Commit Graph

62 Commits

Author SHA1 Message Date
Thomas Gerbet
60731f2750 edk2: 202311 -> 202402
Fixes CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233,
CVE-2023-45234, CVE-2023-45235, CVE-2022-36763, CVE-2022-36764 and CVE-2022-36765.

GHSA-hc6x-cw6p-gj7h
https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
GHSA-4hcq-p8q8-hj8j

Changelog:
https://github.com/tianocore/edk2/releases/tag/edk2-stable202402
2024-02-23 22:56:23 +01:00
Sergei Trofimovich
7b01dd0370 OVMF: fix buils against openssl-3.0.13
Without the change the build fails on `staging-next` as
https://hydra.nixos.org/build/248863953/nixlog/2/tail:

    /build/edk2-unvendored-src/CryptoPkg/Library/OpensslLib/openssl/crypto/property/property_parse.c:107:19: error: ‘INT64_MAX’ undeclared (first use in this function)
      107 |         if (v > ((INT64_MAX - (*s - '0')) / 10)) {
          |                   ^~~~~~~~~

The unbundled version of `openssl` `nixpkgs` injects into `edk2` started
using `INT64_MAX` that `edk2`'s `<stdint.h>` does not provide and relies
on `openssl` to define as a fallback.

Let's pull in `openssl`'s own definition of those.
2024-02-08 15:35:02 +00:00
Raito Bezarius
6a2ed3adf2 edk2: support RISC-V
EDK2 has a good support of RISC-V nowadays.
2023-11-25 12:47:30 +01:00
Raito Bezarius
e99c920fb1 edk2: 202308 -> 202311
https://github.com/tianocore/edk2/releases/tag/edk2-stable202311
2023-11-25 12:47:10 +01:00
Raito Bezarius
ff3adab370 edk2: fix cross compilation
`libuuid` is actually a dependency of the host platform and
should not be tucked in `depBuildBuild`.

Also, we don't need `buildPackages.util-linux` for the compilation.
2023-11-25 12:46:55 +01:00
Weijia Wang
ce1c2ac4cb edk2: fix build on x86_64-darwin 2023-10-01 03:25:59 +02:00
Raito Bezarius
d7e18eea0a edk2: 202305 -> 202308
This bumps EDK2 to latest stable: https://github.com/tianocore/edk2/releases/tag/edk2-stable202308

OpenSSL 3 is unbundled in this version bump because we cannot trust EDK2
to do stable releases at each OpenSSL bump alas.
2023-09-28 20:57:26 +02:00
Theodore Ni
060c8f5875
edk2: fix x86_64-darwin build 2023-08-06 02:29:16 -07:00
Luflosi
2edeba8e6c
edk2: 202302 -> 202305
https://github.com/tianocore/edk2/releases/tag/edk2-stable202305
2023-07-06 00:09:29 +02:00
Raito Bezarius
ef6f3a5c9f edk2: 202211 -> 202302
https://github.com/tianocore/edk2/releases/tag/edk2-stable202302
2023-05-27 22:32:21 +02:00
Raito Bezarius
c449133f88 ovmf: support debugging 2023-04-26 18:31:57 +02:00
Artturin
f9fdf2d402 treewide: move NIX_CFLAGS_COMPILE to the env attrset
with structuredAttrs lists will be bash arrays which cannot be exported
which will be a issue with some patches and some wrappers like cc-wrapper

this makes it clearer that NIX_CFLAGS_COMPILE must be a string as lists
in env cause a eval failure
2023-02-22 21:23:04 +02:00
Alyssa Ross
35b4b29302 edk2: add 32-bit ARM support 2023-01-06 17:43:06 +00:00
Alyssa Ross
ad049483af edk2: don't hardcode OSes in meta.platforms
There's nothing about edk2 specific to the host OS, and it builds fine
with e.g. a NetBSD toolchain, so we should only restrict
meta.platforms by architecture, not by OS.
2023-01-02 03:58:58 +00:00
Adam Stephens
53495400fb
edk2: 202205 -> 202211 2022-12-02 00:44:49 -05:00
Randy Eckenrode
4d3207ecf7
edk2: fix build on x86_64-darwin
ZHF #199919
2022-11-06 18:54:18 -05:00
Artturin
7e49471316 treewide: optional -> optionals where the argument is a list
the argument to optional should not be list
2022-10-10 15:40:21 +03:00
Sandro
8d344439fb
Merge pull request #180733 from whentze/feature/update-edk2 2022-10-01 19:28:33 +02:00
Raito Bezarius
c91d0713ac ovmf: expose EFI prefixes and refactor qemu-vm with it 2022-08-23 12:13:06 +02:00
Raito Bezarius
ce907408b8 edk2: support new functional mkDerivation-style 2022-08-22 16:23:44 +02:00
Wanja Hentze
131105df1d edk2: 202202 -> 202205
changelog: https://github.com/tianocore/edk2/releases/tag/edk2-stable202205
fixes https://nvd.nist.gov/vuln/detail/CVE-2021-38578.
2022-07-08 17:10:38 +02:00
Guillaume Girol
9ccccc3e25 edk2: fix cross compilation 2022-05-14 12:00:00 +00:00
Alyssa Ross
9222b68380 edk2: 202108 -> 202202 2022-03-09 11:14:57 +00:00
pennae
8b154985f3 edk2: use llvmPackages_9.stdenv
stdenv.cc being a list does not seem to be such a good thing.
2021-11-27 00:02:47 +01:00
Sergei Trofimovich
cda036f189
edk2: pull upstream brotli fix for gcc-11 (#144137)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2021-11-22 16:40:06 +01:00
Martin Weinelt
ccbdef3b20
edk2: 202102 -> 202108 2021-09-28 02:38:31 +02:00
Kid
b43389f49d iasl: drop pacakge 2021-08-10 03:46:01 +00:00
Martin Weinelt
c8ac1ce19e
edk2: 202011 -> 202102
Fixes: CVE-2021-28210, CVE-2021-28211
2021-03-30 02:20:31 +02:00
Milan
4617fcd6c4
edk2: 201911 -> 202011 (#105582) 2020-12-01 21:47:18 +01:00
Markus Partheymüller
faf984d12d ed2k/OVMF: Put URLs in quotes 2020-05-04 16:00:37 +02:00
Markus Partheymüller
94d114dc2a edk2/OVMF: Determine build type from CC setting 2020-04-20 13:30:35 +02:00
Markus Partheymüller
fe8afcb993 edk2: Fix style 2020-04-20 13:19:38 +02:00
Markus Partheymüller
f5f53288cc edk2/OVMF: Support build on macOS
In order to use OVMF firmware with e.g. qemu on macOS, these packages
needed to be made macOS ready. This meant choosing the clang build in
this case, because it is the only one working on macOS.

