Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package ovmf for openSUSE:Factory checked in 
at 2025-06-11 16:20:13
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/ovmf (Old)
 and      /work/SRC/openSUSE:Factory/.ovmf.new.19631 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "ovmf"

Wed Jun 11 16:20:13 2025 rev:117 rq:1284309 version:202505

Changes:
--------
--- /work/SRC/openSUSE:Factory/ovmf/ovmf.changes        2025-05-20 
09:31:03.695631596 +0200
+++ /work/SRC/openSUSE:Factory/.ovmf.new.19631/ovmf.changes     2025-06-11 
16:20:53.222358598 +0200
@@ -1,0 +2,367 @@
+Wed May 28 09:46:23 UTC 2025 - YI HSIN Lyu <richard....@suse.com>
+
+- Update to edk2-stable202505
+    - New Features & Bug Fixes (https://github.com/tianocore/edk2/releases):
+        - NetworkPkg/IScsiDxe:Fix for out of bound memory access for bz4207 
(CVE-2024-38805)
+        - Multiple packages: stop using EmbeddedPkg libfdt
+        - Adding support for TPM over FF-A on ARM platforms
+        - SecurityPkg: Prevent invalid DBX from being set
+        - SecurityPkg: Out of bound read in HashPeImageByType()
+        - Adding support for MM Communicate v3
+        - BaseTools: Disable VS2019/2022 ARM/AARCH64 Stack Cookies
+        - Introduce Redfish Platform Wanted Device Lib
+        - HobLib: Add two new APIs in HobLib
+    - Patches (git log --oneline --date-order 
edk2-stable202502..edk2-stable202505):
+        6951dfe7d5 OvmfPkg/VirtCommunicationDxe: add IoLib to 
VirtMmCommunication.inf
+        2e5b357a1f SecurityPkg/Tpm2InstanceLibFfa: Fix constructor wrong name
+        5ea30a061c MdeModulePkg/HiiDatabaseDxe: Fix BlockSize length
+        b3a2f7ff24 NetworkPkg/IScsiDxe:Fix for out of bound memory access for 
bz4207 (CVE-2024-38805)
+        607c58ef01 .github: Compare collaborator GitHub ID's in single case
+        399a40e5cb ArmVirtPkg: Fix dsc include ordering
+        b2db39cefe MdeModulePkg: Correct Usb Mouse Z for absolute pointer.
+        fc215474c4 UefiCpuPkg: Enable the IPI vectors on LoongArch
+        7cea938ac5 UefiCpuPkg: Fix a bug about MP init on LoongArch
+        43e29830ef BaseTools: Fix Macro Expansion on Machine Architecture for 
Components
+        5bc52de687 MdeModulePkg: DebugImageInfoTable: Fix Array Maintenance
+        867fad874a MdeModulePkg: Fix Image Memory Protection Applying
+        28653a1c8a UefiCpuPkg/PiSmmCpuDxeSmm: Fix SMRAM memory leak during S3 
resume
+        d6101acb08 MdeModulePkg: Shortcircuit GCD Dumping Logic if Not Printing
+        2cff8743ce MdeModulePkg/Spi: Solving potential null ptr deref. in 
SpiNorFlashJedecSfdp
+        02ec228654 BaseTools: Change arm align value from 32 to 64
+        77b199b7b9 BaseTools: Update tools_def for aarch64
+        dca5d26bc5 UefiCpuPkg/MpInitLib: Fix SNP AP creation when using known 
APIC IDs
+        dd8c272555 MdeModulePkg/AcpiTableDxe: Add function for extract ACPI 
table from HOB.
+        225bf1277c RedfishPkg/RedfishExDxe: call platform device wanted lib
+        b2c4294c49 RedfishPkg: introduce platform wanted device lib
+        31fc56c70a ArmFfaLib: Replace SMCCC_VERSION check with FF-A version 
check
+        9948a30645 MdePkg/IndustryStandard: fix PASID supported bit
+        8aad683e59 ArmVirtPkg,DynamicTablesPkg,EmbeddedPkg,OvmfPkg: use MdePkg 
BaseFdtLib
+        37652b830e ArmVirtPkg/ArmVirtCloudHv: add missing PrePiLib 
dependency/resolution
+        a862c07a3a MdePkg/BaseFdtLib: add FdtGetPropertyW wrapper
+        cc52f88e61 MdePkg/BaseFdtLib: add FdtSubnodeOffset prototype
+        e25331fc45 MdePkg,UefiPayloadPkg: clean up BaseFdtLib API confusion
+        e1dee2bcfa MdeModulePkg SpiBus: Use correct GUID
+        defdccd4ae ShellPkg: Add PCIe extended capability
+        aa32d2cfc2 MdePkg: Add additional PCIe extended capabilities
+        98351bb0d9 NetworkPkg: Add PCD for HTTP transfer buffer size
+        d985bd4b97 BaseTools: Scripts: efi_debugging.py: search for 
EFI_SYSTEM_TABLE_POINTER
+        55b4688157 BaseTools/Conf: Enable GCC preprocessor line-markers for VFR
+        bf99048365 BaseTools: Add support for GCC preprocessor line directives
+        091bd7958b ReadMe.rst: Update pipeline badges for new pipelines
+        7664c0b4a6 DynamicTablesPkg: Fix incorrect WSMT table size
+        5ccb5fff02 MdeModulePkg: DxeCore: Set Image Protections Through GCD
+        6c6d6f42db MdeModulePkg: DxeCore: Lower Image Protection Print to 
Verbose Log Level
+        856bdc8eec OvmfPkg/CcExitLib: Use the proper register when filtering 
MSRs
+        956ef6cd8b ArmPkg/ArmScmiDxe: Use array indexing to access adjacent 
buffers
+        c6db76402c MdeModulePkg BmDriverHealth.c: Support dump the driver name
+        135e07c6e5 DeviceManagerUiLib:Update DeviceManager form data when the 
form opens.
+        864cc900ab DisplayEngineDxe: Fix length when displaying menu string
+        7711e8a167 DynamicTablesPkg: Add Dbg2Generator Hostbased test
+        d8d47a0ae6 DynamicTablesPkg: Add support for non-serial DBG2 devices
+        42c6deb6f8 DynamicTablesPkg/AcpiDbg2Lib.inf: Add support for X64 Build
+        8910f722c9 OvmfPkg/VirtMmCommunicationDxe: stop on init failure
+        4846ac933f ArmVirtPkg: set PcdQemuVarsRequire
+        9af96e21d8 OvmfPkg: add PcdQemuVarsRequire
+        cd6f84b70c ArmVirtPkg/ArmVirtQemu: add QEMU_PV_VARS option
+        44989944a0 OvmfPkg/OvmfPkgX64: add QEMU_PV_VARS option
+        9dd47eeea1 OvmfPkg: add new VirtMmCommunicationDxe driver
+        d198c80157 OvmfPkg: add IndustryStandard/QemuUefiVars.h
+        d85ee54d53 OvmfPkg/HardwareInfoLib: add support for qemu vars device
+        26fb5edff3 MdeModulePkg/ArmFfaLib: Add depex on 
gEfiPeiMemoryDiscoveredPpiGuid
+        002d69ad9e OvmfPkg: Update ubuntu VM image to 24.04
+        06746e4b06 EmulatorPkg: Update ubuntu VM image to 24.04
+        e944c98e1b ArmVirtPkg: Update ubuntu VM image to 24.04
+        1ac795ea6c .azurepipelines: Update ubuntu VM image to 24.04
+        b833c2f3a6 .pytool: Update pipeline filename instructions
+        ab3a451b1b OvmfPkg: Update pipeline filenames
+        b9f565f8c9 EmulatorPkg: Update pipeline filenames
+        1566205a40 ArmVirtPkg: Rename Linux pipeline file
+        a0d785a560 .azurepipelines: Update pipeline filenames
+        d3b2ee2df3 ShellPkg: Updated Memory Form Factor definition per SMBIOS 
3.8.0
+        1c4c85a003 MdePkg/Library: Remove unused gEfiDevicePathProtocolGuid
+        be4ae9a97d MdePkg/Include/Ppi: Add back gEdkiiPeiMpServices2PpiGuid
+        3c79bd38e0 UefiCpuPkg: Add back gEdkiiPeiMpServices2PpiGuid
+        63e4713c48 OvmfPkg: switch 4M builds to full openssl
+        30c754d853 OvmfPkg: move openssl/tls library config to .dsc.inc file
+        f96d38f432 ArmPkg/ArmScmiDxe: Fix SCMI param overwrite in 
multi-transaction scenario
+        8406e672e8 MdePkg: Updated Memory Form Factor definition per SMBIOS 
3.8.0
+        99a5f388df UefiPayloadPkg: Fix a typo in SMM base
+        238dfc54d0 UefiPayloadPkg: Add MemoryTypeInformation HOB
+        19c6189f54 UefiPayloadPkg: Fix SMM build failure
+        003873db21 MdeModulePkg: PiSmmIpl: Fix physical address dereferencing
+        2e85d12685 CryptoPkg: Resolve CodeQL Errors
+        62390a89c5 MdePkg: Fix typos in PerformanceLib.h
+        5e5ca20bf7 Maintainers.txt: Add Kun Qin as reviewer for ARM-FFA 
folders in SecurityPkg
+        548c29129c SecurityPkg: Tpm2InstanceLibFfa: Introduce Tpm2InstanceLib 
over FF-A
+        86d5680817 SecurityPkg: Tpm2DeviceLibFfa: Introduce TPM device library 
over FF-A
+        df77417d39 SecurityPkg: Tpm2ServiceFfa: Introduce TPM over FF-A 
Definitions
+        7d297e370e SecurityPkg: Tcg2AcpiFfa: Add Tcg2Acpi for FFA enabled ARM 
platforms
+        219c3bac05 SecurityPkg: SmmTcg2PhysicalPresenceLib: Add ARM platforms 
implementation
+        ec5d8ad35f SecurityPkg: Tcg2StandaloneMmArm: Add Tcg2StandaloneMm for 
ARM platforms
+        f89ae9ca2a SecurityPkg: PhysicalPresenceData: Add a GUID used for ACPI 
functions
+        29960f389f MdePkg: Add conditional backwards compatibility to 
MpServices2 aliases
+        e5dae263fe UefiCpuPkg/S3Resume2Pei: Rename EDKII_PEI_MP_SERVICES2_PPI
+        7aa2b3106c UefiCpuPkg/Test: Rename EDKII_PEI_MP_SERVICES2_PPI
+        1d6b8aafa7 UefiCpuPkg/Library: Rename EDKII_PEI_MP_SERVICES2_PPI
+        b66d325cc0 UefiCpuPkg/Include: Rename EDKII_PEI_MP_SERVICES2_PPI
+        7de3a1014f UefiCpuPkg/CpuMpPei:  Rename EDKII_PEI_MP_SERVICES2_PPI
+        997e4e393f OvmfPkg: Rename EDKII_PEI_MP_SERVICES2_PPI
+        aef50446ce UefiCpuPkg: Remove EDKII_PEI_MP_SERVICES2_PPI
+        27b063a1ff MdePkg: Add EFI_PEI_MP_SERVICES2_PPI
+        89b595d115 OvmfPkg/QemuKernelLoaderFsDxe: fix allocation failure check
+        be720b8d6c EmbeddedPkg: Add two new APIs in PrePiHobLib
+        9ae1c8d425 ArmVirtPkg: Add two new APIs in ArmVirtDxeHobLib
+        6b48cdc917 StandaloneMmPkg: Add two new APIs in HobLib
+        cdd31b6460 UefiPayloadPkg: Add two new APIs in HobLib
+        a9cf419ed9 MdeModulePkg: Add two new APIs in BaseHobLibNull
+        161fa22bef MdePkg: Add two new APIs in HobLib
+        3872c38049 MdePkg/Include: Add two new APIs in HobLib.h
+        cd76265f1a OvmfPkg: Enable Smbios measurement
+        8d3c7c196d DynamicTablesPkg: AcpiSpcrLib: Support as-is baud rate 
setting
+        28b952a56b MdePkg: Add as-is baud rate setting to SPCR
+        edaae7bc75 ShellPkg: AcpiView: Add parser support for SPCR Revision 4
+        605582551a DynamicTablesPkg: AcpiSpcrLib: Add support for SPCR 
revision 4
+        1f6c875d37 SecurityPkg/OpalPasswordDxe: Improve the function to get 
device name
+        c2d8e92367 SecurityPkg-Tpm2DeviceLibDTpm: Check SNP enabled prior to 
using AmdSvsmLib
+        eefd4fdb78 SecurityPkg: Update SecureBootVariableLibUnitTest
+        bfb1a45eec SecurityPkg: SecureBootVariableLib: Prevent Invalid DBX
+        5f5cf1c1ab Remove unnecessary RsaFree call in failing path
+        fce142fd31 SecurityPkg/AuthVariableLib: Fix memory leak in 
CheckSignatureListFormat
+        2e81eb8f05 MdeModulePkg/PlatformDriOverrideDxe:Fix typos
+        1968afafb0 MdeModulePkg/DriverHealthManagerDxe:Fix typo
+        948d4ba0be MdeModulePkg/UsbMassStorageDxe: Remove excessive logging
+        b917a5b7b3 MdeModulePkg/UsbMassStorageDxe: Remove Port Reset
+        0f1c0d2d2d BaseTools:Expression.py Adding a check for missing '}' in 
the parser
+        1805068b5e BaseTools:Expression.py Add Assertion for PCD with value {}
+        a1b623b938 BaseTools:Expression.py Size used before Init
+        fdede2e1ea MdeModulePkg: Update MM buffer structs alignment
+        c5e3a840b9 UefiCpuPkg: Add StmmCore for 
IntelMmSaveStateLib,SmmCpuPlatformHookLibNull.
+        51229eee58 ArmPkg,ArmVirtPkg,UefiPayloadPkg: make PcdVFPEnabled 
ARM-only
+        6d886c3054 ArmPkg/CpuDxe: drop unused PcdVFPEnabled declaration
+        6952d1fa90 ArmPlatformPkg/Sec: clean up FP enabling code
+        0368687299 ArmVirtPkg: clean up FP enabling code
+        7fe2436480 ArmPkg/ArmLib: don't check for FP support on AArch64
+        6ddfd378e5 MdeModulePkg/BootManagerUiLib: hide UiApp from boot entries
+        7c6ef8eac2 BaseTools: Fix FMMT Compress wrong behavior
+        18988ea3e6 MdeModulePkg: ArmFfaLib: Move Rx/Tx hob definition to 
Include/Guid folder
+        be03ceb117 ArmPkg: ArmFfaLib: Move ArmFfaLib implementation to 
MdeModulePkg
+        937ffef8ed ArmPkg: ArmFfaLib.h: Move to MdePkg
+        541c46a705 ArmPkg: ArmSvcLib: Move ArmSvcLib to MdePkg
+        211bb9b839 ArmPkg: ArmSmcLibNull: Move ArmSmcLibNull to MdePkg
+        86099b948b ArmPkg: ArmSmcLib: Move ArmSmcLib to MdePkg
+        014689399f ArmPkg: FF-A headers: Move to MdePkg
+        9bcb2e41f7 ArmPkg: ArmStdSmc.h: Move to MdePkg
+        ec91ff2451 MdeModulePkg/DisplayEngineDxe:Fix typos in comments.
+        d8531a1e1a UefiPayloadPkg: Add support for Firmware Volume Block 
Protocol
+        034de59fb7 UefiPayloadPkg: Add SmmStoreLib
+        c67d975cfc UefiPayloadPkg: Add SmmStoreInfoGuid
+        d23edb21a3 UefiPayloadPkg/Include/Coreboot: Add definitions for 
SMMSTOREv2 table
+        70df56728f Increase FVMAIN Size for Compatibility with 2MB Size Limit
+        4e4edd0f07 StandaloneMmPkg/Core: Performance logging for MM driver 
load and start
+        7aa96096a3 UefiPayloadPkg: Drop SmbiosVersionLib for SmbiosDxe on 
AArch64
+        d79d8d6a8d SecurityPkg: Update SecurityFixes.yaml for CVE-2024-38797
+        025ab811fb SecurityPkg: Improving 
SecureBootConfigImpl:HashPeImageByType () logic
+        b90693965b SecurityPkg: Improving HashPeImageByType () logic
+        5f08635ee7 SecurityPkg: Out of bound read in HashPeImageByType()
+        e4140a5701 ShellPkg: Added ArmV9 processors support for SmbiosView 
command
+        d0b64b21a3 BaseTools: Dump library dependency chain on build failure
+        c9ff197059 UefiPayloadPkg: UefiPayloadEntry: Don't use reserved DRAM
+        1d5063763b GitHub Action: Bump actions/create-github-app-token from 1 
to 2
+        f3e02ae545 StandaloneMmPkg: MmCommunicationDxe: Add 
EFI_MM_COMMUNICATION3_PROTOCOL
+        bed033dbf7 StandaloneMmPkg: StandaloneMmIplPei: Add 
EFI_PEI_MM_COMMUNICATION3_PPI
+        05f47b8486 MdeModulePkg: PiSmmIpl: Update MessageLength calculation 
for MmCommunicate
+        249ca10af0 StandaloneMmPkg: StandaloneMmCore: Parsing new MM 
communicate header
+        9dec81092b MdeModulePkg: PiSmmCore: Added parser of new MM communicate 
header
+        3da340ccdd MdePkg: MmCommunication: Introduce 
EFI_PEI_MM_COMMUNICATION3_PPI to MdePkg
+        11cc0d639e MdePkg: MmCommunication: Introduce 
EFI_MM_COMMUNICATION3_PROTOCOL to MdePkg
+        7d1b9d3c3c MdePkg: MmCommunication: Introduce 
EFI_MM_COMMUNICATE_HEADER_V3 to MdePkg
+        59805c7697 ShellPkg/SmbiosView: Decode for InterfaceTypeSpecificData 
of SMBIOS type42
+        7e8cd32353 MdePkg/IndustryStandard: Define enums of MCTPHostInterface 
from DSP0239
+        cf5a955774 MdePkg/IndustryStandard: Fix typos in IoRemappingTable.h
+        e0b2187754 MdeModulePkg/CustomizedDisplayLib:Fix wrong 
ColumnIndexWidth special case.
+        8baa1c5120 ArmPkg: ArmStandaloneMmCoreEntryPoint: Support 18 register 
DIRECT_REQ2
+        8d03c42d38 ArmPkg: ArmFfaLib: Update FF-A direct message to support 18 
registers
+        47b793f38c ArmPkg: ArmSvcLib: Support all 18 registers
+        c0ecd11e62 ArmPkg: ArmSmcLib: Support all 18 registers
+        213973e9e5 EmulatorPkg: Add stub to read redfish host interface serial 
number
+        4a055eb486 RedfishPkg: Populate serial number in SMBIOS type 42 record
+        76c282b075 Maintainers.txt: Add new maintainer to BaseTools section
+        069dfae3e5 MdePkg: Fix typo in I2cMaster.h, SetBusFrequench -> 
SetBusFrequency
+        30f3fa0af7 StandaloneMmCorePerformanceLib.inf: Add 
gEfiEventExitBootServicesGuid
+        09faa4a1ce BaseTools/build: Reduce special FV full to warning
+        a088d9ceb0 ArmPlatformPkg/PeilessSec: drop _SetSVCMode sequence for Arm
+        ad6639cf3e ArmPlatformPkg/PeilessSec: drop _SetSVCMode symbol from 
AArch64
+        5d3314d0bf MdeModulePkg/Core: Add Hot Pluggable type to Attribute 
Conversion Table
+        3907f8a0ba RedfishPkg/RedfishHttpDxe : Fix the incorrect length of the 
Basic Auth
+        9006a9b5e4 PrmPkg: Correct the flags for X64 GCC compiler
+        14b730cde8 MdeModulePkg/Universal: Remove dynamic 
PcdStatusCodeUseSerial usage in MM
+        5c6fea49ee StandaloneMmPkg: Produce gMmStatusCodeUseSerialHobGuid HOB
+        b7ef717177 StandaloneMmPkg: Add gMmStatusCodeUseSerialHobGuid HOB 
definition
+        a7ab45ace2 BaseTools/FMMT: Fix GUID Tool Not Found the Shell Script 
