Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package ovmf for openSUSE:Factory checked in 
at 2024-05-16 17:12:53
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/ovmf (Old)
 and      /work/SRC/openSUSE:Factory/.ovmf.new.1880 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "ovmf"

Thu May 16 17:12:53 2024 rev:102 rq:1174139 version:202311

Changes:
--------
--- /work/SRC/openSUSE:Factory/ovmf/ovmf.changes        2024-05-11 
18:24:08.228635878 +0200
+++ /work/SRC/openSUSE:Factory/.ovmf.new.1880/ovmf.changes      2024-05-16 
17:13:51.969075316 +0200
@@ -1,0 +2,353 @@
+Wed May 15 06:57:30 UTC 2024 - Joey Lee <j...@suse.com>
+
+- Removed ovmf-UefiCpuPkg-BaseXApicX2ApicLib-fix-CPUID_V2_EXTENDED_.patch
+  file which is merged to edk2-stable202311:
+    - 170d4ce8e90a UefiCpuPkg/BaseXApicX2ApicLib: fix 
CPUID_V2_EXTENDED_TOPOLOGY detection
+
+-------------------------------------------------------------------
+Fri May 10 06:50:25 UTC 2024 - Joey Lee <j...@suse.com>
+
+- Update to edk2-stable202311
+    - Features (https://github.com/tianocore/edk2/releases):
+        UefiPayloadPkg:Enhance the build processing for Universalpayload
+        SplitFspBin.py cannot support FSP binary with child FV included
+        Cache Disable should not be set by default in CR0 after ResetVector in 
x64 build
+        SMM perf record is copied multiple times to FPDT table if multiple 
ReadyToBoot events are signaled
+        In some cases, LocateHandleBuffer() may allocate a callee freed buffer 
when an error occurs
+        OvmfPkg/IoMmuDxe: don't rely on TPLs to manage concurrency
+        Recent OVMF build.sh change breaks useful functionality
+        UEFI cryptography agile solution - separate crypto algorithm (phase I)
+        Use MpService2Ppi to wakeup CPU in Smm CpuS3
+        Move RngLibTimer from MdePkg to MdeModulePkg
+        EFI_RNG_PROTOCOL Describe the DRBG algorithm used in the Arm RNDR 
instruction
+        Faulty Rng algo selection for Arm
+        RngDxe assert
+        Add New Intel Processor family for SMBIOS Type 4 from SMBIOS 3.7.0
+        NetworkPkg: HTTP protocol throughput too small
+        MailBoxVersion should be 0 according to the ACPI spec 6.5
+        Pyrite support - Secure erase is only available if encryption is 
supported
+        Remove assembly/tool logic that creates AP waking vector in 4G-20h
+        MdeModulePkg/Bus/Ata/AtaBusDxe: Coverity scan flags SIGN_EXTENSION 
issue
+        MdeModulePkg/Bus/Pci/NvmExpressPei: Coverity scan flags DEADCODE issue
+        MdeModulePkg/Bus/Pci/UhciDxe: fix Coverity issues
+        DynamicTablesPkg: Add support for generating ACPI ThermalZones
+        DynamicTablesPkg: Add support for PCI IO using Qword resources
+        MdeModulePkg/XhciDxe: Use Performance Timer for XHCI Timeouts
+        MdeModulePkg/Bus/Pci/XhciDxe: Need to abort the command for command 
timeout
+        BaseTools: Add support for LOONGARCH64 R_LARCH_RELAX relocation
+        UefiPayloadPkg: Add FIT support
+        SMBIOS BCD revision is not match SMBIOS version
+        Xhci: Skip size round up for TRB when getting PCI device/host memory 
address
+        MdePkg: various fixes to ARM/AArch64 SetJump/LongJump
+        TlsLib should not have a list of Ciphers which may or may not agree 
with what is available
+        MtrrLib modules and Unit test Enhancement
+        Use the base SortLib for Redfish modules only
+        evaluate the feasibility of using mbedtls as crypto library
+        bogus RealTimeClockLib class interface: LibRtcVirtualNotifyEvent
+        OvmfPkg/VirtioFsDxe: tolerate opening an absolute pathname relative to 
a regular file
+        UefiDevicePathLib DevPathToTextAcpiEx overflows the device path node 
when searching for optional strings
+        DynamicTablesPkg/TableHelperLib updates
+        Update Edk2-pytools to latest versions
+        duplicate installation of EFI_REAL_TIME_CLOCK_ARCH_PROTOCOL in 
RealTimeClockLib instances
+        UefiCpuPkg/BaseXApicX2ApicLib: fix CPUID_V2_EXTENDED_TOPOLOGY detection
+        OvmfPkg/AcpiPlatformDxe: Coverity scan flags FORWARD_NULL and 
UNUSED_VALUE issues
+        RedfishPkg/RedfishLib: Return HTTP headers to caller
+        ArmVirtPkg: support two PL011 UARTs
+        Update MADT for ACPI 6.5, and add TRBE & ETE support
+        Add Variable Policy Audit App and Shell Command
+        Use CodeQL CLI
+        TDVF: TdVmCall needs handle the retry results for MapGPA
+        Update GetMaintainer to handle case where a package has only reviewers 
and no maintainers
+        Add 0x0B/Platform Runtime Mechanism (PRM) in Address Space ID of 
Generic Address Structure (GAS)
+        Fix build error when remove "-Wno-sometimes-uninitialized" option
+    - Patches (git log --oneline --date-order 
edk2-stable202308..edk2-stable202311):
+        8736b8fdca RedfishPkg: RedfishDiscoverDxe: Optimize the Redfish 
Discover flow
+        f444c4bea5 RedfishPkg: RedfishDiscoverDxe: Fix issue if IPv4 installed 
after RestEx
+        8dd52c949e Revert "RedfishPkg: RedfishDiscoverDxe: Fix issue if IPv4 
installed later"
+        15538bc62e Revert "RedfishPkg: RedfishDiscoverDxe: Optimize the 
Redfish Discover flow"
+        23dbb8a07d DynamicTablesPkg: Fix ETE _UID Creation
+        3db76e6476 RedfishPkg: RedfishDiscoverDxe: Optimize the Redfish 
Discover flow
+        06b27ccb90 RedfishPkg: RedfishDiscoverDxe: Fix issue if IPv4 installed 
after RestEx
+        c9cce5a005 MdeModulePkg/RegularExpressinoDxe: Fix clang error
+        33deaa3b84 BaseTools/Scripts/GetMaintainer: Sort output addresses
+        706811819d BaseTools/Scripts/GetMaintainer: Handle reviewer only case
