Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package ovmf for openSUSE:Factory checked in at 2025-06-11 16:20:13 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/ovmf (Old) and /work/SRC/openSUSE:Factory/.ovmf.new.19631 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "ovmf" Wed Jun 11 16:20:13 2025 rev:117 rq:1284309 version:202505 Changes: -------- --- /work/SRC/openSUSE:Factory/ovmf/ovmf.changes 2025-05-20 09:31:03.695631596 +0200 +++ /work/SRC/openSUSE:Factory/.ovmf.new.19631/ovmf.changes 2025-06-11 16:20:53.222358598 +0200 @@ -1,0 +2,367 @@ +Wed May 28 09:46:23 UTC 2025 - YI HSIN Lyu <richard....@suse.com> + +- Update to edk2-stable202505 + - New Features & Bug Fixes (https://github.com/tianocore/edk2/releases): + - NetworkPkg/IScsiDxe:Fix for out of bound memory access for bz4207 (CVE-2024-38805) + - Multiple packages: stop using EmbeddedPkg libfdt + - Adding support for TPM over FF-A on ARM platforms + - SecurityPkg: Prevent invalid DBX from being set + - SecurityPkg: Out of bound read in HashPeImageByType() + - Adding support for MM Communicate v3 + - BaseTools: Disable VS2019/2022 ARM/AARCH64 Stack Cookies + - Introduce Redfish Platform Wanted Device Lib + - HobLib: Add two new APIs in HobLib + - Patches (git log --oneline --date-order edk2-stable202502..edk2-stable202505): + 6951dfe7d5 OvmfPkg/VirtCommunicationDxe: add IoLib to VirtMmCommunication.inf + 2e5b357a1f SecurityPkg/Tpm2InstanceLibFfa: Fix constructor wrong name + 5ea30a061c MdeModulePkg/HiiDatabaseDxe: Fix BlockSize length + b3a2f7ff24 NetworkPkg/IScsiDxe:Fix for out of bound memory access for bz4207 (CVE-2024-38805) + 607c58ef01 .github: Compare collaborator GitHub ID's in single case + 399a40e5cb ArmVirtPkg: Fix dsc include ordering + b2db39cefe MdeModulePkg: Correct Usb Mouse Z for absolute pointer. + fc215474c4 UefiCpuPkg: Enable the IPI vectors on LoongArch + 7cea938ac5 UefiCpuPkg: Fix a bug about MP init on LoongArch + 43e29830ef BaseTools: Fix Macro Expansion on Machine Architecture for Components + 5bc52de687 MdeModulePkg: DebugImageInfoTable: Fix Array Maintenance + 867fad874a MdeModulePkg: Fix Image Memory Protection Applying + 28653a1c8a UefiCpuPkg/PiSmmCpuDxeSmm: Fix SMRAM memory leak during S3 resume + d6101acb08 MdeModulePkg: Shortcircuit GCD Dumping Logic if Not Printing + 2cff8743ce MdeModulePkg/Spi: Solving potential null ptr deref. in SpiNorFlashJedecSfdp + 02ec228654 BaseTools: Change arm align value from 32 to 64 + 77b199b7b9 BaseTools: Update tools_def for aarch64 + dca5d26bc5 UefiCpuPkg/MpInitLib: Fix SNP AP creation when using known APIC IDs + dd8c272555 MdeModulePkg/AcpiTableDxe: Add function for extract ACPI table from HOB. + 225bf1277c RedfishPkg/RedfishExDxe: call platform device wanted lib + b2c4294c49 RedfishPkg: introduce platform wanted device lib + 31fc56c70a ArmFfaLib: Replace SMCCC_VERSION check with FF-A version check + 9948a30645 MdePkg/IndustryStandard: fix PASID supported bit + 8aad683e59 ArmVirtPkg,DynamicTablesPkg,EmbeddedPkg,OvmfPkg: use MdePkg BaseFdtLib + 37652b830e ArmVirtPkg/ArmVirtCloudHv: add missing PrePiLib dependency/resolution + a862c07a3a MdePkg/BaseFdtLib: add FdtGetPropertyW wrapper + cc52f88e61 MdePkg/BaseFdtLib: add FdtSubnodeOffset prototype + e25331fc45 MdePkg,UefiPayloadPkg: clean up BaseFdtLib API confusion + e1dee2bcfa MdeModulePkg SpiBus: Use correct GUID + defdccd4ae ShellPkg: Add PCIe extended capability + aa32d2cfc2 MdePkg: Add additional PCIe extended capabilities + 98351bb0d9 NetworkPkg: Add PCD for HTTP transfer buffer size + d985bd4b97 BaseTools: Scripts: efi_debugging.py: search for EFI_SYSTEM_TABLE_POINTER + 55b4688157 BaseTools/Conf: Enable GCC preprocessor line-markers for VFR + bf99048365 BaseTools: Add support for GCC preprocessor line directives + 091bd7958b ReadMe.rst: Update pipeline badges for new pipelines + 7664c0b4a6 DynamicTablesPkg: Fix incorrect WSMT table size + 5ccb5fff02 MdeModulePkg: DxeCore: Set Image Protections Through GCD + 6c6d6f42db MdeModulePkg: DxeCore: Lower Image Protection Print to Verbose Log Level + 856bdc8eec OvmfPkg/CcExitLib: Use the proper register when filtering MSRs + 956ef6cd8b ArmPkg/ArmScmiDxe: Use array indexing to access adjacent buffers + c6db76402c MdeModulePkg BmDriverHealth.c: Support dump the driver name + 135e07c6e5 DeviceManagerUiLib:Update DeviceManager form data when the form opens. + 864cc900ab DisplayEngineDxe: Fix length when displaying menu string + 7711e8a167 DynamicTablesPkg: Add Dbg2Generator Hostbased test + d8d47a0ae6 DynamicTablesPkg: Add support for non-serial DBG2 devices + 42c6deb6f8 DynamicTablesPkg/AcpiDbg2Lib.inf: Add support for X64 Build + 8910f722c9 OvmfPkg/VirtMmCommunicationDxe: stop on init failure + 4846ac933f ArmVirtPkg: set PcdQemuVarsRequire + 9af96e21d8 OvmfPkg: add PcdQemuVarsRequire + cd6f84b70c ArmVirtPkg/ArmVirtQemu: add QEMU_PV_VARS option + 44989944a0 OvmfPkg/OvmfPkgX64: add QEMU_PV_VARS option + 9dd47eeea1 OvmfPkg: add new VirtMmCommunicationDxe driver + d198c80157 OvmfPkg: add IndustryStandard/QemuUefiVars.h + d85ee54d53 OvmfPkg/HardwareInfoLib: add support for qemu vars device + 26fb5edff3 MdeModulePkg/ArmFfaLib: Add depex on gEfiPeiMemoryDiscoveredPpiGuid + 002d69ad9e OvmfPkg: Update ubuntu VM image to 24.04 + 06746e4b06 EmulatorPkg: Update ubuntu VM image to 24.04 + e944c98e1b ArmVirtPkg: Update ubuntu VM image to 24.04 + 1ac795ea6c .azurepipelines: Update ubuntu VM image to 24.04 + b833c2f3a6 .pytool: Update pipeline filename instructions + ab3a451b1b OvmfPkg: Update pipeline filenames + b9f565f8c9 EmulatorPkg: Update pipeline filenames + 1566205a40 ArmVirtPkg: Rename Linux pipeline file + a0d785a560 .azurepipelines: Update pipeline filenames + d3b2ee2df3 ShellPkg: Updated Memory Form Factor definition per SMBIOS 3.8.0 + 1c4c85a003 MdePkg/Library: Remove unused gEfiDevicePathProtocolGuid + be4ae9a97d MdePkg/Include/Ppi: Add back gEdkiiPeiMpServices2PpiGuid + 3c79bd38e0 UefiCpuPkg: Add back gEdkiiPeiMpServices2PpiGuid + 63e4713c48 OvmfPkg: switch 4M builds to full openssl + 30c754d853 OvmfPkg: move openssl/tls library config to .dsc.inc file + f96d38f432 ArmPkg/ArmScmiDxe: Fix SCMI param overwrite in multi-transaction scenario + 8406e672e8 MdePkg: Updated Memory Form Factor definition per SMBIOS 3.8.0 + 99a5f388df UefiPayloadPkg: Fix a typo in SMM base + 238dfc54d0 UefiPayloadPkg: Add MemoryTypeInformation HOB + 19c6189f54 UefiPayloadPkg: Fix SMM build failure + 003873db21 MdeModulePkg: PiSmmIpl: Fix physical address dereferencing + 