v4.7.2
What's Changed
-
Pull mu\_plus, Run DxeMemoryProtectionTestApp in SBSA CI pipelines @TaylorBeebe (#794)
Change Details
# Description
A recent mu_plus commit splits MemoryProtectionTestApp into SMM and DXE versions. Now that they are split, we can run the DXE version of the test on SBSA. This PR adds the new test instances and adds the DXE test to the SBSA CI pipelines.
- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
Tested in pipelines
Integration Instructions
N/A
- Impacts functionality?
-
Minor Platform cleanup @Javagedes (#792)
Change Details
## Description
Resolves syntax warnings in each platform's PlatformBuild.py, which was introduced in python 3.12, responsible for catching invalid escape sequences.
Additionally updates the conditional for including VsIntrinsicLib.inf when building with VS build tools. It uses the macro $(FAMILY), which contains a list families that are being built (Intel, MSFT, GCC, etc). As seen in tools_def.txt, the family is set to MSFT when building with any of the non-EBC Visual studio toolchains. This prevents the need to update this conditional every time a new Visual Studio compiler is introduced.
- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
- Verified syntax warnings dissapeared when building with both platforms
- Verified VsIntrinsicLib is compiled when building with QemuQ35Pkg and
BLD_*_ENABLE_SHARED_CRYPTO=FALSE
Integration Instructions
N/A
- Impacts functionality?
🔐 Security Impacting
-
Use secureboot binary blob external dependency @Javagedes (#790)
Change Details
## Description
Use secureboot binary blobs generated from
https://github.com/microsoft/secureboot_objects for the PK, KeK, Db, Dbx, and 3PDb. The secureboot binary blobs are downloaded as an external dependency, which enables the contents of the secureboot variables to be strongly versioned and easily tracked.This change uses a new version of SecureBootKeyStoreLib (from MsCorePkg), which consumes the secureboob binary values from PCDs and a new helper plugin (BuildSecurebootPcds) generates these PCDs on each build.
- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
Verified QemuPkg and QemuSbsaPkg continue to boot and can have secureboot enabled.
Integration Instructions
N/A
- Impacts functionality?
-
Update All Submodules, Update Package DSC Files to Use New Stack Cookie Library @TaylorBeebe (#784)
Change Details
## Description
All submodules have been updated to top of tree to ingest the stack cookie library transition commits. The packages in this repo were updated to use the new stack cookie library.
- Impacts functionality?
- Functionality - Does the change ultimately impact how firmware functions?
- Examples: Add a new library, publish a new PPI, update an algorithm, ...
- Impacts security?
- Security - Does the change have a direct security impact on an application,
flow, or firmware? - Examples: Crypto algorithm change, buffer overflow fix, parameter
validation improvement, ...
- Security - Does the change have a direct security impact on an application,
- Breaking change?
- Breaking change - Will anyone consuming this change experience a break
in build or boot behavior? - Examples: Add a new library class, move a module to a different repo, call
a function in a new library class in a pre-existing module, ...
- Breaking change - Will anyone consuming this change experience a break
- Includes tests?
- Tests - Does the change include any explicit test code?
- Examples: Unit tests, integration tests, robot tests, ...
- Includes documentation?
- Documentation - Does the change contain explicit documentation additions
outside direct code modifications (and comments)? - Examples: Update readme file, add feature readme file, link to documentation
on an a separate Web page, ...
- Documentation - Does the change contain explicit documentation additions
How This Was Tested
Tested on Q35 and SBSA
Integration Instructions
N/A
- Impacts functionality?
🛠️ Submodule Updates
-
Bump Common/MU from 2023020004.0.3 to 2023020004.0.4 @ProjectMuBot (#797)
-
Bump Features/DFCI from 4.0.2 to 4.0.3 @ProjectMuBot (#793)
Change Details
Bumps Features/DFCI from `4.0.2` to `4.0.3`
Introduces 2 new commits in Features/DFCI.
Commits
Signed-off-by: Project Mu Bot [email protected]
-
Bump Common/MU from 2023020003.4.0 to 2023020004.0.0 @ProjectMuBot (#789)
Change Details
Bumps Common/MU from `2023020003.4.0` to `2023020004.0.0`
Introduces 1 new commits in Common/MU.
Signed-off-by: Project Mu Bot [email protected]
-
Bump Common/MU\_TIANO from 2023020000.1.1 to 2023020000.1.2 @ProjectMuBot (#787)
Change Details
Bumps Common/MU_TIANO from `2023020000.1.1` to `2023020000.1.2`
Introduces 12 new commits in Common/MU_TIANO.
Commits
- eb7f59 pip: bump edk2-pytool-library from 0.19.1 to 0.19.3 (#196)
- 02b3e8 Repo File Sync: MuDevOpsWrapper.yml - Add code coverage calculation parameter (#197)
- e62832 pip: bump edk2-pytool-library from 0.19.3 to 0.19.4 (#198)
- a21e32 pip: bump edk2-pytool-extensions from 0.25.1 to 0.26.0 (#199)
- ac5de7 Repo File Sync: Update to Mu DevOps 7.2.0 (#200)
- aaba05 pip: bump edk2-pytool-extensions from 0.26.0 to 0.26.2 (#201)
- 2600fc GitHub Action: Bump actions/github-script from 6 to 7 (#203)
- 459acd Integration Steps for [email protected]
- 622951 Repo File Sync: synced file(s) with microsoft/mu_devops
- 3e8662 Use New Stack Cookie Library (#204)
- 5eea2c pip: bump edk2-pytool-library from 0.19.4 to 0.19.6 (#206)
- 5242b4 Repo File Sync: synced file(s) with microsoft/mu_devops (#205)
Signed-off-by: Project Mu Bot [email protected]
Full Changelog: v4.7.1...v4.7.2