+        05f3c3f3d0 BaseTools/Scripts/GetMaintainer: refactor internal returns 
as dicts
+        1cb580be85 BaseTools/Scripts/GetMaintainer: Simplify logic
+        431ead235f BaseTools/Scripts/GetMaintainer: Fix logic bug collecting 
maintainers
+        589f2e49e5 UefiCpuPkg/PiSmmCpuDxeSmm: Fix CP Exception when CET enable
+        35c0c63edb Maintainers.txt: Remove unused OvmfPkg Confidential 
Computing path
+        e077ccff6d BaseTools/tools_def: drop -mgeneral-regs-only for AArch64 
CLANGDWARF
+        8a41004643 OvmfPkg/BaseMemEncryptTdxLib: Handle retry result of MapGPA
+        212cf07aaa MdePkg/Tdx.h: Add TDVMCALL_STATUS_RETRY
+        68e37f4578 MdePkg/BaseLib: Update TdVmcall to always output the value 
in R11
+        616f0d5037 IntelFsp2WrapperPkg: Add variable initialization
+        bb18fb80ab Maintainers.txt: Remove Orphan status option
+        c96b4da2a0 ReadMe.rst: Add CodeQL/analyze directory under other 
licenses
+        d461137e22 BaseTools/Plugin/CodeQL: Enable 30 queries
+        a3e8efcc8e .pytool/CISettings: Enable CodeQL audit mode
+        1384ce443d .github/workflows/codeql.yml: Add CodeQL workflow
+        29763016e0 .pytool/CISettings.py: Integrate CodeQL
+        b531ca4bb3 BaseTools/Plugin/CodeQL: Add integration helpers
+        5464d0bed6 BaseTools/Plugin/CodeQL: Add CodeQL build plugin
+        c1393bd486 Remove existing CodeQL infrastructure
+        da21991953 BaseTools: GenFw: auto-set nxcompat flag
+        e53c618ea4 MdePkg: IndustryStandard: Add DLL Characteristics
+        ae02d487a3 BaseTools: Update PatchCheck.py to allow whitespace issues 
in .rtf files
+        778134e491 ShellPkg/Dp: Allow dp command to work without ACPI
+        ee942c5360 MdeModulePkg/DxeCorePerformanceLib: Install BPDT in config 
table
+        038499a268 Maintainers.txt: Update based on active community members
+        08ac799d36 IntelFsp2Pkg/PatchFv: Fix syntax issue in markdown manual
+        0b4acb88d6 IntelFsp2Pkg/SwitchStack: Reserve 32B when calling C 
function in 64bit
+        8da978bf68 ReadMe.rst: Add Apache License 2.0 and update submodule list
+        fbbbd98499 DynamicTablesPkg: Fix assert in CmObject parser
+        1b1509abee RedfishPkg/RedfishCrtLib: remove multiple definitions.
+        ccbe2e9383 UefiCpuPkg: Correct file description for MpHandOff header 
file
+        36812d6c3e .github/workflows: Add Stale Check
+        a6871b5359 ArmVirtPkg/PlatformCI/ReadMe.md: Update contents
+        2e128302e6 ArmVirtPkg: Add varpolicy shell command
+        fe6cd1c187 OvmfPkg: Add varpolicy shell command
+        d4358a7f76 ShellPkg: Add varpolicy dynamic shell command and app
+        f3b2187d55 MdeModulePkg/VariablePolicy: Add more granular variable 
policy querying
+        8e74629070 .azurepipelines: Fix Python version (to 3.12)
+        2426a35625 MdePkg ACPI65: Add 0x0B/PRM to Generic Address Structure
+        aa8431822b MdeModulePkg/DxeCore: Allow relocation of images with large 
address
+        a671a14e63 ArmPkg/ArmLib: Add ArmHasEte () helper function
+        08431081a3 ArmPkg/ArmLib: Add ArmHasTrbe () helper function
+        09fd4e4172 DynamicTablesPkg: Fix referencing of CPC token
+        3ee23713e1 DynamicTablesPkg: Add ETE device to CPU node in AML
+        f81ee47513 DynamicTablesPkg: Add an ET info object parser
+        4821daa524 DynamicTablesPkg: Add an ET info object to Arm namespace
+        2b0d117b4b ShellPkg: Acpiview: Update MADT parser for TRBE interrupt
+        50e8518276 DynamicTablesPkg: Update FADT generator to ACPI 6.5
+        36e9f3d08a DynamicTablesPkg: Update MADT generator for ACPI 6.5
+        cf62548a35 DynamicTablesPkg: Add TRBE interrupt to GICC object parser
+        db9800dce8 DynamicTablesPkg: Add TRBE interrupt to GICC object
+        f9925c8953 MdePkg: MADT: Add TRBE interrupt to GICC
+        822c54eb01 MdePkg: MADT: Add Online capable flag in GICC
+        4f3ee7fbaf Maintainers.txt: update Gary's email address
+        7806713f00 BaseTools: Plugin: Integration of edk2-pytools
+        7f5c24ad35 .pytool: Integration of edk2-pytools
+        7ff6ab2b3e UefiPayloadPkg: Fix incorrect code on Fit function.
+        7e08d17a4a Maintainers.txt: Add .pytool maintainers to BaseTools/Plugin
+        ca32f75fc6 .pytool: Undo uncrustify check change
+        1e27258a89 UnitTestFrameworkPkg: Apply uncrustify formatting to 
relevant files
+        a00f7a355a SecurityPkg: Apply uncrustify formatting to relevant files
+        716a3292e0 MdePkg: Apply uncrustify formatting to relevant files
+        504953ef97 MdeModulePkg: Apply uncrustify formatting to relevant files.
+        41c622523d .pytool: Add cpp support to uncrustify plugin
+        d0cac9f63f .pytool: Set uncrustify check to audit only (temporary)
+        f945b72331 ArmVirtPkg: steer DebugLib output away from 
SerialPortLib+console traffic
+        601abf5d50 ArmVirtPkg: introduce DebugLibFdtPL011Uart DXE Runtime 
instance
+        ba5d955e25 ArmVirtPkg: introduce DebugLibFdtPL011Uart RAM instance
+        b7e6d97973 ArmVirtPkg: introduce DebugLibFdtPL011Uart Flash instance
+        115b59d9c6 ArmVirtPkg: store separate console and debug PL011 
addresses in GUID HOB
+        66046aeb6d ArmVirtPkg: adhere to the serial port selected by /chosen 
"stdout-path"
+        5fc3c39704 ArmVirtPkg: adjust whitespace in block scope declarations
+        f078a6fdd4 ArmVirtPkg/Fdt16550SerialPortHookLib: rebase to 
FdtSerialPortAddressLib
+        eb83b53309 ArmVirtPkg: introduce FdtSerialPortAddressLib
+        74c687cc2f UefiCpuPkg/MpInitLib: Wait for all APs to finish 
initialization
+        fe43b42676 MdeModulePkg/Include: API of IPMI Get System Interface 
Capabilities
