Hello community, here is the log from the commit of package ovmf for openSUSE:Factory:NonFree checked in at 2016-01-12 16:14:07 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory:NonFree/ovmf (Old) and /work/SRC/openSUSE:Factory:NonFree/.ovmf.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "ovmf" Changes: -------- --- /work/SRC/openSUSE:Factory:NonFree/ovmf/ovmf.changes 2015-09-03 18:13:12.000000000 +0200 +++ /work/SRC/openSUSE:Factory:NonFree/.ovmf.new/ovmf.changes 2016-01-12 16:14:13.000000000 +0100 @@ -1,0 +2,403 @@ +Wed Jan 6 08:04:47 UTC 2016 - g...@suse.com + +- update to R19584 + + NetworkPkg: Support DNS4/6 GeneralLookUp feature + + SecurityPkg AuthVariableLib: Correct comment/error log about + CleanCertsFromDb + + NetworkPkg: Fix suspicious dereference of pointer before NULL + check + + NetworkPkg: Update module inf to include the missing uni file + + NetworkPkg: Remove a CopyMem to speed up the HTTP boot download + + NetworkPkg: Remove unused EFI_HTTP_PROTOCOL definition + + MdePkg : Update SPCR to use ACPI5 definition + + MdeModulePkg ScsiDiskDxe: Raise the Tpl of async IO callback + to TPL_NOTIFY + + ScsiDiskDxe: Close event when SCSI command fails + + MdeModulePkg ScsiBusDxe: Only signal caller event when + PassThru() succeeds + + MdeModulePkg DiskIoDxe: Check for MediaPresent in + DiskIo2ReadWriteDisk() + + MdeModulePkg ScsiDiskDxe: Modify WriteBlocks(Ex)() to follow + UEFI spec + + MdeModulePkg ScsiDiskDxe: Modify FlushBlocksEx() to follow UEFI + spec + + MdeModulePkg ScsiDiskDxe: Set block I/O media of SCSI CDROM to + read-only + + PcAtChipsetPkg/Rtc: Fix a UEFI Win7 boot hang issue + + MdeModulePkg:Clear the screen before booting the boot option + + NetworkPkg : Remove unused local variables to fix gcc build + errors + + MdePkg: Add HTTP 1.1 industry standard definitions + + SecurityPkg: SecureBootConfigDxe: Remove useless code in VFR + + NetworkPkg:Fix a bug the 2nd httpboot fail issue + + NetworkPkg: Update iSCSI driver to check existing AIP instances + + UefiCpuPkg/CpuMpPei: Fix pack(1) issue on x64 arch + + MdeModulePkg:Fix bug that get the password width info + incorrectly + + NetworkPkg:Fix the issue Http boot hang when network failed + + DxeTpmMeasureBootLib: Change global variable name to avoid + name conflict + + ArmVirtPkg/ArmVirtXen: add ARM support + + ArmVirtPkg/XenRelocatablePlatformLib: rewrite DTB memory node + retrieval in C + + OvfmPkg/XenHypercallLib: add missing GCC_ASM_EXPORT to + XenHypercall2 + + Shell update + + MdeModulePkg:Fix a bug HttpLib can't parse last chunked data + well + + MdeModulePkg/PciSioSerialDxe:add non-null pointer dereference + assertion + + ArmPkg: rewrite vector table population macros + + BootManagerLib: Check the pointer to avoid use NULL pointer + + MdeModulePkg: Fix RegularExpressionDxe memcpy intrinsic +- Add ovmf-fix-signedness.patch to fix the build error + +------------------------------------------------------------------- +Wed Dec 16 03:01:28 UTC 2015 - g...