on Q35
  466 49edde15230a OvmfPkg/PlatformPei: set 32-bit UC area at PciBase / PciExBarBase (pc/q35)
  467 466c66341a99 CryptoPkg: Fix build problem with XCODE
  468 4ff8b6b1d8b7 FmpDevicePkg: Add TimerLib to DSC file
  469 7cea4d71a8a8 EmulatorPkg: don't display the cpu current speed
  470 a1539c46958f UefiPayloadPkg: Remove legacy PIC 8259 driver
  471 be689ecc93e5 Revert "EmulatorPkg: don't display the cpu current speed"
  472 cbfdc1b2df65 Maintainers.txt: Remove Network maintainers for MdeModulePkg/Universal/Network
  473 0a1b13fd4d22 CryptoPkg/OpensslLib: fix VS2017 build failure
  474 b8993a34ae00 edk2: Update additional licenses in Readme.md
  475 98d8f194e5a6 CryptoPkg/IntrinsicLib: Fix CLANG38 IA32 build problem
  476 b66c4c4ff918 Revert "UefiPayloadPkg: Remove legacy PIC 8259 driver"
  477 20d2e5a125e3 CryptoPkg/OpensslLib: fix build break caused by missing library

Cc: Philippe Mathieu-Daud <philmd@redhat.com>
Ref: https://bugs.launchpad.net/qemu/+bug/1831477
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Philippe Mathieu-Daud <philmd@redhat.com>
Tested-by: Philippe Mathieu-Daud <philmd@redhat.com>
2019-06-14 21:47:43 +02:00
Laszlo Ersek
b1625c660f roms/Makefile.edk2: define edk2-stable201905 network feature test macros
Due to edk2 commits 631195044ff0 ("OvmfPkg: Update DSC/FDF to use
NetworkPkg's include fragment file.", 2019-05-16) and 157a3b1aa50f
("ArmVirtPkg: Update DSC/FDF to use NetworkPkg's include fragment file.",
2019-05-16), we'll have to pefix the HTTP_BOOT_ENABLE and TLS_ENABLE build
flags with "NETWORK_", for building edk2 at tag "edk2-stable201905".

Right now the new flags are no-ops, so we can insert them separately,
before advancing our edk2 submodule reference. We will remove the old
flags afterwards.

Cc: Philippe Mathieu-Daud <philmd@redhat.com>
Ref: https://bugs.launchpad.net/qemu/+bug/1831477
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Philippe Mathieu-Daud <philmd@redhat.com>
Tested-by: Philippe Mathieu-Daud <philmd@redhat.com>
2019-06-14 21:47:33 +02:00
Peter Maydell
f3d0bec9f8 Block patches:
- Allow blockdev-backup from nodes that are not in qemu's main AIO
   context to newly added nodes
 - Add salvaging mode to qemu-img convert
 - Minor fixes to tests, documentation, and for less Valgrind annoyance
 -----BEGIN PGP SIGNATURE-----
 
 iQFGBAABCAAwFiEEkb62CjDbPohX0Rgp9AfbAGHVz0AFAl0Do0MSHG1yZWl0ekBy
 ZWRoYXQuY29tAAoJEPQH2wBh1c9AYfAH/3Z4Ua5Pwown99TH57jdfHBzdWnhwQV6
 fEJs1viFOufb9RS/3UB3JlPZ71Jf+4y97g9NrRY05BQ3ZJPwlm9moSdM7GPQ6Ni3
 OVqHP6shnOHlBHI897JRDPjpLGEujIVk59EE9wB7e/T8rpGo21yJ91u5Ha4T9M2/
 jsHwL/1NPCe8OxdCMSNJmIPA2PqouBjvEGdbCwa6sOVNe+pFJnhStEZOjnP+rmmb
 wt5vk+NR40rdsuAoUZ7mTr0GhUDtJAL9vkJgW1uH7b9mzAsxklsWpct6oxDwEYJL
 BURVLsT2g8QQwX7pebaOkys0ktPGkegtv785yh8KhPf2Yf6S8L1vS4M=
 =o8kg
 -----END PGP SIGNATURE-----

Merge remote-tracking branch 'remotes/maxreitz/tags/pull-block-2019-06-14' into staging

Block patches:
- Allow blockdev-backup from nodes that are not in qemu's main AIO
  context to newly added nodes
- Add salvaging mode to qemu-img convert
- Minor fixes to tests, documentation, and for less Valgrind annoyance

# gpg: Signature made Fri 14 Jun 2019 14:38:11 BST
# gpg:                using RSA key 91BEB60A30DB3E8857D11829F407DB0061D5CF40
# gpg:                issuer "mreitz@redhat.com"
# gpg: Good signature from "Max Reitz <mreitz@redhat.com>" [full]
# Primary key fingerprint: 91BE B60A 30DB 3E88 57D1  1829 F407 DB00 61D5 CF40