Issue
+        95bf74fac1 MdeModulePkg/DxeCorePerformanceLib: Fix incorrect size 
calculation
+        e01f4180b3 BaseTools: Fix missing module PCD in compile information of 
build report
+        b279ac9f36 BaseTools/GenFv: Ensure the minimum pad file size for the 
FV with VTF
+        1c51a268b7 MdeModulePkg: Add Standalone MM perf library support
+        11b44c5cd1 MdeModulePkg: Add Standalone MM Core performance support
+        874c24baae MdeModulePkg/DxeCorePerformanceLib: Use 
EFI_MM_COMMUNICATE_HEADER
+        cd387d2c77 UefiCpuPkg MpInformation2.h: Include PiMultiPhase.h
+        2a3926dadc MdePkg: IndustryStandard: Rename ACPI SPCR revision 4 
structure
+        589be8d301 Maintainers.txt: Update StandaloneMmPkg reviewer
+        2eac71a1ee OvmfPkg/IntelTdx: Cache and measure FwCfg
+        81c2c92074 OvmfPkg/PlatformPei: Cache and measure FwCfg items
+        4d2af7b91a OvmfPkg: Refactor QEMU_FW_CFG_CACHE_WORK_AREA
+        fb56dc78ef OvmfPkg/QemuFwCfgLib: Support Cache FwCfg with optional 
measurement
+        be529ef3c9 OvmfPkg/QemuFwCfgLib: Add FwCfg cache interface
+        63408b2895 OvmfPkg/PeilessStartupLib: Build PlatformInfoHob before 
InitializePlatform
+        f66078a713 OvmfPkg/PlatformInitLib.h: Add QEMU_FW_CFG_CACHE_WORK_AREA
+        151326e542 OvmfPkg.dec: Add gOvmfFwCfgInfoHobGuid
+        ebba67b754 SecurityPkg: Add TpmMeasurementLib for SEC phase
+        425d97caef Maintainers.txt: Add Shuo Liu as UefiPayloadPkg Reviewer
+        22919e560b MdeModulePkg/VarCheckHiiLib: clean up 
VarCheckHiiLibReceiveHiiBinHandler
+        f6aba88ac8 MdeModulePkg/VarCheckHiiLib: don't return success for 
invalid input
+        1c6ce560f0 ArmPkg: Add a protocol notification for 
gEfiDxeMmReadyToLockProtocolGuid
+        f1a2bd2333 MdeModulePkg/XhciDxe: Adjust out-of-range bInterval values
+        70db6510d1 MdeModulePkg/XhciDxe: Refactor endpoint interval calculation
+        17cdc512f0 NetworkPkg/IScsiDxe:Fix for Remote Memory Exposure in ISCSI 
bz4206
+        2fe270a361 UefiCpuPkg: Remove TdxMeasurementLib
+        62e28d89c4 OvmfPkg: Update the .INF file for the changes of 
TdxMeasurementLib
+        f919709c86 MdeModulePkg: Move TdxMeasurementLib from UefiCpuPkg
+        5a1c723cfa ArmVirtPkg: Kvmtool: Rely on InterruptMap to generate PCI 
related tables
+        8c208049d4 ArmVirtPkg: Kvmtool: Advertise all serial ports
+        9bceb16000 Maintainers.txt: Add reviewer for SVSM vTPM related modules
+        06b2f9dc43 OvmfPkg: Use Tpm2Device lib with SVSM vTPM support
+        e868ece3c7 SecurityPkg/Tpm2DeviceLibDTpm: Add TPM2 lib supporting SVSM 
vTPM
+        edf5e365c1 SecurityPkg/Tpm2DeviceLibDTpm: Add header file for Tpm2Ptp.c
+        87f454532a SecurityPkg/Tpm2DeviceLibDTpm: Improve spelling/grammar of 
comments
+        40b4e190d3 OvmfPkg/AmdSvsmLib: Add the SVSM vTPM protocol
+        70f806ec23 MdePkg/AmdSev: Add SVSM protocol vTPM call numbers
+        87d4cdd09e UefiCpuPkg/AmdSvsmLib: Stub the SVSM vTPM protocol for 
non-VMPL0 guests
+        458198aa49 OvmfPkg/AmdSvmLib: Use named protocol and call constants
+        fa74200c92 MdePkg/AmdSev: Add SVSM protocol call numbers
+        e095a3c59b .mergify: Use tianocore-issues to rebase PRs for merge
+        015c4a37c3 StandaloneMmPkg: Disable assert when gMmCommBufferHobGuid 
not found.
+        f47d897f93 UnitTestFrameworkPkg: Avoid duplicate library function names
+        9ac1704af6 OvmfPkg: Use user-specified opt/ovmf/X-PciMmio64Mb value 
unconditionally
+        2aff039da7 UefiPayloadPkg: Parse PCI RB Segment info when its 
available in FDT
+        1e0051e293 BaseTools: Fix Debug Macro Checking to Include Scanning 
Files
+        25ccb6ec54 DynamicTablesPkg/AcpiFacsLib: Fix Issue from Debug Macro 
Checking
+        dd5cce3e53 OvmfPkg/PlatformBootManagerCommonLib: Set UiApp as an 
optional boot option
+        ca278f14c2 OvmfPkg/PlatformBootManagerCommonLib: Disable autoboot for 
EFI Shell
+        4e19daa852 ArmVirtPkg: use BootManagerMenuApp as BootManagerMenu
+        6bfd522477 ArmVirtPkg: add BootManagerMenuApp to dependencies.
+        f25e3d0d2c OvmfPkg/HardwareInfoLib: Reserve device type ID for SVSM
+        e489721275 DynamicTablesPkg/AcpiSsdtCpuTopologyLib: Correct _STA 
method for X64
+        6c30f430bd Maintainers.txt: Transfer Ray's Reviewer role to Dandan
+        dfecb2646f CapsuleApp: Fix proper return after capsule update
+        80c04eb46f NetworkPkg/HttpBootDxe: Add proxy connect flow to 
*GetBootFile()
+        884585818f NetworkPkg/HttpBootDxe: Add ProxyUri handling in start/stop 
path.
+        69b0bed49e Network/HttpBootDxe: Modify device path parser to detect 
Proxy URI node.
+        cd397f16a5 NetworkPkg/HttpBootDxe: Added ProxyUri field to 
HTTP_BOOT_PRIVATE_DATA.
+        592ff1e98f MdeModulePkg/UefiBootManagerLib: Handle device path with 
Proxy URI.
+        7f0fc4189a NetworkPkg/HttpBootDxe: Use ProxyUri from HII to build boot 
option
+        3e0d879a08 NetworkPkg/HttpBootDxe: Add Proxy URI field to HII.
+        fa21977197 NetworkPkg/HttpDxe: Add HTTPS handling in HTTP CONNECT path.
+        f5148b1267 NetworkPkg/HttpDxe: Added support for HTTP CONNECT request.
+        2880ca12ce MdePkg/Http: Add EFI_HTTP_CONNECT_REQUEST_DATA structure
+        4b1a426487 MdePkg: Add ACPI CEDT table structures
+        a093f6eccd PrmPkg: Align Data Buffer Signature to Spec
+        842c4c8afd PrmPkg: PRM support for non-existent MMIO ranges
+        168180aa04 Removing Chinni from maintainer list
+        8e9d56f8ee DynamicTablesPkg: Tolerate NULL when freeing MADT table
+        dfe43d74bc DynamicTablesPkg: Resolve cppcheck findings in macros
+        81031a51a0 BaseTools: Disable VS2019/2022 ARM/AARCH64 Stack Cookies
+        03e66e0a03 BaseTools/Source/C: Disable VS flexible array member warning
+        71188e9063 BaseTools: Add BUILDRULEFAMILY for CLANGDWARF
+        72db37b2f1 StandaloneMmPkg/Library: Print warning message if GUID HOB 
not found
+        de13423277 UnitTestFrameworkPkg: Fix host test /WHOLEARCHIVE regression
+        35cf1d7eb0 MdePkg: fix fru device description string copy error.
+        2b6f979744 workflows: Add UniversalPayload in to git work flow
+        988ea5f571 UefiPayloadPkg: Add stuart build support.
+        d684097661 .github/stale.yml: Exempt type:code-first changes
+        1cc2af8a64 .github: Add EDK II Code First form
+        6234d09f75 OvmfPkg/PlatformInitLib: fix typo
+        deee46d276 CryptoPkg/Library/OpensslLib: Fix CLANG compatibility issues
+        19e2b06625 UefiPayloadPkg: Add new option "--add_cc_flags" in 
UniversalPayloadBuild.py
+        a0d2a64ada UefiPayloadPkg: Add macro to control HandOffFdt 
configuration
+        f4d93446be pip-requirements.txt: Update pip modules
+        99625fe4b2 MdePkg: delete EFI 1.10 USB Host Controller Protocol
+        cc910e4c08 ShellPkg: drop support for obsolete EFI_USB_HC_PROTOCOL
+        1c96d59e71 MdeModulePkg/UhciDxe: drop unused UsbHcProtocol references
+        17a90f66d6 MdeModulePkg/UsbBusDxe: drop support for obsolete 
EFI_USB_HC_PROTOCOL
+        67df979ad2 DebugMacroCheck: Do not show progress bar with zero items
+        dea4e20bd4 MdeModulePkg: Add duplicate exception for gUiAppFileGuid
+        20247e2342 ArmPkg/ArmTransferListLib: improve coding style compliance
+        6782a2b5fc OvmfPkg: add new runtime config option to documentation for 
FirmwareSetup
+        d147d384ac OvmfPkg/PlatformBootManagerCommonLib: Introduce 
OvmfFindLoadOption
+        9b6da0b80b OvmfPkg: Add duplicate exception for gUiAppFileGuid
+        d433b4c8e4 OvmfPkg/PlatformBootManagerLib: Register UiApp as an 
optional boot option
++++ 93 more lines (skipped)
++++ between /work/SRC/openSUSE:Factory/ovmf/ovmf.changes
++++ and /work/SRC/openSUSE:Factory/.ovmf.new.19631/ovmf.changes

