Hello community,

here is the log from the commit of package ovmf for openSUSE:Factory:NonFree 
checked in at 2016-01-12 16:14:07
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory:NonFree/ovmf (Old)
 and      /work/SRC/openSUSE:Factory:NonFree/.ovmf.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "ovmf"

Changes:
--------
--- /work/SRC/openSUSE:Factory:NonFree/ovmf/ovmf.changes        2015-09-03 
18:13:12.000000000 +0200
+++ /work/SRC/openSUSE:Factory:NonFree/.ovmf.new/ovmf.changes   2016-01-12 
16:14:13.000000000 +0100
@@ -1,0 +2,403 @@
+Wed Jan  6 08:04:47 UTC 2016 - g...@suse.com
+
+- update to R19584
+  + NetworkPkg: Support DNS4/6 GeneralLookUp feature
+  + SecurityPkg AuthVariableLib: Correct comment/error log about
+    CleanCertsFromDb
+  + NetworkPkg: Fix suspicious dereference of pointer before NULL
+    check
+  + NetworkPkg: Update module inf to include the missing uni file
+  + NetworkPkg: Remove a CopyMem to speed up the HTTP boot download
+  + NetworkPkg: Remove unused EFI_HTTP_PROTOCOL definition
+  + MdePkg : Update SPCR to use ACPI5 definition
+  + MdeModulePkg ScsiDiskDxe: Raise the Tpl of async IO callback
+    to TPL_NOTIFY
+  + ScsiDiskDxe: Close event when SCSI command fails
+  + MdeModulePkg ScsiBusDxe: Only signal caller event when
+    PassThru() succeeds
+  + MdeModulePkg DiskIoDxe: Check for MediaPresent in
+    DiskIo2ReadWriteDisk()
+  + MdeModulePkg ScsiDiskDxe: Modify WriteBlocks(Ex)() to follow
+    UEFI spec
+  + MdeModulePkg ScsiDiskDxe: Modify FlushBlocksEx() to follow UEFI
+    spec
+  + MdeModulePkg ScsiDiskDxe: Set block I/O media of SCSI CDROM to
+    read-only
+  + PcAtChipsetPkg/Rtc: Fix a UEFI Win7 boot hang issue
+  + MdeModulePkg:Clear the screen before booting the boot option
+  + NetworkPkg : Remove unused local variables to fix gcc build
+    errors
+  + MdePkg: Add HTTP 1.1 industry standard definitions
+  + SecurityPkg: SecureBootConfigDxe: Remove useless code in VFR
+  + NetworkPkg:Fix a bug the 2nd httpboot fail issue
+  + NetworkPkg: Update iSCSI driver to check existing AIP instances
+  + UefiCpuPkg/CpuMpPei: Fix pack(1) issue on x64 arch
+  + MdeModulePkg:Fix bug that get the password width info
+    incorrectly
+  + NetworkPkg:Fix the issue Http boot hang when network failed
+  + DxeTpmMeasureBootLib: Change global variable name to avoid
+    name conflict
+  + ArmVirtPkg/ArmVirtXen: add ARM support
+  + ArmVirtPkg/XenRelocatablePlatformLib: rewrite DTB memory node
+    retrieval in C
+  + OvfmPkg/XenHypercallLib: add missing GCC_ASM_EXPORT to
+    XenHypercall2
+  + Shell update
+  + MdeModulePkg:Fix a bug HttpLib can't parse last chunked data
+    well
+  + MdeModulePkg/PciSioSerialDxe:add non-null pointer dereference
+    assertion
+  + ArmPkg: rewrite vector table population macros
+  + BootManagerLib: Check the pointer to avoid use NULL pointer
+  + MdeModulePkg: Fix RegularExpressionDxe memcpy intrinsic
+- Add ovmf-fix-signedness.patch to fix the build error
+
+-------------------------------------------------------------------
+Wed Dec 16 03:01:28 UTC 2015 - g...@suse.com
+
+- Update R19289
+  + MdePkg: Add missing SMBIOS definitions for SATA and SAS Ports
+  + MdePkg: Add GIC version to ACPI 5.1/6 definitions
