[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [ovmf test] 124440: regressions - FAIL
flight 124440 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/124440/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-libvirt 6 libvirt-build fail REGR. vs. 124361 version targeted for testing: ovmf 855abe0204cb932c8059a573a06a59ddc714ca49 baseline version: ovmf 11d0cd23dd1bc15a6e6a1598250ea2e0c4c36e9a Last test of basis 124361 2018-06-18 16:10:23 Z 2 days Testing same since 124400 2018-06-19 12:26:34 Z 1 days 2 attempts ------------------------------------------------------------ People who touched revisions under test: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> Eric Dong <eric.dong@xxxxxxxxx> Hao Wu <hao.a.wu@xxxxxxxxx> Jian J Wang <jian.j.wang@xxxxxxxxx> Leo Duran <leo.duran@xxxxxxx> Marvin H?user <Marvin.Haeuser@xxxxxxxxxxx> Marvin Haeuser <Marvin.Haeuser@xxxxxxxxxxx> Ruiyu Ni <ruiyu.ni@xxxxxxxxx> jobs: build-amd64-xsm pass build-i386-xsm pass build-amd64 pass build-i386 pass build-amd64-libvirt pass build-i386-libvirt fail build-amd64-pvops pass build-i386-pvops pass test-amd64-amd64-xl-qemuu-ovmf-amd64 pass test-amd64-i386-xl-qemuu-ovmf-amd64 pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit 855abe0204cb932c8059a573a06a59ddc714ca49 Author: Jian J Wang <jian.j.wang@xxxxxxxxx> Date: Wed Jun 13 11:05:44 2018 +0800 MdeModulePkg/Core: remove SMM check for Heap Guard feature detection CpuDxe driver is updated to be able to access DXE page table in SMM mode, which means Heap Guard can get correct memory paging attributes in what environment. It's not necessary to exclude SMM from detecting Heap Guard feature support. Cc: Star Zeng <star.zeng@xxxxxxxxx> Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Jiewen Yao <jiewen.yao@xxxxxxxxx> Cc: Ruiyu Ni <ruiyu.ni@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Jian J Wang <jian.j.wang@xxxxxxxxx> Reviewed-by: Star Zeng <star.zeng@xxxxxxxxx> commit d106cf71eabaacff63c14626a4a87346b93074dd Author: Jian J Wang <jian.j.wang@xxxxxxxxx> Date: Fri Mar 30 22:25:56 2018 +0800 UefiCpuPkg/CpuDxe: make register access more readable Update code to use more meaningful constant macro or predefined register structure. Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Laszlo Ersek <lersek@xxxxxxxxxx> Cc: Jiewen Yao <jiewen.yao@xxxxxxxxx> Cc: Ruiyu Ni <ruiyu.ni@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Jian J Wang <jian.j.wang@xxxxxxxxx> Reviewed-by: Laszlo Ersek <lersek@xxxxxxxxxx> Reviewed-by: Eric Dong <eric.dong@xxxxxxxxx> Regression-tested-by: Laszlo Ersek <lersek@xxxxxxxxxx> commit 2a1408d1d739ead00c96397549be7a9fc53c9c6e Author: Jian J Wang <jian.j.wang@xxxxxxxxx> Date: Thu Jun 14 09:51:34 2018 +0800 UefiCpuPkg/CpuDxe: allow accessing (DXE) page table in SMM mode The MdePkg/Library/SmmMemoryAllocationLib, used only by DXE_SMM_DRIVER, allows to free memory allocated in DXE (before EndOfDxe). This is done by checking the memory range and calling gBS services to do real operation if the memory to free is out of SMRAM. If some memory related features, like Heap Guard, are enabled, gBS interface will turn to EFI_CPU_ARCH_PROTOCOL.SetMemoryAttributes(), provided by DXE driver UefiCpuPkg/CpuDxe, to change memory paging attributes. This means we have part of DXE code running in SMM mode in certain circumstances. Because page table in SMM mode is different from DXE mode and CpuDxe always uses current registers (CR0, CR3, etc.) to get memory