From c707ed060294eafad6b467a9fef78c0d89ce3ce4 Mon Sep 17 00:00:00 2001 From: classabbyamp Date: Sun, 26 Nov 2023 14:22:31 -0500 Subject: [PATCH 1/2] acpica-utils: update to 20230628. also clean up template a bunch --- srcpkgs/acpica-utils/files/LICENSE | 144 ----------------------------- srcpkgs/acpica-utils/template | 30 ++---- 2 files changed, 10 insertions(+), 164 deletions(-) delete mode 100644 srcpkgs/acpica-utils/files/LICENSE diff --git a/srcpkgs/acpica-utils/files/LICENSE b/srcpkgs/acpica-utils/files/LICENSE deleted file mode 100644 index 6c816946c9453..0000000000000 --- a/srcpkgs/acpica-utils/files/LICENSE +++ /dev/null @@ -1,144 +0,0 @@ -/****************************************************************************** - * - * 1. Copyright Notice - * - * Some or all of this work - Copyright (c) 1999 - 2017, Intel Corp. - * All rights reserved. - * - * 2. License - * - * 2.1. This is your license from Intel Corp. under its intellectual property - * rights. You may have additional license terms from the party that provided - * you this software, covering your right to use that party's intellectual - * property rights. - * - * 2.2. Intel grants, free of charge, to any person ("Licensee") obtaining a - * copy of the source code appearing in this file ("Covered Code") an - * irrevocable, perpetual, worldwide license under Intel's copyrights in the - * base code distributed originally by Intel ("Original Intel Code") to copy, - * make derivatives, distribute, use and display any portion of the Covered - * Code in any form, with the right to sublicense such rights; and - * - * 2.3. Intel grants Licensee a non-exclusive and non-transferable patent - * license (with the right to sublicense), under only those claims of Intel - * patents that are infringed by the Original Intel Code, to make, use, sell, - * offer to sell, and import the Covered Code and derivative works thereof - * solely to the minimum extent necessary to exercise the above copyright - * license, and in no event shall the patent license extend to any additions - * to or modifications of the Original Intel Code. No other license or right - * is granted directly or by implication, estoppel or otherwise; - * - * The above copyright and patent license is granted only if the following - * conditions are met: - * - * 3. Conditions - * - * 3.1. Redistribution of Source with Rights to Further Distribute Source. - * Redistribution of source code of any substantial portion of the Covered - * Code or modification with rights to further distribute source must include - * the above Copyright Notice, the above License, this list of Conditions, - * and the following Disclaimer and Export Compliance provision. In addition, - * Licensee must cause all Covered Code to which Licensee contributes to - * contain a file documenting the changes Licensee made to create that Covered - * Code and the date of any change. Licensee must include in that file the - * documentation of any changes made by any predecessor Licensee. Licensee - * must include a prominent statement that the modification is derived, - * directly or indirectly, from Original Intel Code. - * - * 3.2. Redistribution of Source with no Rights to Further Distribute Source. - * Redistribution of source code of any substantial portion of the Covered - * Code or modification without rights to further distribute source must - * include the following Disclaimer and Export Compliance provision in the - * documentation and/or other materials provided with distribution. In - * addition, Licensee may not authorize further sublicense of source of any - * portion of the Covered Code, and must include terms to the effect that the - * license from Licensee to its licensee is limited to the intellectual - * property embodied in the software Licensee provides to its licensee, and - * not to intellectual property embodied in modifications its licensee may - * make. - * - * 3.3. Redistribution of Executable. Redistribution in executable form of any - * substantial portion of the Covered Code or modification must reproduce the - * above Copyright Notice, and the following Disclaimer and Export Compliance - * provision in the documentation and/or other materials provided with the - * distribution. - * - * 3.4. Intel retains all right, title, and interest in and to the Original - * Intel Code. - * - * 3.5. Neither the name Intel nor any other trademark owned or controlled by - * Intel shall be used in advertising or otherwise to promote the sale, use or - * other dealings in products derived from or relating to the Covered Code - * without prior written authorization from Intel. - * - * 4. Disclaimer and Export Compliance - * - * 