+  + MdePkg: Add Ipmi2.0 definitions head file
+  + MdeModulePkg: Add NULL pointer check for RegularExpressionDxe
+  + Convert all .uni files to utf-8
+  + BaseTools/Scripts: Add ConvertUni.py script
+  + Fix >4G issue on IDT not restored correctly
+  + MdeModulePkg: Improved SetupBrowser handling to failed GOTO
+    callback
+  + ArmPlatformPkg/Sec: fix return_from_exception code and comment
+  + ArmPlatformPkg/ArmPlatformLibNull: use declared PPI rather than
+    module local var
+  + ArmVirtPkg RVCT: build DXE_RUNTIME_DRIVER modules with 4 KB
+    alignment
+  + BaseTools/GenFw RVCT: fix relocation processing of PT_DYNAMIC
+    sections
+  + BaseTools RVCT: use scatter file to enforce minimum section
+    alignment
+  + MdePkg/BaseIoLibIntrinsic: Add EBC support
+  + MdePkg: Add 3 macro defined in latest TPM2 specification
+  + ShellPkg: Initialize the local pointer to avoid potential
+    suspicious dereference
+  + CryptoPkg/OpensslLib: upgrade OpenSSL version to 1.0.2e
+  + MdeModulePkg ScsiDiskDxe: Add BlockIO2 Support
+  + MdePkg UefiScsiLib: Add non-blocking support for SCSI
+    Read/Write command
+  + NetworkPkg: Fix the potential NULL pointer dereferenced issue
+  + ShellPkg: Make 'dh' support showing all spec defined protocols
+  + BaseTools GCC: avoid the use of COMMON symbols
+  + ArmPkg/PrePeiCore: adhere to architectural stack alignment
+    requirement
+  + UefiCpuPkg/MtrrLib: Add PCD PcdCpuNumberOfReservedVariableMtrrs
+  + ArmPkg/BdsLib: Send RemainingDevicePath to PXE Load File
+    protocol
+  + CryptoPkg/BaseCryptLib: make mVirtualAddressChangeEvent STATIC
+  + CryptoPkg ARM: add ArmSoftFloatLib resolution to CryptoPkg.dsc
+  + SecurityPkg: AuthVariableLib: Customized SecureBoot Mode
+    transition
+  + MdePkg: DebugAssert enhancement
+  + ArmVirtPkg: HighMemDxe: add memory space for the high memory
+    nodes
+  + ArmVirtPkg: ArmVirtPlatformLib: find the lowest memory node
+- Update openssl to 1.0.2e
+- Update ovmf-embed-default-keys.patch to include one more db key
+- Add MicWinProPCA2011_2011-10-19.crt, the Windows Product key
+
+-------------------------------------------------------------------
+Fri Dec  4 06:13:41 UTC 2015 - g...@suse.com
+
+- Update to R19110
+  + ShellPkg: Fix wrong return status for Ifconfig.c
+  + OvmfPkg: pull in SMM-based variable driver stack
+  + OvmfPkg: any AP in SMM should not wait for the BSP for more
+    than 100 ms
+  + OvmfPkg: use relaxed AP SMM synchronization mode
+  + OvmfPkg: SmmCpuFeaturesLib: implement SMRAM state save map
+    access
+  + OvmfPkg: import SmmCpuFeaturesLib from UefiCpuPkg
+  + OvmfPkg: set gUefiCpuPkgTokenSpaceGuid.PcdCpuSmmEnableBspElection
+    to FALSE
+  + OvmfPkg: LockBox: use SMM stack with -D SMM_REQUIRE
+  + OvmfPkg: introduce -D SMM_REQUIRE and PcdSmmSmramRequire
+  + ArmVirtPkg: add secure boot support to 32-bit ARM targets
+  + MdeModulePkg/BDS: Do not pass unnecessary option to boot option
+  + NetworkPkg: Fix a bug in HttpBootDriverBindingStop() when
+    destroying child
+  + ArmPlatformPkg/PrePiHobListPointerLib: use thread ID register
+  + ArmPlatformPkg/PrePeiCore: add missing entries to AArch64
+    vector table
+- Refresh ovmf-gdb-symbols.patch