* remotes/maxreitz/tags/pull-block-2019-06-14:
  iotests: Test qemu-img convert -C --salvage
  iotests: Test qemu-img convert --salvage
  blkdebug: Inject errors on .bdrv_co_block_status()
  blkdebug: Add "none" event
  blkdebug: Add @iotype error option
  qemu-img: Add salvaging mode to convert
  qemu-img: Move quiet into ImgConvertState
  blockdev: Overlays are not snapshots
  qapi/block-core: Overlays are not snapshots
  qemu-img: Fix options leakage in img_rebase()
  iotests: restrict 254 to support only qcow2
  hw/block/fdc: floppy command FIFO memory initialization
  iotests: Fix intermittent failure in 219
  iotests: Filter 175's allocation information
  event_match: always match on None value
  iotests: add iotest 256 for testing blockdev-backup across iothread contexts
  iotests.py: rewrite run_job to be pickier
  QEMUMachine: add events_wait method
  iotests.py: do not use infinite waits
  blockdev-backup: don't check aio_context too early

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2019-06-14 14:46:13 +01:00
Max Reitz
21c1ce592a iotests: Test qemu-img convert -C --salvage
We do not support this combination (yet), so this should yield an error
message.

Signed-off-by: Max Reitz <mreitz@redhat.com>
Tested-by: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
Reviewed-by: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
Message-id: 20190507203508.18026-8-mreitz@redhat.com
Signed-off-by: Max Reitz <mreitz@redhat.com>
2019-06-14 15:09:42 +02:00
Max Reitz
0b1eb0ce7d iotests: Test qemu-img convert --salvage
This test converts a simple image to another, but blkdebug injects
block_status and read faults at some offsets.  The resulting image
should be the same as the input image, except that sectors that could
not be read have to be 0.

Signed-off-by: Max Reitz <mreitz@redhat.com>
Message-id: 20190507203508.18026-7-mreitz@redhat.com
Tested-by: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
Reviewed-by: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
[mreitz: Dropped superfluous printf from _filter_offsets, as suggested
         by Vladimir; disable test for VDI and IMGOPTSSYNTAX]
Signed-off-by: Max Reitz <mreitz@redhat.com>
2019-06-14 15:09:27 +02:00
Max Reitz
1adb0b5e0f blkdebug: Inject errors on .bdrv_co_block_status()
Signed-off-by: Max Reitz <mreitz@redhat.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Reviewed-by: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
Message-id: 20190507203508.18026-6-mreitz@redhat.com
Signed-off-by: Max Reitz <mreitz@redhat.com>
2019-06-14 14:16:57 +02:00
Max Reitz
f8cec157cb blkdebug: Add "none" event
Together with @iotypes and @sector, this can be used to trap e.g. the
first read or write access to a certain sector without having to know
what happens internally in the block layer, i.e. which "real" events
happen right before such an access.

Signed-off-by: Max Reitz <mreitz@redhat.com>
Reviewed-by: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
Message-id: 20190507203508.18026-5-mreitz@redhat.com
Signed-off-by: Max Reitz <mreitz@redhat.com>
2019-06-14 14:16:57 +02:00
Max Reitz
16789db3de blkdebug: Add @iotype error option
This new error option allows users of blkdebug to inject errors only on
certain kinds of I/O operations.  Users usually want to make a very
specific operation fail, not just any; but right now they simply hope
that the event that triggers the error injection is followed up with
that very operation.  That may not be true, however, because the block
layer is changing (including blkdebug, which may increase the number of
types of I/O operations on which to inject errors).

The new option's default has been chosen to keep backwards
compatibility.

Note that similar to the internal representation, we could choose to
expose this option as a list of I/O types.  But there is no practical
use for this, because as described above, users usually know exactly
which kind of operation they want to make fail, so there is no need to
specify multiple I/O types at once.  In addition, exposing this option
as a list would require non-trivial changes to qemu_opts_absorb_qdict().

Signed-off-by: Max Reitz <mreitz@redhat.com>
Reviewed-by: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
Message-id: 20190507203508.18026-4-mreitz@redhat.com
Signed-off-by: Max Reitz <mreitz@redhat.com>
2019-06-14 14:16:57 +02:00
Max Reitz
8eaac025fb qemu-img: Add salvaging mode to convert
This adds a salvaging mode (--salvage) to qemu-img convert which ignores
read errors and treats the respective areas as containing only zeroes.
This can be used for instance to at least partially recover the data
from terminally corrupted qcow2 images.

Signed-off-by: Max Reitz <mreitz@redhat.com>
Reviewed-by: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
Message-id: 20190507203508.18026-3-mreitz@redhat.com
Signed-off-by: Max Reitz <mreitz@redhat.com>
2019-06-14 14:16:57 +02:00