Old:
----
  edk2-edk2-stable202502.tar.gz
  ovmf-Increase-FVMAIN-Size-for-Compatibility-with-2MB-Size.patch
  ovmf-Maintainers.txt-Add-reviewer-for-SVSM-vTPM-related-m.patch
  ovmf-MdePkg-AmdSev-Add-SVSM-protocol-call-numbers.patch
  ovmf-MdePkg-AmdSev-Add-SVSM-protocol-vTPM-call-numbers.patch
  ovmf-OvmfPkg-AmdSvmLib-Use-named-protocol-and-call-consta.patch
  ovmf-OvmfPkg-AmdSvsmLib-Add-the-SVSM-vTPM-protocol.patch
  ovmf-OvmfPkg-Use-Tpm2Device-lib-with-SVSM-vTPM-support.patch
  ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-TPM2-lib-supportin.patch
  ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-header-file-for-Tp.patch
  ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Check-SNP-enabled-prio.patch
  ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Improve-spelling-gramm.patch
  ovmf-UefiCpuPkg-AmdSvsmLib-Stub-the-SVSM-vTPM-protocol-fo.patch

New:
----
  edk2-edk2-stable202505.tar.gz

BETA DEBUG BEGIN:
  Old:- Remove the following patches because they are merged to 
edk2-stable202505:
    - 70df56728f ovmf-Increase-FVMAIN-Size-for-Compatibility-with-2MB-Size.patch
    - 9bceb16000 ovmf-Maintainers.txt-Add-reviewer-for-SVSM-vTPM-related-m.patch
  Old:    - 70df56728f 
ovmf-Increase-FVMAIN-Size-for-Compatibility-with-2MB-Size.patch
    - 9bceb16000 ovmf-Maintainers.txt-Add-reviewer-for-SVSM-vTPM-related-m.patch
    - 87d4cdd09e ovmf-UefiCpuPkg-AmdSvsmLib-Stub-the-SVSM-vTPM-protocol-fo.patch
  Old:    - 458198aa49 
ovmf-OvmfPkg-AmdSvmLib-Use-named-protocol-and-call-consta.patch
    - fa74200c92 ovmf-MdePkg-AmdSev-Add-SVSM-protocol-call-numbers.patch
    - 70f806ec23 ovmf-MdePkg-AmdSev-Add-SVSM-protocol-vTPM-call-numbers.patch
  Old:    - fa74200c92 ovmf-MdePkg-AmdSev-Add-SVSM-protocol-call-numbers.patch
    - 70f806ec23 ovmf-MdePkg-AmdSev-Add-SVSM-protocol-vTPM-call-numbers.patch
    - edf5e365c1 ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-header-file-for-Tp.patch
  Old:    - 06b2f9dc43 
ovmf-OvmfPkg-Use-Tpm2Device-lib-with-SVSM-vTPM-support.patch
    - 458198aa49 ovmf-OvmfPkg-AmdSvmLib-Use-named-protocol-and-call-consta.patch
    - fa74200c92 ovmf-MdePkg-AmdSev-Add-SVSM-protocol-call-numbers.patch
  Old:    - 87d4cdd09e 
ovmf-UefiCpuPkg-AmdSvsmLib-Stub-the-SVSM-vTPM-protocol-fo.patch
    - 40b4e190d3 ovmf-OvmfPkg-AmdSvsmLib-Add-the-SVSM-vTPM-protocol.patch
    - 06b2f9dc43 ovmf-OvmfPkg-Use-Tpm2Device-lib-with-SVSM-vTPM-support.patch
  Old:    - 40b4e190d3 ovmf-OvmfPkg-AmdSvsmLib-Add-the-SVSM-vTPM-protocol.patch
    - 06b2f9dc43 ovmf-OvmfPkg-Use-Tpm2Device-lib-with-SVSM-vTPM-support.patch
    - 458198aa49 ovmf-OvmfPkg-AmdSvmLib-Use-named-protocol-and-call-consta.patch
  Old:    - edf5e365c1 
ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-header-file-for-Tp.patch
    - e868ece3c7 ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-TPM2-lib-supportin.patch
    - 87f454532a ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Improve-spelling-gramm.patch
  Old:    - 70f806ec23 
ovmf-MdePkg-AmdSev-Add-SVSM-protocol-vTPM-call-numbers.patch
    - edf5e365c1 ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-header-file-for-Tp.patch
    - e868ece3c7 ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-TPM2-lib-supportin.patch
  Old:    - 87f454532a 
ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Improve-spelling-gramm.patch
    - c2d8e92367 ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Check-SNP-enabled-prio.patch
- Refresh patches:
  Old:    - e868ece3c7 
ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-TPM2-lib-supportin.patch
    - 87f454532a ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Improve-spelling-gramm.patch
    - c2d8e92367 ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Check-SNP-enabled-prio.patch
  Old:    - 9bceb16000 
ovmf-Maintainers.txt-Add-reviewer-for-SVSM-vTPM-related-m.patch
    - 87d4cdd09e ovmf-UefiCpuPkg-AmdSvsmLib-Stub-the-SVSM-vTPM-protocol-fo.patch
    - 40b4e190d3 ovmf-OvmfPkg-AmdSvsmLib-Add-the-SVSM-vTPM-protocol.patch
BETA DEBUG END:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ ovmf.spec ++++++
--- /var/tmp/diff_new_pack.8zQyjl/_old  2025-06-11 16:20:54.426408783 +0200
+++ /var/tmp/diff_new_pack.8zQyjl/_new  2025-06-11 16:20:54.430408950 +0200
@@ -27,7 +27,7 @@
 %endif
 
 Name:           ovmf
-Version:        202502
+Version:        202505
 Release:        0
 Summary:        Open Virtual Machine Firmware
 License:        BSD-2-Clause-Patent
@@ -74,21 +74,8 @@
 Patch11:        %{name}-BaseTools-Using-gcc12-for-building-image.patch
 %endif
 %endif
-Patch12:        
%{name}-Increase-FVMAIN-Size-for-Compatibility-with-2MB-Size.patch
 # Bug 1240420 - UEFI boot breaks: X64 Exception Type - 0E(#PF - Page-Fault) 
CPU Apic ID - 00000000
 Patch13:        %{name}-UefiCpuPkg-Disable-EFI-memory-attributes-protocol.patch
-# Add vTPM support for SVSM in OVMF (jsc#PED-12743, jsc#PED-12767)
-Patch14:        
%{name}-Maintainers.txt-Add-reviewer-for-SVSM-vTPM-related-m.patch
-Patch15:        
%{name}-UefiCpuPkg-AmdSvsmLib-Stub-the-SVSM-vTPM-protocol-fo.patch
-Patch16:        %{name}-OvmfPkg-AmdSvsmLib-Add-the-SVSM-vTPM-protocol.patch
-Patch17:        %{name}-OvmfPkg-Use-Tpm2Device-lib-with-SVSM-vTPM-support.patch
-Patch18:        
%{name}-OvmfPkg-AmdSvmLib-Use-named-protocol-and-call-consta.patch
-Patch19:        %{name}-MdePkg-AmdSev-Add-SVSM-protocol-call-numbers.patch
-Patch20:        %{name}-MdePkg-AmdSev-Add-SVSM-protocol-vTPM-call-numbers.patch
-Patch21:        
%{name}-SecurityPkg-Tpm2DeviceLibDTpm-Add-header-file-for-Tp.patch
-Patch22:        
%{name}-SecurityPkg-Tpm2DeviceLibDTpm-Add-TPM2-lib-supportin.patch
-Patch23:        
%{name}-SecurityPkg-Tpm2DeviceLibDTpm-Improve-spelling-gramm.patch
-Patch24:        
%{name}-SecurityPkg-Tpm2DeviceLibDTpm-Check-SNP-enabled-prio.patch
 