+- Run fdupes on /usr/share/qemu
+
+-------------------------------------------------------------------
+Fri Nov 27 04:16:46 UTC 2015 - g...@suse.com
+
+- Update to R18975
+  + ArmVirtPkg: Use SerialDxe in MdeModulePkg instead of
+    EmbeddedPkg
+  + OvmfPkg XenConsoleSerialPortLib: Implement
+    Get(Set)Control/SetAttributes
+  + NetworkPkg:Fix NULL pointer dereference issues
+  + Always set WP in CR0
+  + ArmPkg/UncachedMemoryAllocationLib: fix warning about 
+    uninitialized local var
+  + UefiCpuPkg/CpuS3DataDxe: Add module to initialize ACPI_CPU_DATA
+    for S3
+  + Move CommunicationBuffer from stack to global variable
+  + Move SmmDebug feature from ASM to C
+  + Install LoadedImage protocol for PiSmmCore
+  + Uninstall LoadedImage protocol if SMM driver returns error and
+    is unloaded
+  + ArmLib/ArmV7Mmu: use 64-bit type for mapping region size
+  + ArmVirtPkg/ArmVirtPlatformLib: reduce ID map size to GCD region
+    size
+  + ArmVirtPkg/ArmVirtQemu: limit the (I)PA space to 40 bits
+  + MdeModulePkg/UefiBootManagerLib: Always create MemoryTypeInfo
+    variable
+  + ShellBinPkg: Arm/AArch64 Shell binary update
+  + MdeModulePkg:Create Boot Maintenance Manager Library
+  + MdeModulePkg:Create Device Manager Library
+  + MdeModulePkg:Create Boot Manager Library
+  + ArmPkg: Invalidate cache after allocating UC memory
+  + MdeModulePkg FileExplorerDxe: Create file explorer Protocol
+  + ArmPkg: ArmLib: purge incorrect ArmDrainWriteBuffer () alias
+  + UefiCpuPkg/CpuDxe: Don't use gBS->Stall
+  + UefiCpuPkg/SmmFeatureLib: Check SmmFeatureControl by
+    Code_Access_Chk
+  + UefiCpuPkg: Not touch SmmFeatureControl if Code_Access_Chk not
+    Set
+  + ArmPkg/ArmPlatformPkg: position vectors relative to base
+  + ArmPkg: correct TTBR1_EL1 settings in TCR_EL1
+  + ShellPkg: Corrected CatSPrint usage to prevent memory leaks
+  + ArmPkg/ArmV7Mmu: handle memory regions over 4 GB correctly
+  + ArmPkg/ArmV7Lib: take MP extensions into account when
+    programming TTBR
+  + ArmPkg/ArmV7Lib: fix definition of TTBR_NON_INNER_CACHEABLE
+  + ArmPkg/ArmV7Mmu: introduce feature PCD to map normal memory
+    non-shareable
+  + ArmPkg/ArmV7Mmu: make cached translation table accesses
+    shareable
+  + ArmPkg/ArmV7Lib: add function to test for presence of MP
+    extensions
+  + ArmPkg/ArmV7Lib: add support for reading the ID_MMFR0 system
+    register
+  + ArmPkg/ArmV7Mmu: fix write-through translation table accesses
+  + ArmPkg/Mmu: set required XN attributes for device mappings
+  + ArmVirtPkg/ArmVirtPlatformLib: map executable NOR region as
+    normal memory
+  + ArmPkg/AArch64Mmu: remove unused GcdAttributeToArmAttribute()
+
+-------------------------------------------------------------------
+Wed Nov 18 09:35:19 UTC 2015 - g...@suse.com
+
+- Update to R18868
+  + ArmPkg: ensure DebugAgentVectorTable is 2K-aligned
+  + MdeModulePkg: Add Platform recovery support
+  + MdePkg: Add Platform Recovery definitions
+  + MdeModulePkg: SmmLockBoxPeiLib: work without
+    EFI_PEI_SMM_COMMUNICATION_PPI
++++ 206 more lines (skipped)
++++ between /work/SRC/openSUSE:Factory:NonFree/ovmf/ovmf.changes
++++ and /work/SRC/openSUSE:Factory:NonFree/.ovmf.new/ovmf.changes