@suse.com + +- Update R19289 + + MdePkg: Add missing SMBIOS definitions for SATA and SAS Ports + + MdePkg: Add GIC version to ACPI 5.1/6 definitions + + MdePkg: Add Ipmi2.0 definitions head file + + MdeModulePkg: Add NULL pointer check for RegularExpressionDxe + + Convert all .uni files to utf-8 + + BaseTools/Scripts: Add ConvertUni.py script + + Fix >4G issue on IDT not restored correctly + + MdeModulePkg: Improved SetupBrowser handling to failed GOTO + callback + + ArmPlatformPkg/Sec: fix return_from_exception code and comment + + ArmPlatformPkg/ArmPlatformLibNull: use declared PPI rather than + module local var + + ArmVirtPkg RVCT: build DXE_RUNTIME_DRIVER modules with 4 KB + alignment + + BaseTools/GenFw RVCT: fix relocation processing of PT_DYNAMIC + sections + + BaseTools RVCT: use scatter file to enforce minimum section + alignment + + MdePkg/BaseIoLibIntrinsic: Add EBC support + + MdePkg: Add 3 macro defined in latest TPM2 specification + + ShellPkg: Initialize the local pointer to avoid potential + suspicious dereference + + CryptoPkg/OpensslLib: upgrade OpenSSL version to 1.0.2e + + MdeModulePkg ScsiDiskDxe: Add BlockIO2 Support + + MdePkg UefiScsiLib: Add non-blocking support for SCSI + Read/Write command + + NetworkPkg: Fix the potential NULL pointer dereferenced issue + + ShellPkg: Make 'dh' support showing all spec defined protocols + + BaseTools GCC: avoid the use of COMMON symbols + + ArmPkg/PrePeiCore: adhere to architectural stack alignment + requirement + + UefiCpuPkg/MtrrLib: Add PCD PcdCpuNumberOfReservedVariableMtrrs + + ArmPkg/BdsLib: Send RemainingDevicePath to PXE Load File + protocol + + CryptoPkg/BaseCryptLib: make mVirtualAddressChangeEvent STATIC + + CryptoPkg ARM: add ArmSoftFloatLib resolution to CryptoPkg.dsc + + SecurityPkg: AuthVariableLib: Customized SecureBoot Mode + transition + + MdePkg: DebugAssert enhancement + + ArmVirtPkg: HighMemDxe: add memory space for the high memory + nodes + + ArmVirtPkg: ArmVirtPlatformLib: find the lowest memory node +- Update openssl to 1.0.2e +- Update ovmf-embed-default-keys.patch to include one more db key +- Add MicWinProPCA2011_2011-10-19.crt, the Windows Product key + +------------------------------------------------------------------- +Fri Dec 4 06:13:41 UTC 2015 - g...@suse.com + +- Update to R19110 + + ShellPkg: Fix wrong return status for Ifconfig.c + + OvmfPkg: pull in SMM-based variable driver stack + + OvmfPkg: any AP in SMM should not wait for the BSP for more + than 100 ms + + OvmfPkg: use relaxed AP SMM synchronization mode + + OvmfPkg: SmmCpuFeaturesLib: implement SMRAM state save map + access + + OvmfPkg: import SmmCpuFeaturesLib from UefiCpuPkg + + OvmfPkg: set gUefiCpuPkgTokenSpaceGuid.PcdCpuSmmEnableBspElection + to FALSE + + OvmfPkg: LockBox: use SMM stack with -D SMM_REQUIRE + + OvmfPkg: introduce -D SMM_REQUIRE and PcdSmmSmramRequire + + ArmVirtPkg: add secure boot support to 32-bit ARM targets + + MdeModulePkg/BDS: Do not pass unnecessary option to boot option + + NetworkPkg: Fix a bug in HttpBootDriverBindingStop() when + destroying child + + ArmPlatformPkg/PrePiHobListPointerLib: use thread ID register + + ArmPlatformPkg/PrePeiCore: add missing entries to AArch64 + vector table +- Refresh ovmf-gdb-symbols.patch +- Run fdupes on /usr/share/qemu + +------------------------------------------------------------------- +Fri Nov 27 04:16:46 UTC 2015 - g...