[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [ovmf baseline-only test] 83681: trouble: blocked/broken



This run is configured for baseline tests only.

flight 83681 ovmf real [real]
http://osstest.xensource.com/osstest/logs/83681/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm                 <job status>                 broken
 build-i386                      <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-amd64                     <job status>                 broken
 build-i386-pvops                <job status>                 broken

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 build-amd64                   4 host-install(4)       broken baseline untested
 build-amd64-pvops             4 host-install(4)       broken baseline untested
 build-i386-xsm                4 host-install(4)       broken baseline untested
 build-i386-pvops              4 host-install(4)       broken baseline untested
 build-i386                    4 host-install(4)       broken baseline untested
 build-amd64-xsm               4 host-install(4)       broken baseline untested

version targeted for testing:
 ovmf                 3a4698202cf5ca81d4401bdc6c0974400064f333
baseline version:
 ovmf                 8b8d6f8a3beea391b1ec39ac347ef69501b44019

Last test of basis    83677  2019-02-28 04:32:02 Z    0 days
Testing same since    83681  2019-02-28 13:54:14 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Hao Wu <hao.a.wu@xxxxxxxxx>
  Jiaxin Wu <Jiaxin.wu@xxxxxxxxx>
  Jiewen Yao <jiewen.yao@xxxxxxxxx>
  Liming Gao <liming.gao@xxxxxxxxx>
  Wang Fan <fan.wang@xxxxxxxxx>
  Wu Jiaxin <jiaxin.wu@xxxxxxxxx>
  Yao Jiewen <jiewen.yao@xxxxxxxxx>
  Yao, Jiewen <jiewen.yao@xxxxxxxxx>

jobs:
 build-amd64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.xs.citrite.net
logs: /home/osstest/logs
images: /home/osstest/images

Logs, config files, etc. are available at
    http://osstest.xensource.com/osstest/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary

broken-job build-amd64-xsm broken
broken-job build-i386 broken
broken-job build-amd64-pvops broken
broken-job build-i386-xsm broken
broken-job build-amd64 broken
broken-job build-i386-pvops broken
broken-step build-amd64 host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-i386 host-install(4)
broken-step build-amd64-xsm host-install(4)

Push not applicable.

------------------------------------------------------------
commit 3a4698202cf5ca81d4401bdc6c0974400064f333
Author: Liming Gao <liming.gao@xxxxxxxxx>
Date:   Mon Feb 25 08:15:25 2019 +0800

    Revert "BaseTools:BaseTools supports to the driver combination."
    
    This reverts commit 838bc257bae3f9fc6723f41f3980f6cfbedb77e5.
    After further evaluation, there are the unclear behavior in for the
    driver combination feature. To not impact Q1 stable tag, remove it first.
    1. If the drivers to be combined have the different PCD or library instance
       setting, build should not combine them and report build break. But this
       commit doesn't consider this case.
    2. When start the sub driver fail, continue to start other sub driver. This
       behavior is required to be clarifed in build spec.
    3. Unload the sub driver when the combined driver start fail. This case need
       to call the sub driver unload function for the driver start fail only.
    
    Contributed-under: TianoCore Contribution Agreement 1.1
    Signed-off-by: Liming Gao <liming.gao@xxxxxxxxx>
    Reviewed-by: Bob Feng <bob.c.feng@xxxxxxxxx>

commit 90b24889f9ced53c18b73266d507e45fbd94fab0
Author: Wang Fan <fan.wang@xxxxxxxxx>
Date:   Fri Feb 22 15:48:25 2019 +0800

    NetworkPkg: Add WiFi Connection Manager to NetworkPkg
    
    * V2
    
    * Remove Arch dependency in Inf file
    * Add a global guid for WiFi formset and set other guids to module levels
    * Open supplicant and EapConfig by BY_DRIVER
    * Remove token free function to avoid potential NULL reference
    * Update WifiMgrUpdateConnectMessage() to only display message for Current 
Nic
    * Fix the potential NULL reference in AIP call
    
    * REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1492
    
    Add WiFi Connection Manager in NetworkPkg to provide UI for users to scan
    networks, connect or disconnect to networks.
    
    This connection manager won't include the UNDI driver, supplicant driver,
    or other device specific drivers and is therefor not a complete solution
    stack for UEFI Wi-Fi, users can seek help for Wireless card vendors.
    
    Cc: Ye Ting <ting.ye@xxxxxxxxx>
    Cc: Fu Siyuan <siyuan.fu@xxxxxxxxx>
    Cc: Wu Jiaxin <jiaxin.wu@xxxxxxxxx>
    Contributed-under: TianoCore Contribution Agreement 1.1
    Signed-off-by: Wang Fan <fan.wang@xxxxxxxxx>
    Reviewed-by: Wu Jiaxin <jiaxin.wu@xxxxxxxxx>
    Reviewed-by: Siyuan Fu <siyuan.fu@xxxxxxxxx>

commit 3eb69b081c683f9d825930d0c511e43c0485e5d2
Author: Jiewen Yao <jiewen.yao@xxxxxxxxx>
Date:   Fri Feb 22 21:30:36 2019 +0800

    UefiCpuPkg/PiSmmCpu: Add Shadow Stack Support for X86 SMM.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1521
    
    We scan the SMM code with ROPgadget.
    http://shell-storm.org/project/ROPgadget/
    https://github.com/JonathanSalwan/ROPgadget/tree/master
    This tool reports the gadget in SMM driver.
    
    This patch enabled CET ShadowStack for X86 SMM.
    If CET is supported, SMM will enable CET ShadowStack.
    SMM CET will save the OS CET context at SmmEntry and
    restore OS CET context at SmmExit.
    
    Test:
    1) test Intel internal platform (x64 only, CET enabled/disabled)
    Boot test:
    CET supported or not supported CPU
    on CET supported platform
      CET enabled/disabled
      PcdCpuSmmCetEnable enabled/disabled
      Single core/Multiple core
      PcdCpuSmmStackGuard enabled/disabled
      PcdCpuSmmProfileEnable enabled/disabled
      PcdCpuSmmStaticPageTable enabled/disabled
    CET exception test:
      #CF generated with PcdCpuSmmStackGuard enabled/disabled.
    Other exception test:
      #PF for normal stack overflow
      #PF for NX protection
      #PF for RO protection
    CET env test:
      Launch SMM in CET enabled/disabled environment (DXE) - no impact to DXE
    
    The test case can be found at
    https://github.com/jyao1/SecurityEx/tree/master/ControlFlowPkg
    
    2) test ovmf (both IA32 and X64 SMM, CET disabled only)
    test OvmfIa32/Ovmf3264, with -D SMM_REQUIRE.
      qemu-system-x86_64.exe -machine q35,smm=on -smp 4
        -serial file:serial.log
        -drive if=pflash,format=raw,unit=0,file=OVMF_CODE.fd,readonly=on
        -drive if=pflash,format=raw,unit=1,file=OVMF_VARS.fd
    QEMU emulator version 3.1.0 (v3.1.0-11736-g7a30e7adb0-dirty)
    
    3) not tested
    IA32 CET enabled platform
    
    Cc: Eric Dong <eric.dong@xxxxxxxxx>
    Cc: Ray Ni <ray.ni@xxxxxxxxx>
    Cc: Laszlo Ersek <lersek@xxxxxxxxxx>
    Contributed-under: TianoCore Contribution Agreement 1.1
    Signed-off-by: Yao Jiewen <jiewen.yao@xxxxxxxxx>
    Reviewed-by: Ray Ni <ray.ni@xxxxxxxxx>
    Regression-tested-by: Laszlo Ersek <lersek@xxxxxxxxxx>

commit 0d25074cbcc272532d6ca5a47974ac5b31f4b6ec
Author: Jiewen Yao <jiewen.yao@xxxxxxxxx>
Date:   Fri Feb 22 21:30:35 2019 +0800

    UefiCpuPkg/ExceptionLib: Add CET support.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1521
    
    Add information dump for Control Protection exception.
    
    Cc: Eric Dong <eric.dong@xxxxxxxxx>
    Cc: Ray Ni <ray.ni@xxxxxxxxx>
    Cc: Laszlo Ersek <lersek@xxxxxxxxxx>
    Contributed-under: TianoCore Contribution Agreement 1.1
    Signed-off-by: Yao Jiewen <jiewen.yao@xxxxxxxxx>
    Reviewed-by: Ray Ni <ray.ni@xxxxxxxxx>
    Regression-tested-by: Laszlo Ersek <lersek@xxxxxxxxxx>

commit 0aac2f777a688a146050bed47753e2dcf801d3c7
Author: Yao, Jiewen <jiewen.yao@xxxxxxxxx>
Date:   Fri Feb 22 21:30:34 2019 +0800

    MdePkg/BaseLib: Add Shadow Stack Support for X86.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1521
    
    This patch adds SSP - shadow stack pointer to JumpBuffer.
    It will be used for the platform that enabled CET/ShadowStack.
    
    We add gEfiMdePkgTokenSpaceGuid.PcdControlFlowEnforcementPropertyMask
    to control the global enable/disable.
    
    Cc: Michael D Kinney <michael.d.kinney@xxxxxxxxx>
    Cc: Liming Gao <liming.gao@xxxxxxxxx>
    Cc: Eric Dong <eric.dong@xxxxxxxxx>
    Cc: Ray Ni <ray.ni@xxxxxxxxx>
    Cc: Laszlo Ersek <lersek@xxxxxxxxxx>
    Contributed-under: TianoCore Contribution Agreement 1.1
    Signed-off-by: Yao Jiewen <jiewen.yao@xxxxxxxxx>
    Reviewed-by: Ray Ni <ray.ni@xxxxxxxxx>
    Regression-tested-by: Laszlo Ersek <lersek@xxxxxxxxxx>

commit 68edd7dbad77d7170ee0e1c5dbefae93ea9997b1
Author: Yao, Jiewen <jiewen.yao@xxxxxxxxx>
Date:   Fri Feb 22 21:30:33 2019 +0800

    MdePkg/Include: Add Nasm.inc
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=1521
    
    This is to add CET related instruction in Nasm
    because CET instruction is not supported yet.
    
    See https://www.nasm.us/xdoc/2.14.02/html/nasmdocb.html
    
    Cc: Michael D Kinney <michael.d.kinney@xxxxxxxxx>
    Cc: Liming Gao <liming.gao@xxxxxxxxx>
    Cc: Eric Dong <eric.dong@xxxxxxxxx>
    Cc: Ray Ni <ray.ni@xxxxxxxxx>
    Cc: Laszlo Ersek <lersek@xxxxxxxxxx>
    Contributed-under: TianoCore Contribution Agreement 1.1
    Signed-off-by: Yao Jiewen <jiewen.yao@xxxxxxxxx>
    Reviewed-by: Ray Ni <ray.ni@xxxxxxxxx>
    Regression-tested-by: Laszlo Ersek <lersek@xxxxxxxxxx>

commit 84110bbe4bb3a346514b9bb12eadb7586bca7dfd
Author: Jiaxin Wu <Jiaxin.wu@xxxxxxxxx>
Date:   Mon Jul 2 09:20:56 2018 +0800

    NetworkPkg/DnsDxe: [CVE-2018-12178] Check the received packet size before 
parsing the message.
    
    Fix CVE-2018-12178
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=809
    
    The DNS driver only checks the received packet size against the
    minimum DNS header size in DnsOnPacketReceived(), later it accesses
    the QueryName and QuerySection beyond the header scope, which might
    cause the pointer within DNS driver points to an invalid entry or
    modifies the memory content beyond the header scope.
    
    This patch is to fix above problem.
    
    Cc: Ye Ting <ting.ye@xxxxxxxxx>
    Cc: Fu Siyuan <siyuan.fu@xxxxxxxxx>
    Cc: Wang Fan <fan.wang@xxxxxxxxx>
    Contributed-under: TianoCore Contribution Agreement 1.0
    Signed-off-by: Wu Jiaxin <jiaxin.wu@xxxxxxxxx>
    Reviewed-by: Siyuan Fu <siyuan.fu@xxxxxxxxx>

commit 38c9fbdcaa0219eb86fe82d90e3f8cfb5a54be9f
Author: Hao Wu <hao.a.wu@xxxxxxxxx>
Date:   Wed Feb 7 12:49:50 2018 +0800

    MdeModulePkg/RamDiskDxe: Restrict on RAM disk size (CVE-2018-12180)
    
    REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1134
    
    Originally, the block size of created Ram disks is hard-coded to 512
    bytes. However, if the total size of the Ram disk is not a multiple of 512
    bytes, there will be potential memory access issues when dealing with the
    last block of the Ram disk.
    
    This commit will adjust the block size of the Ram disks to ensure that the
    total size is a multiple of the block size.
    
    Cc: Jian J Wang <jian.j.wang@xxxxxxxxx>
    Cc: Star Zeng <star.zeng@xxxxxxxxx>
    Cc: Laszlo Ersek <lersek@xxxxxxxxxx>
    Contributed-under: TianoCore Contribution Agreement 1.1
    Signed-off-by: Hao Wu <hao.a.wu@xxxxxxxxx>
    Reviewed-by: Ray Ni <ray.ni@xxxxxxxxx>

commit fccdb88022c1f6d85c773fce506b10c879063f1d
Author: Hao Wu <hao.a.wu@xxxxxxxxx>
Date:   Fri Feb 9 08:43:01 2018 +0800

    MdeModulePkg/PartitionDxe: Ensure blocksize holds MBR (CVE-2018-12180)
    
    REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1134
    
    The commit adds checks for detecting GPT and MBR partitions.
    
    These checks will ensure that the device block size is big enough to hold
    an MBR (512 bytes).
    
    Cc: Jian J Wang <jian.j.wang@xxxxxxxxx>
    Cc: Star Zeng <star.zeng@xxxxxxxxx>
    Cc: Laszlo Ersek <lersek@xxxxxxxxxx>
    Contributed-under: TianoCore Contribution Agreement 1.1
    Signed-off-by: Hao Wu <hao.a.wu@xxxxxxxxx>
    Reviewed-by: Ray Ni <ray.ni@xxxxxxxxx>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.