Old:
----
  0001-Revert-BaseTools-AARCH64-use-tiny-code-model-by-defa.patch
  0010-avoid-potentially-uninitialized-variable.diff
  openssl-1.0.2d.tar.gz
  openssl-1.0.2d.tar.gz.asc
  ovmf-0.1+svn18393.tar.xz
  ovmf-gcc5-conf.patch

New:
----
  MicWinProPCA2011_2011-10-19.crt
  openssl-1.0.2e.tar.gz
  openssl-1.0.2e.tar.gz.asc
  ovmf-0.1+svn19584.tar.xz
  ovmf-fix-signedness.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ ovmf.spec ++++++
--- /var/tmp/diff_new_pack.T5nYb0/_old  2016-01-12 16:14:14.000000000 +0100
+++ /var/tmp/diff_new_pack.T5nYb0/_new  2016-01-12 16:14:14.000000000 +0100
@@ -24,11 +24,11 @@
 Summary:        Open Virtual Machine Firmware
 License:        BSD-2-Clause
 Group:          System/Emulators/PC
-Version:        0.1+svn18393
+Version:        0.1+svn19584
 Release:        0
 Source0:        %{name}-%{version}.tar.xz
-Source1:        https://www.openssl.org/source/openssl-1.0.2d.tar.gz
-Source111:      https://www.openssl.org/source/openssl-1.0.2d.tar.gz.asc
+Source1:        https://www.openssl.org/source/openssl-1.0.2e.tar.gz
+Source111:      https://www.openssl.org/source/openssl-1.0.2e.tar.gz.asc
 Source112:      openssl.keyring
 Source2:        README
 Source3:        SLES-UEFI-CA-Certificate-2048.crt
@@ -41,14 +41,12 @@
 Source10:       openSUSE-UEFI-SIGN-Certificate-4096.crt
 Source11:       http://www.uefi.org/sites/default/files/resources/dbxupdate.zip
 Source12:       strip_authinfo.pl
+Source13:       MicWinProPCA2011_2011-10-19.crt
 Source100:      %{name}-rpmlintrc
 Source101:      gdb_uefi.py.in
 Patch2:         %{name}-embed-default-keys.patch
 Patch3:         %{name}-gdb-symbols.patch
-Patch4:         0001-Revert-BaseTools-AARCH64-use-tiny-code-model-by-defa.patch
-# PATCH-FIX-OPENSUSE 0010-avoid-potentially-uninitialized-variable.diff 
bnc#123456 you@foo -- descr
-Patch13:        0010-avoid-potentially-uninitialized-variable.diff
-Patch14:        ovmf-gcc5-conf.patch
+Patch4:         %{name}-fix-signedness.patch
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 BuildRequires:  libuuid-devel
 BuildRequires:  fdupes
@@ -147,20 +145,22 @@
 %endif
 %patch3 -p1
 %patch4 -p1
-%patch13 -p1
-%patch14 -p1
 # Intel has special patches for openssl
-pushd CryptoPkg/Library/OpensslLib/openssl-1.0.2d
-patch -p0 -i ../EDKII_openssl-1.0.2d.patch
+pushd CryptoPkg/Library/OpensslLib/openssl-1.0.2e
+patch -p0 -i ../EDKII_openssl-1.0.2e.patch
 cd ..
 ./Install.sh
 popd
 
 %build
-OVMF_FLAGS="-D FD_SIZE_2MB -D SECURE_BOOT_ENABLE -D NETWORK_IP6_ENABLE"
+OVMF_FLAGS="-D FD_SIZE_2MB -D SECURE_BOOT_ENABLE -D NETWORK_IP6_ENABLE -D 
HTTP_BOOT_ENABLE"
 
+%if 0%{?suse_version} > 1320
+TOOL_CHAIN_TAG=GCC49
+%else
 echo `gcc -dumpversion`
 TOOL_CHAIN_TAG=GCC$(gcc -dumpversion|sed 's/\([0-9]\)\.\([0-9]\).*/\1\2/')
+%endif
 