 BuildRequires:  bc
 BuildRequires:  cross-arm-binutils


++++++ edk2-edk2-stable202502.tar.gz -> edk2-edk2-stable202505.tar.gz ++++++
/work/SRC/openSUSE:Factory/ovmf/edk2-edk2-stable202502.tar.gz 
/work/SRC/openSUSE:Factory/.ovmf.new.19631/edk2-edk2-stable202505.tar.gz 
differ: char 13, line 1




++++++ ovmf-Revert-Add-Stack-Cookie-Support-to-MSVC-and-GCC.patch ++++++
--- /var/tmp/diff_new_pack.8zQyjl/_old  2025-06-11 16:20:54.578415119 +0200
+++ /var/tmp/diff_new_pack.8zQyjl/_new  2025-06-11 16:20:54.590415619 +0200
@@ -1,17 +1,18 @@
-From 7b9e33357945b23e6bcdb21fb9d0ba5859ad9b0b Mon Sep 17 00:00:00 2001
+From 772bda5290449d46546b7b19cda083ed50536e7b Mon Sep 17 00:00:00 2001
 From: Richard Lyu <richard....@suse.com>
-Date: Tue, 14 Jan 2025 19:31:48 +0800
-Subject: [PATCH] ovmf Revert add stack cookie support to MSVC and GCC
+Date: Thu, 29 May 2025 14:25:56 +0800
+Subject: [PATCH] Revert "BaseTools: Add Stack Cookie Support to MSVC and GCC
+ IA32/X64/ARM/AARCH64"
 
 This reverts commit f53f029122d4493e9db95e2424dd8f067f247661.
 ---
- BaseTools/Conf/tools_def.template | 65 +++++++++++++++----------------
- 1 file changed, 31 insertions(+), 34 deletions(-)
+ BaseTools/Conf/tools_def.template | 41 ++++++++++++++-----------------
+ 1 file changed, 19 insertions(+), 22 deletions(-)
 
-Index: edk2-edk2-stable202502/BaseTools/Conf/tools_def.template
-===================================================================
---- edk2-edk2-stable202502.orig/BaseTools/Conf/tools_def.template
-+++ edk2-edk2-stable202502/BaseTools/Conf/tools_def.template
+diff --git a/BaseTools/Conf/tools_def.template 
b/BaseTools/Conf/tools_def.template
+index de86f96733..2a479365da 100755
+--- a/BaseTools/Conf/tools_def.template
++++ b/BaseTools/Conf/tools_def.template
 @@ -21,9 +21,8 @@
  #      - Add GCC and GCCNOLTO
  #      - Deprecate GCC48, GCC49 and GCC5.
@@ -23,7 +24,7 @@
  
  IDENTIFIER = Default TOOL_CHAIN_CONF
  
-@@ -636,9 +635,9 @@ NOOPT_VS2017_AARCH64_DLINK_FLAGS   = /NO
+@@ -636,9 +635,9 @@ NOOPT_VS2017_AARCH64_DLINK_FLAGS   = /NOLOGO /NODEFAULTLIB 
/IGNORE:4001 /OPT:REF
  *_VS2019_IA32_PP_PATH      = DEF(VS2019_BIN_IA32)\cl.exe
  *_VS2019_IA32_ASM_PATH     = DEF(VS2019_BIN_IA32)\ml.exe
  
@@ -36,7 +37,7 @@
  
    DEBUG_VS2019_IA32_ASM_FLAGS   = /nologo /c /WX /W3 /Cx /coff /Zd /Zi
  RELEASE_VS2019_IA32_ASM_FLAGS   = /nologo /c /WX /W3 /Cx /coff /Zd
-@@ -666,9 +665,9 @@ NOOPT_VS2019_IA32_DLINK_FLAGS   = /NOLOG
+@@ -666,9 +665,9 @@ NOOPT_VS2019_IA32_DLINK_FLAGS   = /NOLOGO /NODEFAULTLIB 
/IGNORE:4001 /OPT:REF /O
  *_VS2019_X64_DLINK_PATH    = DEF(VS2019_BIN_X64)\link.exe
  *_VS2019_X64_ASLDLINK_PATH = DEF(VS2019_BIN_X64)\link.exe
  
@@ -49,33 +50,7 @@
  
    DEBUG_VS2019_X64_ASM_FLAGS    = /nologo /c /WX /W3 /Cx /Zd /Zi
  RELEASE_VS2019_X64_ASM_FLAGS    = /nologo /c /WX /W3 /Cx /Zd
-@@ -696,9 +695,9 @@ NOOPT_VS2019_X64_DLINK_FLAGS    = /NOLOG
- *_VS2019_ARM_ASLPP_PATH           = DEF(VS2019_BIN_ARM)\cl.exe
- *_VS2019_ARM_ASLDLINK_PATH        = DEF(VS2019_BIN_ARM)\link.exe
- 
--  DEBUG_VS2019_ARM_CC_FLAGS       = /nologo /c /WX /GS /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi-
--RELEASE_VS2019_ARM_CC_FLAGS       = /nologo /c /WX /GS /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi-
--NOOPT_VS2019_ARM_CC_FLAGS         = /nologo /c /WX /GS /W4 /Gs32768 /D 
UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi-
-+  DEBUG_VS2019_ARM_CC_FLAGS       = /nologo /c /WX /GS- /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi-
-+RELEASE_VS2019_ARM_CC_FLAGS       = /nologo /c /WX /GS- /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi-
-+NOOPT_VS2019_ARM_CC_FLAGS         = /nologo /c /WX /GS- /W4 /Gs32768 /D 
UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi-
- 
-   DEBUG_VS2019_ARM_ASM_FLAGS      = /nologo /g
- RELEASE_VS2019_ARM_ASM_FLAGS      = /nologo
-@@ -722,9 +721,9 @@ NOOPT_VS2019_ARM_DLINK_FLAGS      = /NOL
- *_VS2019_AARCH64_ASLPP_PATH        = DEF(VS2019_BIN_AARCH64)\cl.exe
- *_VS2019_AARCH64_ASLDLINK_PATH     = DEF(VS2019_BIN_AARCH64)\link.exe
- 
--  DEBUG_VS2019_AARCH64_CC_FLAGS    = /nologo /c /WX /GS /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi-
--RELEASE_VS2019_AARCH64_CC_FLAGS    = /nologo /c /WX /GS /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi-
--NOOPT_VS2019_AARCH64_CC_FLAGS      = /nologo /c /WX /GS /W4 /Gs32768 /D 
UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi-
-+  DEBUG_VS2019_AARCH64_CC_FLAGS    = /nologo /c /WX /GS- /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi-
-+RELEASE_VS2019_AARCH64_CC_FLAGS    = /nologo /c /WX /GS- /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi-
-+NOOPT_VS2019_AARCH64_CC_FLAGS      = /nologo /c /WX /GS- /W4 /Gs32768 /D 
UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi-
- 
-   DEBUG_VS2019_AARCH64_ASM_FLAGS   = /nologo /g
- RELEASE_VS2019_AARCH64_ASM_FLAGS   = /nologo
-@@ -779,9 +778,9 @@ NOOPT_VS2019_AARCH64_DLINK_FLAGS   = /NO
+@@ -779,9 +778,9 @@ NOOPT_VS2019_AARCH64_DLINK_FLAGS   = /NOLOGO /NODEFAULTLIB 
/IGNORE:4001 /OPT:REF
  *_VS2022_IA32_ASM_PATH     = DEF(VS2022_BIN_IA32)\ml.exe
  
        *_VS2022_IA32_MAKE_FLAGS  = /nologo
@@ -88,7 +63,7 @@
  
    DEBUG_VS2022_IA32_ASM_FLAGS   = /nologo /c /WX /W3 /Cx /coff /Zd /Zi
  RELEASE_VS2022_IA32_ASM_FLAGS   = /nologo /c /WX /W3 /Cx /coff /Zd
-@@ -815,9 +814,9 @@ NOOPT_VS2022_IA32_DLINK_FLAGS   = /NOLOG
+@@ -815,9 +814,9 @@ NOOPT_VS2022_IA32_DLINK_FLAGS   = /NOLOGO /NODEFAULTLIB 
/IGNORE:4001 /OPT:REF /O
  *_VS2022_X64_DLINK_PATH    = DEF(VS2022_BIN_X64)\link.exe
  *_VS2022_X64_ASLDLINK_PATH = DEF(VS2022_BIN_X64)\link.exe
  