+        9a38ddc806 MdePkg/Include: Definitions of IPMI Get System Interface 
Capabilities
+        8765f3eb42 RedfishPkg/RedfishLib: return HTTP headers to caller
+        1cbdd6e9ff RedfishPkg/libredfish: introduce new interfaces.
+        cf68ff6130 RedfishPkg/RedfishLib: introduce new interfaces.
+        9bb5ef1287 MdePkg: Add Cxl20.h into IndustryStandard
+        884ef98454 MdePkg/Pldm.h: Add define for the PLDM response flag
+        00dbde5fa4 MdePkg/Mctp.h: Correct typo in structure member name
+        1f21e11168 Maintainers.txt: Update maintainers list
+        cf87fd95c1 OvmfPkg/AcpiPlatformDxe: Fix Coverity report issues
+        170d4ce8e9 UefiCpuPkg/BaseXApicX2ApicLib: fix 
CPUID_V2_EXTENDED_TOPOLOGY detection
+        d85bf54b7f ArmPlatformPkg/PL031RealTimeClockLib: remove needless 
instance init steps
+        a6648418c1 MdeModulePkg: Optimize BmExpandPartitionDevicePath
+        e17e58e81b DynamicTablesPkg: HOWTO for Handcrafted tables
+        fb044b7fe8 RedfishPkg/RedfishDiscoverDxe: remove Redfish false alarm
+        da73578bf7 RedfishPkg/RedfishPlatformConfigDxe: add debug message.
+        2ad52adb66 IntelFsp2WrapperPkg: CI: Add PrEval entry
+        87ef986eeb MdeModulePkg: CI: Add PrEval entry
+        f8923b72de MdePkg: CI: Add PrEval entry
+        e44097a965 PrmPkg: CI: Add PrEval entry
+        e5b4fe21ae RedfishPkg: CI: Add PrEval entry
+        b24c8b0467 IntelFsp2Pkg: CI: Add PrEval entry
+        1cd0227c5d FmpDevicePkg: CI: Add PrEval entry
+        22b667c821 EmbeddedPkg: CI: Add PrEval entry
+        2298769ecf DynamicTablesPkg: CI: Add PrEval entry
+        36b41b067f CryptoPkg: CI: Add PrEval entry
+        cbcdf4ff7b UnitTestFrameworkPkg: CI: Add PrEval entry
+        9f5e409623 Edk2: edk2-pytools: Update to latest versions
+        309450db26 DynamicTablesPkg/AmlLib: Enumerate memory attributes
+        ec7f734366 DynamicTablesPkg/TableHelperLib: Enhance error handling
+        575bd4f55c DynamicTablesPkg/TableHelperLib: Fix and improve text 
handling
+        c591395f4a EmbeddedPkg/NorFlashInfoLib: Update norflash device list
+        bed477d9cf Maintainers.txt: Stop to be reviewer of several modules
+        0355e559c6 MdePkg/Test: Add DevicePathLib host test module
+        96ed60dfd7 MdePkg/UefiDevicePathLib: Fix AcpiEx print logic
+        8abbf6d87e OvmfPkg/VirtioFsDxe: tolerate opening an abs. pathname rel. 
to a reg. file
+        b75d9f556d BaseTools: trim warning to error
+        7fe49887c4 EmbeddedPkg/RealTimeClockLib: drop LibRtcVirtualNotifyEvent 
from lib class
+        3c3136d3b6 EmbeddedPkg/VirtualRealTimeClockLib: drop 
LibRtcVirtualNotifyEvent
+        e6e0e7ba74 EmbeddedPkg/TemplateRealTimeClockLib: drop 
LibRtcVirtualNotifyEvent
+        189addfde6 ArmPlatformPkg/PL031RealTimeClockLib: hide 
LibRtcVirtualNotifyEvent
+        c62fb45549 PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe: rename 
LibRtcVirtualNotifyEvent
+        747a08eae2 RedfishPkg/RedfishDiscoverDxe: introduce 
PcdRedfishSendReceiveTimeout
+        01e1bc2894 ArmPkg/ArmPsciMpServices: Add EFI_NOT_READY return
+        772ec92577 UefiCpuPkg: RISC-V: MMU: Introduce a PCD for SATP mode
+        a445e1a42c ShellPkg: Increase PcdShellPrintBufferSize from UINT16 to 
UINT32
+        03d6569f70 MdeModulePkg: UsbRndis: get rid of magic values
+        e07948255c MdeModulePkg: UsbNetwork: fix Ethernet functional 
descriptor processing
+        326b9e1d81 UefiCpuPkg/CpuDxe: Eliminate the unused variable.
+        eebd446875 CryptoPkg: Add CryptAes functions based on Mbedtls Add 
CryptAes APIS.
+        c109e4a244 CryptoPkg: Add basic Readme for BaseCryptLibMbedTls
+        26754b3707 CryptoPkg: Add Mbedtls submodule in CI
+        c5fedb030a CryptoPkg: Add MD5/SHA1/SHA2 functions based on Mbedtls
+        4049ca493c CryptoPkg: Add Null functions for building pass
+        b26f7dfe29 CryptoPkg: Add all .inf files for BaseCryptLibMbedTls
+        97f51f2e9b CryptoPkg: Add RSA functions based on Mbedtls
+        60222e7eb9 CryptoPkg: Add HKDF functions based on Mbedtls
+        731aa70881 CryptoPkg: Add HMAC functions based on Mbedtls
+        586f05b9de CryptoPkg: Add mbedtls_config and MbedTlsLib.inf
+        1a79cc7d95 CryptoPkg: Add mbedtls submodule for EDKII
+        95c9f470ca RedfishPkg: Use base version SortLib for the specific 
modules
+        137f799aae UefiCpuPkg/CpuDxe: Update RefreshMemoryAttributesFromMtrr
+        01b0d19dbb UefiCpuPkg/MtrrUnitTest: Add Unit test of setting/getting 
memory attributes
+        c4fdec0a83 UefiCpuPkg/MtrrLib: Improve MtrrDebugPrintAllMtrrsWorker.
+        4b7b32f846 UefiCpuPkg/MtrrLib: Add API 
MtrrGetMemoryAttributesInMtrrSettings.
+        c032db3308 UefiCpuPkg/MtrrLib: Update APIs related to set memory 
attributes.
+        1d0fd0bb3d UefiCpuPkg/MtrrUnitTest: Update UnitTestMtrrSetAllMtrrs().
+        1217f59d23 UefiCpuPkg/MtrrLib: Fix MtrrSetAllMtrrs to handle absent 
fixed MTRRs.
+        cc070b88e4 UefiCpuPkg/MtrrUnitTest: Update UnitTestMtrrGetFixedMtrr().
+        0103d09ebe UefiCpuPkg/MtrrLib: Update MtrrGetFixedMtrr().
+        a519014472 UefiCpuPkg/MtrrUnitTest: Update UnitTestMtrrGetAllMtrrs().
+        0d89ceae31 UefiCpuPkg/MtrrLib: Fix MtrrGetAllMtrrs to return correct 
MTRR setting.
+        5b76b4a9f9 UefiCpuPkg/MtrrUnitTest: Update test to cover no-fixed-mtrr 
cases.
+        1ec374cb50 UefiCpuPkg/MtrrUnitTest: Update 
UnitTestMtrrGetDefaultMemoryType.
+        f784fc0e39 UefiCpuPkg/MtrrUnitTest: Update 
UnitTestGetFirmwareVariableMtrrCount.
+        ca3f8638fa UefiCpuPkg/MtrrUnitTest: Update the Unit Test for 
IsMtrrSupported().
+        bf03c4a52a UefiCpuPkg/MtrrLib: Add internal function 
MtrrLibIsMtrrSupported.
+        4ddd8ac3a2 CryptoPkg/TlsLib: fix tls cipher configuration
+        5087a07736 ArmVirtPkg/FdtPL011SerialPortLib: initialize implicitly
+        82191f8a0e .github: Fix Python version (to 3.11)
+        6439c73356 .azurepipelines: Fix Python version (to 3.11)
+        d073a54511 MdePkg/DxeRngLib: Add missing GUID declaration in inf
+        1497c4b074 MdePkg/BaseLib: fix typo in Arm SetJump
+        1a66bd51ca MdePkg/BaseLib: ensure ARM LongJump never returns 0
+        2b2705343a MdePkg/BaseLib: correct register sizes in AArch64 
SetJump/LongJump
+        ae79efb7bd MdePkg/BaseLib: use normal register init in ARM SetJump 
implementations
+        80bbea192a MdePkg/BaseLib: add ASSERT in ARM* SetJump implementations
+        cbf0e4f5b3 MdePkg/BaseLib: fix comments in ARM* SetJump/LongJump 
implementations
+        f6a314e5b5 Maintainers.txt: add Sami as maintainer of 
arm-architectural subdirs
+        f36e1ec1f0 MdeModulePkg/Xhci: Skip size round up for TRB during 
address translation
+        ad1c0394b1 EmulatorPkg: Fix Terminal Issues
+        be971fc302 MdeModulePkg/SmbiosDxe: Fix BcdRevision is not match with 
SMBIOS version
+        bf0bdacdd6 MdeModulePkg: Fix misspelling
+        39f3c26e8c UefiPayloadPkg: Add FIT support
+        d6b05375b4 MdePkg/BaseFdtLib: Add Fdt function.
+        c70d914428 BaseTools/GenFw: Add support for LOONGARCH64 relax 
relocation
+        d11f0ea045 MdeModulePkg/XhciDxe: Abort the Address Device cmd when 
time out
+        43dcf453fc MdeModulePkg/XhciDxe: Use Performance Timer for XHCI 
Timeouts
+        8b2e6b90b8 DynamicTablesPkg: AcpiSsdtPcieLibArm: Use QWord to describe 
I/O range
+        909e870e34 DynamicTablesPkg: AML Code generation for I/O ranges
+        b5003ab725 DynamicTablesPkg: Add Aml NameUnicodeString API
+        fd0ccccb42 DynamicTablesPkg: Add support to add Strings to package
+        b2df3ee17f DynamicTablesPkg: Add support for simple method invocation.
+        8f5505a4c9 DynamicTablesPkg: Add ThermalZone CodeGen function
+        28a267af40 MdeModulePkg/Bus/Pci/UhciDxe: Fix FORWARD_NULL Coverity 
issues
+        e9f5d8c0e0 MdeModulePkg/Bus/Pci/UhciDxe: Fix BAD_SHIFT Coverity issue
+        f67e1934d9 RedfishPkg/JsonLib: fix JsonObjectGetValue issue
+        ea628f28e5 RISCV: Fix InternalLongJump to return correct value
+        89dad77cfb ArmPkg/ArmLib: Add ArmHasVhe () helper function
+        4317b4824b MdeModulePkg/Bus/Pci/NvmExpressPei: Fix DEADCODE Coverity 
issue
+        4fb69c2bee MdeModulePkg/Bus/Ata/AtaBusDxe: Fix SIGN_EXTENSION Coverity 
issue
+        eb485b6438 ArmVirtPkg: handle virtual EL2 timer in DT
+        baee97670f ArmPkg: add EL2 virtual timer interrupt Pcd
+        7275993dc6 RedfishPkg/RedfishRestExDxe: return HTTP status code to 
caller.
+        cbcf0428e8 BaseTools/Plugin: Add DebugMacroCheck
+        97d367f37e OvmfPkg/PlatformCI: Disable DebugMacroCheck
+        8803033c0c DynamicTablesPkg.ci.yaml: Add debug macro exception
+        1312c2e9fd ArmVirtPkg.ci.yaml: Add debug macro exception
+        bc7bbd3bc4 SecurityPkg.ci.yaml: Add debug macro exception
+        5cfb5d6c01 pip-requirements.txt: Add regex
+        6f0729484f RedfishPkg/PlatformHostInterfaceBmcUsbNicLib: Fix DEBUG 
macro args
+        408e463135 MdeModulePkg: Memory Bin Range Update Accounts for Guard 
Page
+        db38c7de64 UefiCpuPkg/ResetVector: Remove AP waking vector from 
ResetVector
+        dea6002d6e OvmfPkg: Remove applicationProcessorEntryPoint
+        718cf21a5a UefiCpuPkg/SecCore: Remove AP waking Vector logic in SecCore
+        392456240a BaseTools: Remove logic to create AP waking vector in GenFv
+        29cce3356a OvmfPkg/RiscVVirt/README: document direct kernel boot
+        1bfd63ac39 OvmfPkg/RiscVVirt/README: explain the "acpi=off" machine 
property
+        5242bae5dd OvmfPkg/RiscVVirt/README: explain that "-bios" is only 
useful with TCG
+        cdfe4310dd Pyrite support - Secure erase is only available if 
encryption is supported.
+        4a1afea6f7 RedfishPkg/RedfishPlatformConfigDxe: fix can not set one-of 
option issue.
+        b844b106e2 OvmfPkg/TdxDxe: Change MadtMpWk->MailBoxVersion from 1 to 0
+        7f1a8cad99 Maintainers.txt: Make myself maintainer for 
OvmfPkg/RiscVVirt
+        6d074d6a10 OvmfPkg: raise DXEFV size to 14.5 MB in the traditional 
platform FDFs
+        c95158e419 OvmfPkg/PlatformBootManagerLib: refer to virtio console 
subsys symbolically
+        4f4a2c3b07 ArmPkg/ArmMmuLib: Drop buggy secure memory type check
+        b7a48bed16 OvmfPkg/RiscVVirt/README.md: bring your own OpenSBI
+        e880c307c5 MdeModulePkg/BootMaintenanceManagerUiLib: Check array index 
before access
+        a5cbb59905 Maintainers.txt: Update reviewers and maintainers for 
DynamicTablesPkg
+        cc26a2cb31 MdeModulePkg/Core/Dxe: Fix memory leak issue in FwVolBlock.c
+        f18ec60fa4 MdeModulePkg/Core/Dxe: Fix memory leak issue in FwVol.c
+        0bcc503595 MdeModulePkg/HiiDatabase: Fix incorrect AllocateCopyPool 
size
+        b240eab035 NetworkPkg: Increase HTTP buffer size and enable TCP window 
scaling
+        d4ae5df711 MdePkg/SmBios.h: Add New Intel Processor family
+        d42ad81e22 Add a .editorconfig file to tell editors basic formatting 
details
+        28a74d7ab2 OvmfPkg/Bhyve: don't exit early if RSDP is not found in 
memory
+        493a375eef ShellPkg/UefiShellNetwork2CommandsLib: Check array index 
before access
+        60d0f5802b MdePkg/Library/TdxLib: Remove unnecessary comparison
+        b74f1f7ab5 SecurityPkg: RngDxe: Fixing mAvailableAlgoArray allocator
++++ 56 more lines (skipped)
++++ between /work/SRC/openSUSE:Factory/ovmf/ovmf.changes
++++ and /work/SRC/openSUSE:Factory/.ovmf.new.1880/ovmf.changes

Old:
----
  edk2-edk2-stable202308.tar.gz
  ovmf-UefiCpuPkg-BaseXApicX2ApicLib-fix-CPUID_V2_EXTENDED_.patch

New:
----
  edk2-edk2-stable202311.tar.gz
  mbedtls-3.3.0.tar.gz

BETA DEBUG BEGIN:
  Old:
- Removed ovmf-UefiCpuPkg-BaseXApicX2ApicLib-fix-CPUID_V2_EXTENDED_.patch
  file which is merged to edk2-stable202311:
BETA DEBUG END:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ ovmf.spec ++++++
--- /var/tmp/diff_new_pack.I0eace/_old  2024-05-16 17:13:54.537168393 +0200
+++ /var/tmp/diff_new_pack.I0eace/_new  2024-05-16 17:13:54.541168538 +0200
@@ -27,7 +27,7 @@
 %endif
 
 Name:           ovmf
-Version:        202308
+Version:        202311
 Release:        0
 Summary:        Open Virtual Machine Firmware
 License:        BSD-2-Clause-Patent
@@ -49,6 +49,8 @@
 Source8:        oniguruma-v6.9.4_mark1-src.tar.xz
 # public-mipi-sys-t: https://github.com/MIPI-Alliance/public-mipi-sys-t
 Source9:        public-mipi-sys-t-1.1-edk2.tar.gz
+# mbedtls: https://github.com/Mbed-TLS/mbedtls
+Source10:       mbedtls-3.3.0.tar.gz
 Source100:      %{name}-rpmlintrc
 Source101:      gdb_uefi.py.in
 Source102:      gen-key-enrollment-iso.sh
@@ -67,23 +69,21 @@
 Patch9:         %{name}-Revert-OvmfPkg-OvmfXen-Set-PcdFSBClock.patch
 # Bug 1209266 - OVMF firmware hangs when booting SEV or SEV-ES guest
 Patch10:        
%{name}-Revert-OvmfPkg-PlatformPei-Update-ReserveEmuVariable.patch
-# Bug 1216472 - VMs with secure boot do not start (assertion in edk2)
-Patch11:        
%{name}-UefiCpuPkg-BaseXApicX2ApicLib-fix-CPUID_V2_EXTENDED_.patch
 # Bug 1219024 - SVVP test Check SMBIOS Table Specific Requirements fails
-Patch12:        
%{name}-OvmfPkg-SmbiosPlatformDxe-tweak-fallback-release-dat.patch
+Patch11:        
%{name}-OvmfPkg-SmbiosPlatformDxe-tweak-fallback-release-dat.patch
 # Bug 1217704 - ovmf: reproducible builds problem in ovmf-riscv64-code.bin
-Patch13:        
%{name}-EmbeddedPkg-Library-Support-SOURCE_DATE_EPOCH-in-Vir.patch
+Patch12:        
%{name}-EmbeddedPkg-Library-Support-SOURCE_DATE_EPOCH-in-Vir.patch
 # Bug 1218678 (CVE-2022-36763) - VUL-0: CVE-2022-36763: EDK2 is susceptible to 
a vulnerability in the Tcg2MeasureGptTable() function...
-Patch14:        
%{name}-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-4117.patch
-Patch15:        
%{name}-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4117.patch
-Patch16:        
%{name}-SecurityPkg-Adding-CVE-2022-36763-to-SecurityFixes.y.patch
+Patch13:        
%{name}-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-4117.patch
+Patch14:        
%{name}-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4117.patch
+Patch15:        
%{name}-SecurityPkg-Adding-CVE-2022-36763-to-SecurityFixes.y.patch
 # Bug 1218679 (CVE-2022-36764) - VUL-0: CVE-2022-36764: EDK2 is susceptible to 
a vulnerability in the Tcg2MeasurePeImage() function...
-Patch17:        
%{name}-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-4118.patch
-Patch18:        
%{name}-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4118.patch
-Patch19:        
%{name}-SecurityPkg-Adding-CVE-2022-36764-to-SecurityFixes.y.patch
-Patch20:        
%{name}-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-4117-4118-symbol-rename.patch
-Patch21:        
%{name}-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4117-4118-symbol-rename.patch
-Patch22:        
%{name}-SecurityPkg-Updating-SecurityFixes.yaml-after-symbol.patch
+Patch16:        
%{name}-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-4118.patch
+Patch17:        
%{name}-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4118.patch
+Patch18:        
%{name}-SecurityPkg-Adding-CVE-2022-36764-to-SecurityFixes.y.patch
+Patch19:        
%{name}-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-4117-4118-symbol-rename.patch
+Patch20:        
%{name}-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4117-4118-symbol-rename.patch
+Patch21:        
%{name}-SecurityPkg-Updating-SecurityFixes.yaml-after-symbol.patch
 BuildRequires:  bc
 BuildRequires:  cross-arm-binutils
 BuildRequires:  cross-arm-gcc%{gcc_version}
@@ -235,6 +235,11 @@
 tar -xf %{SOURCE9} --strip 1
 popd
 
+# add mbedtls
+pushd CryptoPkg/Library/MbedTlsLib/mbedtls
+tar -xf %{SOURCE10} --strip 1
+popd
+
 chmod +x %{SOURCE102}
 
 %build


++++++ edk2-edk2-stable202308.tar.gz -> edk2-edk2-stable202311.tar.gz ++++++
/work/SRC/openSUSE:Factory/ovmf/edk2-edk2-stable202308.tar.gz 
/work/SRC/openSUSE:Factory/.ovmf.new.1880/edk2-edk2-stable202311.tar.gz differ: 
char 24, line 1





++++++ ovmf-SecurityPkg-Adding-CVE-2022-36763-to-SecurityFixes.y.patch ++++++
--- /var/tmp/diff_new_pack.I0eace/_old  2024-05-16 17:13:54.701174337 +0200
+++ /var/tmp/diff_new_pack.I0eace/_new  2024-05-16 17:13:54.701174337 +0200
@@ -16,10 +16,10 @@
  1 file changed, 22 insertions(+)
  create mode 100644 SecurityPkg/SecurityFixes.yaml
 
-Index: edk2-edk2-stable202308/SecurityPkg/SecurityFixes.yaml
+Index: edk2-edk2-stable202311/SecurityPkg/SecurityFixes.yaml
 ===================================================================
 --- /dev/null
-+++ edk2-edk2-stable202308/SecurityPkg/SecurityFixes.yaml
++++ edk2-edk2-stable202311/SecurityPkg/SecurityFixes.yaml
 @@ -0,0 +1,22 @@
 +## @file
 +# Security Fixes for SecurityPkg

++++++ ovmf-SecurityPkg-Adding-CVE-2022-36764-to-SecurityFixes.y.patch ++++++
--- /var/tmp/diff_new_pack.I0eace/_old  2024-05-16 17:13:54.713174772 +0200
+++ /var/tmp/diff_new_pack.I0eace/_new  2024-05-16 17:13:54.717174917 +0200
@@ -15,10 +15,10 @@
  SecurityPkg/SecurityFixes.yaml | 14 ++++++++++++++
  1 file changed, 14 insertions(+)
 
-Index: edk2-edk2-stable202308/SecurityPkg/SecurityFixes.yaml
+Index: edk2-edk2-stable202311/SecurityPkg/SecurityFixes.yaml
 ===================================================================
---- edk2-edk2-stable202308.orig/SecurityPkg/SecurityFixes.yaml
-+++ edk2-edk2-stable202308/SecurityPkg/SecurityFixes.yaml
+--- edk2-edk2-stable202311.orig/SecurityPkg/SecurityFixes.yaml
++++ edk2-edk2-stable202311/SecurityPkg/SecurityFixes.yaml
 @@ -20,3 +20,17 @@ CVE_2022_36763:
    - https://bugzilla.tianocore.org/show_bug.cgi?id=4117
    - https://bugzilla.tianocore.org/show_bug.cgi?id=2168

++++++ 
ovmf-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-4117-4118-symbol-rename.patch
 ++++++
--- /var/tmp/diff_new_pack.I0eace/_old  2024-05-16 17:13:54.729175352 +0200
+++ /var/tmp/diff_new_pack.I0eace/_new  2024-05-16 17:13:54.733175497 +0200
@@ -19,10 +19,10 @@
  .../DxeTpm2MeasureBootLibSanitizationTest.c   | 26 +++++++++----------
  4 files changed, 25 insertions(+), 25 deletions(-)
 
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
 @@ -200,7 +200,7 @@ Tcg2MeasureGptTable (
                       BlockIo->Media->BlockSize,
                       (UINT8 *)PrimaryHeader
@@ -59,10 +59,10 @@
    if (EFI_ERROR (Status)) {
      return EFI_UNSUPPORTED;
    }
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
 @@ -63,7 +63,7 @@
  **/
  EFI_STATUS
@@ -99,10 +99,10 @@
    IN  UINT32  FilePathSize,
    OUT UINT32  *EventSize
    )
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
 @@ -54,7 +54,7 @@
  **/
  EFI_STATUS
@@ -139,10 +139,10 @@
    IN  UINT32  FilePathSize,
    OUT UINT32  *EventSize
    );
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
 @@ -84,27 +84,27 @@ TestSanitizeEfiPartitionTableHeader (
    PrimaryHeader.Header.CRC32 = CalculateCrc32 ((UINT8 *)&PrimaryHeader, 
PrimaryHeader.Header.HeaderSize);
  

++++++ ovmf-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-4117.patch ++++++
--- /var/tmp/diff_new_pack.I0eace/_old  2024-05-16 17:13:54.749176077 +0200
+++ /var/tmp/diff_new_pack.I0eace/_new  2024-05-16 17:13:54.753176222 +0200
@@ -25,10 +25,10 @@
  create mode 100644 
SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
  create mode 100644 
SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTestHost.inf
 
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
 @@ -20,6 +20,8 @@ Copyright (c) 2013 - 2018, Intel Corpora
  (C) Copyright 2015 Hewlett Packard Enterprise Development LP<BR>
  SPDX-License-Identifier: BSD-2-Clause-Patent
@@ -194,10 +194,10 @@
  
    //
    // Copy File Device Path
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
 @@ -37,6 +37,8 @@
  