2e85d12685 CryptoPkg: Resolve CodeQL Errors + 62390a89c5 MdePkg: Fix typos in PerformanceLib.h + 5e5ca20bf7 Maintainers.txt: Add Kun Qin as reviewer for ARM-FFA folders in SecurityPkg + 548c29129c SecurityPkg: Tpm2InstanceLibFfa: Introduce Tpm2InstanceLib over FF-A + 86d5680817 SecurityPkg: Tpm2DeviceLibFfa: Introduce TPM device library over FF-A + df77417d39 SecurityPkg: Tpm2ServiceFfa: Introduce TPM over FF-A Definitions + 7d297e370e SecurityPkg: Tcg2AcpiFfa: Add Tcg2Acpi for FFA enabled ARM platforms + 219c3bac05 SecurityPkg: SmmTcg2PhysicalPresenceLib: Add ARM platforms implementation + ec5d8ad35f SecurityPkg: Tcg2StandaloneMmArm: Add Tcg2StandaloneMm for ARM platforms + f89ae9ca2a SecurityPkg: PhysicalPresenceData: Add a GUID used for ACPI functions + 29960f389f MdePkg: Add conditional backwards compatibility to MpServices2 aliases + e5dae263fe UefiCpuPkg/S3Resume2Pei: Rename EDKII_PEI_MP_SERVICES2_PPI + 7aa2b3106c UefiCpuPkg/Test: Rename EDKII_PEI_MP_SERVICES2_PPI + 1d6b8aafa7 UefiCpuPkg/Library: Rename EDKII_PEI_MP_SERVICES2_PPI + b66d325cc0 UefiCpuPkg/Include: Rename EDKII_PEI_MP_SERVICES2_PPI + 7de3a1014f UefiCpuPkg/CpuMpPei: Rename EDKII_PEI_MP_SERVICES2_PPI + 997e4e393f OvmfPkg: Rename EDKII_PEI_MP_SERVICES2_PPI + aef50446ce UefiCpuPkg: Remove EDKII_PEI_MP_SERVICES2_PPI + 27b063a1ff MdePkg: Add EFI_PEI_MP_SERVICES2_PPI + 89b595d115 OvmfPkg/QemuKernelLoaderFsDxe: fix allocation failure check + be720b8d6c EmbeddedPkg: Add two new APIs in PrePiHobLib + 9ae1c8d425 ArmVirtPkg: Add two new APIs in ArmVirtDxeHobLib + 6b48cdc917 StandaloneMmPkg: Add two new APIs in HobLib + cdd31b6460 UefiPayloadPkg: Add two new APIs in HobLib + a9cf419ed9 MdeModulePkg: Add two new APIs in BaseHobLibNull + 161fa22bef MdePkg: Add two new APIs in HobLib + 3872c38049 MdePkg/Include: Add two new APIs in HobLib.h + cd76265f1a OvmfPkg: Enable Smbios measurement + 8d3c7c196d DynamicTablesPkg: AcpiSpcrLib: Support as-is baud rate setting + 28b952a56b MdePkg: Add as-is baud rate setting to SPCR + edaae7bc75 ShellPkg: AcpiView: Add parser support for SPCR Revision 4 + 605582551a DynamicTablesPkg: AcpiSpcrLib: Add support for SPCR revision 4 + 1f6c875d37 SecurityPkg/OpalPasswordDxe: Improve the function to get device name + c2d8e92367 SecurityPkg-Tpm2DeviceLibDTpm: Check SNP enabled prior to using AmdSvsmLib + eefd4fdb78 SecurityPkg: Update SecureBootVariableLibUnitTest + bfb1a45eec SecurityPkg: SecureBootVariableLib: Prevent Invalid DBX + 5f5cf1c1ab Remove unnecessary RsaFree call in failing path + fce142fd31 SecurityPkg/AuthVariableLib: Fix memory leak in CheckSignatureListFormat + 2e81eb8f05 MdeModulePkg/PlatformDriOverrideDxe:Fix typos + 1968afafb0 MdeModulePkg/DriverHealthManagerDxe:Fix typo + 948d4ba0be MdeModulePkg/UsbMassStorageDxe: Remove excessive logging + b917a5b7b3 MdeModulePkg/UsbMassStorageDxe: Remove Port Reset + 0f1c0d2d2d BaseTools:Expression.py Adding a check for missing '}' in the parser + 1805068b5e BaseTools:Expression.py Add Assertion for PCD with value {} + a1b623b938 BaseTools:Expression.py Size used before Init + fdede2e1ea MdeModulePkg: Update MM buffer structs alignment + c5e3a840b9 UefiCpuPkg: Add StmmCore for IntelMmSaveStateLib,SmmCpuPlatformHookLibNull. + 51229eee58 ArmPkg,ArmVirtPkg,UefiPayloadPkg: make PcdVFPEnabled ARM-only + 6d886c3054 ArmPkg/CpuDxe: drop unused PcdVFPEnabled declaration + 6952d1fa90 ArmPlatformPkg/Sec: clean up FP enabling code + 0368687299 ArmVirtPkg: clean up FP enabling code + 7fe2436480 ArmPkg/ArmLib: don't check for FP support on AArch64 + 6ddfd378e5 MdeModulePkg/BootManagerUiLib: hide UiApp from boot entries + 7c6ef8eac2 BaseTools: Fix FMMT Compress wrong behavior + 18988ea3e6 MdeModulePkg: ArmFfaLib: Move Rx/Tx hob definition to Include/Guid folder + be03ceb117 ArmPkg: ArmFfaLib: Move ArmFfaLib implementation to MdeModulePkg + 937ffef8ed ArmPkg: ArmFfaLib.h: Move to MdePkg + 541c46a705 ArmPkg: ArmSvcLib: Move ArmSvcLib to MdePkg + 211bb9b839 ArmPkg: ArmSmcLibNull: Move ArmSmcLibNull to MdePkg + 86099b948b ArmPkg: ArmSmcLib: Move ArmSmcLib to MdePkg + 014689399f ArmPkg: FF-A headers: Move to MdePkg + 9bcb2e41f7 ArmPkg: ArmStdSmc.h: Move to MdePkg + ec91ff2451 MdeModulePkg/DisplayEngineDxe:Fix typos in comments. + d8531a1e1a UefiPayloadPkg: Add support for Firmware Volume Block Protocol + 034de59fb7 UefiPayloadPkg: Add SmmStoreLib + c67d975cfc UefiPayloadPkg: Add SmmStoreInfoGuid + d23edb21a3 UefiPayloadPkg/Include/Coreboot: Add definitions for SMMSTOREv2 table + 70df56728f Increase FVMAIN Size for Compatibility with 2MB Size Limit + 4e4edd0f07 StandaloneMmPkg/Core: Performance logging for MM driver load and start + 7aa96096a3 UefiPayloadPkg: Drop SmbiosVersionLib for SmbiosDxe on AArch64 + d79d8d6a8d SecurityPkg: Update SecurityFixes.yaml for CVE-2024-38797 + 025ab811fb SecurityPkg: Improving SecureBootConfigImpl:HashPeImageByType () logic + b90693965b SecurityPkg: Improving HashPeImageByType () logic + 5f08635ee7 SecurityPkg: Out of bound read in HashPeImageByType() + e4140a5701 ShellPkg: Added ArmV9 processors support for SmbiosView command + d0b64b21a3 BaseTools: Dump library dependency chain on build failure + c9ff197059 UefiPayloadPkg: UefiPayloadEntry: Don't use reserved DRAM + 1d5063763b GitHub Action: Bump actions/create-github-app-token from 1 to 2 + f3e02ae545 StandaloneMmPkg: MmCommunicationDxe: Add EFI_MM_COMMUNICATION3_PROTOCOL + bed033dbf7 StandaloneMmPkg: StandaloneMmIplPei: Add EFI_PEI_MM_COMMUNICATION3_PPI + 05f47b8486 MdeModulePkg: PiSmmIpl: Update MessageLength calculation for MmCommunicate + 249ca10af0 StandaloneMmPkg: StandaloneMmCore: Parsing new MM communicate header + 9dec81092b MdeModulePkg: PiSmmCore: Added parser of new MM communicate header + 3da340ccdd MdePkg: MmCommunication: Introduce EFI_PEI_MM_COMMUNICATION3_PPI to MdePkg + 11cc0d639e MdePkg: MmCommunication: Introduce EFI_MM_COMMUNICATION3_PROTOCOL to MdePkg + 7d1b9d3c3c MdePkg: MmCommunication: Introduce EFI_MM_COMMUNICATE_HEADER_V3 to MdePkg + 59805c7697 ShellPkg/SmbiosView: Decode for InterfaceTypeSpecificData of SMBIOS type42 + 7e8cd32353 MdePkg/IndustryStandard: Define enums of MCTPHostInterface from DSP0239 + cf5a955774 MdePkg/IndustryStandard: Fix typos in IoRemappingTable.h + e0b2187754 MdeModulePkg/CustomizedDisplayLib:Fix wrong ColumnIndexWidth special case. + 8baa1c5120 ArmPkg: ArmStandaloneMmCoreEntryPoint: Support 18 register DIRECT_REQ2 + 8d03c42d38 ArmPkg: ArmFfaLib: Update FF-A direct message to support 18 registers + 47b793f38c ArmPkg: ArmSvcLib: Support all 18 registers + c0ecd11e62 ArmPkg: ArmSmcLib: Support all 18 registers + 213973e9e5 EmulatorPkg: Add stub to read redfish host interface serial number + 4a055eb486 RedfishPkg: Populate serial number in SMBIOS type 42 record + 76c282b075 Maintainers.txt: Add new maintainer to BaseTools section + 069dfae3e5 MdePkg: Fix typo in I2cMaster.h, SetBusFrequench -> SetBusFrequency + 30f3fa0af7 StandaloneMmCorePerformanceLib.inf: Add gEfiEventExitBootServicesGuid + 09faa4a1ce BaseTools/build: Reduce special FV full to warning + a088d9ceb0 ArmPlatformPkg/PeilessSec: drop _SetSVCMode sequence for Arm + ad6639cf3e ArmPlatformPkg/PeilessSec: drop _SetSVCMode symbol from AArch64 + 5d3314d0bf MdeModulePkg/Core: Add Hot Pluggable type to Attribute Conversion Table + 3907f8a0ba RedfishPkg/RedfishHttpDxe : Fix the incorrect length of the Basic Auth + 9006a9b5e4 PrmPkg: Correct the flags for X64 GCC compiler + 14b730cde8 MdeModulePkg/Universal: Remove dynamic PcdStatusCodeUseSerial usage in MM + 5c6fea49ee StandaloneMmPkg: Produce gMmStatusCodeUseSerialHobGuid HOB + b7ef717177 StandaloneMmPkg: Add gMmStatusCodeUseSerialHobGuid HOB definition + a7ab45ace2 BaseTools/FMMT: Fix GUID Tool Not Found the Shell Script Issue + 95bf74fac1 MdeModulePkg/DxeCorePerformanceLib: Fix incorrect size calculation + e01f4180b3 BaseTools: Fix missing module PCD in compile information of build report + b279ac9f36 BaseTools/GenFv: Ensure the minimum pad file size for the FV with VTF + 1c51a268b7 MdeModulePkg: Add Standalone MM perf library support + 11b44c5cd1 MdeModulePkg: Add Standalone MM Core performance support + 874c24baae MdeModulePkg/DxeCorePerformanceLib: Use EFI_MM_COMMUNICATE_HEADER + cd387d2c77 UefiCpuPkg MpInformation2.h: Include PiMultiPhase.h + 2a3926dadc MdePkg: IndustryStandard: Rename ACPI SPCR revision 4 structure + 589be8d301 Maintainers.txt: Update StandaloneMmPkg reviewer + 2eac71a1ee OvmfPkg/IntelTdx: Cache and measure FwCfg + 81c2c92074 OvmfPkg/PlatformPei: Cache and measure FwCfg items + 4d2af7b91a OvmfPkg: Refactor QEMU_FW_CFG_CACHE_WORK_AREA + fb56dc78ef OvmfPkg/QemuFwCfgLib: Support Cache FwCfg with optional measurement + be529ef3c9 OvmfPkg/QemuFwCfgLib: Add FwCfg cache interface + 63408b2895 OvmfPkg/PeilessStartupLib: Build PlatformInfoHob before InitializePlatform + f66078a713 OvmfPkg/PlatformInitLib.h: Add QEMU_FW_CFG_CACHE_WORK_AREA + 151326e542 OvmfPkg.dec: Add gOvmfFwCfgInfoHobGuid + ebba67b754 SecurityPkg: Add TpmMeasurementLib for SEC phase + 425d97caef Maintainers.txt: Add Shuo Liu as UefiPayloadPkg Reviewer + 22919e560b MdeModulePkg/VarCheckHiiLib: clean up VarCheckHiiLibReceiveHiiBinHandler + f6aba88ac8 MdeModulePkg/VarCheckHiiLib: don't return success for invalid input + 1c6ce560f0 ArmPkg: Add a protocol notification for gEfiDxeMmReadyToLockProtocolGuid + f1a2bd2333 MdeModulePkg/XhciDxe: Adjust out-of-range bInterval values + 70db6510d1 MdeModulePkg/XhciDxe: Refactor endpoint interval calculation + 17cdc512f0 NetworkPkg/IScsiDxe:Fix for Remote Memory Exposure in ISCSI bz4206 + 2fe270a361 UefiCpuPkg: Remove TdxMeasurementLib + 62e28d89c4 OvmfPkg: Update the .INF file for the changes of TdxMeasurementLib + f919709c86 MdeModulePkg: Move TdxMeasurementLib from UefiCpuPkg + 5a1c723cfa ArmVirtPkg: Kvmtool: Rely on InterruptMap to generate PCI related tables + 8c208049d4 ArmVirtPkg: Kvmtool: Advertise all serial ports + 9bceb16000 Maintainers.txt: Add reviewer for SVSM vTPM related modules + 06b2f9dc43 OvmfPkg: Use Tpm2Device lib with SVSM vTPM support + e868ece3c7 SecurityPkg/Tpm2DeviceLibDTpm: Add TPM2 lib supporting SVSM vTPM + edf5e365c1 SecurityPkg/Tpm2DeviceLibDTpm: Add header file for Tpm2Ptp.c + 87f454532a SecurityPkg/Tpm2DeviceLibDTpm: Improve spelling/grammar of comments + 40b4e190d3 OvmfPkg/AmdSvsmLib: Add the SVSM vTPM protocol + 70f806ec23 MdePkg/AmdSev: Add SVSM protocol vTPM call numbers + 87d4cdd09e UefiCpuPkg/AmdSvsmLib: Stub the SVSM vTPM protocol for non-VMPL0 guests + 458198aa49 OvmfPkg/AmdSvmLib: Use named protocol and call constants + fa74200c92 MdePkg/AmdSev: Add SVSM protocol call numbers + e095a3c59b .mergify: Use tianocore-issues to rebase PRs for merge + 015c4a37c3 StandaloneMmPkg: Disable assert when gMmCommBufferHobGuid not found. + f47d897f93 UnitTestFrameworkPkg: Avoid duplicate library function names + 9ac1704af6 OvmfPkg: Use user-specified opt/ovmf/X-PciMmio64Mb value unconditionally + 2aff039da7 UefiPayloadPkg: Parse PCI RB Segment info when its available in FDT + 1e0051e293 BaseTools: Fix Debug Macro Checking to Include Scanning Files + 25ccb6ec54 DynamicTablesPkg/AcpiFacsLib: Fix Issue from Debug Macro Checking + dd5cce3e53 OvmfPkg/PlatformBootManagerCommonLib: Set UiApp as an optional boot option + ca278f14c2 OvmfPkg/PlatformBootManagerCommonLib: Disable autoboot for EFI Shell + 4e19daa852 ArmVirtPkg: use BootManagerMenuApp as BootManagerMenu + 6bfd522477 ArmVirtPkg: add BootManagerMenuApp to dependencies. + f25e3d0d2c OvmfPkg/HardwareInfoLib: Reserve device type ID for SVSM + e489721275 DynamicTablesPkg/AcpiSsdtCpuTopologyLib: Correct _STA method for X64 + 6c30f430bd Maintainers.txt: Transfer Ray's Reviewer role to Dandan + dfecb2646f CapsuleApp: Fix proper return after capsule update + 80c04eb46f NetworkPkg/HttpBootDxe: Add proxy connect flow to *GetBootFile() + 884585818f NetworkPkg/HttpBootDxe: Add ProxyUri handling in start/stop path. + 69b0bed49e Network/HttpBootDxe: Modify device path parser to detect Proxy URI node. + cd397f16a5 NetworkPkg/HttpBootDxe: Added ProxyUri field to HTTP_BOOT_PRIVATE_DATA. + 592ff1e98f MdeModulePkg/UefiBootManagerLib: Handle device path with Proxy URI. + 7f0fc4189a NetworkPkg/HttpBootDxe: Use ProxyUri from HII to build boot option + 3e0d879a08 NetworkPkg/HttpBootDxe: Add Proxy URI field to HII. + fa21977197 NetworkPkg/HttpDxe: Add HTTPS handling in HTTP CONNECT path. + f5148b1267 NetworkPkg/HttpDxe: Added support for HTTP CONNECT request. + 2880ca12ce MdePkg/Http: Add EFI_HTTP_CONNECT_REQUEST_DATA structure + 4b1a426487 MdePkg: Add ACPI CEDT table structures + a093f6eccd PrmPkg: Align Data Buffer Signature to Spec + 842c4c8afd PrmPkg: PRM support for non-existent MMIO ranges + 168180aa04 Removing Chinni from maintainer list + 8e9d56f8ee DynamicTablesPkg: Tolerate NULL when freeing MADT table + dfe43d74bc DynamicTablesPkg: Resolve cppcheck findings in macros + 81031a51a0 BaseTools: Disable VS2019/2022 ARM/AARCH64 Stack Cookies + 03e66e0a03 BaseTools/Source/C: Disable VS flexible array member warning + 71188e9063 