@suse.com + +- Update to R18975 + + ArmVirtPkg: Use SerialDxe in MdeModulePkg instead of + EmbeddedPkg + + OvmfPkg XenConsoleSerialPortLib: Implement + Get(Set)Control/SetAttributes + + NetworkPkg:Fix NULL pointer dereference issues + + Always set WP in CR0 + + ArmPkg/UncachedMemoryAllocationLib: fix warning about + uninitialized local var + + UefiCpuPkg/CpuS3DataDxe: Add module to initialize ACPI_CPU_DATA + for S3 + + Move CommunicationBuffer from stack to global variable + + Move SmmDebug feature from ASM to C + + Install LoadedImage protocol for PiSmmCore + + Uninstall LoadedImage protocol if SMM driver returns error and + is unloaded + + ArmLib/ArmV7Mmu: use 64-bit type for mapping region size + + ArmVirtPkg/ArmVirtPlatformLib: reduce ID map size to GCD region + size + + ArmVirtPkg/ArmVirtQemu: limit the (I)PA space to 40 bits + + MdeModulePkg/UefiBootManagerLib: Always create MemoryTypeInfo + variable + + ShellBinPkg: Arm/AArch64 Shell binary update + + MdeModulePkg:Create Boot Maintenance Manager Library + + MdeModulePkg:Create Device Manager Library + + MdeModulePkg:Create Boot Manager Library + + ArmPkg: Invalidate cache after allocating UC memory + + MdeModulePkg FileExplorerDxe: Create file explorer Protocol + + ArmPkg: ArmLib: purge incorrect ArmDrainWriteBuffer () alias + + UefiCpuPkg/CpuDxe: Don't use gBS->Stall + + UefiCpuPkg/SmmFeatureLib: Check SmmFeatureControl by + Code_Access_Chk + + UefiCpuPkg: Not touch SmmFeatureControl if Code_Access_Chk not + Set + + ArmPkg/ArmPlatformPkg: position vectors relative to base + + ArmPkg: correct TTBR1_EL1 settings in TCR_EL1 + + ShellPkg: Corrected CatSPrint usage to prevent memory leaks + + ArmPkg/ArmV7Mmu: handle memory regions over 4 GB correctly + + ArmPkg/ArmV7Lib: take MP extensions into account when + programming TTBR + + ArmPkg/ArmV7Lib: fix definition of TTBR_NON_INNER_CACHEABLE + + ArmPkg/ArmV7Mmu: introduce feature PCD to map normal memory + non-shareable + + ArmPkg/ArmV7Mmu: make cached translation table accesses + shareable + + ArmPkg/ArmV7Lib: add function to test for presence of MP + extensions + + ArmPkg/ArmV7Lib: add support for reading the ID_MMFR0 system + register + + ArmPkg/ArmV7Mmu: fix write-through translation table accesses + + ArmPkg/Mmu: set required XN attributes for device mappings + + ArmVirtPkg/ArmVirtPlatformLib: map executable NOR region as + normal memory + + ArmPkg/AArch64Mmu: remove unused GcdAttributeToArmAttribute() + +------------------------------------------------------------------- +Wed Nov 18 09:35:19 UTC 2015 - g...@suse.com + +- Update to R18868 + + ArmPkg: ensure DebugAgentVectorTable is 2K-aligned + + MdeModulePkg: Add Platform recovery support + + MdePkg: Add Platform Recovery definitions + + MdeModulePkg: SmmLockBoxPeiLib: work without + EFI_PEI_SMM_COMMUNICATION_PPI ++++ 206 more lines (skipped) ++++ between /work/SRC/openSUSE:Factory:NonFree/ovmf/ovmf.changes ++++ and /work/SRC/openSUSE:Factory:NonFree/.ovmf.new/ovmf.changes Old: ---- 0001-Revert-BaseTools-AARCH64-use-tiny-code-model-by-defa.patch 0010-avoid-potentially-uninitialized-variable.diff openssl-1.0.2d.tar.gz openssl-1.0.2d.tar.gz.asc ovmf-0.1+svn18393.tar.xz ovmf-gcc5-conf.patch New: ---- MicWinProPCA2011_2011-10-19.crt openssl-1.0.2e.tar.gz openssl-1.0.2e.tar.gz.asc ovmf-0.1+svn19584.tar.xz ovmf-fix-signedness.