@@ -101,33 +76,7 @@
  
    DEBUG_VS2022_X64_ASM_FLAGS    = /nologo /c /WX /W3 /Cx /Zd /Zi
  RELEASE_VS2022_X64_ASM_FLAGS    = /nologo /c /WX /W3 /Cx /Zd
-@@ -852,9 +851,9 @@ NOOPT_VS2022_X64_DLINK_FLAGS    = /NOLOG
- *_VS2022_ARM_ASLDLINK_PATH        = DEF(VS2022_BIN_ARM)\link.exe
- 
-       *_VS2022_ARM_MAKE_FLAGS     = /nologo
--  DEBUG_VS2022_ARM_CC_FLAGS       = /nologo /c /WX /GS /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi-
--RELEASE_VS2022_ARM_CC_FLAGS       = /nologo /c /WX /GS /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi-
--NOOPT_VS2022_ARM_CC_FLAGS         = /nologo /c /WX /GS /W4 /Gs32768 /D 
UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi-
-+  DEBUG_VS2022_ARM_CC_FLAGS       = /nologo /c /WX /GS- /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi-
-+RELEASE_VS2022_ARM_CC_FLAGS       = /nologo /c /WX /GS- /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi-
-+NOOPT_VS2022_ARM_CC_FLAGS         = /nologo /c /WX /GS- /W4 /Gs32768 /D 
UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi-
- 
-   DEBUG_VS2022_ARM_ASM_FLAGS      = /nologo /g
- RELEASE_VS2022_ARM_ASM_FLAGS      = /nologo
-@@ -885,9 +884,9 @@ NOOPT_VS2022_ARM_DLINK_FLAGS      = /NOL
- *_VS2022_AARCH64_ASLDLINK_PATH     = DEF(VS2022_BIN_AARCH64)\link.exe
- 
-       *_VS2022_AARCH64_MAKE_FLAGS  = /nologo
--  DEBUG_VS2022_AARCH64_CC_FLAGS    = /nologo /c /WX /GS /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi-
--RELEASE_VS2022_AARCH64_CC_FLAGS    = /nologo /c /WX /GS /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi-
--NOOPT_VS2022_AARCH64_CC_FLAGS      = /nologo /c /WX /GS /W4 /Gs32768 /D 
UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi-
-+  DEBUG_VS2022_AARCH64_CC_FLAGS    = /nologo /c /WX /GS- /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi-
-+RELEASE_VS2022_AARCH64_CC_FLAGS    = /nologo /c /WX /GS- /W4 /Gs32768 /D 
UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi-
-+NOOPT_VS2022_AARCH64_CC_FLAGS      = /nologo /c /WX /GS- /W4 /Gs32768 /D 
UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi-
- 
-   DEBUG_VS2022_AARCH64_ASM_FLAGS   = /nologo /g
- RELEASE_VS2022_AARCH64_ASM_FLAGS   = /nologo
-@@ -919,13 +918,11 @@ NOOPT_*_*_OBJCOPY_ADDDEBUGFLAG     = --a
+@@ -919,13 +918,11 @@ NOOPT_*_*_OBJCOPY_ADDDEBUGFLAG     = 
--add-gnu-debuglink="$(DEBUG_DIR)/$(MODULE_
  *_*_*_DTCPP_PATH                   = DEF(DTCPP_BIN)
  *_*_*_DTC_PATH                     = DEF(DTC_BIN)
  
@@ -144,7 +93,7 @@
  DEFINE GCC_AARCH64_CC_XIPFLAGS     = -mstrict-align -mgeneral-regs-only
  DEFINE GCC_RISCV64_CC_XIPFLAGS     = -mstrict-align -mgeneral-regs-only
  DEFINE GCC_DLINK2_FLAGS_COMMON     = 
-Wl,--script=$(EDK_TOOLS_PATH)/Scripts/GccBase.lds
-@@ -961,8 +958,8 @@ DEFINE GCC_DEPS_FLAGS              = -MM
+@@ -961,8 +958,8 @@ DEFINE GCC_DEPS_FLAGS              = -MMD -MF $@.deps
  
  DEFINE GCC48_ALL_CC_FLAGS            = DEF(GCC_ALL_CC_FLAGS) 
-ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=$(BASE_NAME)Strings
  DEFINE GCC48_IA32_X64_DLINK_COMMON   = -nostdlib -Wl,-n,-q,--gc-sections -z 
common-page-size=0x20
@@ -155,7 +104,7 @@
  DEFINE GCC48_IA32_X64_ASLDLINK_FLAGS = DEF(GCC48_IA32_X64_DLINK_COMMON) 
-Wl,--entry,ReferenceAcpiTable -u ReferenceAcpiTable
  DEFINE GCC48_IA32_X64_DLINK_FLAGS    = DEF(GCC48_IA32_X64_DLINK_COMMON) 
-Wl,--entry,$(IMAGE_ENTRY_POINT) -u $(IMAGE_ENTRY_POINT) 
-Wl,-Map,$(DEST_DIR_DEBUG)/$(BASE_NAME).map,--whole-archive
  DEFINE GCC48_IA32_DLINK2_FLAGS       = -Wl,--defsym=PECOFF_HEADER_SIZE=0x220 
DEF(GCC_DLINK2_FLAGS_COMMON)
-@@ -971,7 +968,7 @@ DEFINE GCC48_X64_DLINK2_FLAGS        = -
+@@ -971,7 +968,7 @@ DEFINE GCC48_X64_DLINK2_FLAGS        = 
-Wl,--defsym=PECOFF_HEADER_SIZE=0x228 DEF
  DEFINE GCC48_ASM_FLAGS               = DEF(GCC_ASM_FLAGS)
  DEFINE GCC48_ARM_ASM_FLAGS           = $(PLATFORM_FLAGS) DEF(GCC_ASM_FLAGS) 
-mlittle-endian
  DEFINE GCC48_AARCH64_ASM_FLAGS       = $(PLATFORM_FLAGS) DEF(GCC_ASM_FLAGS) 
-mlittle-endian
@@ -164,4 +113,7 @@
  DEFINE GCC48_ARM_CC_XIPFLAGS         = DEF(GCC_ARM_CC_XIPFLAGS)
  DEFINE GCC48_AARCH64_CC_FLAGS        = $(PLATFORM_FLAGS) -mcmodel=large 
DEF(GCC_AARCH64_CC_FLAGS)
  DEFINE GCC48_AARCH64_CC_XIPFLAGS     = DEF(GCC_AARCH64_CC_XIPFLAGS)
+-- 
+2.43.0
+
 

++++++ ovmf-Revert-OvmfPkg-OvmfXen-Set-PcdFSBClock.patch ++++++
--- /var/tmp/diff_new_pack.8zQyjl/_old  2025-06-11 16:20:54.618416786 +0200
+++ /var/tmp/diff_new_pack.8zQyjl/_new  2025-06-11 16:20:54.622416953 +0200
@@ -1,6 +1,6 @@
-From b8324bc3d5d44e5b1644a66f1b6e07b6e4ad9350 Mon Sep 17 00:00:00 2001
-From: "Lee, Chun-Yi" <j...@suse.com>
-Date: Wed, 15 Feb 2023 14:39:37 +0800
+From f059118317b6d3a1dfdeec45494d279842c855e4 Mon Sep 17 00:00:00 2001
+From: Richard Lyu <richard....@suse.com>
+Date: Thu, 29 May 2025 13:22:47 +0800
 Subject: [PATCH] Revert "OvmfPkg/OvmfXen: Set PcdFSBClock"
 
 This reverts commit 71cdb91f313380152d7bf38cfeebe76f5b2d39ac.
@@ -10,13 +10,13 @@
  OvmfPkg/XenPlatformPei/XenPlatformPei.inf | 1 -
  3 files changed, 3 insertions(+), 6 deletions(-)
 
-Index: edk2-edk2-stable202302/OvmfPkg/OvmfXen.dsc
-===================================================================
---- edk2-edk2-stable202302.orig/OvmfPkg/OvmfXen.dsc
-+++ edk2-edk2-stable202302/OvmfPkg/OvmfXen.dsc
-@@ -456,6 +456,9 @@
-   # Point to the MdeModulePkg/Application/UiApp/UiApp.inf
-   gEfiMdeModulePkgTokenSpaceGuid.PcdBootManagerMenuFile|{ 0x21, 0xaa, 0x2c, 
0x46, 0x14, 0x76, 0x03, 0x45, 0x83, 0x6e, 0x8a, 0xb6, 0xf4, 0x66, 0x23, 0x31 }
+diff --git a/OvmfPkg/OvmfXen.dsc b/OvmfPkg/OvmfXen.dsc
+index 088c63f5c2..6f636a79a2 100644
+--- a/OvmfPkg/OvmfXen.dsc
++++ b/OvmfPkg/OvmfXen.dsc
+@@ -451,6 +451,9 @@
+   # Point to the 
MdeModulePkg/Application/BootManagerMenuApp/BootManagerMenuApp.inf
+   gEfiMdeModulePkgTokenSpaceGuid.PcdBootManagerMenuFile|{ 0xdc, 0x5b, 0xc2, 
0xee, 0xf2, 0x67, 0x95, 0x4d, 0xb1, 0xd5, 0xf8, 0x1b, 0x20, 0x39, 0xd1, 0x1d }
  
 +  ## Xen vlapic's frequence is 100 MHz
 +  gEfiMdePkgTokenSpaceGuid.PcdFSBClock|100000000
@@ -24,7 +24,7 @@
    # We populate DXE IPL tables with 1G pages preferably on Xen
    gEfiMdeModulePkgTokenSpaceGuid.PcdUse1GPageTable|TRUE
  
-@@ -486,7 +489,6 @@
+@@ -484,7 +487,6 @@
    gUefiOvmfPkgTokenSpaceGuid.PcdPciMmio64Base|0x0
    gUefiOvmfPkgTokenSpaceGuid.PcdPciMmio64Size|0x800000000
  
@@ -32,11 +32,11 @@
    gEfiMdePkgTokenSpaceGuid.PcdPlatformBootTimeOut|0
  
    # Set video resolution for text setup.
-Index: edk2-edk2-stable202302/OvmfPkg/XenPlatformPei/Xen.c
-===================================================================
---- edk2-edk2-stable202302.orig/OvmfPkg/XenPlatformPei/Xen.c
-+++ edk2-edk2-stable202302/OvmfPkg/XenPlatformPei/Xen.c
-@@ -634,9 +634,5 @@ CalibrateLapicTimer (
+diff --git a/OvmfPkg/XenPlatformPei/Xen.c b/OvmfPkg/XenPlatformPei/Xen.c
+index a54fd55c70..68ae4801ae 100644
+--- a/OvmfPkg/XenPlatformPei/Xen.c
++++ b/OvmfPkg/XenPlatformPei/Xen.c
+@@ -613,9 +613,5 @@ CalibrateLapicTimer (
    Freq = DivU64x64Remainder (Dividend, TscTick2 - TscTick, NULL);
    DEBUG ((DEBUG_INFO, "APIC Freq % 8lu Hz\n", Freq));
  
@@ -46,10 +46,10 @@
 -
    UnmapXenPage (SharedInfo);
  }
-Index: edk2-edk2-stable202302/OvmfPkg/XenPlatformPei/XenPlatformPei.inf
-===================================================================
---- edk2-edk2-stable202302.orig/OvmfPkg/XenPlatformPei/XenPlatformPei.inf
-+++ edk2-edk2-stable202302/OvmfPkg/XenPlatformPei/XenPlatformPei.inf
+diff --git a/OvmfPkg/XenPlatformPei/XenPlatformPei.inf 
b/OvmfPkg/XenPlatformPei/XenPlatformPei.inf
+index 20c27ff34b..790f4af551 100644
+--- a/OvmfPkg/XenPlatformPei/XenPlatformPei.inf
++++ b/OvmfPkg/XenPlatformPei/XenPlatformPei.inf
 @@ -86,7 +86,6 @@
    gEfiMdeModulePkgTokenSpaceGuid.PcdDxeIplSwitchToLongMode
    gEfiMdeModulePkgTokenSpaceGuid.PcdUse1GPageTable
@@ -58,4 +58,7 @@
    gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy
    gUefiCpuPkgTokenSpaceGuid.PcdCpuLocalApicBaseAddress
  
+-- 
+2.43.0
+
 

++++++ ovmf-gdb-symbols.patch ++++++
--- /var/tmp/diff_new_pack.8zQyjl/_old  2025-06-11 16:20:54.638417620 +0200
+++ /var/tmp/diff_new_pack.8zQyjl/_new  2025-06-11 16:20:54.642417786 +0200
@@ -1,207 +1,212 @@
-From 263791566fbe25755aebde54c98d5aea061414f3 Mon Sep 17 00:00:00 2001
-From: Gary Ching-Pang Lin <g...@suse.com>
-Date: Tue, 24 Jun 2014 11:57:32 +0800
-Subject: [PATCH 1/3] Add DebugPkg
+From d4fc3987941016cba0a2cd1d4037b87bc5937f5e Mon Sep 17 00:00:00 2001
+From: Richard Lyu <richard....@suse.com>
+Date: Thu, 29 May 2025 12:12:23 +0800
+Subject: [PATCH] Add DebugPkg
 
 ---
  DebugPkg/DebugPkg.dec        |  34 ++++
- DebugPkg/GdbSyms/GdbSyms.c   |  70 +++++++
+ DebugPkg/GdbSyms/GdbSyms.c   |  78 ++++++++
  DebugPkg/GdbSyms/GdbSyms.inf |  57 ++++++
- DebugPkg/Scripts/gdb_uefi.py | 348 +++++++++++++++++++++++++++++++++++
- 4 files changed, 509 insertions(+)
+ DebugPkg/Scripts/gdb_uefi.py | 350 +++++++++++++++++++++++++++++++++++
+ OvmfPkg/OvmfPkgX64.dsc       |   3 +
+ 5 files changed, 522 insertions(+)
  create mode 100644 DebugPkg/DebugPkg.dec
  create mode 100644 DebugPkg/GdbSyms/GdbSyms.c
  create mode 100644 DebugPkg/GdbSyms/GdbSyms.inf
  create mode 100644 DebugPkg/Scripts/gdb_uefi.py
 