 %ifarch %ix86
        BUILD_OPTIONS="$OVMF_FLAGS -a IA32 -p OvmfPkg/OvmfPkgIa32.dsc -b DEBUG 
-t $TOOL_CHAIN_TAG"
@@ -236,6 +236,9 @@
        xxd -i Default_PK >  SecurityPkg/Library/AuthVariableLib/Default_PK.h
        xxd -i Default_KEK > SecurityPkg/Library/AuthVariableLib/Default_KEK.h
        xxd -i Default_DB >  SecurityPkg/Library/AuthVariableLib/Default_DB.h
+       if [ -e Default_DB_EX ]; then
+               xxd -i Default_DB_EX > 
SecurityPkg/Library/AuthVariableLib/Default_DB_EX.h
+       fi
        if [ -e Default_DBX ]; then
                xxd -i Default_DBX > 
SecurityPkg/Library/AuthVariableLib/Default_DBX.h
        fi
@@ -259,6 +262,7 @@
 cat %{SOURCE5} > Default_PK
 cat %{SOURCE5} > Default_KEK
 cat %{SOURCE6} > Default_DB
+cat %{SOURCE13} > Default_DB_EX
 chmod 755 %{SOURCE12}
 %{SOURCE12} dbxupdate.bin Default_DBX
 build_with_keys ms
@@ -314,6 +318,7 @@
 tr -d '\r' < OvmfPkg/License.txt > License.txt
 install -m 0644 -D ovmf-x86_64.bin 
%{buildroot}/%{_datadir}/qemu/ovmf-x86_64.bin
 install -m 0644 ovmf-x86_64-*.bin %{buildroot}/%{_datadir}/qemu/
+%fdupes %{buildroot}/%{_datadir}/qemu/
 # Install debug symbols, gdb-uefi.py
 install -d %{buildroot}/%{_datadir}/ovmf-x86_64/
 install -m 0644 gdb_uefi-*.py %{buildroot}/%{_datadir}/ovmf-x86_64/




++++++ openssl-1.0.2d.tar.gz -> openssl-1.0.2e.tar.gz ++++++
++++ 13069 lines of diff (skipped)


++++++ ovmf-0.1+svn18393.tar.xz -> ovmf-0.1+svn19584.tar.xz ++++++
/work/SRC/openSUSE:Factory:NonFree/ovmf/ovmf-0.1+svn18393.tar.xz 
/work/SRC/openSUSE:Factory:NonFree/.ovmf.new/ovmf-0.1+svn19584.tar.xz differ: 
char 27, line 1

++++++ ovmf-embed-default-keys.patch ++++++
--- /var/tmp/diff_new_pack.T5nYb0/_old  2016-01-12 16:14:17.000000000 +0100
+++ /var/tmp/diff_new_pack.T5nYb0/_new  2016-01-12 16:14:17.000000000 +0100
@@ -1,7 +1,7 @@
-From 395072acee83ee24d4ebb153953405a09fdeaa50 Mon Sep 17 00:00:00 2001
+From c6de8d0e43fb1c0709d938d8951d7bdefb314bcf Mon Sep 17 00:00:00 2001
 From: Gary Ching-Pang Lin <g...@suse.com>
 Date: Fri, 10 May 2013 10:27:51 +0800
-Subject: [PATCH] Add a stub to allow keys to be embedded at build time
+Subject: [PATCH 1/2] Add a stub to allow keys to be embedded at build time
 
 Signed-off-by: Gary Ching-Pang Lin <g...@suse.com>
 ---
@@ -18,7 +18,7 @@
  create mode 100644 SecurityPkg/Library/AuthVariableLib/Default_PK.h
 
 diff --git a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c 
b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c
-index 0bb0918..321a889 100644
+index dee5e1d..91f361c 100644
 --- a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c
 +++ b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c
 @@ -23,6 +23,10 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER 
EXPRESS OR IMPLIED.
@@ -32,8 +32,8 @@
  