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ ovmf.spec ++++++ --- /var/tmp/diff_new_pack.T5nYb0/_old 2016-01-12 16:14:14.000000000 +0100 +++ /var/tmp/diff_new_pack.T5nYb0/_new 2016-01-12 16:14:14.000000000 +0100 @@ -24,11 +24,11 @@ Summary: Open Virtual Machine Firmware License: BSD-2-Clause Group: System/Emulators/PC -Version: 0.1+svn18393 +Version: 0.1+svn19584 Release: 0 Source0: %{name}-%{version}.tar.xz -Source1: https://www.openssl.org/source/openssl-1.0.2d.tar.gz -Source111: https://www.openssl.org/source/openssl-1.0.2d.tar.gz.asc +Source1: https://www.openssl.org/source/openssl-1.0.2e.tar.gz +Source111: https://www.openssl.org/source/openssl-1.0.2e.tar.gz.asc Source112: openssl.keyring Source2: README Source3: SLES-UEFI-CA-Certificate-2048.crt @@ -41,14 +41,12 @@ Source10: openSUSE-UEFI-SIGN-Certificate-4096.crt Source11: http://www.uefi.org/sites/default/files/resources/dbxupdate.zip Source12: strip_authinfo.pl +Source13: MicWinProPCA2011_2011-10-19.crt Source100: %{name}-rpmlintrc Source101: gdb_uefi.py.in Patch2: %{name}-embed-default-keys.patch Patch3: %{name}-gdb-symbols.patch -Patch4: 0001-Revert-BaseTools-AARCH64-use-tiny-code-model-by-defa.patch -# PATCH-FIX-OPENSUSE 0010-avoid-potentially-uninitialized-variable.diff bnc#123456 you@foo -- descr -Patch13: 0010-avoid-potentially-uninitialized-variable.diff -Patch14: ovmf-gcc5-conf.patch +Patch4: %{name}-fix-signedness.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build BuildRequires: libuuid-devel BuildRequires: fdupes @@ -147,20 +145,22 @@ %endif %patch3 -p1 %patch4 -p1 -%patch13 -p1 -%patch14 -p1 # Intel has special patches for openssl -pushd CryptoPkg/Library/OpensslLib/openssl-1.0.2d -patch -p0 -i ../EDKII_openssl-1.0.2d.patch +pushd CryptoPkg/Library/OpensslLib/openssl-1.0.2e +patch -p0 -i ../EDKII_openssl-1.0.2e.patch cd .. ./Install.sh popd %build -OVMF_FLAGS="-D FD_SIZE_2MB -D SECURE_BOOT_ENABLE -D NETWORK_IP6_ENABLE" +OVMF_FLAGS="-D FD_SIZE_2MB -D SECURE_BOOT_ENABLE -D NETWORK_IP6_ENABLE -D HTTP_BOOT_ENABLE" +%if 0%{?suse_version} > 1320 +TOOL_CHAIN_TAG=GCC49 +%else echo `gcc -dumpversion` TOOL_CHAIN_TAG=GCC$(gcc -dumpversion|sed 's/\([0-9]\)\.\([0-9]\).*/\1\2/') +%endif %ifarch %ix86 BUILD_OPTIONS="$OVMF_FLAGS -a IA32 -p OvmfPkg/OvmfPkgIa32.dsc -b DEBUG -t $TOOL_CHAIN_TAG" @@ -236,6 +236,9 @@ xxd -i Default_PK > SecurityPkg/Library/AuthVariableLib/Default_PK.h xxd -i Default_KEK > SecurityPkg/Library/AuthVariableLib/Default_KEK.h xxd -i Default_DB > SecurityPkg/Library/AuthVariableLib/Default_DB.h + if [ -e Default_DB_EX ]; then + xxd -i Default_DB_EX > SecurityPkg/Library/AuthVariableLib/Default_DB_EX.h + fi if [ -e Default_DBX ]; then xxd -i Default_DBX > SecurityPkg/Library/AuthVariableLib/Default_DBX.h fi @@ -259,6 +262,7 @@ cat %{SOURCE5} > Default_PK cat %{SOURCE5} > Default_KEK cat %{SOURCE6} > Default_DB +cat %{SOURCE13} > Default_DB_EX chmod 755 %{SOURCE12} %{SOURCE12} dbxupdate.bin Default_DBX build_with_keys ms @@ -314,6 +318,7 @@ tr -d '\r' < OvmfPkg/License.txt > License.txt install -m 0644 -D ovmf-x86_64.bin %{buildroot}/%{_datadir}/qemu/ovmf-x86_64.bin install -m 0644 ovmf-x86_64-*.bin %{buildroot}/%{_datadir}/qemu/ +%fdupes %{buildroot}/%{_datadir}/qemu/ # Install