4.1. INTEL MAKES NO WARRANTY OF ANY KIND REGARDING ANY SOFTWARE PROVIDED - * HERE. ANY SOFTWARE ORIGINATING FROM INTEL OR DERIVED FROM INTEL SOFTWARE - * IS PROVIDED "AS IS," AND INTEL WILL NOT PROVIDE ANY SUPPORT, ASSISTANCE, - * INSTALLATION, TRAINING OR OTHER SERVICES. INTEL WILL NOT PROVIDE ANY - * UPDATES, ENHANCEMENTS OR EXTENSIONS. INTEL SPECIFICALLY DISCLAIMS ANY - * IMPLIED WARRANTIES OF MERCHANTABILITY, NONINFRINGEMENT AND FITNESS FOR A - * PARTICULAR PURPOSE. - * - * 4.2. IN NO EVENT SHALL INTEL HAVE ANY LIABILITY TO LICENSEE, ITS LICENSEES - * OR ANY OTHER THIRD PARTY, FOR ANY LOST PROFITS, LOST DATA, LOSS OF USE OR - * COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR FOR ANY INDIRECT, - * SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THIS AGREEMENT, UNDER ANY - * CAUSE OF ACTION OR THEORY OF LIABILITY, AND IRRESPECTIVE OF WHETHER INTEL - * HAS ADVANCE NOTICE OF THE POSSIBILITY OF SUCH DAMAGES. THESE LIMITATIONS - * SHALL APPLY NOTWITHSTANDING THE FAILURE OF THE ESSENTIAL PURPOSE OF ANY - * LIMITED REMEDY. - * - * 4.3. Licensee shall not export, either directly or indirectly, any of this - * software or system incorporating such software without first obtaining any - * required license or other approval from the U. S. Department of Commerce or - * any other agency or department of the United States Government. In the - * event Licensee exports any such software from the United States or - * re-exports any such software from a foreign destination, Licensee shall - * ensure that the distribution and export/re-export of the software is in - * compliance with all laws, regulations, orders, or other restrictions of the - * U.S. Export Administration Regulations. Licensee agrees that neither it nor - * any of its subsidiaries will export/re-export any technical data, process, - * software, or service, directly or indirectly, to any country for which the - * United States government or any agency thereof requires an export license, - * other governmental approval, or letter of assurance, without first obtaining - * such license, approval or letter. - * - ***************************************************************************** - * - * Alternatively, you may choose to be licensed under the terms of the - * following license: - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions, and the following disclaimer, - * without modification. - * 2. Redistributions in binary form must reproduce at minimum a disclaimer - * substantially similar to the "NO WARRANTY" disclaimer below - * ("Disclaimer") and any redistribution must be conditioned upon - * including a substantially similar Disclaimer requirement for further - * binary redistribution. - * 3. Neither the names of the above-listed copyright holders nor the names - * of any contributors may be used to endorse or promote products derived - * from this software without specific prior written permission. - * - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - * Alternatively, you may choose to be licensed under the terms of the - * GNU General Public License ("GPL") version 2 as published by the Free - * Software Foundation. - * - *****************************************************************************/ diff --git a/srcpkgs/acpica-utils/template b/srcpkgs/acpica-utils/template index 26a66c72e9ae9..e756c1814279b 100644 --- a/srcpkgs/acpica-utils/template +++ b/srcpkgs/acpica-utils/template @@ -1,30 +1,20 @@ # Template file for 'acpica-utils' pkgname=acpica-utils -version=20210930 +version=20230628 revision=1 -archs="i686* x86_64* aarch64*" +build_style="gnu-makefile" +make_use_env=yes +make_build_args="NOWERROR=TRUE BITS=${XBPS_TARGET_WORDSIZE}" hostmakedepends="flex" short_desc="Intel ACPI CA Unix utilities" maintainer="Orphaned " license="GPL-2.0-only, BSD-3-Clause" homepage="https://www.acpica.org/" -distfiles="https://acpica.org/sites/acpica/files/acpica-unix-${version}.tar.gz" -checksum=3cd82a281a16bc70c2708665668f138c4fc606c31161d46ce77230454ec04821 +distfiles="https://downloadmirror.intel.com/783534/acpica-unix-${version}.tar.gz" +checksum=86876a745e3d224dcfd222ed3de465b47559e85811df2db9820ef09a9dff5cce -do_build() { - vsed -e 's/-Werror//g' \ - -i generate/unix/Makefile.config - - vsed -e 's/_CYGWIN/_LINUX/g' \ - -i generate/unix/iasl/Makefile - - case "$XBPS_TARGET_MACHINE" in - i686*) make BITS=32;; - *) make BITS=64;; - esac -} - -do_install() { - make DESTDIR=${DESTDIR} install - vlicense ${FILESDIR}/LICENSE +post_install() { + sed -n '/Copyright Notice/,/\*\/$/p' source/include/accommon.h | \ + sed 's/^ \* \?