  ///
  /// Global database array for scratch
-@@ -136,6 +140,11 @@ AuthVariableLibInitialize (
-   UINT8                 SecureBootEnable;
+@@ -144,6 +148,11 @@ AuthVariableLibInitialize (
+   UINTN                 CtxSize;
    UINT8                 CustomMode;
    UINT32                ListSize;
 +  EFI_SIGNATURE_LIST    *SigCert;
@@ -44,7 +44,7 @@
  
    if ((AuthVarLibContextIn == NULL) || (AuthVarLibContextOut == NULL)) {
      return EFI_INVALID_PARAMETER;
-@@ -152,6 +161,177 @@ AuthVariableLibInitialize (
+@@ -160,6 +169,177 @@ AuthVariableLibInitialize (
      return EFI_OUT_OF_RESOURCES;
    }
  
@@ -223,10 +223,10 @@
    // Reserve runtime buffer for public key database. The size excludes 
variable header and name size.
    //
 diff --git a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf 
b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf
-index d0c0cc2..552dbb9 100644
+index 07a3ed5..477ddcb 100644
 --- a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf
 +++ b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.inf
-@@ -33,6 +33,10 @@
+@@ -33,6 +33,10 @@ [Sources]
    AuthVariableLib.c
    AuthService.c
    AuthServiceInternal.h
@@ -270,5 +270,95 @@
 +unsigned char *Default_PK = NULL;
 +unsigned int Default_PK_len = 0;
 -- 
-2.1.4
+2.6.3
+
+
+From 75090a7df9e83c068807ee413862128d59569a39 Mon Sep 17 00:00:00 2001
+From: Gary Lin <g...@suse.com>
+Date: Tue, 15 Dec 2015 16:54:54 +0800
+Subject: [PATCH 2/2] Add DB_EX to include one more DB cert
+
+Signed-off-by: Gary Lin <g...@suse.com>
+---
+ .../Library/AuthVariableLib/AuthVariableLib.c      | 27 ++++++++++++++++++----
+ .../Library/AuthVariableLib/Default_DB_EX.h        |  2 ++
+ 2 files changed, 25 insertions(+), 4 deletions(-)
+ create mode 100644 SecurityPkg/Library/AuthVariableLib/Default_DB_EX.h
+
+diff --git a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c 
b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c
+index 91f361c..490ec7a 100644
+--- a/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c
++++ b/SecurityPkg/Library/AuthVariableLib/AuthVariableLib.c
+@@ -26,6 +26,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER 
EXPRESS OR IMPLIED.
+ #include "Default_PK.h"
+ #include "Default_KEK.h"
+ #include "Default_DB.h"
++#include "Default_DB_EX.h"
+ #include "Default_DBX.h"
+ 
+ ///
+@@ -280,19 +281,25 @@ AuthVariableLibInitialize (
+              &DataSize
+              );
+   if (Status == EFI_NOT_FOUND) {
++    UINTN SigSize_1 = 0;
++    UINTN SigSize_2 = 0;