debug symbols, gdb-uefi.py install -d %{buildroot}/%{_datadir}/ovmf-x86_64/ install -m 0644 gdb_uefi-*.py %{buildroot}/%{_datadir}/ovmf-x86_64/ ++++++ openssl-1.0.2d.tar.gz -> openssl-1.0.2e.tar.gz ++++++ ++++ 13069 lines of diff (skipped) ++++++ ovmf-0.1+svn18393.tar.xz -> ovmf-0.1+svn19584.tar.xz ++++++ /work/SRC/openSUSE:Factory:NonFree/ovmf/ovmf-0.1+svn18393.tar.xz /work/SRC/openSUSE:Factory:NonFree/.ovmf.new/ovmf-0.1+svn19584.tar.xz differ: char 27, line 1 ++++++ ovmf-embed-default-keys.patch ++++++ --- /var/tmp/diff_new_pack.T5nYb0/_old 2016-01-12 16:14:17.000000000 +0100 +++ /var/tmp/diff_new_pack.T5nYb0/_new 2016-01-12 16:14:17.000000000 +0100 @@ -1,7 +1,7 @@ -From 395072acee83ee24d4ebb153953405a09fdeaa50 Mon Sep 17 00:00:00 2001 +From c6de8d0e43fb1c0709d938d8951d7bdefb314bcf Mon Sep 17 00:00:00 2001 From: Gary Ching-Pang Lin <g...@suse.com> Date: Fri, 10 May 2013 10:27:51 +0800 -Subject: [PATCH] Add a stub to allow keys to be embedded at build time +Subject: [PATCH 1/2] Add a stub to allow keys to be embedded at build time Signed-off-by: Gary Ching-Pang Lin <g...@suse.com> --- @@ -18,7 +18,7 @@ create mode 100644 SecurityPkg/Library/AuthVariableLib/Default_PK.h diff --git a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c -index 0bb0918..321a889 100644 +index dee5e1d..91f361c 100644 --- a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c +++ b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c @@ -23,6 +23,10 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. @@ -32,8 +32,8 @@ /// /// Global database array for scratch -@@ -136,6 +140,11 @@ AuthVariableLibInitialize ( - UINT8 SecureBootEnable; +@@ -144,6 +148,11 @@ AuthVariableLibInitialize ( + UINTN CtxSize; UINT8 CustomMode; UINT32 ListSize; + EFI_SIGNATURE_LIST *SigCert; @@ -44,7 +44,7 @@ if ((AuthVarLibContextIn == NULL) || (AuthVarLibContextOut == NULL)) { return EFI_INVALID_PARAMETER; -@@ -152,6 +161,177 @@ AuthVariableLibInitialize ( +@@ -160,6 +169,177 @@ AuthVariableLibInitialize ( return EFI_OUT_OF_RESOURCES; } @@ -223,10 +223,10 @@ // Reserve runtime buffer for public key database. The size excludes variable header and name size. // diff --git a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf -index d0c0cc2..552dbb9 100644 +index 07a3ed5..477ddcb 100644 --- a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf +++ b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf -@@ -33,6 +33,10 @@ +@@ -33,6 +33,10 @@ [Sources] AuthVariableLib.c AuthService.c AuthServiceInternal.h @@ -270,5 +270,95 @@ +unsigned char *Default_PK = NULL; +unsigned int Default_PK_len = 0; -- -2.1.4 +2.6.3 + + +From 75090a7df9e83c068807ee413862128d59569a39 Mon Sep 17 00:00:00 2001 +From: Gary Lin <g...@suse.com> +Date: Tue, 15 Dec 2015 16:54:54 +0800 +Subject: [PATCH 2/2] Add DB_EX to include one more DB cert + +Signed-off-by: Gary Lin <g...