//' | head -n-2 > LICENSE + vlicense LICENSE } From b79b60fb206d49ba957c52cb98d8dfc8a1fb6f7a Mon Sep 17 00:00:00 2001 From: classabbyamp Date: Mon, 27 Nov 2023 00:47:57 -0500 Subject: [PATCH 2/2] New package: edk2-ovmf-202311 --- .../files/50-edk2-ovmf-i386-secure-4m.json | 35 +++ .../files/50-edk2-ovmf-i386-secure.json | 35 +++ .../files/50-edk2-ovmf-x86_64-secure-4m.json | 36 +++ .../files/50-edk2-ovmf-x86_64-secure.json | 36 +++ .../edk2-ovmf/files/60-edk2-ovmf-aarch64.json | 31 +++ srcpkgs/edk2-ovmf/files/60-edk2-ovmf-arm.json | 31 +++ .../edk2-ovmf/files/60-edk2-ovmf-i386-4m.json | 34 +++ .../edk2-ovmf/files/60-edk2-ovmf-i386.json | 34 +++ .../files/60-edk2-ovmf-microvm-4m.json | 22 ++ .../edk2-ovmf/files/60-edk2-ovmf-microvm.json | 22 ++ .../files/60-edk2-ovmf-x86_64-4m.json | 35 +++ .../edk2-ovmf/files/60-edk2-ovmf-x86_64.json | 35 +++ ...80-edk2-ovmf-ia32-on-x86_64-secure-4m.json | 35 +++ .../80-edk2-ovmf-ia32-on-x86_64-secure.json | 35 +++ .../files/81-edk2-ovmf-ia32-on-x86_64-4m.json | 34 +++ .../files/81-edk2-ovmf-ia32-on-x86_64.json | 34 +++ srcpkgs/edk2-ovmf/patches/brotli.patch | 92 ++++++++ srcpkgs/edk2-ovmf/template | 217 ++++++++++++++++++ srcpkgs/edk2-ovmf/update | 2 + 19 files changed, 835 insertions(+) create mode 100644 srcpkgs/edk2-ovmf/files/50-edk2-ovmf-i386-secure-4m.json create mode 100644 srcpkgs/edk2-ovmf/files/50-edk2-ovmf-i386-secure.json create mode 100644 srcpkgs/edk2-ovmf/files/50-edk2-ovmf-x86_64-secure-4m.json create mode 100644 srcpkgs/edk2-ovmf/files/50-edk2-ovmf-x86_64-secure.json create mode 100644 srcpkgs/edk2-ovmf/files/60-edk2-ovmf-aarch64.json create mode 100644 srcpkgs/edk2-ovmf/files/60-edk2-ovmf-arm.json create mode 100644 srcpkgs/edk2-ovmf/files/60-edk2-ovmf-i386-4m.json create mode 100644 srcpkgs/edk2-ovmf/files/60-edk2-ovmf-i386.json create mode 100644 srcpkgs/edk2-ovmf/files/60-edk2-ovmf-microvm-4m.json create mode 100644 srcpkgs/edk2-ovmf/files/60-edk2-ovmf-microvm.json create mode 100644 srcpkgs/edk2-ovmf/files/60-edk2-ovmf-x86_64-4m.json create mode 100644 srcpkgs/edk2-ovmf/files/60-edk2-ovmf-x86_64.json create mode 100644 srcpkgs/edk2-ovmf/files/80-edk2-ovmf-ia32-on-x86_64-secure-4m.json create mode 100644 srcpkgs/edk2-ovmf/files/80-edk2-ovmf-ia32-on-x86_64-secure.json create mode 100644 srcpkgs/edk2-ovmf/files/81-edk2-ovmf-ia32-on-x86_64-4m.json create mode 100644 srcpkgs/edk2-ovmf/files/81-edk2-ovmf-ia32-on-x86_64.json create mode 100644 srcpkgs/edk2-ovmf/patches/brotli.patch create mode 100644 srcpkgs/edk2-ovmf/template create mode 100644 srcpkgs/edk2-ovmf/update diff --git a/srcpkgs/edk2-ovmf/files/50-edk2-ovmf-i386-secure-4m.json b/srcpkgs/edk2-ovmf/files/50-edk2-ovmf-i386-secure-4m.json new file mode 100644 index 0000000000000..f556449645a9a --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/50-edk2-ovmf-i386-secure-4m.json @@ -0,0 +1,35 @@ +{ + "description": "IA32 UEFI for i386, with Secure Boot and SMM, 4MB FD", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "flash", + "executable": { + "filename": "/usr/share/edk2/ia32/OVMF_CODE.secure.4m.fd", + "format": "raw" + }, + "nvram-template": { + "filename": "/usr/share/edk2/ia32/OVMF_VARS.4m.fd", + "format": "raw" + } + }, + "targets": [ + { + "architecture": "i386", + "machines": [ + "pc-q35-*" + ] + } + ], + "features": [ + "acpi-s3", + "acpi-s4", + "requires-smm", + "secure-boot", + "verbose-dynamic" + ], + "tags": [ + + ] +} diff --git a/srcpkgs/edk2-ovmf/files/50-edk2-ovmf-i386-secure.json b/srcpkgs/edk2-ovmf/files/50-edk2-ovmf-i386-secure.json new file mode 100644 index 0000000000000..fd244f0e01c27 --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/50-edk2-ovmf-i386-secure.json @@ -0,0 +1,35 @@ +{ + "description": "IA32 UEFI for i386, with Secure Boot and SMM", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "flash", + "executable": { + "filename": "/usr/share/edk2/ia32/OVMF_CODE.secure.fd", + "format": "raw" + }, + "nvram-template": { + "filename": "/usr/share/edk2/ia32/OVMF_VARS.fd", + "format": "raw" + } + }, + "targets": [ + { + "architecture": "i386", + "machines": [ + "pc-q35-*" + ] + } + ], + "features": [ + "acpi-s3", + "acpi-s4", + "requires-smm", + "secure-boot", + "verbose-dynamic" + ], + "tags": [ + + ] +} diff --git a/srcpkgs/edk2-ovmf/files/50-edk2-ovmf-x86_64-secure-4m.json b/srcpkgs/edk2-ovmf/files/50-edk2-ovmf-x86_64-secure-4m.json new file mode 100644 index 0000000000000..d1678cb4fe2e6 --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/50-edk2-ovmf-x86_64-secure-4m.json @@ -0,0 +1,36 @@ +{ + "description": "x64 UEFI for x86_64, with Secure Boot and SMM, 4MB FD", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "flash", + "executable": { + "filename": "/usr/share/edk2/x64/OVMF_CODE.secure.4m.fd", + "format": "raw" + }, + "nvram-template": { + "filename": "/usr/share/edk2/x64/OVMF_VARS.4m.fd", + "format": "raw" + } + }, + "targets": [ + { + "architecture": "x86_64", + "machines": [ + "pc-q35-*" + ] + } + ], + "features": [ + "acpi-s3", + "acpi-s4", + "amd-sev", + "requires-smm", + "secure-boot", + "verbose-dynamic" + ], + "tags": [ + + ] +} diff --git a/srcpkgs/edk2-ovmf/files/50-edk2-ovmf-x86_64-secure.json b/srcpkgs/edk2-ovmf/files/50-edk2-ovmf-x86_64-secure.json new file mode 100644 index 0000000000000..5adc4db7fb4cf --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/50-edk2-ovmf-x86_64-secure.json @@ -0,0 +1,36 @@ +{ + "description": "x64 UEFI for x86_64, with Secure Boot and SMM", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "flash", + "executable": { + "filename": "/usr/share/edk2/x64/OVMF_CODE.secure.fd", + "format": "raw" + }, + "nvram-template": { + "filename": "/usr/share/edk2/x64/OVMF_VARS.fd", + "format": "raw" + } + }, + "targets": [ + { + "architecture": "x86_64", + "machines": [ + "pc-q35-*" + ] + } + ], + "features": [ + "acpi-s3", + "acpi-s4", + "amd-sev", + "requires-smm", + "secure-boot", + "verbose-dynamic" + ], + "tags": [ + + ] +} diff --git a/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-aarch64.json b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-aarch64.json new file mode 100644 index 0000000000000..b95bdc8c96425 --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-aarch64.json @@ -0,0 +1,31 @@ +{ + "description": "AA64 UEFI for aarch64", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "flash", + "executable": { + "filename": "/usr/share/edk2/aarch64/QEMU_CODE.fd", + "format": "raw" + }, + "nvram-template": { + "filename": "/usr/share/edk2/aarch64/QEMU_VARS.fd", + "format": "raw" + } + }, + "targets": [ + { + "architecture": "aarch64", + "machines": [ + "virt-*" + ] + } + ], + "features": [ + "verbose-static" + ], + "tags": [ + + ] +} diff --git a/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-arm.json b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-arm.json new file mode 100644 index 0000000000000..f7006a2254a50 --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-arm.json @@ -0,0 +1,31 @@ +{ + "description": "ARM UEFI for armv7", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "flash", + "executable": { + "filename": "/usr/share/edk2/arm/QEMU_CODE.fd", + "format": "raw" + }, + "nvram-template": { + "filename": "/usr/share/edk2/arm/QEMU_VARS.fd", + "format": "raw" + } + }, + "targets": [ + { + "architecture": "arm", + "machines": [ + "virt-*" + ] + } + ], + "features": [ + "verbose-static" + ], + "tags": [ + + ] +} diff --git a/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-i386-4m.json b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-i386-4m.json new file mode 100644 index 0000000000000..2a070767f6a8f --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-i386-4m.json @@ -0,0 +1,34 @@ +{ + "description": "IA32 UEFI for i386, 4MB FD", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "flash", + "executable": { + "filename": "/usr/share/edk2/ia32/OVMF_CODE.4m.fd", + "format": "raw" + }, + "nvram-template": { + "filename": "/usr/share/edk2/ia32/OVMF_VARS.4m.fd", + "format": "raw" + } + }, + "targets": [ + { + "architecture": "i386", + "machines": [ + "pc-i440fx-*", + "pc-q35-*" + ] + } + ], + "features": [ + "acpi-s3", + "acpi-s4", + "verbose-dynamic" + ], + "tags": [ + + ] +} diff --git a/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-i386.json b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-i386.json new file mode 100644 index 0000000000000..18cb255a32026 --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-i386.json @@ -0,0 +1,34 @@ +{ + "description": "IA32 UEFI for i386", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "flash", + "executable": { + "filename": "/usr/share/edk2/ia32/OVMF_CODE.fd", + "format": "raw" + }, + "nvram-template": { + "filename": "/usr/share/edk2/ia32/OVMF_VARS.fd", + "format": "raw" + } + }, + "targets": [ + { + "architecture": "i386", + "machines": [ + "pc-i440fx-*", + "pc-q35-*" + ] + } + ], + "features": [ + "acpi-s3", + "acpi-s4", + "verbose-dynamic" + ], + "tags": [ + + ] +} diff --git a/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-microvm-4m.json b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-microvm-4m.json new file mode 100644 index 0000000000000..1639f336f17d4 --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-microvm-4m.json @@ -0,0 +1,22 @@ +{ + "description": "OVMF for microvm, 4MB FD", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "memory", + "filename": "/usr/share/edk2/x64/MICROVM.4m.fd" + }, + "targets": [ + { + "architecture": "x86_64", + "machines": [ + "microvm" + ] + } + ], + "features": [ + ], + "tags": [ + ] +} diff --git a/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-microvm.json b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-microvm.json new file mode 100644 index 0000000000000..78b900eb56437 --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-microvm.json @@ -0,0 +1,22 @@ +{ + "description": "OVMF for microvm", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "memory", + "filename": "/usr/share/edk2/x64/MICROVM.fd" + }, + "targets": [ + { + "architecture": "x86_64", + "machines": [ + "microvm" + ] + } + ], + "features": [ + ], + "tags": [ + ] +} diff --git a/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-x86_64-4m.json b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-x86_64-4m.json new file mode 100644 index 0000000000000..fe8e2639b1c4b --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-x86_64-4m.json @@ -0,0 +1,35 @@ +{ + "description": "x64 UEFI for x86_64, 4MB FD", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "flash", + "executable": { + "filename": "/usr/share/edk2/x64/OVMF_CODE.4m.fd", + "format": "raw" + }, + "nvram-template": { + "filename": "/usr/share/edk2/x64/OVMF_VARS.4m.fd", + "format": "raw" + } + }, + "targets": [ + { + "architecture": "x86_64", + "machines": [ + "pc-i440fx-*", + "pc-q35-*" + ] + } + ], + "features": [ + "acpi-s3", + "acpi-s4", + "amd-sev", + "verbose-dynamic" + ], + "tags": [ + + ] +} diff --git a/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-x86_64.json b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-x86_64.json new file mode 100644 index 0000000000000..ca02ef0831bba --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/60-edk2-ovmf-x86_64.json @@ -0,0 +1,35 @@ +{ + "description": "x64 UEFI for x86_64", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "flash", + "executable": { + "filename": "/usr/share/edk2/x64/OVMF_CODE.fd", + "format": "raw" + }, + "nvram-template": { + "filename": "/usr/share/edk2/x64/OVMF_VARS.fd", + "format": "raw" + } + }, + "targets": [ + { + "architecture": "x86_64", + "machines": [ + "pc-i440fx-*", + "pc-q35-*" + ] + } + ], + "features": [ + "acpi-s3", + "acpi-s4", + "amd-sev", + "verbose-dynamic" + ], + "tags": [ + + ] +} diff --git a/srcpkgs/edk2-ovmf/files/80-edk2-ovmf-ia32-on-x86_64-secure-4m.json b/srcpkgs/edk2-ovmf/files/80-edk2-ovmf-ia32-on-x86_64-secure-4m.json new file mode 100644 index 0000000000000..63a827684c044 --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/80-edk2-ovmf-ia32-on-x86_64-secure-4m.json @@ -0,0 +1,35 @@ +{ + "description": "IA32 UEFI for x86_64, with Secure Boot and SMM, 4MB FD", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "flash", + "executable": { + "filename": "/usr/share/edk2/ia32/OVMF_CODE.secure.4m.fd", + "format": "raw" + }, + "nvram-template": { + "filename": "/usr/share/edk2/ia32/OVMF_VARS.4m.fd", + "format": "raw" + } + }, + "targets": [ + { + "architecture": "x86_64", + "machines": [ + "pc-q35-*" + ] + } + ], + "features": [ + "acpi-s3", + "acpi-s4", + "requires-smm", + "secure-boot", + "verbose-dynamic" + ], + "tags": [ + + ] +} diff --git a/srcpkgs/edk2-ovmf/files/80-edk2-ovmf-ia32-on-x86_64-secure.json b/srcpkgs/edk2-ovmf/files/80-edk2-ovmf-ia32-on-x86_64-secure.json new file mode 100644 index 0000000000000..6d28f39715162 --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/80-edk2-ovmf-ia32-on-x86_64-secure.json @@ -0,0 +1,35 @@ +{ + "description": "IA32 UEFI for x86_64, with Secure Boot and SMM", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "flash", + "executable": { + "filename": "/usr/share/edk2/ia32/OVMF_CODE.secure.fd", + "format": "raw" + }, + "nvram-template": { + "filename": "/usr/share/edk2/ia32/OVMF_VARS.fd", + "format": "raw" + } + }, + "targets": [ + { + "architecture": "x86_64", + "machines": [ + "pc-q35-*" + ] + } + ], + "features": [ + "acpi-s3", + "acpi-s4", + "requires-smm", + "secure-boot", + "verbose-dynamic" + ], + "tags": [ + + ] +} diff --git a/srcpkgs/edk2-ovmf/files/81-edk2-ovmf-ia32-on-x86_64-4m.json b/srcpkgs/edk2-ovmf/files/81-edk2-ovmf-ia32-on-x86_64-4m.json new file mode 100644 index 0000000000000..d871ed1c56662 --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/81-edk2-ovmf-ia32-on-x86_64-4m.json @@ -0,0 +1,34 @@ +{ + "description": "IA32 UEFI for x86_64, 4MB FD", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "flash", + "executable": { + "filename": "/usr/share/edk2/ia32/OVMF_CODE.4m.fd", + "format": "raw" + }, + "nvram-template": { + "filename": "/usr/share/edk2/ia32/OVMF_VARS.4m.fd", + "format": "raw" + } + }, + "targets": [ + { + "architecture": "x86_64", + "machines": [ + "pc-i440fx-*", + "pc-q35-*" + ] + } + ], + "features": [ + "acpi-s3", + "acpi-s4", + "verbose-dynamic" + ], + "tags": [ + + ] +} diff --git a/srcpkgs/edk2-ovmf/files/81-edk2-ovmf-ia32-on-x86_64.json b/srcpkgs/edk2-ovmf/files/81-edk2-ovmf-ia32-on-x86_64.json new file mode 100644 index 0000000000000..3d7532ef04c08 --- /dev/null +++ b/srcpkgs/edk2-ovmf/files/81-edk2-ovmf-ia32-on-x86_64.json @@ -0,0 +1,34 @@ +{ + "description": "IA32 UEFI for x86_64", + "interface-types": [ + "uefi" + ], + "mapping": { + "device": "flash", + "executable": { + "filename": "/usr/share/edk2/ia32/OVMF_CODE.fd", + "format": "raw" + }, + "nvram-template": { + "filename": "/usr/share/edk2/ia32/OVMF_VARS.fd", + "format": "raw" + } + }, + "targets": [ + { + "architecture": "x86_64", + "machines": [ + "pc-i440fx-*", + "pc-q35-*" + ] + } + ], + "features": [ + "acpi-s3", + "acpi-s4", + "verbose-dynamic" + ], + "tags": [ + + ] +} diff --git a/srcpkgs/edk2-ovmf/patches/brotli.patch b/srcpkgs/edk2-ovmf/patches/brotli.patch new file mode 100644 index 0000000000000..b7a58023251a3 --- /dev/null +++ b/srcpkgs/edk2-ovmf/patches/brotli.patch @@ -0,0 +1,92 @@ +From dca56cf4d28bbbb1d3be029ce9a6710cb3f6cd2f Mon Sep 17 00:00:00 2001 +From: Laszlo Ersek +Date: Thu, 4 Jun 2020 13:34:12 +0200 +Subject: BaseTools: do not build BrotliCompress (RH only) + +Notes about the RHEL-8.3/20200603-ca407c7246bf [edk2-stable202005] -> +RHEL-8.5/20210520-e1999b264f1f [edk2-stable202105] rebase: + +- no change + +Notes about the RHEL-8.2/20190904-37eef91017ad [edk2-stable201908] -> +RHEL-8.3/20200603-ca407c7246bf [edk2-stable202005] rebase: + +- New patch. + +BrotliCompress is not used for building ArmVirtPkg or OvmfPkg platforms. +It depends on one of the upstream Brotli git submodules that we removed +earlier in this rebase series. (See patch "remove upstream edk2's Brotli +submodules (RH only"). + +Do not attempt to build BrotliCompress. + +Signed-off-by: Laszlo Ersek +(cherry picked from commit db8ccca337e2c5722c1d408d2541cf653d3371a2) +--- + BaseTools/Source/C/GNUmakefile | 1 - + 1 file changed, 1 deletion(-) + +diff --git a/BaseTools/Source/C/GNUmakefile b/BaseTools/Source/C/GNUmakefile +index 8c191e0c38..3eae824a1c 100644 +--- a/BaseTools/Source/C/GNUmakefile ++++ b/BaseTools/Source/C/GNUmakefile +@@ -48,7 +48,6 @@ all: makerootdir subdirs + LIBRARIES = Common + VFRAUTOGEN = VfrCompile/VfrLexer.h + APPLICATIONS = \ +- BrotliCompress \ + VfrCompile \ + EfiRom \ + GenFfs \ +-- +2.27.0 + +From 9729dd1d6b83961d531e29777d0cc4a610b108be Mon Sep 17 00:00:00 2001 +From: Laszlo Ersek +Date: Thu, 4 Jun 2020 13:39:08 +0200 +Subject: MdeModulePkg: remove package-private Brotli include path (RH only) + +Notes about the RHEL-8.3/20200603-ca407c7246bf [edk2-stable202005] -> +RHEL-8.5/20210520-e1999b264f1f [edk2-stable202105] rebase: + +- no change + +Notes about the RHEL-8.2/20190904-37eef91017ad [edk2-stable201908] -> +RHEL-8.3/20200603-ca407c7246bf [edk2-stable202005] rebase: + +- New patch. + +Originating from upstream commit 58802e02c41b +("MdeModulePkg/BrotliCustomDecompressLib: Make brotli a submodule", +2020-04-16), "MdeModulePkg/MdeModulePkg.dec" contains a package-internal +include path into a Brotli submodule. + +The edk2 build system requires such include paths to resolve successfully, +regardless of the firmware platform being built. Because +BrotliCustomDecompressLib is not consumed by any OvmfPkg or ArmVirtPkg +platforms, and we've removed the submodule earlier in this patch set, +remove the include path too. + +Signed-off-by: Laszlo Ersek +(cherry picked from commit e05e0de713c4a2b8adb6ff9809611f222bfe50ed) +--- + MdeModulePkg/MdeModulePkg.dec | 3 --- + 1 file changed, 3 deletions(-) + +diff --git a/MdeModulePkg/MdeModulePkg.dec b/MdeModulePkg/MdeModulePkg.dec +index 8d38383915..ba2d0290e7 100644 +--- a/MdeModulePkg/MdeModulePkg.dec ++++ b/MdeModulePkg/MdeModulePkg.dec +@@ -24,9 +24,6 @@ + [Includes] + Include + +-[Includes.Common.Private] +- Library/BrotliCustomDecompressLib/brotli/c/include +- + [LibraryClasses] + ## @libraryclass Defines a set of methods to reset whole system. + ResetSystemLib|Include/Library/ResetSystemLib.h +-- +2.27.0 + diff --git a/srcpkgs/edk2-ovmf/template b/srcpkgs/edk2-ovmf/template new file mode 100644 index 0000000000000..3ad84436a61f3 --- /dev/null +++ b/srcpkgs/edk2-ovmf/template @@ -0,0 +1,217 @@ +# Template file for 'edk2-ovmf' +pkgname=edk2-ovmf +version=202311 +revision=1 +_mipi_commit=370b5944c046bab043dd8b133727b2135af7747a +_openssl_version=3.0.9 +_mbedtls_commit=8c89224991adff88d53cd380f42a2baa36f91454 +_softfloat_commit=b64af41c3276f97f0e181920400ee056b9c88037 +hostmakedepends="acpica-utils nasm python3 cross-arm-none-eabi-gcc" +makedepends="libuuid-devel" +short_desc="EFI Development Kit II - Open Virtual Machine Firmware and Shell" +maintainer="classabbyamp " +license="BSD-2-Clause-Patent, MIT" +homepage="https://github.com/tianocore/tianocore.github.io/wiki/EDK-II" +changelog="https://github.com/tianocore/edk2/releases" +distfiles="https://github.com/tianocore/edk2/archive/refs/tags/edk2-stable${version}.tar.gz + https://github.com/MIPI-Alliance/public-mipi-sys-t/archive/${_mipi_commit}.tar.gz + https://www.openssl.org/source/openssl-${_openssl_version}.tar.gz + https://github.com/Mbed-TLS/mbedtls/archive/${_mbedtls_commit}.tar.gz + https://github.com/ucb-bar/berkeley-softfloat-3/archive/${_softfloat_commit}.tar.gz" +checksum="d26258942e9fb166488df029fdb0b1e60729329a9efb2da49fe4c5e9e1e354ee + 9fda3b9a78343ab2be6f06ce6396536e7e065abac29b47c8eb2e42cbb4c4f00b + eb1ab04781474360f77c318ab89d8c5a03abc38e63d65a603cabbf1b00a1dc90 + b5c7e7c54e013c168f4aae036e59912785f11b4aeebd57f6165a14e879b9a82c + faae889814ea6a292f7ca03d9b36e6c7e95bab2a64777804883cc822b8d48757" +skip_extraction="${_mipi_commit}.tar.gz + openssl-${_openssl_version}.tar.gz + ${_mbedtls_commit}.tar.gz + ${_softfloat_commit}.tar.gz" +nocross="probably possible, but complex" + +case "$XBPS_TARGET_LIBC" in + glibc) + hostmakedepends+=" cross-aarch64-linux-gnu" + _pfx="gnu" + ;; + musl) + hostmakedepends+=" cross-aarch64-linux-musl" + _pfx="musl" + ;; +esac + +case "$XBPS_MACHINE" in + x86_64*) _archs=(X64 IA32 AARCH64 ARM) ;; + i686*) _archs=(IA32 AARCH64 ARM) ;; +esac + +post_extract() { + vsrcextract -C MdePkg/Library/MipiSysTLib/mipisyst "${_mipi_commit}.tar.gz" + vsrcextract -C CryptoPkg/Library/OpensslLib/openssl "openssl-${_openssl_version}.tar.gz" + vsrcextract -C CryptoPkg/Library/MbedTlsLib/mbedtls "${_mbedtls_commit}.tar.gz" + vsrcextract -C ArmPkg/Library/ArmSoftFloatLib/berkeley-softfloat-3 "${_softfloat_commit}.tar.gz" +} + +do_build() { + local PATH="BaseTools/BinWrappers/PosixLike:$PATH" + local _common_args=(-b RELEASE -n "$XBPS_MAKEJOBS" -t GCC5) + local _efi_args=(-D NETWORK_IP6_ENABLE -D TPM_CONFIG_ENABLE -D TPM1_ENABLE -D TPM2_ENABLE) + local _x86_args=(-D FD_SIZE_2MB -D HTTP_BOOT_ENABLE -D TLS_ENABLE) + local _4mb_args=(-D FD_SIZE_4MB -D FD_SIZE_IN_KB=4096 -D HTTP_BOOT_ENABLE -D TLS_ENABLE) + + export GCC5_AARCH64_PREFIX="aarch64-linux-${_pfx}-" + export GCC5_ARM_PREFIX="arm-none-eabi-" + + for _arch in "" AARCH64 ARM; do + ARCH="$_arch" make "${makejobs}" -C BaseTools + done + . edksetup.sh + + for _arch in "${_archs[@]}"; do + msg_normal "$pkgver: building shell ($_arch)\n" + build -p ShellPkg/ShellPkg.dsc -a "$_arch" "${_common_args[@]}" + + case "${_arch}" in + X64) + msg_normal "$pkgver: building ovmf ($_arch) with secure boot support (4MB FD)\n" + build -p "OvmfPkg/OvmfPkgIa32X64.dsc" -a IA32 -a "$_arch" \ + "${_common_args[@]}" "${_efi_args[@]}" "${_4mb_args[@]}" \ + -D SECURE_BOOT_ENABLE -D SMM_REQUIRE -D EXCLUDE_SHELL_FROM_FD + mv -v Build/Ovmf3264{,-secure-4mb} + + msg_normal "$pkgver: building ovmf ($_arch) with secure boot support\n" + build -p "OvmfPkg/OvmfPkgIa32X64.dsc" -a IA32 -a "$_arch" \ + "${_common_args[@]}" "${_efi_args[@]}" "${_x86_args[@]}" \ + -D SECURE_BOOT_ENABLE -D SMM_REQUIRE -D EXCLUDE_SHELL_FROM_FD + mv -v Build/Ovmf3264{,-secure} + + msg_normal "$pkgver: building ovmf ($_arch) default (4MB FD)\n" + build -p "OvmfPkg/OvmfPkg${_arch}.dsc" -a "$_arch" \ + "${_common_args[@]}" "${_efi_args[@]}" "${_4mb_args[@]}" + mv -v Build/OvmfX64{,-4mb} + + msg_normal "$pkgver: building ovmf ($_arch) default\n" + build -p "OvmfPkg/OvmfPkg${_arch}.dsc" -a "$_arch" \ + "${_common_args[@]}" "${_efi_args[@]}" "${_x86_args[@]}" + + msg_normal "$pkgver: building ovmf ($_arch) with microvm support (4MB FD)\n" + build -p "OvmfPkg/Microvm/Microvm${_arch}.dsc" -a "$_arch" \ + "${_common_args[@]}" "${_efi_args[@]}" "${_4mb_args[@]}" + mv -v Build/MicrovmX64{,-4mb} + + msg_normal "$pkgver: building ovmf ($_arch) with microvm support\n" + build -p "OvmfPkg/Microvm/Microvm${_arch}.dsc" -a "$_arch" \ + "${_common_args[@]}" "${_efi_args[@]}" "${_x86_args[@]}" + ;; + IA32) + msg_normal "$pkgver: building ovmf ($_arch) with secure boot support (4MB FD)\n" + build -p "OvmfPkg/OvmfPkgIa32.dsc" -a "$_arch" \ + "${_common_args[@]}" "${_efi_args[@]}" "${_4mb_args[@]}" \ + -D SECURE_BOOT_ENABLE -D SMM_REQUIRE -D EXCLUDE_SHELL_FROM_FD -D LOAD_X64_ON_IA32_ENABLE + mv -v Build/Ovmf{Ia32,IA32-secure-4mb} + + msg_normal "$pkgver: building ovmf ($_arch) with secure boot support\n" + build -p "OvmfPkg/OvmfPkgIa32.dsc" -a "$_arch" \ + "${_common_args[@]}" "${_efi_args[@]}" "${_x86_args[@]}" \ + -D SECURE_BOOT_ENABLE -D SMM_REQUIRE -D EXCLUDE_SHELL_FROM_FD -D LOAD_X64_ON_IA32_ENABLE + mv -v Build/Ovmf{Ia32,IA32-secure} + + msg_normal "$pkgver: building ovmf ($_arch) default (4MB FD)\n" + build -p "OvmfPkg/OvmfPkgIa32.dsc" -a "$_arch" \ + "${_common_args[@]}" "${_efi_args[@]}" "${_4mb_args[@]}" \ + -D LOAD_X64_ON_IA32_ENABLE + mv -v Build/Ovmf{Ia32,IA32-4mb} + + msg_normal "$pkgver: building ovmf ($_arch) default\n" + build -p "OvmfPkg/OvmfPkgIa32.dsc" -a "$_arch" \ + "${_common_args[@]}" "${_efi_args[@]}" "${_x86_args[@]}" \ + -D LOAD_X64_ON_IA32_ENABLE + mv -v Build/Ovmf{Ia32,IA32} + ;; + A*) + msg_normal "Building ArmVirtPkg ($_arch) with secure boot\n" + build -p "ArmVirtPkg/ArmVirtQemu.dsc" -a "${_arch}" \ + "${_common_args[@]}" "${_efi_args[@]}" \ + -D NETWORK_HTTP_BOOT_ENABLE -D NETWORK_TLS_ENABLE -D SECURE_BOOT_ENABLE + + dd if=/dev/zero of="Build/ArmVirtQemu-$_arch/RELEASE_GCC5/FV/QEMU_CODE.fd" bs=1M count=64 + dd if="Build/ArmVirtQemu-$_arch/RELEASE_GCC5/FV/QEMU_EFI.fd" \ + of="Build/ArmVirtQemu-$_arch/RELEASE_GCC5/FV/QEMU_CODE.fd" conv=notrunc + dd if=/dev/zero of="Build/ArmVirtQemu-$_arch/RELEASE_GCC5/FV/QEMU_VARS.fd" bs=1M count=64 + ;; + esac + done +} + +do_install() { + vmkdir usr/share/qemu/firmware + vmkdir usr/share/AAVMF + + for _arch in "${_archs[@]}"; do + vmkdir "usr/share/edk2/${_arch,,}" + + vinstall "Build/Shell/RELEASE_GCC5/${_arch}/Shell_7C04A583-9E3E-4f1c-AD65-E05268D0B4D1.efi" 644 \ + "usr/share/edk2/${_arch,,}" Shell.efi + vinstall "Build/Shell/RELEASE_GCC5/${_arch}/Shell_EA4BB293-2D7F-4456-A681-1F22F42CD0BC.efi" 644 \ + "usr/share/edk2/${_arch,,}" Shell_Full.efi + + case "$_arch" in + X64) + vinstall "Build/Ovmf${_arch}/RELEASE_GCC5/FV/OVMF.fd" 644 "usr/share/edk2/${_arch,,}" + vinstall "Build/Ovmf${_arch}/RELEASE_GCC5/FV/OVMF_CODE.fd" 644 "usr/share/edk2/${_arch,,}" + vinstall "Build/Ovmf${_arch}/RELEASE_GCC5/FV/OVMF_VARS.fd" 644 "usr/share/edk2/${_arch,,}" + + vinstall "Build/Ovmf${_arch}-4mb/RELEASE_GCC5/FV/OVMF.fd" 644 "usr/share/edk2/${_arch,,}" OVMF.4m.fd + vinstall "Build/Ovmf${_arch}-4mb/RELEASE_GCC5/FV/OVMF_CODE.fd" 644 "usr/share/edk2/${_arch,,}" OVMF_CODE.4m.fd + vinstall "Build/Ovmf${_arch}-4mb/RELEASE_GCC5/FV/OVMF_VARS.fd" 644 "usr/share/edk2/${_arch,,}" OVMF_VARS.4m.fd + + vinstall "Build/Ovmf3264-secure/RELEASE_GCC5/FV/OVMF_CODE.fd" 644 "usr/share/edk2/${_arch,,}" OVMF_CODE.secure.fd + vinstall "Build/Ovmf3264-secure-4mb/RELEASE_GCC5/FV/OVMF_CODE.fd" 644 "usr/share/edk2/${_arch,,}" OVMF_CODE.secure.4m.fd + + vinstall "Build/MicrovmX64/RELEASE_GCC5/FV/MICROVM.fd" 644 "usr/share/edk2/${_arch,,}" OVMF_CODE.microvm.fd + vinstall "Build/MicrovmX64-4mb/RELEASE_GCC5/FV/MICROVM.fd" 644 "usr/share/edk2/${_arch,,}" OVMF_CODE.microvm.4m.fd + + vcopy "${FILESDIR}/*x86_64*.json" usr/share/qemu/firmware + vcopy "${FILESDIR}/*microvm*.json" usr/share/qemu/firmware + ;; + IA32) + vinstall "Build/Ovmf${_arch}/RELEASE_GCC5/FV/OVMF.fd" 644 "usr/share/edk2/${_arch,,}" + vinstall "Build/Ovmf${_arch}/RELEASE_GCC5/FV/OVMF_CODE.fd" 644 "usr/share/edk2/${_arch,,}" + vinstall "Build/Ovmf${_arch}/RELEASE_GCC5/FV/OVMF_VARS.fd" 644 "usr/share/edk2/${_arch,,}" + + vinstall "Build/Ovmf${_arch}-4mb/RELEASE_GCC5/FV/OVMF.fd" 644 "usr/share/edk2/${_arch,,}" OVMF.4m.fd + vinstall "Build/Ovmf${_arch}-4mb/RELEASE_GCC5/FV/OVMF_CODE.fd" 644 "usr/share/edk2/${_arch,,}" OVMF_CODE.4m.fd + vinstall "Build/Ovmf${_arch}-4mb/RELEASE_GCC5/FV/OVMF_VARS.fd" 644 "usr/share/edk2/${_arch,,}" OVMF_VARS.4m.fd + + vinstall "Build/Ovmf${_arch}-secure/RELEASE_GCC5/FV/OVMF_CODE.fd" 644 "usr/share/edk2/${_arch,,}" OVMF_CODE.secure.fd + vinstall "Build/Ovmf${_arch}-secure-4mb/RELEASE_GCC5/FV/OVMF_CODE.fd" 644 "usr/share/edk2/${_arch,,}" OVMF_CODE.secure.4m.fd + + vcopy "${FILESDIR}/*i386*.json" usr/share/qemu/firmware + ;; + AARCH64) + vcopy "Build/ArmVirtQemu-${_arch}/RELEASE_GCC5/FV/*.fd" "usr/share/edk2/${_arch,,}" + + # libvirt hardcodes this + ln -s ../edk2/aarch64/QEMU_CODE.fd "${DESTDIR}/usr/share/AAVMF/AAVMF_CODE.fd" + ln -s ../edk2/aarch64/QEMU_VARS.fd "${DESTDIR}/usr/share/AAVMF/AAVMF_VARS.fd" + + vcopy "${FILESDIR}/*aarch64*.json" usr/share/qemu/firmware + ;; + ARM) + vcopy "Build/ArmVirtQemu-${_arch}/RELEASE_GCC5/FV/*.fd" "usr/share/edk2/${_arch,,}" + + # libvirt hardcodes this + ln -s ../edk2/arm/QEMU_CODE.fd "${DESTDIR}/usr/share/AAVMF/AAVMF32_CODE.fd" + ln -s ../edk2/arm/QEMU_VARS.fd "${DESTDIR}/usr/share/AAVMF/AAVMF32_VARS.fd" + + vcopy "${FILESDIR}/*arm*.json" usr/share/qemu/firmware + ;; + esac + done + + # lxd hardcodes this + ln -s ./edk2 "${DESTDIR}/usr/share/OVMF" + + vlicense License.txt + vlicense OvmfPkg/License.txt OvmfPkg.License.txt +} diff --git a/srcpkgs/edk2-ovmf/update b/srcpkgs/edk2-ovmf/update new file mode 100644 index 0000000000000..35be97e570139 --- /dev/null +++ b/srcpkgs/edk2-ovmf/update @@ -0,0 +1,2 @@ +site="https://github.com/tianocore/edk2/tags" +pkgname="edk2-stable"