BaseTools: Add BUILDRULEFAMILY for CLANGDWARF + 72db37b2f1 StandaloneMmPkg/Library: Print warning message if GUID HOB not found + de13423277 UnitTestFrameworkPkg: Fix host test /WHOLEARCHIVE regression + 35cf1d7eb0 MdePkg: fix fru device description string copy error. + 2b6f979744 workflows: Add UniversalPayload in to git work flow + 988ea5f571 UefiPayloadPkg: Add stuart build support. + d684097661 .github/stale.yml: Exempt type:code-first changes + 1cc2af8a64 .github: Add EDK II Code First form + 6234d09f75 OvmfPkg/PlatformInitLib: fix typo + deee46d276 CryptoPkg/Library/OpensslLib: Fix CLANG compatibility issues + 19e2b06625 UefiPayloadPkg: Add new option "--add_cc_flags" in UniversalPayloadBuild.py + a0d2a64ada UefiPayloadPkg: Add macro to control HandOffFdt configuration + f4d93446be pip-requirements.txt: Update pip modules + 99625fe4b2 MdePkg: delete EFI 1.10 USB Host Controller Protocol + cc910e4c08 ShellPkg: drop support for obsolete EFI_USB_HC_PROTOCOL + 1c96d59e71 MdeModulePkg/UhciDxe: drop unused UsbHcProtocol references + 17a90f66d6 MdeModulePkg/UsbBusDxe: drop support for obsolete EFI_USB_HC_PROTOCOL + 67df979ad2 DebugMacroCheck: Do not show progress bar with zero items + dea4e20bd4 MdeModulePkg: Add duplicate exception for gUiAppFileGuid + 20247e2342 ArmPkg/ArmTransferListLib: improve coding style compliance + 6782a2b5fc OvmfPkg: add new runtime config option to documentation for FirmwareSetup + d147d384ac OvmfPkg/PlatformBootManagerCommonLib: Introduce OvmfFindLoadOption + 9b6da0b80b OvmfPkg: Add duplicate exception for gUiAppFileGuid + d433b4c8e4 OvmfPkg/PlatformBootManagerLib: Register UiApp as an optional boot option ++++ 93 more lines (skipped) ++++ between /work/SRC/openSUSE:Factory/ovmf/ovmf.changes ++++ and /work/SRC/openSUSE:Factory/.ovmf.new.19631/ovmf.changes Old: ---- edk2-edk2-stable202502.tar.gz ovmf-Increase-FVMAIN-Size-for-Compatibility-with-2MB-Size.patch ovmf-Maintainers.txt-Add-reviewer-for-SVSM-vTPM-related-m.patch ovmf-MdePkg-AmdSev-Add-SVSM-protocol-call-numbers.patch ovmf-MdePkg-AmdSev-Add-SVSM-protocol-vTPM-call-numbers.patch ovmf-OvmfPkg-AmdSvmLib-Use-named-protocol-and-call-consta.patch ovmf-OvmfPkg-AmdSvsmLib-Add-the-SVSM-vTPM-protocol.patch ovmf-OvmfPkg-Use-Tpm2Device-lib-with-SVSM-vTPM-support.patch ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-TPM2-lib-supportin.patch ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-header-file-for-Tp.patch ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Check-SNP-enabled-prio.patch ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Improve-spelling-gramm.patch ovmf-UefiCpuPkg-AmdSvsmLib-Stub-the-SVSM-vTPM-protocol-fo.patch New: ---- edk2-edk2-stable202505.tar.gz BETA DEBUG BEGIN: Old:- Remove the following patches because they are merged to edk2-stable202505: - 70df56728f ovmf-Increase-FVMAIN-Size-for-Compatibility-with-2MB-Size.patch - 9bceb16000 ovmf-Maintainers.txt-Add-reviewer-for-SVSM-vTPM-related-m.patch Old: - 70df56728f ovmf-Increase-FVMAIN-Size-for-Compatibility-with-2MB-Size.patch - 9bceb16000 ovmf-Maintainers.txt-Add-reviewer-for-SVSM-vTPM-related-m.patch - 87d4cdd09e ovmf-UefiCpuPkg-AmdSvsmLib-Stub-the-SVSM-vTPM-protocol-fo.patch Old: - 458198aa49 ovmf-OvmfPkg-AmdSvmLib-Use-named-protocol-and-call-consta.patch - fa74200c92 ovmf-MdePkg-AmdSev-Add-SVSM-protocol-call-numbers.patch - 70f806ec23 ovmf-MdePkg-AmdSev-Add-SVSM-protocol-vTPM-call-numbers.patch Old: - fa74200c92 ovmf-MdePkg-AmdSev-Add-SVSM-protocol-call-numbers.patch - 70f806ec23 ovmf-MdePkg-AmdSev-Add-SVSM-protocol-vTPM-call-numbers.patch - edf5e365c1 ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-header-file-for-Tp.patch Old: - 06b2f9dc43 ovmf-OvmfPkg-Use-Tpm2Device-lib-with-SVSM-vTPM-support.patch - 458198aa49 ovmf-OvmfPkg-AmdSvmLib-Use-named-protocol-and-call-consta.patch - fa74200c92 ovmf-MdePkg-AmdSev-Add-SVSM-protocol-call-numbers.patch Old: - 87d4cdd09e ovmf-UefiCpuPkg-AmdSvsmLib-Stub-the-SVSM-vTPM-protocol-fo.patch - 40b4e190d3 ovmf-OvmfPkg-AmdSvsmLib-Add-the-SVSM-vTPM-protocol.patch - 06b2f9dc43 ovmf-OvmfPkg-Use-Tpm2Device-lib-with-SVSM-vTPM-support.patch Old: - 40b4e190d3 ovmf-OvmfPkg-AmdSvsmLib-Add-the-SVSM-vTPM-protocol.patch - 06b2f9dc43 ovmf-OvmfPkg-Use-Tpm2Device-lib-with-SVSM-vTPM-support.patch - 458198aa49 ovmf-OvmfPkg-AmdSvmLib-Use-named-protocol-and-call-consta.patch Old: - edf5e365c1 ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-header-file-for-Tp.patch - e868ece3c7 ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-TPM2-lib-supportin.patch - 87f454532a ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Improve-spelling-gramm.patch Old: - 70f806ec23 ovmf-MdePkg-AmdSev-Add-SVSM-protocol-vTPM-call-numbers.patch - edf5e365c1 ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-header-file-for-Tp.patch - e868ece3c7 ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-TPM2-lib-supportin.patch Old: - 87f454532a ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Improve-spelling-gramm.patch - c2d8e92367 ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Check-SNP-enabled-prio.patch - Refresh patches: Old: - e868ece3c7 ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Add-TPM2-lib-supportin.patch - 87f454532a ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Improve-spelling-gramm.patch - c2d8e92367 ovmf-SecurityPkg-Tpm2DeviceLibDTpm-Check-SNP-enabled-prio.patch Old: - 9bceb16000 ovmf-Maintainers.txt-Add-reviewer-for-SVSM-vTPM-related-m.patch - 87d4cdd09e ovmf-UefiCpuPkg-AmdSvsmLib-Stub-the-SVSM-vTPM-protocol-fo.patch - 40b4e190d3 ovmf-OvmfPkg-AmdSvsmLib-Add-the-SVSM-vTPM-protocol.patch BETA DEBUG END: ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ ovmf.spec ++++++ --- /var/tmp/diff_new_pack.8zQyjl/_old 2025-06-11 16:20:54.426408783 +0200 +++ /var/tmp/diff_new_pack.8zQyjl/_new 2025-06-11 16:20:54.430408950 +0200 @@ -27,7 +27,7 @@ %endif Name: ovmf -Version: 202502 +Version: 202505 Release: 0 Summary: Open Virtual Machine Firmware License: BSD-2-Clause-Patent @@ -74,21 +74,8 @@ Patch11: %{name}-BaseTools-Using-gcc12-for-building-image.patch %endif %endif -Patch12: %{name}-Increase-FVMAIN-Size-for-Compatibility-with-2MB-Size.patch # Bug 1240420 - UEFI boot breaks: X64 Exception Type - 0E(#PF - Page-Fault) CPU Apic ID - 00000000 Patch13: %{name}-UefiCpuPkg-Disable-EFI-memory-attributes-protocol.patch -# Add vTPM support for SVSM in OVMF (jsc#PED-12743, jsc#PED-12767) -Patch14: %{name}-Maintainers.txt-Add-reviewer-for-SVSM-vTPM-related-m.patch -Patch15: %{name}-UefiCpuPkg-AmdSvsmLib-Stub-the-SVSM-vTPM-protocol-fo.patch -Patch16: %{name}-OvmfPkg-AmdSvsmLib-Add-the-SVSM-vTPM-protocol.patch -Patch17: %{name}-OvmfPkg-Use-Tpm2Device-lib-with-SVSM-vTPM-support.patch -Patch18: %{name}-OvmfPkg-AmdSvmLib-Use-named-protocol-and-call-consta.patch -Patch19: %{name}-MdePkg-AmdSev-Add-SVSM-protocol-call-numbers.patch -Patch20: %{name}-MdePkg-AmdSev-Add-SVSM-protocol-vTPM-call-numbers.patch -Patch21: %{name}-SecurityPkg-Tpm2DeviceLibDTpm-Add-header-file-for-Tp.patch -Patch22: %{name}-SecurityPkg-Tpm2DeviceLibDTpm-Add-TPM2-lib-supportin.patch -Patch23: %{name}-SecurityPkg-Tpm2DeviceLibDTpm-Improve-spelling-gramm.patch -Patch24: %{name}-SecurityPkg-Tpm2DeviceLibDTpm-Check-SNP-enabled-prio.patch BuildRequires: bc BuildRequires: cross-arm-binutils ++++++ edk2-edk2-stable202502.tar.gz -> edk2-edk2-stable202505.tar.gz ++++++ /work/SRC/openSUSE:Factory/ovmf/edk2-edk2-stable202502.tar.gz /work/SRC/openSUSE:Factory/.ovmf.new.19631/edk2-edk2-stable202505.tar.gz differ: char 13, line 1 ++++++ ovmf-Revert-Add-Stack-Cookie-Support-to-MSVC-and-GCC.patch ++++++ --- /var/tmp/diff_new_pack.8zQyjl/_old 2025-06-11 16:20:54.578415119 +0200 +++ /var/tmp/diff_new_pack.8zQyjl/_new 2025-06-11 16:20:54.590415619 +0200 @@ -1,17 +1,18 @@ -From 7b9e33357945b23e6bcdb21fb9d0ba5859ad9b0b Mon Sep 17 00:00:00 2001 +From 772bda5290449d46546b7b19cda083ed50536e7b Mon Sep 17 00:00:00 2001 From: Richard Lyu <richard....@suse.com> -Date: Tue, 14 Jan 2025 19:31:48 +0800 -Subject: [PATCH] ovmf Revert add stack cookie support to MSVC and GCC +Date: Thu, 29 May 2025 14:25:56 +0800 +Subject: [PATCH] Revert "BaseTools: Add Stack Cookie Support to MSVC and GCC + IA32/X64/ARM/AARCH64" This reverts commit f53f029122d4493e9db95e2424dd8f067f247661. --- - BaseTools/Conf/tools_def.template | 65 +++++++++++++++---------------- - 1 file changed, 31 insertions(+), 34 deletions(-) + BaseTools/Conf/tools_def.template | 41 ++++++++++++++----------------- + 1 file changed, 19 insertions(+), 22 deletions(-) -Index: edk2-edk2-stable202502/BaseTools/Conf/tools_def.template -=================================================================== ---- edk2-edk2-stable202502.orig/BaseTools/Conf/tools_def.template -+++ edk2-edk2-stable202502/BaseTools/Conf/tools_def.template +diff --git a/BaseTools/Conf/tools_def.template b/BaseTools/Conf/tools_def.template +index de86f96733..2a479365da 100755 +--- a/BaseTools/Conf/tools_def.template ++++ b/BaseTools/Conf/tools_def.template @@ -21,9 +21,8 @@ # - Add GCC and GCCNOLTO # - Deprecate GCC48, GCC49 and GCC5. @@ -23,7 +24,7 @@ IDENTIFIER = Default TOOL_CHAIN_CONF -@@ -636,9 +635,9 @@ NOOPT_VS2017_AARCH64_DLINK_FLAGS = /NO +@@ -636,9 +635,9 @@ NOOPT_VS2017_AARCH64_DLINK_FLAGS = /NOLOGO /NODEFAULTLIB /IGNORE:4001 /OPT:REF *_VS2019_IA32_PP_PATH = DEF(VS2019_BIN_IA32)\cl.exe *_VS2019_IA32_ASM_PATH = DEF(VS2019_BIN_IA32)\ml.exe @@ -36,7 +37,7 @@ DEBUG_VS2019_IA32_ASM_FLAGS = /nologo /c /WX /W3 /Cx /coff /Zd /Zi RELEASE_VS2019_IA32_ASM_FLAGS = /nologo /c /WX /W3 /Cx /coff /Zd -@@ -666,9 +665,9 @@ NOOPT_VS2019_IA32_DLINK_FLAGS = /NOLOG +@@ -666,9 +665,9 @@ NOOPT_VS2019_IA32_DLINK_FLAGS = /NOLOGO /NODEFAULTLIB /IGNORE:4001 /OPT:REF /O *_VS2019_X64_DLINK_PATH = DEF(VS2019_BIN_X64)\link.exe *_VS2019_X64_ASLDLINK_PATH = DEF(VS2019_BIN_X64)\link.exe @@ -49,33 +50,7 @@ DEBUG_VS2019_X64_ASM_FLAGS = /nologo /c /WX /W3 /Cx /Zd /Zi RELEASE_VS2019_X64_ASM_FLAGS = /nologo /c /WX /W3 /Cx /Zd -@@ -696,9 +695,9 @@ NOOPT_VS2019_X64_DLINK_FLAGS = /NOLOG - *_VS2019_ARM_ASLPP_PATH = DEF(VS2019_BIN_ARM)\cl.exe - *_VS2019_ARM_ASLDLINK_PATH = DEF(VS2019_BIN_ARM)\link.exe - -- DEBUG_VS2019_ARM_CC_FLAGS = /nologo /c /WX /GS /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi- --RELEASE_VS2019_ARM_CC_FLAGS = /nologo /c /WX /GS /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi- --NOOPT_VS2019_ARM_CC_FLAGS = /nologo /c /WX /GS /W4 /Gs32768 /D UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi- -+ DEBUG_VS2019_ARM_CC_FLAGS = /nologo /c /WX /GS- /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi- -+RELEASE_VS2019_ARM_CC_FLAGS = /nologo /c /WX /GS- /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi- -+NOOPT_VS2019_ARM_CC_FLAGS = /nologo /c /WX /GS- /W4 /Gs32768 /D UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi- - - DEBUG_VS2019_ARM_ASM_FLAGS = /nologo /g - RELEASE_VS2019_ARM_ASM_FLAGS = /nologo -@@ -722,9 +721,9 @@ NOOPT_VS2019_ARM_DLINK_FLAGS = /NOL - *_VS2019_AARCH64_ASLPP_PATH = DEF(VS2019_BIN_AARCH64)\cl.exe - *_VS2019_AARCH64_ASLDLINK_PATH = DEF(VS2019_BIN_AARCH64)\link.exe - -- DEBUG_VS2019_AARCH64_CC_FLAGS = /nologo /c /WX /GS /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi- --RELEASE_VS2019_AARCH64_CC_FLAGS = /nologo /c /WX /GS /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi- --NOOPT_VS2019_AARCH64_CC_FLAGS = /nologo /c /WX /GS /W4 /Gs32768 /D UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi- -+ DEBUG_VS2019_AARCH64_CC_FLAGS = /nologo /c /WX /GS- /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi- -+RELEASE_VS2019_AARCH64_CC_FLAGS = /nologo /c /WX /GS- /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi- -+NOOPT_VS2019_AARCH64_CC_FLAGS = /nologo /c /WX /GS- /W4 /Gs32768 /D UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi- - - DEBUG_VS2019_AARCH64_ASM_FLAGS = /nologo /g - RELEASE_VS2019_AARCH64_ASM_FLAGS = /nologo -@@ -779,9 +778,9 @@ NOOPT_VS2019_AARCH64_DLINK_FLAGS = /NO +@@ -779,9 +778,9 @@ NOOPT_VS2019_AARCH64_DLINK_FLAGS = /NOLOGO /NODEFAULTLIB /IGNORE:4001 /OPT:REF *_VS2022_IA32_ASM_PATH = DEF(VS2022_BIN_IA32)\ml.exe *_VS2022_IA32_MAKE_FLAGS = /nologo @@ -88,7 +63,7 @@ DEBUG_VS2022_IA32_ASM_FLAGS = /nologo /c /WX /W3 /Cx /coff /Zd /Zi RELEASE_VS2022_IA32_ASM_FLAGS = /nologo /c /WX /W3 /Cx /coff /Zd -@@ -815,9 +814,9 @@ NOOPT_VS2022_IA32_DLINK_FLAGS = /NOLOG +@@ -815,9 +814,9 @@ NOOPT_VS2022_IA32_DLINK_FLAGS = /NOLOGO /NODEFAULTLIB /IGNORE:4001 /OPT:REF /O *_VS2022_X64_DLINK_PATH = DEF(VS2022_BIN_X64)\link.exe *_VS2022_X64_ASLDLINK_PATH = DEF(VS2022_BIN_X64)\link.exe @@ -101,33 +76,7 @@ DEBUG_VS2022_X64_ASM_FLAGS = /nologo /c /WX /W3 /Cx /Zd /Zi RELEASE_VS2022_X64_ASM_FLAGS = /nologo /c /WX /W3 /Cx /Zd -@@ -852,9 +851,9 @@ NOOPT_VS2022_X64_DLINK_FLAGS = /NOLOG - *_VS2022_ARM_ASLDLINK_PATH = DEF(VS2022_BIN_ARM)\link.exe - - *_VS2022_ARM_MAKE_FLAGS = /nologo -- DEBUG_VS2022_ARM_CC_FLAGS = /nologo /c /WX /GS /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi- --RELEASE_VS2022_ARM_CC_FLAGS = /nologo /c /WX /GS /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi- --NOOPT_VS2022_ARM_CC_FLAGS = /nologo /c /WX /GS /W4 /Gs32768 /D UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi- -+ DEBUG_VS2022_ARM_CC_FLAGS = /nologo /c /WX /GS- /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi- -+RELEASE_VS2022_ARM_CC_FLAGS = /nologo /c /WX /GS- /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi- -+NOOPT_VS2022_ARM_CC_FLAGS = /nologo /c /WX /GS- /W4 /Gs32768 /D UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi- - - DEBUG_VS2022_ARM_ASM_FLAGS = /nologo /g - RELEASE_VS2022_ARM_ASM_FLAGS = /nologo -@@ -885,9 +884,9 @@ NOOPT_VS2022_ARM_DLINK_FLAGS = /NOL - *_VS2022_AARCH64_ASLDLINK_PATH = DEF(VS2022_BIN_AARCH64)\link.exe - - *_VS2022_AARCH64_MAKE_FLAGS = /nologo -- DEBUG_VS2022_AARCH64_CC_FLAGS = /nologo /c /WX /GS /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi- --RELEASE_VS2022_AARCH64_CC_FLAGS = /nologo /c /WX /GS /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi- --NOOPT_VS2022_AARCH64_CC_FLAGS = /nologo /c /WX /GS /W4 /Gs32768 /D UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi- -+ DEBUG_VS2022_AARCH64_CC_FLAGS = /nologo /c /WX /GS- /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Gw /Oi- -+RELEASE_VS2022_AARCH64_CC_FLAGS = /nologo /c /WX /GS- /W4 /Gs32768 /D UNICODE /O1b2 /GL /FIAutoGen.h /EHs-c- /GR- /GF /Gw /Oi- -+NOOPT_VS2022_AARCH64_CC_FLAGS = /nologo /c /WX /GS- /W4 /Gs32768 /D UNICODE /FIAutoGen.h /EHs-c- /GR- /GF /Gy /Zi /Od /Oi- - - DEBUG_VS2022_AARCH64_ASM_FLAGS = /nologo /g - RELEASE_VS2022_AARCH64_ASM_FLAGS = /nologo -@@ -919,13 +918,11 @@ NOOPT_*_*_OBJCOPY_ADDDEBUGFLAG = --a +@@ -919,13 +918,11 @@ NOOPT_*_*_OBJCOPY_ADDDEBUGFLAG = --add-gnu-debuglink="$(DEBUG_DIR)/$(MODULE_ *_*_*_DTCPP_PATH = DEF(DTCPP_BIN) *_*_*_DTC_PATH = DEF(DTC_BIN) @@ -144,7 +93,7 @@ DEFINE GCC_AARCH64_CC_XIPFLAGS = -mstrict-align -mgeneral-regs-only DEFINE GCC_RISCV64_CC_XIPFLAGS = -mstrict-align -mgeneral-regs-only DEFINE GCC_DLINK2_FLAGS_COMMON = -Wl,--script=$(EDK_TOOLS_PATH)/Scripts/GccBase.lds -@@ -961,8 +958,8 @@ DEFINE GCC_DEPS_FLAGS = -MM +@@ -961,8 +958,8 @@ DEFINE GCC_DEPS_FLAGS = -MMD -MF $@.deps DEFINE GCC48_ALL_CC_FLAGS = DEF(GCC_ALL_CC_FLAGS) -ffunction-sections -fdata-sections -DSTRING_ARRAY_NAME=$(BASE_NAME)Strings DEFINE GCC48_IA32_X64_DLINK_COMMON = -nostdlib -Wl,-n,-q,--gc-sections -z common-page-size=0x20 @@ -155,7 +104,7 @@ DEFINE GCC48_IA32_X64_ASLDLINK_FLAGS = DEF(GCC48_IA32_X64_DLINK_COMMON) -Wl,--entry,ReferenceAcpiTable -u ReferenceAcpiTable DEFINE GCC48_IA32_X64_DLINK_FLAGS = DEF(GCC48_IA32_X64_DLINK_COMMON) -Wl,--entry,$(IMAGE_ENTRY_POINT) -u $(IMAGE_ENTRY_POINT) -Wl,-Map,$(DEST_DIR_DEBUG)/$(BASE_NAME).map,--whole-archive DEFINE GCC48_IA32_DLINK2_FLAGS = -Wl,--defsym=PECOFF_HEADER_SIZE=0x220 DEF(GCC_DLINK2_FLAGS_COMMON) -@@ -971,7 +968,7 @@ DEFINE GCC48_X64_DLINK2_FLAGS = - +@@ -971,7 +968,7 @@ DEFINE GCC48_X64_DLINK2_FLAGS = -Wl,--defsym=PECOFF_HEADER_SIZE=0x228 DEF DEFINE GCC48_ASM_FLAGS = DEF(GCC_ASM_FLAGS) DEFINE GCC48_ARM_ASM_FLAGS = $(PLATFORM_FLAGS) DEF(GCC_ASM_FLAGS) -mlittle-endian DEFINE GCC48_AARCH64_ASM_FLAGS = $(PLATFORM_FLAGS) DEF(GCC_ASM_FLAGS) -mlittle-endian @@ -164,4 +113,7 @@ DEFINE GCC48_ARM_CC_XIPFLAGS = DEF(GCC_ARM_CC_XIPFLAGS) DEFINE GCC48_AARCH64_CC_FLAGS = $(PLATFORM_FLAGS) -mcmodel=large DEF(GCC_AARCH64_CC_FLAGS) DEFINE GCC48_AARCH64_CC_XIPFLAGS = DEF(GCC_AARCH64_CC_XIPFLAGS) +-- +2.43.0 + ++++++ ovmf-Revert-OvmfPkg-OvmfXen-Set-PcdFSBClock.patch ++++++ --- /var/tmp/diff_new_pack.8zQyjl/_old 2025-06-11 16:20:54.618416786 +0200 +++ /var/tmp/diff_new_pack.8zQyjl/_new 2025-06-11 16:20:54.622416953 +0200 @@ -1,6 +1,6 @@ -From b8324bc3d5d44e5b1644a66f1b6e07b6e4ad9350 Mon Sep 17 00:00:00 2001 -From: "Lee, Chun-Yi" <j...@suse.com> -Date: Wed, 15 Feb 2023 14:39:37 +0800 +From f059118317b6d3a1dfdeec45494d279842c855e4 Mon Sep 17 00:00:00 2001 +From: Richard Lyu <richard....@suse.com> +Date: Thu, 29 May 2025 13:22:47 +0800 Subject: [PATCH] Revert "OvmfPkg/OvmfXen: Set PcdFSBClock" This reverts commit 71cdb91f313380152d7bf38cfeebe76f5b2d39ac. @@ -10,13 +10,13 @@ OvmfPkg/XenPlatformPei/XenPlatformPei.inf | 1 - 3 files changed, 3 insertions(+), 6 deletions(-) -Index: edk2-edk2-stable202302/OvmfPkg/OvmfXen.dsc -=================================================================== ---- edk2-edk2-stable202302.orig/OvmfPkg/OvmfXen.dsc -+++ edk2-edk2-stable202302/OvmfPkg/OvmfXen.dsc -@@ -456,6 +456,9 @@ - # Point to the MdeModulePkg/Application/UiApp/UiApp.inf - gEfiMdeModulePkgTokenSpaceGuid.PcdBootManagerMenuFile|{ 0x21, 0xaa, 0x2c, 0x46, 0x14, 0x76, 0x03, 0x45, 0x83, 0x6e, 0x8a, 0xb6, 0xf4, 0x66, 0x23, 0x31 } +diff --git a/OvmfPkg/OvmfXen.dsc b/OvmfPkg/OvmfXen.dsc +index 088c63f5c2..6f636a79a2 100644 +--- a/OvmfPkg/OvmfXen.dsc ++++ b/OvmfPkg/OvmfXen.dsc +@@ -451,6 +451,9 @@ + # Point to the MdeModulePkg/Application/BootManagerMenuApp/BootManagerMenuApp.inf + gEfiMdeModulePkgTokenSpaceGuid.PcdBootManagerMenuFile|{ 0xdc, 0x5b, 0xc2, 0xee, 0xf2, 0x67, 0x95, 0x4d, 0xb1, 0xd5, 0xf8, 0x1b, 0x20, 0x39, 0xd1, 0x1d } + ## Xen vlapic's frequence is 100 MHz + gEfiMdePkgTokenSpaceGuid.PcdFSBClock|100000000 @@ -24,7 +24,7 @@ # We populate DXE IPL tables with 1G pages preferably on Xen gEfiMdeModulePkgTokenSpaceGuid.PcdUse1GPageTable|TRUE -@@ -486,7 +489,6 @@ +@@ -484,7 +487,6 @@ gUefiOvmfPkgTokenSpaceGuid.PcdPciMmio64Base|0x0 gUefiOvmfPkgTokenSpaceGuid.PcdPciMmio64Size|0x800000000 @@ -32,11 +32,11 @@ gEfiMdePkgTokenSpaceGuid.PcdPlatformBootTimeOut|0 # Set video resolution for text setup. -Index: edk2-edk2-stable202302/OvmfPkg/XenPlatformPei/Xen.c -=================================================================== ---- edk2-edk2-stable202302.orig/OvmfPkg/XenPlatformPei/Xen.c -+++ edk2-edk2-stable202302/OvmfPkg/XenPlatformPei/Xen.c -@@ -634,9 +634,5 @@ CalibrateLapicTimer ( +diff --git a/OvmfPkg/XenPlatformPei/Xen.c b/OvmfPkg/XenPlatformPei/Xen.c +index a54fd55c70..68ae4801ae 100644 +--- a/OvmfPkg/XenPlatformPei/Xen.c ++++ b/OvmfPkg/XenPlatformPei/Xen.c +@@ -613,9 +613,5 @@ CalibrateLapicTimer ( Freq = DivU64x64Remainder (Dividend, TscTick2 - TscTick, NULL); DEBUG ((DEBUG_INFO, "APIC Freq % 8lu Hz\n", Freq)); @@ -46,10 +46,10 @@ - UnmapXenPage (SharedInfo); } -Index: edk2-edk2-stable202302/OvmfPkg/XenPlatformPei/XenPlatformPei.inf -=================================================================== ---- edk2-edk2-stable202302.orig/OvmfPkg/XenPlatformPei/XenPlatformPei.inf -+++ edk2-edk2-stable202302/OvmfPkg/XenPlatformPei/XenPlatformPei.inf +diff --git a/OvmfPkg/XenPlatformPei/XenPlatformPei.inf b/OvmfPkg/XenPlatformPei/XenPlatformPei.inf +index 20c27ff34b..790f4af551 100644 +--- a/OvmfPkg/XenPlatformPei/XenPlatformPei.inf ++++ b/OvmfPkg/XenPlatformPei/XenPlatformPei.inf @@ -86,7 +86,6 @@ gEfiMdeModulePkgTokenSpaceGuid.PcdDxeIplSwitchToLongMode gEfiMdeModulePkgTokenSpaceGuid.PcdUse1GPageTable @@ -58,4 +58,7 @@ gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy gUefiCpuPkgTokenSpaceGuid.PcdCpuLocalApicBaseAddress +-- +2.43.0 + ++++++ ovmf-gdb-symbols.patch ++++++ --- /var/tmp/diff_new_pack.8zQyjl/_old 2025-06-11 16:20:54.638417620 +0200 +++ /var/tmp/diff_new_pack.8zQyjl/_new 2025-06-11 16:20:54.642417786 +0200 @@ -1,207 +1,212 @@ -From 263791566fbe25755aebde54c98d5aea061414f3 Mon Sep 17 00:00:00 2001 -From: Gary Ching-Pang Lin <g...@suse.com> -Date: Tue, 24 Jun 2014 11:57:32 +0800 -Subject: [PATCH 1/3] Add DebugPkg +From d4fc3987941016cba0a2cd1d4037b87bc5937f5e Mon Sep 17 00:00:00 2001 +From: Richard Lyu <richard....@suse.com> +Date: Thu, 29 May 2025 12:12:23 +0800 +Subject: [PATCH] Add DebugPkg --- DebugPkg/DebugPkg.dec | 34 ++++ - DebugPkg/GdbSyms/GdbSyms.c | 70 +++++++ + DebugPkg/GdbSyms/GdbSyms.c | 78 ++++++++ DebugPkg/GdbSyms/GdbSyms.inf | 57 ++++++ - DebugPkg/Scripts/gdb_uefi.py | 348 +++++++++++++++++++++++++++++++++++ - 4 files changed, 509 insertions(+) + DebugPkg/Scripts/gdb_uefi.py | 350 +++++++++++++++++++++++++++++++++++ + OvmfPkg/OvmfPkgX64.dsc | 3 + + 5 files changed, 522 insertions(+) create mode 100644 DebugPkg/DebugPkg.dec create mode 100644 DebugPkg/GdbSyms/GdbSyms.c create mode 100644 DebugPkg/GdbSyms/GdbSyms.inf create mode 100644 DebugPkg/Scripts/gdb_uefi.py -Index: edk2-edk2-stable202302/DebugPkg/DebugPkg.dec -=================================================================== +diff --git a/DebugPkg/DebugPkg.dec b/DebugPkg/DebugPkg.dec +new file mode 100644 +index 0000000000..b39a660e45 --- /dev/null -+++ edk2-edk2-stable202302/DebugPkg/DebugPkg.dec ++++ b/DebugPkg/DebugPkg.dec @@ -0,0 +1,34 @@ -+## @file -+# Debug package - various useful stuff for debugging. -+# -+# Copyright (c) 2006 - 2011, Andrei Warkentin <andr...@motorola.com> -+# -+# This program and the accompanying materials -+# are licensed and made available under the terms and conditions of the BSD License -+# which accompanies this distribution. The full text of the license may be found at -+# http://opensource.org/licenses/bsd-license.php -+# -+# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, -+# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. -+# -+## -+ -+[Defines] -+ DEC_VERSION = 0x00010005 -+ PACKAGE_NAME = DebugPkg -+ PACKAGE_GUID = 2d234f34-50e5-4b9d-b8e3-5562334d87e5 -+ PACKAGE_VERSION = 0.1 -+ -+[Includes] -+ Include -+ -+[Guids] -+ -+[Protocols] -+ -+[PcdsFixedAtBuild] -+ -+[PcdsDynamic] -+ -+[LibraryClasses] -+ -Index: edk2-edk2-stable202302/DebugPkg/GdbSyms/GdbSyms.c -=================================================================== ++## @file ++# Debug package - various useful stuff for debugging. ++# ++# Copyright (c) 2006 - 2011, Andrei Warkentin <andr...@motorola.com> ++# ++# This program and the accompanying materials ++# are licensed and made available under the terms and conditions of the BSD License ++# which accompanies this distribution. The full text of the license may be found at ++# http://opensource.org/licenses/bsd-license.php ++# ++# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, ++# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. ++# ++## ++ ++[Defines] ++ DEC_VERSION = 0x00010005 ++ PACKAGE_NAME = DebugPkg ++ PACKAGE_GUID = 2d234f34-50e5-4b9d-b8e3-5562334d87e5 ++ PACKAGE_VERSION = 0.1 ++ ++[Includes] ++ Include ++ ++[Guids] ++ ++[Protocols] ++ ++[PcdsFixedAtBuild] ++ ++[PcdsDynamic] ++ ++[LibraryClasses] ++ +diff --git a/DebugPkg/GdbSyms/GdbSyms.c b/DebugPkg/GdbSyms/GdbSyms.c +new file mode 100644 +index 0000000000..9780cff802 --- /dev/null -+++ edk2-edk2-stable202302/DebugPkg/GdbSyms/GdbSyms.c ++++ b/DebugPkg/GdbSyms/GdbSyms.c @@ -0,0 +1,78 @@ -+/** @file -+ -+ Bare-minimum GDB symbols needed for reloading symbols. -+ -+ This is not a "driver" and should not be placed in a FD. -+ -+ Copyright (c) 2011, Andrei Warkentin <andr...@motorola.com> -+ -+ This program and the accompanying materials -+ are licensed and made available under the terms and conditions of the BSD License -+ which accompanies this distribution. The full text of the license may be found at -+ http://opensource.org/licenses/bsd-license.php -+ THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, -+ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. -+ -+**/ -+ -+#include "PiDxe.h" -+ -+#include <Library/UefiLib.h> -+#include <Library/UefiDriverEntryPoint.h> -+#include <Library/BaseLib.h> -+#include <Library/UefiRuntimeLib.h> -+#include <Library/DebugLib.h> -+#include <Library/BaseMemoryLib.h> -+#include <Library/MemoryAllocationLib.h> -+#include <Library/UefiBootServicesTableLib.h> -+#include <Library/DevicePathLib.h> -+#include <Library/PcdLib.h> -+#include <Guid/DebugImageInfoTable.h> -+ -+/** -+ Main entry point. -+ -+ @param[in] ImageHandle The firmware allocated handle for the EFI image. -+ @param[in] SystemTable A pointer to the EFI System Table. -+ -+ @retval EFI_SUCCESS Successfully initialized. -+ -+**/ -+EFI_STATUS -+EFIAPI -+Initialize ( -+ IN EFI_HANDLE ImageHandle, -+ IN EFI_SYSTEM_TABLE *SystemTable -+ ) -+{ -+ EFI_SYSTEM_TABLE_POINTER ESTP; -+ EFI_DEBUG_IMAGE_INFO_TABLE_HEADER EDIITH; -+ EFI_IMAGE_DOS_HEADER EIDH; -+ EFI_IMAGE_OPTIONAL_HEADER_UNION EIOHU; -+ EFI_IMAGE_DEBUG_DIRECTORY_ENTRY EIDDE; -+ EFI_IMAGE_DEBUG_CODEVIEW_NB10_ENTRY EIDCNE; -+ EFI_IMAGE_DEBUG_CODEVIEW_RSDS_ENTRY EIDCRE; -+ EFI_IMAGE_DEBUG_CODEVIEW_MTOC_ENTRY EIDCME; -+ UINTN Dummy = -+ (UINTN) &ESTP | -+ (UINTN) &EDIITH | -+ (UINTN) &EIDH | -+ (UINTN) &EIOHU | -+ (UINTN) &EIDDE | -+ (UINTN) &EIDCNE | -+ (UINTN) &EIDCRE | -+ (UINTN) &EIDCME | -+ 1 -+ ; -+ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &ESTP)); -+ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EDIITH)); -+ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDH)); -+ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIOHU)); -+ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDDE)); -+ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDCNE)); -+ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDCRE)); -+ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDCME)); -+ return !!Dummy & EFI_SUCCESS; -+} -+ -+ -Index: edk2-edk2-stable202302/DebugPkg/GdbSyms/GdbSyms.inf -=================================================================== ++/** @file ++ ++ Bare-minimum GDB symbols needed for reloading symbols. ++ ++ This is not a "driver" and should not be placed in a FD. ++ ++ Copyright (c) 2011, Andrei Warkentin <andr...