@suse.com> +--- + .../Library/AuthVariableLib/AuthVariableLib.c | 27 ++++++++++++++++++---- + .../Library/AuthVariableLib/Default_DB_EX.h | 2 ++ + 2 files changed, 25 insertions(+), 4 deletions(-) + create mode 100644 SecurityPkg/Library/AuthVariableLib/Default_DB_EX.h + +diff --git a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c +index 91f361c..490ec7a 100644 +--- a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c ++++ b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c +@@ -26,6 +26,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. + #include "Default_PK.h" + #include "Default_KEK.h" + #include "Default_DB.h" ++#include "Default_DB_EX.h" + #include "Default_DBX.h" + + /// +@@ -280,19 +281,25 @@ AuthVariableLibInitialize ( + &DataSize + ); + if (Status == EFI_NOT_FOUND) { ++ UINTN SigSize_1 = 0; ++ UINTN SigSize_2 = 0; ++ + SignatureGUID = (EFI_GUID *) AllocateZeroPool (sizeof (EFI_GUID)); + if (SignatureGUID == NULL) { + return EFI_OUT_OF_RESOURCES; + } + +- SigSize = sizeof(EFI_SIGNATURE_LIST) + sizeof(EFI_SIGNATURE_DATA) - 1 + Default_DB_len; +- Data = AllocateZeroPool (SigSize); ++ SigSize_1 = sizeof(EFI_SIGNATURE_LIST) + sizeof(EFI_SIGNATURE_DATA) - 1 + Default_DB_len; ++ if (Default_DB_EX != NULL) { ++ SigSize_2 = sizeof(EFI_SIGNATURE_LIST) + sizeof(EFI_SIGNATURE_DATA) - 1 + Default_DB_EX_len; ++ } ++ Data = AllocateZeroPool (SigSize_1 + SigSize_2); + if (Data == NULL) { + return EFI_OUT_OF_RESOURCES; + } + + SigCert = (EFI_SIGNATURE_LIST*) Data; +- SigCert->SignatureListSize = (UINT32) SigSize; ++ SigCert->SignatureListSize = (UINT32) SigSize_1; + SigCert->SignatureHeaderSize = 0; + SigCert->SignatureSize = (UINT32) (sizeof(EFI_SIGNATURE_DATA) - 1 + Default_DB_len); + CopyGuid (&SigCert->SignatureType, &gEfiCertX509Guid); +@@ -301,11 +308,23 @@ AuthVariableLibInitialize ( + CopyGuid (&SigCertData->SignatureOwner, SignatureGUID); + CopyMem ((UINT8* ) (SigCertData->SignatureData), Default_DB, Default_DB_len); + ++ if (Default_DB_EX != NULL) { ++ SigCert = (EFI_SIGNATURE_LIST*) (Data + SigSize_1); ++ SigCert->SignatureListSize = (UINT32) SigSize_2; ++ SigCert->SignatureHeaderSize = 0; ++ SigCert->SignatureSize = (UINT32) (sizeof(EFI_SIGNATURE_DATA) - 1 + Default_DB_EX_len); ++ CopyGuid (&SigCert->SignatureType, &gEfiCertX509Guid); ++ ++ SigCertData = (EFI_SIGNATURE_DATA*) ((UINT8* ) SigCert + sizeof (EFI_SIGNATURE_LIST)); ++ CopyGuid (&SigCertData->SignatureOwner, SignatureGUID); ++ CopyMem ((UINT8* ) (SigCertData->SignatureData), Default_DB_EX, Default_DB_EX_len); ++ } ++ + Status = AuthServiceInternalUpdateVariable ( + EFI_IMAGE_SECURITY_DATABASE, + &gEfiImageSecurityDatabaseGuid, + Data, +- SigSize, ++ SigSize_1 + SigSize_2, + Attr + ); + FreePool(SignatureGUID); +diff --git a/SecurityPkg/Library/AuthVariableLib/Default_DB_EX.h b/SecurityPkg/Library/AuthVariableLib/Default_DB_EX.h +new file mode 100644 +index 0000000..001f125 +--- /dev/null ++++ b/SecurityPkg/Library/AuthVariableLib/Default_DB_EX.h +@@ -0,0 +1,2 @@ ++unsigned char *Default_DB_EX = NULL; ++unsigned int Default_DB_EX_len = 0; +-- +2.6.3 ++++++ ovmf-fix-signedness.patch ++++++ diff --git a/NetworkPkg/DnsDxe/DnsImpl.c b/NetworkPkg/DnsDxe/DnsImpl.c index 8725670..362af86 100644 --- a/NetworkPkg/DnsDxe/DnsImpl.c +++ b/NetworkPkg/DnsDxe/DnsImpl.c @@ -1026,7 +1026,7 @@ AddDns6ServerIp ( @return QName filled successfully. **/ -UINT8 * +CHAR8 * EFIAPI DnsFillinQNameForQueryIp ( IN CHAR16 *HostName diff --git a/NetworkPkg/DnsDxe/DnsImpl.h b/NetworkPkg/DnsDxe/DnsImpl.h index a13355f..847cd15 100644 --- a/NetworkPkg/DnsDxe/DnsImpl.h +++ b/NetworkPkg/DnsDxe/DnsImpl.h @@ -581,7 +581,7 @@ AddDns6ServerIp ( @return QName filled successfully. **/ -UINT8 * +CHAR8 * EFIAPI DnsFillinQNameForQueryIp ( IN CHAR16 *HostName ++++++ ovmf-gdb-symbols.patch ++++++ --- /var/tmp/diff_new_pack.T5nYb0/_old 2016-01-12 16:14:17.000000000 +0100 +++ /var/tmp/diff_new_pack.T5nYb0/_new 2016-01-12 16:14:17.000000000 +0100 @@ -1,3 +1,19 @@ +From 983c7fbc2444cbbbf3b82ae07a56232075a412bb Mon Sep 17 00:00:00 2001 +From: Gary Ching-Pang Lin <g...