Unfortunately, just using clang on all platforms doesn't work because
there are hardcoded assumptions in the edk2 build system.
2020-04-20 09:53:32 +02:00
arcnmx
2646554b25 edk2: 201905 -> 201911 2020-01-29 08:32:01 -08:00
Robin Gloster
616b8343c4
Merge remote-tracking branch 'upstream/master' into gcc-8 2019-08-25 18:55:46 +02:00
Nikolay Amiantov
c3a6c8de88 edk2: 2017-12-05 -> 201905
* Move to stable version;
* Refactor `setup` to `mkDerivation`;
* Use flags instead of `sed`;
* Support Secure Boot builds.
2019-08-19 19:52:30 +03:00
Robin Gloster
5ef32577e6
edk2: fix build with gcc8 2019-06-17 07:06:05 +02:00
Izorkin
c83eff9022 edk2: fix buid 2018-08-01 11:15:17 +03:00
Tuomas Tynkkynen
f59eab75d2 edk2, OVMF: Build on aarch64
And also build in parallel.

I don't understand why we manually tediously link every single directory
from the source, but I don't want to investigate too much.
2018-03-21 23:19:26 +02:00
Tuomas Tynkkynen
1d854b479c edk2: Reformat a bit for readability
- Have only one sed expression per line
- Put the important stuff closer to the command and not hidden in some
continuation line. That is, don't do:

sed \
    <boring stuff> \
    <boring stuff> \
    <boring stuff> \
    <boring stuff> \
    <boring stuff> \
    <IMPORTANT STUFF>

but:

sed <IMPORTANT STUFF> \
    <boring stuff> \
    <boring stuff> \
    <boring stuff> \
    <boring stuff> \
    <boring stuff>
2018-03-21 23:19:25 +02:00
Orivej Desh
08ff5462ed edk2 add short-circuit-the-transfer-of-an-empty-S3_CONTEXT.patch
as requested by @lukeadams in
https://github.com/NixOS/nixpkgs/pull/32724#issuecomment-352140119
2017-12-16 03:07:42 +00:00
Luke Adams
237cf9e21f edk2: 2014-12-10 -> 2017-12-05
src was at vUDK2017 tag (2017-06-13), updated to the latest commit in UDK2017 branch.
2017-12-16 03:01:38 +00:00
Linus Heckemann
f6afe064a0 edk2: 2014-12-10 -> UDK2017 2017-08-27 19:41:10 +01:00
mimadrid
09e0cc7cc7
Update homepage attributes: http -> https
Homepage link "http://.../" is a permanent redirect to "https://.../" and should be updated
https://repology.org/repository/nix_stable/problems
2017-08-03 11:56:15 +02:00
Frederik Rietdijk
aa652d0df7 edk2: use python2
python 2 print statement
2016-10-18 23:16:04 +02:00
Frederik Rietdijk
ffa65afdcd edk2: use python env 2016-10-13 10:47:07 +02:00
Frederik Rietdijk
104c50dd1a Python: remove modules and pythonFull 2016-10-10 10:33:24 +02:00
Robin Gloster
8031cba2ab Merge remote-tracking branch 'upstream/master' into hardened-stdenv 2016-06-10 09:27:04 +00:00
Tuomas Tynkkynen
bac26e08db Fix lots of fetchgit hashes (fallout from #15469) 2016-06-03 17:17:08 +03:00
Franz Pletz
aff1f4ab94 Use general hardening flag toggle lists
The following parameters are now available:

  * hardeningDisable
    To disable specific hardening flags
  * hardeningEnable
    To enable specific hardening flags

Only the cc-wrapper supports this right now, but these may be reused by
other wrappers, builders or setup hooks.

cc-wrapper supports the following flags:

  * fortify
  * stackprotector
  * pie (disabled by default)
  * pic
  * strictoverflow
  * format
  * relro
  * bindnow
2016-03-05 18:55:26 +01:00