++
+     SignatureGUID = (EFI_GUID *) AllocateZeroPool (sizeof (EFI_GUID));
+     if (SignatureGUID == NULL) {
+       return EFI_OUT_OF_RESOURCES;
+     }
+ 
+-    SigSize = sizeof(EFI_SIGNATURE_LIST) + sizeof(EFI_SIGNATURE_DATA) - 1 + 
Default_DB_len;
+-    Data = AllocateZeroPool (SigSize);
++    SigSize_1 = sizeof(EFI_SIGNATURE_LIST) + sizeof(EFI_SIGNATURE_DATA) - 1 + 
Default_DB_len;
++    if (Default_DB_EX != NULL) {
++      SigSize_2 = sizeof(EFI_SIGNATURE_LIST) + sizeof(EFI_SIGNATURE_DATA) - 1 
+ Default_DB_EX_len;
++    }
++    Data = AllocateZeroPool (SigSize_1 + SigSize_2);
+     if (Data == NULL) {
+       return EFI_OUT_OF_RESOURCES;
+     }
+ 
+     SigCert = (EFI_SIGNATURE_LIST*) Data;
+-    SigCert->SignatureListSize   = (UINT32) SigSize;
++    SigCert->SignatureListSize   = (UINT32) SigSize_1;
+     SigCert->SignatureHeaderSize = 0;
+     SigCert->SignatureSize = (UINT32) (sizeof(EFI_SIGNATURE_DATA) - 1 + 
Default_DB_len);
+     CopyGuid (&SigCert->SignatureType, &gEfiCertX509Guid);
+@@ -301,11 +308,23 @@ AuthVariableLibInitialize (
+     CopyGuid (&SigCertData->SignatureOwner, SignatureGUID);
+     CopyMem ((UINT8* ) (SigCertData->SignatureData), Default_DB, 
Default_DB_len);
+ 
++    if (Default_DB_EX != NULL) {
++      SigCert = (EFI_SIGNATURE_LIST*) (Data + SigSize_1);
++      SigCert->SignatureListSize   = (UINT32) SigSize_2;
++      SigCert->SignatureHeaderSize = 0;
++      SigCert->SignatureSize = (UINT32) (sizeof(EFI_SIGNATURE_DATA) - 1 + 
Default_DB_EX_len);
++      CopyGuid (&SigCert->SignatureType, &gEfiCertX509Guid);
++
++      SigCertData = (EFI_SIGNATURE_DATA*) ((UINT8* ) SigCert + sizeof 
(EFI_SIGNATURE_LIST));
++      CopyGuid (&SigCertData->SignatureOwner, SignatureGUID);
++      CopyMem ((UINT8* ) (SigCertData->SignatureData), Default_DB_EX, 
Default_DB_EX_len);
++    }
++
+     Status = AuthServiceInternalUpdateVariable (
+                EFI_IMAGE_SECURITY_DATABASE,
+                &gEfiImageSecurityDatabaseGuid,
+                Data,
+-               SigSize,
++               SigSize_1 + SigSize_2,
+                Attr
+                );
+     FreePool(SignatureGUID);
+diff --git a/SecurityPkg/Library/AuthVariableLib/Default_DB_EX.h 
b/SecurityPkg/Library/AuthVariableLib/Default_DB_EX.h
+new file mode 100644
+index 0000000..001f125
+--- /dev/null
++++ b/SecurityPkg/Library/AuthVariableLib/Default_DB_EX.h
+@@ -0,0 +1,2 @@
++unsigned char *Default_DB_EX = NULL;
++unsigned int Default_DB_EX_len = 0;
+-- 
+2.6.3
 

++++++ ovmf-fix-signedness.patch ++++++
diff --git a/NetworkPkg/DnsDxe/DnsImpl.c b/NetworkPkg/DnsDxe/DnsImpl.c
index 8725670..362af86 100644
--- a/NetworkPkg/DnsDxe/DnsImpl.c
+++ b/NetworkPkg/DnsDxe/DnsImpl.c
@@ -1026,7 +1026,7 @@ AddDns6ServerIp (
   @return           QName filled successfully.
   
 **/ 
-UINT8 *
+CHAR8 *
 EFIAPI
 DnsFillinQNameForQueryIp (
   IN  CHAR16              *HostName
diff --git a/NetworkPkg/DnsDxe/DnsImpl.h b/NetworkPkg/DnsDxe/DnsImpl.h
index a13355f..847cd15 100644
--- a/NetworkPkg/DnsDxe/DnsImpl.h
+++ b/NetworkPkg/DnsDxe/DnsImpl.h
@@ -581,7 +581,7 @@ AddDns6ServerIp (
   @return           QName filled successfully.
   
 **/ 
-UINT8 *
+CHAR8 *
 EFIAPI
 DnsFillinQNameForQueryIp (
   IN  CHAR16              *HostName
++++++ ovmf-gdb-symbols.patch ++++++
--- /var/tmp/diff_new_pack.T5nYb0/_old  2016-01-12 16:14:17.000000000 +0100
+++ /var/tmp/diff_new_pack.T5nYb0/_new  2016-01-12 16:14:17.000000000 +0100
@@ -1,3 +1,19 @@
+From 983c7fbc2444cbbbf3b82ae07a56232075a412bb Mon Sep 17 00:00:00 2001
+From: Gary Ching-Pang Lin <g...@suse.com>
+Date: Tue, 24 Jun 2014 11:57:32 +0800
+Subject: [PATCH 1/2] Add DebugPkg
+
+---
+ DebugPkg/DebugPkg.dec        |  34 +++++
+ DebugPkg/GdbSyms/GdbSyms.c   |  70 +++++++++
+ DebugPkg/GdbSyms/GdbSyms.inf |  57 +++++++
+ DebugPkg/Scripts/gdb_uefi.py | 348 +++++++++++++++++++++++++++++++++++++++++++
+ 4 files changed, 509 insertions(+)
+ create mode 100644 DebugPkg/DebugPkg.dec
+ create mode 100644 DebugPkg/GdbSyms/GdbSyms.c
+ create mode 100644 DebugPkg/GdbSyms/GdbSyms.inf
+ create mode 100644 DebugPkg/Scripts/gdb_uefi.py
+
 diff --git a/DebugPkg/DebugPkg.dec b/DebugPkg/DebugPkg.dec
 new file mode 100644
 index 0000000..e12401d
@@ -179,10 +195,10 @@
 +
 diff --git a/DebugPkg/Scripts/gdb_uefi.py b/DebugPkg/Scripts/gdb_uefi.py
 new file mode 100644
-index 0000000..3db87a4
+index 0000000..dac215c
 --- /dev/null
 +++ b/DebugPkg/Scripts/gdb_uefi.py
-@@ -0,0 +1,350 @@
+@@ -0,0 +1,348 @@
 +"""
 +Allows loading TianoCore symbols into a GDB session attached to EFI
 +Firmware.
@@ -203,7 +219,6 @@
 +import array
 +import getopt
 +import binascii
-+import re
 +
 +__license__ = "BSD"
 +__version = "1.0.0"
@@ -429,7 +444,6 @@
 +            base = base + opt['SizeOfHeaders']
 +        if sym_name != self.EINVAL:
 +            sym_name = sym_name.cast (self.ptype('CHAR8')).string ()
-+            sym_name = re.sub(r"\.dll$", ".debug", sym_name)
 +            syms.append ("add-symbol-file %s 0x%x" % \
 +                             (sym_name,
 +                              long (base)))
@@ -533,12 +547,49 @@
 +ReloadUefi ()
 +
 +
+-- 
+2.6.3
+
+
+From 1f827a7df8049b1375171a67d399dcba47b7786e Mon Sep 17 00:00:00 2001
+From: Gary Ching-Pang Lin <g...@suse.com>
+Date: Tue, 24 Jun 2014 11:59:02 +0800
+Subject: [PATCH 2/2] Compile DebugPkg and load .debug files
+
+---
+ DebugPkg/Scripts/gdb_uefi.py | 2 ++
+ OvmfPkg/OvmfPkgX64.dsc       | 1 +
+ 2 files changed, 3 insertions(+)
+
+diff --git a/DebugPkg/Scripts/gdb_uefi.py b/DebugPkg/Scripts/gdb_uefi.py
+index dac215c..3db87a4 100644
+--- a/DebugPkg/Scripts/gdb_uefi.py
++++ b/DebugPkg/Scripts/gdb_uefi.py
+@@ -18,6 +18,7 @@ images were converted from MACH-O or ELF binaries.
+ import array
+ import getopt
+ import binascii
++import re
+ 
+ __license__ = "BSD"
+ __version = "1.0.0"
+@@ -243,6 +244,7 @@ class ReloadUefi (gdb.Command):
+             base = base + opt['SizeOfHeaders']
+         if sym_name != self.EINVAL:
+             sym_name = sym_name.cast (self.ptype('CHAR8')).string ()
++            sym_name = re.sub(r"\.dll$", ".debug", sym_name)
+             syms.append ("add-symbol-file %s 0x%x" % \
+                              (sym_name,
+                               long (base)))
 diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc
-index 66459c2..320ffe8 100644
+index 76ef00a..62d0688 100644
 --- a/OvmfPkg/OvmfPkgX64.dsc
 +++ b/OvmfPkg/OvmfPkgX64.dsc
-@@ -567,3 +567,4 @@
+@@ -735,3 +735,4 @@ [Components]
+       NULL|MdeModulePkg/Library/VarCheckUefiLib/VarCheckUefiLib.inf
+   }
  !endif
- 
-   OvmfPkg/PlatformDxe/Platform.inf
 +  DebugPkg/GdbSyms/GdbSyms.inf
+-- 
+2.6.3
+


Reply via email to