@motorola.com> ++ ++ This program and the accompanying materials ++ are licensed and made available under the terms and conditions of the BSD License ++ which accompanies this distribution. The full text of the license may be found at ++ http://opensource.org/licenses/bsd-license.php ++ THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, ++ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. ++ ++**/ ++ ++#include "PiDxe.h" ++ ++#include <Library/UefiLib.h> ++#include <Library/UefiDriverEntryPoint.h> ++#include <Library/BaseLib.h> ++#include <Library/UefiRuntimeLib.h> ++#include <Library/DebugLib.h> ++#include <Library/BaseMemoryLib.h> ++#include <Library/MemoryAllocationLib.h> ++#include <Library/UefiBootServicesTableLib.h> ++#include <Library/DevicePathLib.h> ++#include <Library/PcdLib.h> ++#include <Guid/DebugImageInfoTable.h> ++ ++/** ++ Main entry point. ++ ++ @param[in] ImageHandle The firmware allocated handle for the EFI image. ++ @param[in] SystemTable A pointer to the EFI System Table. ++ ++ @retval EFI_SUCCESS Successfully initialized. ++ ++**/ ++EFI_STATUS ++EFIAPI ++Initialize ( ++ IN EFI_HANDLE ImageHandle, ++ IN EFI_SYSTEM_TABLE *SystemTable ++ ) ++{ ++ EFI_SYSTEM_TABLE_POINTER ESTP; ++ EFI_DEBUG_IMAGE_INFO_TABLE_HEADER EDIITH; ++ EFI_IMAGE_DOS_HEADER EIDH; ++ EFI_IMAGE_OPTIONAL_HEADER_UNION EIOHU; ++ EFI_IMAGE_DEBUG_DIRECTORY_ENTRY EIDDE; ++ EFI_IMAGE_DEBUG_CODEVIEW_NB10_ENTRY EIDCNE; ++ EFI_IMAGE_DEBUG_CODEVIEW_RSDS_ENTRY EIDCRE; ++ EFI_IMAGE_DEBUG_CODEVIEW_MTOC_ENTRY EIDCME; ++ UINTN Dummy = ++ (UINTN) &ESTP | ++ (UINTN) &EDIITH | ++ (UINTN) &EIDH | ++ (UINTN) &EIOHU | ++ (UINTN) &EIDDE | ++ (UINTN) &EIDCNE | ++ (UINTN) &EIDCRE | ++ (UINTN) &EIDCME | ++ 1 ++ ; ++ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &ESTP)); ++ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EDIITH)); ++ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDH)); ++ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIOHU)); ++ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDDE)); ++ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDCNE)); ++ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDCRE)); ++ DEBUG ((DEBUG_VERBOSE, "%a: %llx\n", __FUNCTION__, &EIDCME)); ++ return !!Dummy & EFI_SUCCESS; ++} ++ ++ +diff --git a/DebugPkg/GdbSyms/GdbSyms.inf b/DebugPkg/GdbSyms/GdbSyms.inf +new file mode 100644 +index 0000000000..0a18a33c73 --- /dev/null -+++ edk2-edk2-stable202302/DebugPkg/GdbSyms/GdbSyms.inf ++++ b/DebugPkg/GdbSyms/GdbSyms.inf @@ -0,0 +1,57 @@ -+## @file -+# -+# Bare-minimum GDB symbols needed for reloading symbols. -+# -+# This is not a "driver" and should not be placed in a FD. -+# -+# Copyright (c) 2011, Andrei Warkentin <andr...@motorola.com> -+# -+# This program and the accompanying materials -+# are licensed and made available under the terms and conditions of the BSD License -+# which accompanies this distribution. The full text of the license may be found at -+# http://opensource.org/licenses/bsd-license.php -+# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, -+# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. -+# -+## -+ -+[Defines] -+ INF_VERSION = 0x00010005 -+ BASE_NAME = GdbSyms -+ FILE_GUID = 22abcb60-fb40-42ac-b01f-3ab1fad9aad8 -+ MODULE_TYPE = DXE_DRIVER -+ VERSION_STRING = 1.0 -+ ENTRY_POINT = Initialize -+ -+# -+# The following information is for reference only and not required by the build tools. -+# -+# VALID_ARCHITECTURES = IA32 X64 IPF EBC ARM -+# -+ -+[Sources] -+ GdbSyms.c -+ -+[Packages] -+ MdePkg/MdePkg.dec -+ MdeModulePkg/MdeModulePkg.dec -+ -+[LibraryClasses] -+ BaseLib -+ BaseMemoryLib -+ DebugLib -+ DxeServicesTableLib -+ HobLib -+ MemoryAllocationLib -+ PcdLib -+ UefiBootServicesTableLib -+ UefiDriverEntryPoint -+ UefiLib -+ -+[Guids] -+ -+[Protocols] -+ -+[Depex] -+ TRUE -+ -Index: edk2-edk2-stable202302/DebugPkg/Scripts/gdb_uefi.py -=================================================================== ++## @file ++# ++# Bare-minimum GDB symbols needed for reloading symbols. ++# ++# This is not a "driver" and should not be placed in a FD. ++# ++# Copyright (c) 2011, Andrei Warkentin <andr...@motorola.com> ++# ++# This program and the accompanying materials ++# are licensed and made available under the terms and conditions of the BSD License ++# which accompanies this distribution. The full text of the license may be found at ++# http://opensource.org/licenses/bsd-license.php ++# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, ++# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. ++# ++## ++ ++[Defines] ++ INF_VERSION = 0x00010005 ++ BASE_NAME = GdbSyms ++ FILE_GUID = 22abcb60-fb40-42ac-b01f-3ab1fad9aad8 ++ MODULE_TYPE = DXE_DRIVER ++ VERSION_STRING = 1.0 ++ ENTRY_POINT = Initialize ++ ++# ++# The following information is for reference only and not required by the build tools. ++# ++# VALID_ARCHITECTURES = IA32 X64 IPF EBC ARM ++# ++ ++[Sources] ++ GdbSyms.c ++ ++[Packages] ++ MdePkg/MdePkg.dec ++ MdeModulePkg/MdeModulePkg.dec ++ ++[LibraryClasses] ++ BaseLib ++ BaseMemoryLib ++ DebugLib ++ DxeServicesTableLib ++ HobLib ++ MemoryAllocationLib ++ PcdLib ++ UefiBootServicesTableLib ++ UefiDriverEntryPoint ++ UefiLib ++ ++[Guids] ++ ++[Protocols] ++ ++[Depex] ++ TRUE ++ +diff --git a/DebugPkg/Scripts/gdb_uefi.py b/DebugPkg/Scripts/gdb_uefi.py +new file mode 100644 +index 0000000000..3db87a4de4 --- /dev/null -+++ edk2-edk2-stable202302/DebugPkg/Scripts/gdb_uefi.py ++++ b/DebugPkg/Scripts/gdb_uefi.py @@ -0,0 +1,350 @@ +""" +Allows loading TianoCore symbols into a GDB session attached to EFI @@ -553,14 +558,21 @@ +ReloadUefi () + + -Index: edk2-edk2-stable202302/OvmfPkg/OvmfPkgX64.dsc -=================================================================== ---- edk2-edk2-stable202302.orig/OvmfPkg/OvmfPkgX64.dsc -+++ edk2-edk2-stable202302/OvmfPkg/OvmfPkgX64.dsc -@@ -1123,3 +1123,5 @@ - # TPM support +diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc +index 60fccc19d2..a2784bbd40 100644 +--- a/OvmfPkg/OvmfPkgX64.dsc ++++ b/OvmfPkg/OvmfPkgX64.dsc +@@ -1063,6 +1063,9 @@ # !include OvmfPkg/Include/Dsc/OvmfTpmComponentsDxe.dsc.inc + ++ DebugPkg/GdbSyms/GdbSyms.inf + -+ DebugPkg/GdbSyms/GdbSyms.inf ++ + # + # Smbios Measurement support + # +-- +2.43.0 +