@suse.com> +Date: Tue, 24 Jun 2014 11:57:32 +0800 +Subject: [PATCH 1/2] Add DebugPkg + +--- + DebugPkg/DebugPkg.dec | 34 +++++ + DebugPkg/GdbSyms/GdbSyms.c | 70 +++++++++ + DebugPkg/GdbSyms/GdbSyms.inf | 57 +++++++ + DebugPkg/Scripts/gdb_uefi.py | 348 +++++++++++++++++++++++++++++++++++++++++++ + 4 files changed, 509 insertions(+) + create mode 100644 DebugPkg/DebugPkg.dec + create mode 100644 DebugPkg/GdbSyms/GdbSyms.c + create mode 100644 DebugPkg/GdbSyms/GdbSyms.inf + create mode 100644 DebugPkg/Scripts/gdb_uefi.py + diff --git a/DebugPkg/DebugPkg.dec b/DebugPkg/DebugPkg.dec new file mode 100644 index 0000000..e12401d @@ -179,10 +195,10 @@ + diff --git a/DebugPkg/Scripts/gdb_uefi.py b/DebugPkg/Scripts/gdb_uefi.py new file mode 100644 -index 0000000..3db87a4 +index 0000000..dac215c --- /dev/null +++ b/DebugPkg/Scripts/gdb_uefi.py -@@ -0,0 +1,350 @@ +@@ -0,0 +1,348 @@ +""" +Allows loading TianoCore symbols into a GDB session attached to EFI +Firmware. @@ -203,7 +219,6 @@ +import array +import getopt +import binascii -+import re + +__license__ = "BSD" +__version = "1.0.0" @@ -429,7 +444,6 @@ + base = base + opt['SizeOfHeaders'] + if sym_name != self.EINVAL: + sym_name = sym_name.cast (self.ptype('CHAR8')).string () -+ sym_name = re.sub(r"\.dll$", ".debug", sym_name) + syms.append ("add-symbol-file %s 0x%x" % \ + (sym_name, + long (base))) @@ -533,12 +547,49 @@ +ReloadUefi () + + +-- +2.6.3 + + +From 1f827a7df8049b1375171a67d399dcba47b7786e Mon Sep 17 00:00:00 2001 +From: Gary Ching-Pang Lin <g...@suse.com> +Date: Tue, 24 Jun 2014 11:59:02 +0800 +Subject: [PATCH 2/2] Compile DebugPkg and load .debug files + +--- + DebugPkg/Scripts/gdb_uefi.py | 2 ++ + OvmfPkg/OvmfPkgX64.dsc | 1 + + 2 files changed, 3 insertions(+) + +diff --git a/DebugPkg/Scripts/gdb_uefi.py b/DebugPkg/Scripts/gdb_uefi.py +index dac215c..3db87a4 100644 +--- a/DebugPkg/Scripts/gdb_uefi.py ++++ b/DebugPkg/Scripts/gdb_uefi.py +@@ -18,6 +18,7 @@ images were converted from MACH-O or ELF binaries. + import array + import getopt + import binascii ++import re + + __license__ = "BSD" + __version = "1.0.0" +@@ -243,6 +244,7 @@ class ReloadUefi (gdb.Command): + base = base + opt['SizeOfHeaders'] + if sym_name != self.EINVAL: + sym_name = sym_name.cast (self.ptype('CHAR8')).string () ++ sym_name = re.sub(r"\.dll$", ".debug", sym_name) + syms.append ("add-symbol-file %s 0x%x" % \ + (sym_name, + long (base))) diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc -index 66459c2..320ffe8 100644 +index 76ef00a..62d0688 100644 --- a/OvmfPkg/OvmfPkgX64.dsc +++ b/OvmfPkg/OvmfPkgX64.dsc -@@ -567,3 +567,4 @@ +@@ -735,3 +735,4 @@ [Components] + NULL|MdeModulePkg/Library/VarCheckUefiLib/VarCheckUefiLib.inf + } !endif - - OvmfPkg/PlatformDxe/Platform.inf + DebugPkg/GdbSyms/GdbSyms.inf +-- +2.6.3 +