[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [ovmf baseline-only test] 83681: trouble: blocked/broken
This run is configured for baseline tests only. flight 83681 ovmf real [real] http://osstest.xensource.com/osstest/logs/83681/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-xsm <job status> broken build-i386 <job status> broken build-amd64-pvops <job status> broken build-i386-xsm <job status> broken build-amd64 <job status> broken build-i386-pvops <job status> broken Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemuu-ovmf-amd64 1 build-check(1) blocked n/a build-amd64-libvirt 1 build-check(1) blocked n/a test-amd64-i386-xl-qemuu-ovmf-amd64 1 build-check(1) blocked n/a build-i386-libvirt 1 build-check(1) blocked n/a build-amd64 4 host-install(4) broken baseline untested build-amd64-pvops 4 host-install(4) broken baseline untested build-i386-xsm 4 host-install(4) broken baseline untested build-i386-pvops 4 host-install(4) broken baseline untested build-i386 4 host-install(4) broken baseline untested build-amd64-xsm 4 host-install(4) broken baseline untested version targeted for testing: ovmf 3a4698202cf5ca81d4401bdc6c0974400064f333 baseline version: ovmf 8b8d6f8a3beea391b1ec39ac347ef69501b44019 Last test of basis 83677 2019-02-28 04:32:02 Z 0 days Testing same since 83681 2019-02-28 13:54:14 Z 0 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Hao Wu <hao.a.wu@xxxxxxxxx> Jiaxin Wu <Jiaxin.wu@xxxxxxxxx> Jiewen Yao <jiewen.yao@xxxxxxxxx> Liming Gao <liming.gao@xxxxxxxxx> Wang Fan <fan.wang@xxxxxxxxx> Wu Jiaxin <jiaxin.wu@xxxxxxxxx> Yao Jiewen <jiewen.yao@xxxxxxxxx> Yao, Jiewen <jiewen.yao@xxxxxxxxx> jobs: build-amd64-xsm broken build-i386-xsm broken build-amd64 broken build-i386 broken build-amd64-libvirt blocked build-i386-libvirt blocked build-amd64-pvops broken build-i386-pvops broken test-amd64-amd64-xl-qemuu-ovmf-amd64 blocked test-amd64-i386-xl-qemuu-ovmf-amd64 blocked ------------------------------------------------------------ sg-report-flight on osstest.xs.citrite.net logs: /home/osstest/logs images: /home/osstest/images Logs, config files, etc. are available at http://osstest.xensource.com/osstest/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary broken-job build-amd64-xsm broken broken-job build-i386 broken broken-job build-amd64-pvops broken broken-job build-i386-xsm broken broken-job build-amd64 broken broken-job build-i386-pvops broken broken-step build-amd64 host-install(4) broken-step build-amd64-pvops host-install(4) broken-step build-i386-xsm host-install(4) broken-step build-i386-pvops host-install(4) broken-step build-i386 host-install(4) broken-step build-amd64-xsm host-install(4) Push not applicable. ------------------------------------------------------------ commit 3a4698202cf5ca81d4401bdc6c0974400064f333 Author: Liming Gao <liming.gao@xxxxxxxxx> Date: Mon Feb 25 08:15:25 2019 +0800 Revert "BaseTools:BaseTools supports to the driver combination." This reverts commit 838bc257bae3f9fc6723f41f3980f6cfbedb77e5. After further evaluation, there are the unclear behavior in for the driver combination feature. To not impact Q1 stable tag, remove it first. 1. If the drivers to be combined have the different PCD or library instance setting, build should not combine them and report build break. But this commit doesn't consider this case. 2. When start the sub driver fail, continue to start other sub driver. This behavior is required to be clarifed in build spec. 3. Unload the sub driver when the combined driver start fail. This case need to call the sub driver unload function for the driver start fail only. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Liming Gao <liming.gao@xxxxxxxxx> Reviewed-by: Bob Feng <bob.c.feng@xxxxxxxxx> commit 90b24889f9ced53c18b73266d507e45fbd94fab0 Author: Wang Fan <fan.wang@xxxxxxxxx> Date: Fri Feb 22 15:48:25 2019 +0800 NetworkPkg: Add WiFi Connection Manager to NetworkPkg * V2 * Remove Arch dependency in Inf file * Add a global guid for WiFi formset and set other guids to module levels * Open supplicant and EapConfig by BY_DRIVER * Remove token free function to avoid potential NULL reference * Update WifiMgrUpdateConnectMessage() to only display message for Current Nic * Fix the potential NULL reference in AIP call * REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1492 Add WiFi Connection Manager in NetworkPkg to provide UI for users to scan networks, connect or disconnect to networks. This connection manager won't include the UNDI driver, supplicant driver, or other device specific drivers and is therefor not a complete solution stack for UEFI Wi-Fi, users can seek help for Wireless card vendors. Cc: Ye Ting <ting.ye@xxxxxxxxx> Cc: Fu Siyuan <siyuan.fu@xxxxxxxxx> Cc: Wu Jiaxin <jiaxin.wu@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Wang Fan <fan.wang@xxxxxxxxx> Reviewed-by: Wu Jiaxin <jiaxin.wu@xxxxxxxxx> Reviewed-by: Siyuan Fu <siyuan.fu@xxxxxxxxx> commit 3eb69b081c683f9d825930d0c511e43c0485e5d2 Author: Jiewen Yao <jiewen.yao@xxxxxxxxx> Date: Fri Feb 22 21:30:36 2019 +0800 UefiCpuPkg/PiSmmCpu: Add Shadow Stack Support for X86 SMM. REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1521 We scan the SMM code with ROPgadget. http://shell-storm.org/project/ROPgadget/ https://github.com/JonathanSalwan/ROPgadget/tree/master This tool reports the gadget in SMM driver. This patch enabled CET ShadowStack for X86 SMM. If CET is supported, SMM will enable CET ShadowStack. SMM CET will save the OS CET context at SmmEntry and restore OS CET context at SmmExit. Test: 1) test Intel internal platform (x64 only, CET enabled/disabled) Boot test: CET supported or not supported CPU on CET supported platform CET enabled/disabled PcdCpuSmmCetEnable enabled/disabled Single core/Multiple core PcdCpuSmmStackGuard enabled/disabled PcdCpuSmmProfileEnable enabled/disabled PcdCpuSmmStaticPageTable enabled/disabled CET exception test: #CF generated with PcdCpuSmmStackGuard enabled/disabled. Other exception test: #PF for normal stack overflow #PF for NX protection #PF for RO protection CET env test: Launch SMM in CET enabled/disabled environment (DXE) - no impact to DXE The test case can be found at https://github.com/jyao1/SecurityEx/tree/master/ControlFlowPkg 2) test ovmf (both IA32 and X64 SMM, CET disabled only) test OvmfIa32/Ovmf3264, with -D SMM_REQUIRE. qemu-system-x86_64.exe -machine q35,smm=on -smp 4 -serial file:serial.log -drive if=pflash,format=raw,unit=0,file=OVMF_CODE.fd,readonly=on -drive if=pflash,format=raw,unit=1,file=OVMF_VARS.fd QEMU emulator version 3.1.0 (v3.1.0-11736-g7a30e7adb0-dirty) 3) not tested IA32 CET enabled platform Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Ray Ni <ray.ni@xxxxxxxxx> Cc: Laszlo Ersek <lersek@xxxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Yao Jiewen <jiewen.yao@xxxxxxxxx> Reviewed-by: Ray Ni <ray.ni@xxxxxxxxx> Regression-tested-by: Laszlo Ersek <lersek@xxxxxxxxxx> commit 0d25074cbcc272532d6ca5a47974ac5b31f4b6ec Author: Jiewen Yao <jiewen.yao@xxxxxxxxx> Date: Fri Feb 22 21:30:35 2019 +0800 UefiCpuPkg/ExceptionLib: Add CET support. REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1521 Add information dump for Control Protection exception. Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Ray Ni <ray.ni@xxxxxxxxx> Cc: Laszlo Ersek <lersek@xxxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Yao Jiewen <jiewen.yao@xxxxxxxxx> Reviewed-by: Ray Ni <ray.ni@xxxxxxxxx> Regression-tested-by: Laszlo Ersek <lersek@xxxxxxxxxx> commit 0aac2f777a688a146050bed47753e2dcf801d3c7 Author: Yao, Jiewen <jiewen.yao@xxxxxxxxx> Date: Fri Feb 22 21:30:34 2019 +0800 MdePkg/BaseLib: Add Shadow Stack Support for X86. REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1521 This patch adds SSP - shadow stack pointer to JumpBuffer. It will be used for the platform that enabled CET/ShadowStack. We add gEfiMdePkgTokenSpaceGuid.PcdControlFlowEnforcementPropertyMask to control the global enable/disable. Cc: Michael D Kinney <michael.d.kinney@xxxxxxxxx> Cc: Liming Gao <liming.gao@xxxxxxxxx> Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Ray Ni <ray.ni@xxxxxxxxx> Cc: Laszlo Ersek <lersek@xxxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Yao Jiewen <jiewen.yao@xxxxxxxxx> Reviewed-by: Ray Ni <ray.ni@xxxxxxxxx> Regression-tested-by: Laszlo Ersek <lersek@xxxxxxxxxx> commit 68edd7dbad77d7170ee0e1c5dbefae93ea9997b1 Author: Yao, Jiewen <jiewen.yao@xxxxxxxxx> Date: Fri Feb 22 21:30:33 2019 +0800 MdePkg/Include: Add Nasm.inc REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1521 This is to add CET related instruction in Nasm because CET instruction is not supported yet. See https://www.nasm.us/xdoc/2.14.02/html/nasmdocb.html Cc: Michael D Kinney <michael.d.kinney@xxxxxxxxx> Cc: Liming Gao <liming.gao@xxxxxxxxx> Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Ray Ni <ray.ni@xxxxxxxxx> Cc: Laszlo Ersek <lersek@xxxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Yao Jiewen <jiewen.yao@xxxxxxxxx> Reviewed-by: Ray Ni <ray.ni@xxxxxxxxx> Regression-tested-by: Laszlo Ersek <lersek@xxxxxxxxxx> commit 84110bbe4bb3a346514b9bb12eadb7586bca7dfd Author: Jiaxin Wu <Jiaxin.wu@xxxxxxxxx> Date: Mon Jul 2 09:20:56 2018 +0800 NetworkPkg/DnsDxe: [CVE-2018-12178] Check the received packet size before parsing the message. Fix CVE-2018-12178 REF: https://bugzilla.tianocore.org/show_bug.cgi?id=809 The DNS driver only checks the received packet size against the minimum DNS header size in DnsOnPacketReceived(), later it accesses the QueryName and QuerySection beyond the header scope, which might cause the pointer within DNS driver points to an invalid entry or modifies the memory content beyond the header scope. This patch is to fix above problem. Cc: Ye Ting <ting.ye@xxxxxxxxx> Cc: Fu Siyuan <siyuan.fu@xxxxxxxxx> Cc: Wang Fan <fan.wang@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Wu Jiaxin <jiaxin.wu@xxxxxxxxx> Reviewed-by: Siyuan Fu <siyuan.fu@xxxxxxxxx> commit 38c9fbdcaa0219eb86fe82d90e3f8cfb5a54be9f Author: Hao Wu <hao.a.wu@xxxxxxxxx> Date: Wed Feb 7 12:49:50 2018 +0800 MdeModulePkg/RamDiskDxe: Restrict on RAM disk size (CVE-2018-12180) REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1134 Originally, the block size of created Ram disks is hard-coded to 512 bytes. However, if the total size of the Ram disk is not a multiple of 512 bytes, there will be potential memory access issues when dealing with the last block of the Ram disk. This commit will adjust the block size of the Ram disks to ensure that the total size is a multiple of the block size. Cc: Jian J Wang <jian.j.wang@xxxxxxxxx> Cc: Star Zeng <star.zeng@xxxxxxxxx> Cc: Laszlo Ersek <lersek@xxxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Hao Wu <hao.a.wu@xxxxxxxxx> Reviewed-by: Ray Ni <ray.ni@xxxxxxxxx> commit fccdb88022c1f6d85c773fce506b10c879063f1d Author: Hao Wu <hao.a.wu@xxxxxxxxx> Date: Fri Feb 9 08:43:01 2018 +0800 MdeModulePkg/PartitionDxe: Ensure blocksize holds MBR (CVE-2018-12180) REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1134 The commit adds checks for detecting GPT and MBR partitions. These checks will ensure that the device block size is big enough to hold an MBR (512 bytes). Cc: Jian J Wang <jian.j.wang@xxxxxxxxx> Cc: Star Zeng <star.zeng@xxxxxxxxx> Cc: Laszlo Ersek <lersek@xxxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Hao Wu <hao.a.wu@xxxxxxxxx> Reviewed-by: Ray Ni <ray.ni@xxxxxxxxx> _______________________________________________ osstest-output mailing list osstest-output@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/osstest-output
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |