[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [ovmf test] 113667: regressions - FAIL
flight 113667 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/113667/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-xsm 6 xen-build fail REGR. vs. 113647 build-i386-xsm 6 xen-build fail REGR. vs. 113647 build-i386 6 xen-build fail REGR. vs. 113647 build-amd64 6 xen-build fail REGR. vs. 113647 Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemuu-ovmf-amd64 1 build-check(1) blocked n/a build-amd64-libvirt 1 build-check(1) blocked n/a test-amd64-i386-xl-qemuu-ovmf-amd64 1 build-check(1) blocked n/a build-i386-libvirt 1 build-check(1) blocked n/a version targeted for testing: ovmf 560a435df02b233ea33ae543aeab76b2201de849 baseline version: ovmf 947f3737abf65fda63f3ffd97fddfa6986986868 Last test of basis 113647 2017-09-20 22:34:05 Z 0 days Failing since 113654 2017-09-21 06:22:39 Z 0 days 4 attempts Testing same since 113658 2017-09-21 09:21:11 Z 0 days 3 attempts ------------------------------------------------------------ People who touched revisions under test: Dandan Bi <dandan.bi@xxxxxxxxx> Hao Wu <hao.a.wu@xxxxxxxxx> Jian J Wang <jian.j.wang@xxxxxxxxx> jobs: build-amd64-xsm fail build-i386-xsm fail build-amd64 fail build-i386 fail build-amd64-libvirt blocked build-i386-libvirt blocked build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl-qemuu-ovmf-amd64 blocked test-amd64-i386-xl-qemuu-ovmf-amd64 blocked ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 560a435df02b233ea33ae543aeab76b2201de849 Author: Dandan Bi <dandan.bi@xxxxxxxxx> Date: Wed Sep 20 20:19:04 2017 +0800 MdeModulePkg/SetupBrowser: Handle questions with Bit VarStore REF:https://bugzilla.tianocore.org/show_bug.cgi?id=545 For oneof/numeric/CheckBox(storage can be Bit VarStore) If the question value can be updated and shown correctly in UI page, we need do enhancements in following cases: 1. Parse the Ifr data to get the bit VarStore info correctly. 2. Set/get value to/from bit VarStore correctly. Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Liming Gao <liming.gao@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Dandan Bi <dandan.bi@xxxxxxxxx> Reviewed-by: Eric Dong <eric.dong@xxxxxxxxx> Reviewed-by: Liming Gao <liming.gao@xxxxxxxxx> commit 37cd16ac57fcbe5f6ecd15f85ea51621d08cde59 Author: Dandan Bi <dandan.bi@xxxxxxxxx> Date: Wed Sep 20 20:09:04 2017 +0800 MdeModulePkg/HiiDatabase: Handle questions with Bit VarStore REF:https://bugzilla.tianocore.org/show_bug.cgi?id=545 For oneof/numeric/checkbox, their storage may be bit field. When generating <ConfigAltResp> string to get default value for these questions, we need to parse the Ifr data to get the bit Varstore info,and then generating the correct <ConfigAltResp> string. Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Liming Gao <liming.gao@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Dandan Bi <dandan.bi@xxxxxxxxx> Reviewed-by: Eric Dong <eric.dong@xxxxxxxxx> Reviewed-by: Liming Gao <liming.gao@xxxxxxxxx> commit 95a71351919aee15874b748f1aae2f8f492d2f76 Author: Dandan Bi <dandan.bi@xxxxxxxxx> Date: Wed Sep 20 19:43:45 2017 +0800 MdeModulePkg/UefiHiiLib: Validate question with bit fields REF:https://bugzilla.tianocore.org/show_bug.cgi?id=545 In UefiHiiLib, there are codes to validate the current setting of questions, now update the logic to handle question with bit storage. Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Liming Gao <liming.gao@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Dandan Bi <dandan.bi@xxxxxxxxx> Reviewed-by: Eric Dong <eric.dong@xxxxxxxxx> Reviewed-by: Liming Gao <liming.gao@xxxxxxxxx> commit 01723271a8baef1dc4c92bce0c09d41055cc5eb9 Author: Dandan Bi <dandan.bi@xxxxxxxxx> Date: Wed Sep 20 19:24:18 2017 +0800 MdeModulePkg: Add GUID/flags to implement BitField support REF: https://bugzilla.tianocore.org/show_bug.cgi?id=545 Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Liming Gao <liming.gao@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Dandan Bi <dandan.bi@xxxxxxxxx> Reviewed-by: Eric Dong <eric.dong@xxxxxxxxx> Reviewed-by: Liming Gao <liming.gao@xxxxxxxxx> commit 42c808d4cbc66605777dad18d800708f2c06f0c4 Author: Dandan Bi <dandan.bi@xxxxxxxxx> Date: Wed Aug 23 16:27:26 2017 +0800 BaseTool/VfrCompiler: Support Bit fields in EFI/Buffer VarStore REF: https://bugzilla.tianocore.org/show_bug.cgi?id=545 Enhance VfrCompiler to parse following case: 1. EFI/Buffer VarStore can contain bit fields in their structure. 2. For question Oneof/Checkbox/numeric, their storage can be bit fields of an EFI VarStore/Buffer VarStore. Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Liming Gao <liming.gao@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Dandan Bi <dandan.bi@xxxxxxxxx> Reviewed-by: Eric Dong <eric.dong@xxxxxxxxx> Reviewed-by: Liming Gao <liming.gao@xxxxxxxxx> commit 2b7f3d4a6bb7e024b3c45f328bdd635f878387f7 Author: Dandan Bi <dandan.bi@xxxxxxxxx> Date: Wed Aug 23 15:50:50 2017 +0800 BaseTool/VfrCompile: Support Union type in VFR https://bugzilla.tianocore.org/show_bug.cgi?id=603 Update VfrCompiler to parse the UNION type in vfr file Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Liming Gao <liming.gao@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Dandan Bi <dandan.bi@xxxxxxxxx> Reviewed-by: Eric Dong <eric.dong@xxxxxxxxx> Reviewed-by: Liming Gao <liming.gao@xxxxxxxxx> commit 9fdf31789a7088736bc574f6802f4a97b5ef2e97 Author: Hao Wu <hao.a.wu@xxxxxxxxx> Date: Tue Sep 19 11:01:56 2017 +0800 MdePkg/BaseLib: Avoid reading content beyond string boundary REF: https://bugzilla.tianocore.org/show_bug.cgi?id=705 As mentioned in the above Bugzilla link by Steven, within the function PathCleanUpDirectories(), when executing command: "cd ." under Shell, the input parameter 'Path' string will have string length less than 2. Hence, it is possible for the below statement: "if (StrCmp (Path + StrLen (Path) - 2, L"\\.") == 0) {" to read contents before the string boundary. This commit adds additional checks to avoid this. Cc: Steven Shi <steven.shi@xxxxxxxxx> Cc: Michael Kinney <michael.d.kinney@xxxxxxxxx> Cc: Liming Gao <liming.gao@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Hao Wu <hao.a.wu@xxxxxxxxx> Reviewed-by: Ruiyu Ni <ruiyu.ni@xxxxxxxxx> commit 8c3e4688e0d8e6c218a98855d98976ce46dbb29e Author: Hao Wu <hao.a.wu@xxxxxxxxx> Date: Tue Sep 19 10:22:21 2017 +0800 ShellPkg/Shell: Avoid reading content beyond string boundary REF: https://bugzilla.tianocore.org/show_bug.cgi?id=690 Within function EfiShellGetDevicePathFromFilePath(), when the input parameter 'Path' string is like: "FS0:" It is possible for the below statement: "if (*(Path+StrLen(MapName)+1) == CHAR_NULL) {" to read the content 1 byte beyond the string boundary (both 'Path' and 'MapName' will be FS0: in this case). This commit adds additional checks to avoid this. Cc: Steven Shi <steven.shi@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Hao Wu <hao.a.wu@xxxxxxxxx> Reviewed-by: Jaben Carsey <jaben.carsey@xxxxxxxxx> Reviewed-by: Ruiyu Ni <ruiyu.ni@xxxxxxxxx> commit 14dde9e903bb9a719ebb8f3381da72b19509bc36 Author: Jian J Wang <jian.j.wang@xxxxxxxxx> Date: Tue Sep 19 13:52:11 2017 +0800 MdeModulePkg/Core: Fix out-of-sync issue in GCD From GCD perspective, its SetMemorySpaceAttributes() method doesn't accept page related attributes. That means users cannot use it to change page attributes, and have to turn to CPU arch protocol to do it, which is not be allowed by PI spec. Cc: Jiewen Yao <jiewen.yao@xxxxxxxxx> Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Star Zeng <star.zeng@xxxxxxxxx> Cc: Laszlo Ersek <lersek@xxxxxxxxxx> Cc: Michael Kinney <michael.d.kinney@xxxxxxxxx> Suggested-by: Jiewen Yao <jiewen.yao@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Jian J Wang <jian.j.wang@xxxxxxxxx> Reviewed-by: Jiewen Yao <jiewen.yao@xxxxxxxxx> Reviewed-by: Star Zeng <star.zeng@xxxxxxxxx> commit c1cab54ce57c2608b8b3ea051c7041f036f21153 Author: Jian J Wang <jian.j.wang@xxxxxxxxx> Date: Sat Sep 16 21:26:28 2017 +0800 UefiCpuPkg/CpuDxe: Fix out-of-sync issue in page attributes From CpuDxe driver perspective, it doesn't update GCD memory attributes from current page table setup during its initialization. So the memory attributes in GCD might not reflect all memory attributes in real world. Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Jiewen Yao <jiewen.yao@xxxxxxxxx> Cc: Star Zeng <star.zeng@xxxxxxxxx> Cc: Laszlo Ersek <lersek@xxxxxxxxxx> Cc: Michael Kinney <michael.d.kinney@xxxxxxxxx> Suggested-by: Jiewen Yao <jiewen.yao@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Jian J Wang <jian.j.wang@xxxxxxxxx> Reviewed-by: Jiewen Yao <jiewen.yao@xxxxxxxxx> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |