Hello community, here is the log from the commit of package ovmf for openSUSE:Factory checked in at 2017-11-23 09:36:59 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/ovmf (Old) and /work/SRC/openSUSE:Factory/.ovmf.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "ovmf" Thu Nov 23 09:36:59 2017 rev:19 rq:543002 version:2017+git1510945757.b2662641d5 Changes: -------- --- /work/SRC/openSUSE:Factory/ovmf/ovmf.changes 2017-10-23 16:39:01.292755474 +0200 +++ /work/SRC/openSUSE:Factory/.ovmf.new/ovmf.changes 2017-11-23 09:37:11.996307734 +0100 @@ -1,0 +2,104 @@ +Mon Nov 20 04:23:04 UTC 2017 - g...@suse.com + +- Update to 2017+git1510945757.b2662641d5 + + ArmPlatformPkg/ArmPlatformLibNull: remove bogus PCD dependencies + + MdeModulePkg/UsbMassStorageDxe: Enhance Request Sense Handling + + OvmfPkg: save on I/O port accesses when the debug port is not + in use + + OvmfPkg: create a separate PlatformDebugLibIoPort instance for + SEC + + OvmfPkg: make PlatformDebugLibIoPort a proper BASE library + + OvmfPkg: restore temporary SEC/PEI RAM size to 64KB + + OvmfPkg/Sec/X64: seed the temporary RAM with PcdInitValueInTempStack + + ArmVirtPkg: switch to new PL011UartLib implementation + + OvmfPkg/XenHypercallLib: enable virt extensions for ARM + + MdeModulePkg/PiSmmCore: Implement heap guard feature for SMM mode + + MdeModulePkg/DxeCore: Implement heap guard feature for UEFI + + ArmVirtPkg/ArmVirtQemu: use non-accelerated CopyMem for + VariableRuntimeDxe + + NetworkPkg: Fix incorrect SizeofHeaders returned from + HttpTcpReceiveHeader() + + NetworkPkg: Print error message to screen if error occurs + during HTTP boot + + MdeModulePkg/PartitionDxe: Fix UDF fs access on certain CD/DVD + medias + + MdeModulePkg/UsbMassStorageDxe: Fix USB Mass Storage detection + + MdeModulePkg SerialDxe: Handle Timeout change more robustly + + CryptoPkg/BaseCryptLib: Fix mismatched memory allocation/free + + CryptoPkg/BaseCryptLib: Fix buffer overflow issue in realloc + wrapper + + ArmPlatformPkg/PlatformPeim: allow PlatformPeiLib to set the + boot mode + + Deprecate EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS + + SecurityPkg: Remove Counter Based AuthVariable support + + BaseTools/tools_def AARCH64 ARM: disable PIE linking + + NetworkPkg/TlsAuthConfigDxe: Remove the extra FreePool + + NetworkPkg/HttpBootDxe: Add IPv6 support condition check + + NetworkPkg/IScsiDxe: Fix the incorrect/needless DHCP process + + MdeModulePkg/PciBus: Fix bug that PCI BUS claims too much resource + + UefiCpuPkg/MtrrLib: Use SetMem instead of SetMem64 to fix hang + + NetworkPkg: Remove ping6 and ifconfig shell application + + OvmfPkg: fix dynamic default for oprom verification policy PCD + without SB + + OvmfPkg/PlatformPei: DENY_EXECUTE_ON_SECURITY_VIOLATION when + SEV is active + + SecurityPkg\Tcg2Pei: FV measure performance enhancement + + SecurityPkg:AuthVariableLib:Implement ECR1707 for Private Auth + Variable + + ArmPlatformPkg: Store initial timer value + + ArmVirtPkg ArmVirtDxeHobLib: Implement BuildFv3Hob + + MdeModulePkg/Variable/RuntimeDxe: delete and lock OS-created + MOR variable + + ArmPkg/PlatformBootManagerLib: fix bug in ESRT invocation + + OvmfPkg/PciHotPlugInitDxe: translate QEMU's resource + reservation hints + + OvmfPkg/PciHotPlugInitDxe: generalize RESOURCE_PADDING + composition + + OvmfPkg/IndustryStandard: define PCI Capabilities for QEMU's + PCI Bridges + + MdeModulePkg/BdsDxe: Don't delete "BootNext" until booting it + + Clarify the usage of HttpConfigData in HTTP protocol + + SecurityPkg/SecureBootConfigImpl.c: Secure Boot DBX UI + Enhancement + + MdeModulePkg/UDF: Fix creation of UDF logical partition + + CryptoPkg: Add new API to retrieve commonName of X.509 certificate + + OvmfPkg/VirtioNetDxe: log debug message in VirtioNetExitBoot() + + OvmfPkg/QemuBootOrderLib: recognize "usb-storage" devices in + XHCI ports + + MdeModulePkg/Core: Fix out-of-sync issue in GCD + + UefiCpuPkg/CpuDxe: Fix out-of-sync issue in page attributes + + OvmfPkg/QemuVideoDxe/VbeShim: handle PAM1 register on Q35 + correctly + + OvmfPkg/QemuVideoDxe/VbeShim: rename Status to + Segment0AllocationStatus + + OvmfPkg/CsmSupportLib: move PAM register addresses to + IndustryStandard + + NetworkPkg/IScsiDxe: Remove redundant call to StrLen + + BaseTools/tools_def AARCH64: enable frame pointers for RELEASE + builds + + ArmPkg/PlatformBootManagerLib: process pending capsules + + MdeModulePkg/Udf: Avoid declaring and initializing local GUID + variable + + MdeModulePkg/UdfDxe: Avoid short (single character) variable name + + MdeModulePkg/UdfDxe: Use compare operator for non-boolean + comparisons + + MdeModulePkg/UdfDxe: Fix operands of different size in bitwise + OP + + MdeModulePkg/UdfDxe: Add checks to ensure no possible NULL ptr + deref + + MdeModulePkg/SerialDxe: Fix not able to change serial attributes + + NetworkPkg: Remove the redundant '/' in the end of returned + ISCSIMacAddr keyword + + MdeModulePkg/UdfDxe: Fix NULL pointer dereference + + OvmfPkg/VirtioNetDxe: negotiate VIRTIO_F_IOMMU_PLATFORM + + OvmfPkg/VirtioNetDxe: map caller-supplied Tx packet to + device-address + + OvmfPkg/VirtioNetDxe: add Tx packet map/unmap helper functions + + OvmfPkg/VirtioNetDxe: update TechNotes + + OvmfPkg/VirtioNetDxe: dynamically alloc transmit header + + OvmfPkg/VirtioNetDxe: alloc RxBuf using AllocateSharedPages() + + OvmfPkg/VirtioNetDxe: map VRINGs using VirtioRingMap() + + OvmfPkg/VirtioNetDxe: add helper VirtioNetUninitRing() +- Update openssl to 1.1.0g + +------------------------------------------------------------------- Old: ---- openssl-1.1.0e.tar.gz openssl-1.1.0e.tar.gz.asc ovmf-2017+git1505340320.5afa5b8159.tar.xz New: ---- openssl-1.1.0g.tar.gz openssl-1.1.0g.tar.gz.asc ovmf-2017+git1510945757.b2662641d5.tar.xz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ ovmf.spec ++++++ --- /var/tmp/diff_new_pack.nGWtFn/_old 2017-11-23 09:37:13.300260158 +0100 +++ /var/tmp/diff_new_pack.nGWtFn/_new 2017-11-23 09:37:13.300260158 +0100 @@ -18,14 +18,14 @@ %undefine _build_create_debug -%global openssl_version 1.1.0e +%global openssl_version 1.1.0g Name: ovmf Url: http://sourceforge.net/apps/mediawiki/tianocore/index.php?title=EDK2 Summary: Open Virtual Machine Firmware License: BSD-2-Clause Group: System/Emulators/PC -Version: 2017+git1505340320.5afa5b8159 +Version: 2017+git1510945757.b2662641d5 Release: 0 Source0: %{name}-%{version}.tar.xz Source1: https://www.openssl.org/source/openssl-%{openssl_version}.tar.gz ++++++ ovmf-2017+git1505340320.5afa5b8159.tar.xz -> ovmf-2017+git1510945757.b2662641d5.tar.xz ++++++ /work/SRC/openSUSE:Factory/ovmf/ovmf-2017+git1505340320.5afa5b8159.tar.xz /work/SRC/openSUSE:Factory/.ovmf.new/ovmf-2017+git1510945757.b2662641d5.tar.xz differ: char 26, line 1 ++++++ ovmf-embed-default-keys.patch ++++++ --- /var/tmp/diff_new_pack.nGWtFn/_old 2017-11-23 09:37:13.484253445 +0100 +++ /var/tmp/diff_new_pack.nGWtFn/_new 2017-11-23 09:37:13.488253299 +0100 @@ -1,4 +1,4 @@ -From b967e8dc2bea98736d8544d9ee2565f71ac06d08 Mon Sep 17 00:00:00 2001 +From 933284f94b8bffb7d3d81152e0b5f49c46a9f787 Mon Sep 17 00:00:00 2001 From: Gary Ching-Pang Lin <g...@suse.com> Date: Fri, 10 May 2013 10:27:51 +0800 Subject: [PATCH 1/3] Add a stub to allow keys to be embedded at build time @@ -18,7 +18,7 @@ create mode 100644 SecurityPkg/Library/AuthVariableLib/Default_PK.h diff --git a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c -index 792a1232ae..f5f954e534 100644 +index 00917eb374..a7a46fc648 100644 --- a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c +++ b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c @@ -23,6 +23,10 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. @@ -32,7 +32,7 @@ /// /// Global database array for scratch -@@ -147,6 +151,11 @@ AuthVariableLibInitialize ( +@@ -131,6 +135,11 @@ AuthVariableLibInitialize ( UINT8 SecureBootEnable; UINT8 CustomMode; UINT32 ListSize; @@ -44,7 +44,7 @@ if ((AuthVarLibContextIn == NULL) || (AuthVarLibContextOut == NULL)) { return EFI_INVALID_PARAMETER; -@@ -163,6 +172,177 @@ AuthVariableLibInitialize ( +@@ -147,6 +156,177 @@ AuthVariableLibInitialize ( return EFI_OUT_OF_RESOURCES; } @@ -220,8 +220,8 @@ + +SKIP_KEYS: // - // Reserve runtime buffer for public key database. The size excludes variable header and name size. - // + // Reserve runtime buffer for certificate database. The size excludes variable header and name size. + // Use EFI_CERT_DB_VOLATILE_NAME size since it is longer. diff --git a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf index 572ba4e120..1a46019a5f 100644 --- a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf @@ -270,10 +270,10 @@ +unsigned char *Default_PK = NULL; +unsigned int Default_PK_len = 0; -- -2.14.1 +2.15.0 -From 5e76fc193363471e9720005bdb8e4c62fb15de6b Mon Sep 17 00:00:00 2001 +From 72d09098734d00696e0db13d9b84bb01a0c89c76 Mon Sep 17 00:00:00 2001 From: Gary Lin <g...@suse.com> Date: Tue, 15 Dec 2015 16:54:54 +0800 Subject: [PATCH 2/3] Add DB_EX to include one more DB cert @@ -286,7 +286,7 @@ create mode 100644 SecurityPkg/Library/AuthVariableLib/Default_DB_EX.h diff --git a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c -index f5f954e534..803b77d178 100644 +index a7a46fc648..114f3d84c6 100644 --- a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c +++ b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c @@ -26,6 +26,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. @@ -297,7 +297,7 @@ #include "Default_DBX.h" /// -@@ -283,19 +284,25 @@ AuthVariableLibInitialize ( +@@ -267,19 +268,25 @@ AuthVariableLibInitialize ( &DataSize ); if (Status == EFI_NOT_FOUND) { @@ -326,7 +326,7 @@ SigCert->SignatureHeaderSize = 0; SigCert->SignatureSize = (UINT32) (sizeof(EFI_SIGNATURE_DATA) - 1 + Default_DB_len); CopyGuid (&SigCert->SignatureType, &gEfiCertX509Guid); -@@ -304,11 +311,23 @@ AuthVariableLibInitialize ( +@@ -288,11 +295,23 @@ AuthVariableLibInitialize ( CopyGuid (&SigCertData->SignatureOwner, SignatureGUID); CopyMem ((UINT8* ) (SigCertData->SignatureData), Default_DB, Default_DB_len); @@ -360,10 +360,10 @@ +unsigned char *Default_DB_EX = NULL; +unsigned int Default_DB_EX_len = 0; -- -2.14.1 +2.15.0 -From 72543f45511d32c784be63145ff6e9d8697d22c5 Mon Sep 17 00:00:00 2001 +From 5db901016015df0955085003387f52655ed9b964 Mon Sep 17 00:00:00 2001 From: Gary Lin <g...@suse.com> Date: Mon, 28 Aug 2017 16:18:00 +0800 Subject: [PATCH 3/3] Check the length of the certificate instead of the @@ -378,10 +378,10 @@ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c -index 803b77d178..9a4a7eda7b 100644 +index 114f3d84c6..641823216a 100644 --- a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c +++ b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c -@@ -180,7 +180,7 @@ AuthVariableLibInitialize ( +@@ -164,7 +164,7 @@ AuthVariableLibInitialize ( EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS; // PK @@ -390,7 +390,7 @@ goto SKIP_KEYS; Status = AuthServiceInternalFindVariable ( -@@ -227,7 +227,7 @@ AuthVariableLibInitialize ( +@@ -211,7 +211,7 @@ AuthVariableLibInitialize ( } // KEK @@ -399,7 +399,7 @@ goto SKIP_KEYS; Status = AuthServiceInternalFindVariable ( -@@ -274,7 +274,7 @@ AuthVariableLibInitialize ( +@@ -258,7 +258,7 @@ AuthVariableLibInitialize ( } // DB @@ -408,7 +408,7 @@ goto SKIP_KEYS; Status = AuthServiceInternalFindVariable ( -@@ -293,7 +293,7 @@ AuthVariableLibInitialize ( +@@ -277,7 +277,7 @@ AuthVariableLibInitialize ( } SigSize_1 = sizeof(EFI_SIGNATURE_LIST) + sizeof(EFI_SIGNATURE_DATA) - 1 + Default_DB_len; @@ -417,7 +417,7 @@ SigSize_2 = sizeof(EFI_SIGNATURE_LIST) + sizeof(EFI_SIGNATURE_DATA) - 1 + Default_DB_EX_len; } Data = AllocateZeroPool (SigSize_1 + SigSize_2); -@@ -311,7 +311,7 @@ AuthVariableLibInitialize ( +@@ -295,7 +295,7 @@ AuthVariableLibInitialize ( CopyGuid (&SigCertData->SignatureOwner, SignatureGUID); CopyMem ((UINT8* ) (SigCertData->SignatureData), Default_DB, Default_DB_len); @@ -426,7 +426,7 @@ SigCert = (EFI_SIGNATURE_LIST*) (Data + SigSize_1); SigCert->SignatureListSize = (UINT32) SigSize_2; SigCert->SignatureHeaderSize = 0; -@@ -339,7 +339,7 @@ AuthVariableLibInitialize ( +@@ -323,7 +323,7 @@ AuthVariableLibInitialize ( } // DBX @@ -436,5 +436,5 @@ Status = AuthServiceInternalFindVariable ( -- -2.14.1 +2.15.0