-Index: edk2-edk2-stable202302/DebugPkg/DebugPkg.dec
-===================================================================
+diff --git a/DebugPkg/DebugPkg.dec b/DebugPkg/DebugPkg.dec
+new file mode 100644
+index 0000000000..b39a660e45
 --- /dev/null
-+++ edk2-edk2-stable202302/DebugPkg/DebugPkg.dec
++++ b/DebugPkg/DebugPkg.dec
 @@ -0,0 +1,34 @@
-+## @file
-+#  Debug package - various useful stuff for debugging.
-+#
-+#  Copyright (c) 2006 - 2011, Andrei Warkentin <andr...@motorola.com>
-+#
-+#  This program and the accompanying materials
-+#  are licensed and made available under the terms and conditions of the BSD 
License
-+#  which accompanies this distribution. The full text of the license may be 
found at
-+#  http://opensource.org/licenses/bsd-license.php
-+#
-+#  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
-+#  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR 
IMPLIED.
-+#
-+##
-+
-+[Defines]
-+  DEC_VERSION                    = 0x00010005
-+  PACKAGE_NAME                   = DebugPkg
-+  PACKAGE_GUID                   = 2d234f34-50e5-4b9d-b8e3-5562334d87e5
-+  PACKAGE_VERSION                = 0.1
-+
-+[Includes]
-+  Include
-+
-+[Guids]
-+
-+[Protocols]
-+
-+[PcdsFixedAtBuild]
-+
-+[PcdsDynamic]
-+
-+[LibraryClasses]
-+
-Index: edk2-edk2-stable202302/DebugPkg/GdbSyms/GdbSyms.c
-===================================================================
++## @file
++#  Debug package - various useful stuff for debugging.
++#
++#  Copyright (c) 2006 - 2011, Andrei Warkentin <andr...@motorola.com>
++#
++#  This program and the accompanying materials
++#  are licensed and made available under the terms and conditions of the BSD 
License
++#  which accompanies this distribution. The full text of the license may be 
found at
++#  http://opensource.org/licenses/bsd-license.php
++#
++#  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
++#  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR 
IMPLIED.
++#
++##
++
++[Defines]
++  DEC_VERSION                    = 0x00010005
++  PACKAGE_NAME                   = DebugPkg
++  PACKAGE_GUID                   = 2d234f34-50e5-4b9d-b8e3-5562334d87e5
++  PACKAGE_VERSION                = 0.1
++
++[Includes]
++  Include
++
++[Guids]
++
++[Protocols]
++
++[PcdsFixedAtBuild]
++
++[PcdsDynamic]
++
++[LibraryClasses]
++
+diff --git a/DebugPkg/GdbSyms/GdbSyms.c b/DebugPkg/GdbSyms/GdbSyms.c
+new file mode 100644
+index 0000000000..9780cff802
 --- /dev/null
-+++ edk2-edk2-stable202302/DebugPkg/GdbSyms/GdbSyms.c
++++ b/DebugPkg/GdbSyms/GdbSyms.c
 @@ -0,0 +1,78 @@
-+/** @file
-+
-+  Bare-minimum GDB symbols needed for reloading symbols.
-+
-+  This is not a "driver" and should not be placed in a FD.
-+
-+  Copyright (c) 2011, Andrei Warkentin <andr...@motorola.com>
-+
-+  This program and the accompanying materials
-+  are licensed and made available under the terms and conditions of the BSD 
License
-+  which accompanies this distribution. The full text of the license may be 
found at
-+  http://opensource.org/licenses/bsd-license.php
-+  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
-+  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR 
IMPLIED.
-+
-+**/
-+
-+#include "PiDxe.h"
-+
-+#include <Library/UefiLib.h>
-+#include <Library/UefiDriverEntryPoint.h>
-+#include <Library/BaseLib.h>
-+#include <Library/UefiRuntimeLib.h>
-+#include <Library/DebugLib.h>
-+#include <Library/BaseMemoryLib.h>
-+#include <Library/MemoryAllocationLib.h>
-+#include <Library/UefiBootServicesTableLib.h>
-+#include <Library/DevicePathLib.h>
-+#include <Library/PcdLib.h>
-+#include <Guid/DebugImageInfoTable.h>
-+
-+/**
-+  Main entry point.
-+
-+  @param[in] ImageHandle    The firmware allocated handle for the EFI image.
-+  @param[in] SystemTable    A pointer to the EFI System Table.
-+
-+  @retval EFI_SUCCESS       Successfully initialized.
-+
-+**/
-+EFI_STATUS
-+EFIAPI
-+Initialize (
-+  IN EFI_HANDLE         ImageHandle,
-+  IN EFI_SYSTEM_TABLE   *SystemTable
-+  )
-+{
-+  EFI_SYSTEM_TABLE_POINTER ESTP;
-+  EFI_DEBUG_IMAGE_INFO_TABLE_HEADER EDIITH;
-+  EFI_IMAGE_DOS_HEADER EIDH;
-+  EFI_IMAGE_OPTIONAL_HEADER_UNION EIOHU;
-+  EFI_IMAGE_DEBUG_DIRECTORY_ENTRY EIDDE;
-+  EFI_IMAGE_DEBUG_CODEVIEW_NB10_ENTRY EIDCNE;
-+  EFI_IMAGE_DEBUG_CODEVIEW_RSDS_ENTRY EIDCRE;
-+  EFI_IMAGE_DEBUG_CODEVIEW_MTOC_ENTRY EIDCME;
-+  UINTN Dummy =
-+    (UINTN) &ESTP   |
-+    (UINTN) &EDIITH |
-+    (UINTN) &EIDH   |
-+    (UINTN) &EIOHU  |
-+    (UINTN) &EIDDE  |
-+    (UINTN) &EIDCNE |
-+    (UINTN) &EIDCRE |
-+    (UINTN) &EIDCME |
-+     1
-+    ;
-+  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &ESTP));
-+  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EDIITH));
-+  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDH));
-+  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIOHU));
-+  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDDE));
-+  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDCNE));
-+  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDCRE));
-+  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDCME));
-+  return !!Dummy & EFI_SUCCESS;
-+}
-+
-+
-Index: edk2-edk2-stable202302/DebugPkg/GdbSyms/GdbSyms.inf
-===================================================================
++/** @file
++
++  Bare-minimum GDB symbols needed for reloading symbols.
++
++  This is not a "driver" and should not be placed in a FD.
++
++  Copyright (c) 2011, Andrei Warkentin <andr...@motorola.com>
++
++  This program and the accompanying materials
++  are licensed and made available under the terms and conditions of the BSD 
License
++  which accompanies this distribution. The full text of the license may be 
found at
++  http://opensource.org/licenses/bsd-license.php
++  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
++  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR 
IMPLIED.
++
++**/
++
++#include "PiDxe.h"
++
++#include <Library/UefiLib.h>
++#include <Library/UefiDriverEntryPoint.h>
++#include <Library/BaseLib.h>
++#include <Library/UefiRuntimeLib.h>
++#include <Library/DebugLib.h>
++#include <Library/BaseMemoryLib.h>
++#include <Library/MemoryAllocationLib.h>
++#include <Library/UefiBootServicesTableLib.h>
++#include <Library/DevicePathLib.h>
++#include <Library/PcdLib.h>
++#include <Guid/DebugImageInfoTable.h>
++
++/**
++  Main entry point.
++
++  @param[in] ImageHandle    The firmware allocated handle for the EFI image.
++  @param[in] SystemTable    A pointer to the EFI System Table.
++
++  @retval EFI_SUCCESS       Successfully initialized.
++
++**/
++EFI_STATUS
++EFIAPI
++Initialize (
++  IN EFI_HANDLE         ImageHandle,
++  IN EFI_SYSTEM_TABLE   *SystemTable
++  )
++{
++  EFI_SYSTEM_TABLE_POINTER ESTP;
++  EFI_DEBUG_IMAGE_INFO_TABLE_HEADER EDIITH;
++  EFI_IMAGE_DOS_HEADER EIDH;
++  EFI_IMAGE_OPTIONAL_HEADER_UNION EIOHU;
++  EFI_IMAGE_DEBUG_DIRECTORY_ENTRY EIDDE;
++  EFI_IMAGE_DEBUG_CODEVIEW_NB10_ENTRY EIDCNE;
++  EFI_IMAGE_DEBUG_CODEVIEW_RSDS_ENTRY EIDCRE;
++  EFI_IMAGE_DEBUG_CODEVIEW_MTOC_ENTRY EIDCME;
++  UINTN Dummy =
++    (UINTN) &ESTP   |
++    (UINTN) &EDIITH |
++    (UINTN) &EIDH   |
++    (UINTN) &EIOHU  |
++    (UINTN) &EIDDE  |
++    (UINTN) &EIDCNE |
++    (UINTN) &EIDCRE |
++    (UINTN) &EIDCME |
++     1
++    ;
++  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &ESTP));
++  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EDIITH));
++  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDH));
++  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIOHU));
++  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDDE));
++  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDCNE));
++  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDCRE));
++  DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDCME));
++  return !!Dummy & EFI_SUCCESS;
++}
++
++
+diff --git a/DebugPkg/GdbSyms/GdbSyms.inf b/DebugPkg/GdbSyms/GdbSyms.inf
+new file mode 100644
+index 0000000000..0a18a33c73
 --- /dev/null
-+++ edk2-edk2-stable202302/DebugPkg/GdbSyms/GdbSyms.inf
++++ b/DebugPkg/GdbSyms/GdbSyms.inf
 @@ -0,0 +1,57 @@
-+## @file
-+#
-+#  Bare-minimum GDB symbols needed for reloading symbols.
-+#
-+#  This is not a "driver" and should not be placed in a FD.
-+#
-+#  Copyright (c) 2011, Andrei Warkentin <andr...@motorola.com>
-+#
-+#  This program and the accompanying materials
-+#  are licensed and made available under the terms and conditions of the BSD 
License
-+#  which accompanies this distribution. The full text of the license may be 
found at
-+#  http://opensource.org/licenses/bsd-license.php
-+#  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
-+#  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR 
IMPLIED.
-+#
-+##
-+
-+[Defines]
-+  INF_VERSION                    = 0x00010005
-+  BASE_NAME                      = GdbSyms
-+  FILE_GUID                      = 22abcb60-fb40-42ac-b01f-3ab1fad9aad8
-+  MODULE_TYPE                    = DXE_DRIVER
-+  VERSION_STRING                 = 1.0
-+  ENTRY_POINT                    = Initialize
-+
-+#
-+# The following information is for reference only and not required by the 
build tools.
-+#
-+#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC ARM
-+#
-+
-+[Sources]
-+  GdbSyms.c
-+
-+[Packages]
-+  MdePkg/MdePkg.dec
-+  MdeModulePkg/MdeModulePkg.dec
-+
-+[LibraryClasses]
-+  BaseLib
-+  BaseMemoryLib
-+  DebugLib
-+  DxeServicesTableLib
-+  HobLib
-+  MemoryAllocationLib
-+  PcdLib
-+  UefiBootServicesTableLib
-+  UefiDriverEntryPoint
-+  UefiLib
-+
-+[Guids]
-+
-+[Protocols]
-+
-+[Depex]
-+  TRUE
-+
-Index: edk2-edk2-stable202302/DebugPkg/Scripts/gdb_uefi.py
-===================================================================
++## @file
++#
++#  Bare-minimum GDB symbols needed for reloading symbols.
++#
++#  This is not a "driver" and should not be placed in a FD.
++#
++#  Copyright (c) 2011, Andrei Warkentin <andr...@motorola.com>
++#
++#  This program and the accompanying materials
++#  are licensed and made available under the terms and conditions of the BSD 
License
++#  which accompanies this distribution. The full text of the license may be 
found at
++#  http://opensource.org/licenses/bsd-license.php
++#  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
++#  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR 
IMPLIED.
++#
++##
++
++[Defines]
++  INF_VERSION                    = 0x00010005
++  BASE_NAME                      = GdbSyms
++  FILE_GUID                      = 22abcb60-fb40-42ac-b01f-3ab1fad9aad8
++  MODULE_TYPE                    = DXE_DRIVER
++  VERSION_STRING                 = 1.0
++  ENTRY_POINT                    = Initialize
++
++#
++# The following information is for reference only and not required by the 
build tools.
++#
++#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC ARM
++#
++
++[Sources]
++  GdbSyms.c
++
++[Packages]
++  MdePkg/MdePkg.dec
++  MdeModulePkg/MdeModulePkg.dec
++
++[LibraryClasses]
++  BaseLib
++  BaseMemoryLib
++  DebugLib
++  DxeServicesTableLib
++  HobLib
++  MemoryAllocationLib
++  PcdLib
++  UefiBootServicesTableLib
++  UefiDriverEntryPoint
++  UefiLib
++
++[Guids]
++
++[Protocols]
++
++[Depex]
++  TRUE
++
+diff --git a/DebugPkg/Scripts/gdb_uefi.py b/DebugPkg/Scripts/gdb_uefi.py
+new file mode 100644
+index 0000000000..3db87a4de4
 --- /dev/null
-+++ edk2-edk2-stable202302/DebugPkg/Scripts/gdb_uefi.py
++++ b/DebugPkg/Scripts/gdb_uefi.py
 @@ -0,0 +1,350 @@
 +"""
 +Allows loading TianoCore symbols into a GDB session attached to EFI
@@ -553,14 +558,21 @@
 +ReloadUefi ()
 +
 +
-Index: edk2-edk2-stable202302/OvmfPkg/OvmfPkgX64.dsc
-===================================================================
---- edk2-edk2-stable202302.orig/OvmfPkg/OvmfPkgX64.dsc
-+++ edk2-edk2-stable202302/OvmfPkg/OvmfPkgX64.dsc
-@@ -1123,3 +1123,5 @@
-   # TPM support
+diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
+index 60fccc19d2..a2784bbd40 100644
+--- a/OvmfPkg/OvmfPkgX64.dsc
++++ b/OvmfPkg/OvmfPkgX64.dsc
+@@ -1063,6 +1063,9 @@
    #
  !include OvmfPkg/Include/Dsc/OvmfTpmComponentsDxe.dsc.inc
+ 
++  DebugPkg/GdbSyms/GdbSyms.inf
 +
-+  DebugPkg/GdbSyms/GdbSyms.inf
++
+   #
+   # Smbios Measurement support
+   #
+-- 
+2.43.0
+
 

Reply via email to