  [Sources]
@@ -220,10 +220,10 @@
    gEfiBlockIoProtocolGuid               ## SOMETIMES_CONSUMES
    gEfiDiskIoProtocolGuid                ## SOMETIMES_CONSUMES
 -
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
 ===================================================================
 --- /dev/null
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
 @@ -0,0 +1,275 @@
 +/** @file
 +  The library instance provides security service of TPM2 measure boot and
@@ -500,10 +500,10 @@
 +
 +  return EFI_SUCCESS;
 +}
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
 ===================================================================
 --- /dev/null
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
 @@ -0,0 +1,113 @@
 +/** @file
 +  This file includes the function prototypes for the sanitization functions.
@@ -618,10 +618,10 @@
 +  );
 +
 +#endif // DXE_TPM2_MEASURE_BOOT_LIB_SANITATION_
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
 ===================================================================
 --- /dev/null
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
 @@ -0,0 +1,303 @@
 +/** @file
 +  This file includes the unit test cases for the 
DxeTpm2MeasureBootLibSanitizationTest.c.
@@ -926,10 +926,10 @@
 +{
 +  return (INT32)UefiTestMain ();
 +}
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTestHost.inf
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTestHost.inf
 ===================================================================
 --- /dev/null
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTestHost.inf
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTestHost.inf
 @@ -0,0 +1,28 @@
 +## @file
 +# This file builds the unit tests for DxeTpm2MeasureBootLib
@@ -959,10 +959,10 @@
 +  UnitTestLib
 +  PrintLib
 +  SafeIntLib
-Index: edk2-edk2-stable202308/SecurityPkg/SecurityPkg.ci.yaml
+Index: edk2-edk2-stable202311/SecurityPkg/SecurityPkg.ci.yaml
 ===================================================================
---- edk2-edk2-stable202308.orig/SecurityPkg/SecurityPkg.ci.yaml
-+++ edk2-edk2-stable202308/SecurityPkg/SecurityPkg.ci.yaml
+--- edk2-edk2-stable202311.orig/SecurityPkg/SecurityPkg.ci.yaml
++++ edk2-edk2-stable202311/SecurityPkg/SecurityPkg.ci.yaml
 @@ -16,6 +16,7 @@
          ## ]
          "ExceptionList": [
@@ -971,10 +971,10 @@
          ],
          ## Both file path and directory path are accepted.
          "IgnoreFiles": [
-Index: edk2-edk2-stable202308/SecurityPkg/Test/SecurityPkgHostTest.dsc
+Index: edk2-edk2-stable202311/SecurityPkg/Test/SecurityPkgHostTest.dsc
 ===================================================================
---- edk2-edk2-stable202308.orig/SecurityPkg/Test/SecurityPkgHostTest.dsc
-+++ edk2-edk2-stable202308/SecurityPkg/Test/SecurityPkgHostTest.dsc
+--- edk2-edk2-stable202311.orig/SecurityPkg/Test/SecurityPkgHostTest.dsc
++++ edk2-edk2-stable202311/SecurityPkg/Test/SecurityPkgHostTest.dsc
 @@ -26,6 +26,7 @@
    
SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockPlatformPKProtectionLib.inf
    SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiLib.inf

++++++ ovmf-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-4118.patch ++++++
--- /var/tmp/diff_new_pack.I0eace/_old  2024-05-16 17:13:54.765176657 +0200
+++ /var/tmp/diff_new_pack.I0eace/_new  2024-05-16 17:13:54.769176801 +0200
@@ -18,10 +18,10 @@
  .../DxeTpm2MeasureBootLibSanitizationTest.c   | 60 ++++++++++++++++---
  4 files changed, 131 insertions(+), 15 deletions(-)
 
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
 @@ -378,7 +378,6 @@ Exit:
    @retval EFI_OUT_OF_RESOURCES   No enough resource to measure image.
    @retval EFI_UNSUPPORTED        ImageType is unsupported or PE image is 
mal-format.
@@ -64,10 +64,10 @@
    Tcg2Event->Header.HeaderSize    = sizeof (EFI_TCG2_EVENT_HEADER);
    Tcg2Event->Header.HeaderVersion = EFI_TCG2_EVENT_HEADER_VERSION;
    ImageLoad                       = (EFI_IMAGE_LOAD_EVENT *)Tcg2Event->Event;
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.c
 @@ -151,7 +151,7 @@ SanitizeEfiPartitionTableHeader (
  }
  
@@ -127,10 +127,10 @@
 +
    return EFI_SUCCESS;
  }
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSanitization.h
 @@ -9,6 +9,9 @@
    Tcg2MeasureGptTable() function will receive untrusted GPT partition table, 
and parse
    partition data carefully.
@@ -170,10 +170,10 @@
 +  );
 +
 +#endif // DXE_TPM2_MEASURE_BOOT_LIB_VALIDATION_
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c
 @@ -72,10 +72,10 @@ TestSanitizeEfiPartitionTableHeader (
    PrimaryHeader.Header.Revision          = 
DEFAULT_PRIMARY_TABLE_HEADER_REVISION;
    PrimaryHeader.Header.HeaderSize        = sizeof 
(EFI_PARTITION_TABLE_HEADER);

++++++ 
ovmf-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4117-4118-symbol-rename.patch
 ++++++
--- /var/tmp/diff_new_pack.I0eace/_old  2024-05-16 17:13:54.781177236 +0200
+++ /var/tmp/diff_new_pack.I0eace/_new  2024-05-16 17:13:54.785177381 +0200
@@ -19,10 +19,10 @@
  .../DxeTpmMeasureBootLibSanitizationTest.c    | 26 +++++++++----------
  4 files changed, 26 insertions(+), 26 deletions(-)
 
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
 @@ -174,7 +174,7 @@ TcgMeasureGptTable (
                       BlockIo->Media->BlockSize,
                       (UINT8 *)PrimaryHeader
@@ -59,10 +59,10 @@
    if (EFI_ERROR (Status)) {
      return EFI_UNSUPPORTED;
    }
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
 @@ -1,5 +1,5 @@
  /** @file
 -  The library instance provides security service of TPM2 measure boot and
@@ -106,10 +106,10 @@
    IN  UINT32  FilePathSize,
    OUT UINT32  *EventSize
    )
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
 @@ -53,7 +53,7 @@
  **/
  EFI_STATUS
@@ -146,10 +146,10 @@
    IN  UINT32  FilePathSize,
    OUT UINT32  *EventSize
    );
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
 @@ -83,27 +83,27 @@ TestSanitizeEfiPartitionTableHeader (
    PrimaryHeader.Header.CRC32 = CalculateCrc32 ((UINT8 *)&PrimaryHeader, 
PrimaryHeader.Header.HeaderSize);
  

++++++ ovmf-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4117.patch ++++++
--- /var/tmp/diff_new_pack.I0eace/_old  2024-05-16 17:13:54.801177962 +0200
+++ /var/tmp/diff_new_pack.I0eace/_new  2024-05-16 17:13:54.805178107 +0200
@@ -26,10 +26,10 @@
  create mode 100644 
SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
  create mode 100644 
SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTestHost.inf
 
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
 @@ -18,6 +18,8 @@
  Copyright (c) 2009 - 2018, Intel Corporation. All rights reserved.<BR>
  SPDX-License-Identifier: BSD-2-Clause-Patent
@@ -133,10 +133,10 @@
        goto Finish;
    }
  
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
 @@ -32,6 +32,8 @@
  
  [Sources]
@@ -159,10 +159,10 @@
    gEfiBlockIoProtocolGuid               ## SOMETIMES_CONSUMES
    gEfiDiskIoProtocolGuid                ## SOMETIMES_CONSUMES
 -
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
 ===================================================================
 --- /dev/null
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
 @@ -0,0 +1,241 @@
 +/** @file
 +  The library instance provides security service of TPM2 measure boot and
@@ -405,10 +405,10 @@
 +
 +  return EFI_SUCCESS;
 +}
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
 ===================================================================
 --- /dev/null
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
 @@ -0,0 +1,114 @@
 +/** @file
 +  This file includes the function prototypes for the sanitization functions.
@@ -524,10 +524,10 @@
 +  );
 +
 +#endif // DXE_TPM_MEASURE_BOOT_LIB_VALIDATION_
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
 ===================================================================
 --- /dev/null
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
 @@ -0,0 +1,301 @@
 +/** @file
 +This file includes the unit test cases for the 
DxeTpmMeasureBootLibSanitizationTest.c.
@@ -830,10 +830,10 @@
 +{
 +  return (INT32)UefiTestMain ();
 +}
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTestHost.inf
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTestHost.inf
 ===================================================================
 --- /dev/null
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTestHost.inf
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTestHost.inf
 @@ -0,0 +1,28 @@
 +## @file
 +# This file builds the unit tests for DxeTpmMeasureBootLib
@@ -863,10 +863,10 @@
 +  UnitTestLib
 +  PrintLib
 +  SafeIntLib
-Index: edk2-edk2-stable202308/SecurityPkg/SecurityPkg.ci.yaml
+Index: edk2-edk2-stable202311/SecurityPkg/SecurityPkg.ci.yaml
 ===================================================================
---- edk2-edk2-stable202308.orig/SecurityPkg/SecurityPkg.ci.yaml
-+++ edk2-edk2-stable202308/SecurityPkg/SecurityPkg.ci.yaml
+--- edk2-edk2-stable202311.orig/SecurityPkg/SecurityPkg.ci.yaml
++++ edk2-edk2-stable202311/SecurityPkg/SecurityPkg.ci.yaml
 @@ -17,6 +17,7 @@
          "ExceptionList": [
              "8005", "gRT",
@@ -875,10 +875,10 @@
          ],
          ## Both file path and directory path are accepted.
          "IgnoreFiles": [
-Index: edk2-edk2-stable202308/SecurityPkg/Test/SecurityPkgHostTest.dsc
+Index: edk2-edk2-stable202311/SecurityPkg/Test/SecurityPkgHostTest.dsc
 ===================================================================
---- edk2-edk2-stable202308.orig/SecurityPkg/Test/SecurityPkgHostTest.dsc
-+++ edk2-edk2-stable202308/SecurityPkg/Test/SecurityPkgHostTest.dsc
+--- edk2-edk2-stable202311.orig/SecurityPkg/Test/SecurityPkgHostTest.dsc
++++ edk2-edk2-stable202311/SecurityPkg/Test/SecurityPkgHostTest.dsc
 @@ -27,6 +27,7 @@
    SecurityPkg/Library/SecureBootVariableLib/UnitTest/MockUefiLib.inf
    
SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/MockPlatformPKProtectionLib.inf

++++++ ovmf-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4118.patch ++++++
--- /var/tmp/diff_new_pack.I0eace/_old  2024-05-16 17:13:54.817178541 +0200
+++ /var/tmp/diff_new_pack.I0eace/_new  2024-05-16 17:13:54.821178686 +0200
@@ -18,10 +18,10 @@
  .../DxeTpmMeasureBootLibSanitizationTest.c    | 98 +++++++++++++++++--
  4 files changed, 168 insertions(+), 10 deletions(-)
 
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
 @@ -17,6 +17,7 @@
  
  Copyright (c) 2009 - 2018, Intel Corporation. All rights reserved.<BR>
@@ -57,10 +57,10 @@
    ImageLoad           = (EFI_IMAGE_LOAD_EVENT *)TcgEvent->Event;
  
    switch (ImageType) {
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.c
 @@ -239,3 +239,47 @@ SanitizePrimaryHeaderGptEventSize (
  
    return EFI_SUCCESS;
@@ -109,10 +109,10 @@
 +
 +  return EFI_SUCCESS;
 +}
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitization.h
 @@ -111,4 +111,27 @@ SanitizePrimaryHeaderGptEventSize (
    OUT UINT32                            *EventSize
    );
@@ -141,10 +141,10 @@
 +  );
 +
  #endif // DXE_TPM_MEASURE_BOOT_LIB_VALIDATION_
-Index: 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
+Index: 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
 ===================================================================
---- 
edk2-edk2-stable202308.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
-+++ 
edk2-edk2-stable202308/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
+--- 
edk2-edk2-stable202311.orig/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
++++ 
edk2-edk2-stable202311/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c
 @@ -1,8 +1,8 @@
  /** @file
 -This file includes the unit test cases for the 
DxeTpmMeasureBootLibSanitizationTest.c.

++++++ ovmf-SecurityPkg-Updating-SecurityFixes.yaml-after-symbol.patch ++++++
--- /var/tmp/diff_new_pack.I0eace/_old  2024-05-16 17:13:54.833179121 +0200
+++ /var/tmp/diff_new_pack.I0eace/_new  2024-05-16 17:13:54.837179266 +0200
@@ -16,10 +16,10 @@
  SecurityPkg/SecurityFixes.yaml | 28 +++++++++++++++++-----------
  1 file changed, 17 insertions(+), 11 deletions(-)
 
-Index: edk2-edk2-stable202308/SecurityPkg/SecurityFixes.yaml
+Index: edk2-edk2-stable202311/SecurityPkg/SecurityFixes.yaml
 ===================================================================
---- edk2-edk2-stable202308.orig/SecurityPkg/SecurityFixes.yaml
-+++ edk2-edk2-stable202308/SecurityPkg/SecurityFixes.yaml
+--- edk2-edk2-stable202311.orig/SecurityPkg/SecurityFixes.yaml
++++ edk2-edk2-stable202311/SecurityPkg/SecurityFixes.yaml
 @@ -9,28 +9,34 @@ CVE_2022_36763:
      - "SecurityPkg: DxeTpm2Measurement: SECURITY PATCH 4117 - CVE 2022-36763"
      - "SecurityPkg: DxeTpmMeasurement: SECURITY PATCH 4117 - CVE 2022-36763"

Reply via email to