paging attributes, it cannot get the correct attributes of DXE memory in SMM mode from SMM page table. This will cause incorrect memory manipulations, like fail the releasing of Guard pages if Heap Guard is enabled. The solution in this patch is to store the DXE page table information (e.g. value of CR0, CR3 registers, etc.) in a global variable of CpuDxe driver. If CpuDxe detects it's in SMM mode, it will use this global variable to access page table instead of current processor registers. This can avoid retrieving wrong DXE memory paging attributes and changing SMM page table attributes unexpectedly. Cc: Eric Dong <eric.dong@xxxxxxxxx> Cc: Laszlo Ersek <lersek@xxxxxxxxxx> Cc: Jiewen Yao <jiewen.yao@xxxxxxxxx> Cc: Ruiyu Ni <ruiyu.ni@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Jian J Wang <jian.j.wang@xxxxxxxxx> Reviewed-by: Laszlo Ersek <lersek@xxxxxxxxxx> Reviewed-by: Eric Dong <eric.dong@xxxxxxxxx> Regression-tested-by: Laszlo Ersek <lersek@xxxxxxxxxx> commit bf252e29a5a1a68fdd584b1cd117b728d7d67ec0 Author: Eric Dong <eric.dong@xxxxxxxxx> Date: Tue Jun 19 13:15:39 2018 +0800 UefiCpuPkg/LocalApicLib: Exclude second SendIpi sequence on AMD processors. On AMD processors the second SendIpi in the SendInitSipiSipi and SendInitSipiSipiAllExcludingSelf routines is not required, and may cause undesired side-effects during MP initialization. This patch leverages the StandardSignatureIsAuthenticAMD check to exclude the second SendIpi and its associated MicroSecondDelay (200). Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Leo Duran <leo.duran@xxxxxxx> Cc: Jordan Justen <jordan.l.justen@xxxxxxxxx> Cc: Jeff Fan <jeff.fan@xxxxxxxxx> Cc: Liming Gao <liming.gao@xxxxxxxxx> Reviewed-by: Eric Dong <eric.dong@xxxxxxxxx> Reviewed-by: Laszlo Ersek <lersek@xxxxxxxxxx> commit aeb6f576258ef18c0debca1d6b908df1799e0d9b Author: Hao Wu <hao.a.wu@xxxxxxxxx> Date: Sat Apr 28 13:48:06 2018 +0800 MdePkg/IndustryStandard/Ipmi: Use union for bitmap fields This commit enhances the bitmap fields defined in the IPMI header files, union types will be used to provide the users with both the individual bitmap access and the whole byte/word access. Cc: Michael Kinney <michael.d.kinney@xxxxxxxxx> Cc: Jiewen Yao <jiewen.yao@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Hao Wu <hao.a.wu@xxxxxxxxx> Reviewed-by: Liming Gao <liming.gao@xxxxxxxxx> commit 25517f7ce35b4dba78660a67ecb6be0c211e62f1 Author: Hao Wu <hao.a.wu@xxxxxxxxx> Date: Tue Apr 17 15:37:09 2018 +0800 MdePkg/IndustryStandard/Ipmi: Update IPMI header files REF:https://bugzilla.tianocore.org/show_bug.cgi?id=814 This commit updates the IPMI related header files. Cc: Younas Khan <pmdyounaskhan786@xxxxxxxxx> Cc: Michael Kinney <michael.d.kinney@xxxxxxxxx> Cc: Jiewen Yao <jiewen.yao@xxxxxxxxx> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Hao Wu <hao.a.wu@xxxxxxxxx> Reviewed-by: Liming Gao <liming.gao@xxxxxxxxx> commit 4e738cd4088e279c3cbfb676a7cc241a9359e1ad Author: Ruiyu Ni <ruiyu.ni@xxxxxxxxx> Date: Mon Jun 11 10:17:01 2018 +0800 MdeModulePkg/AtaAtapiPassThru: Fix VS2010/VS2012 build failure The patch doesn't have functionality impact. It is just to make VS2010/VS2012 happy. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ruiyu Ni <ruiyu.ni@xxxxxxxxx> Reviewed-by: Dandan Bi <dandan.bi@xxxxxxxxx> commit 73ae70db0f7a2ccada149e9dd03fda30923fdd75 Author: Marvin H?user <Marvin.Haeuser@xxxxxxxxxxx> Date: Sun Jun 17 00:16:24 2018 +0800 SourceLevelDebugPkg/DebugCommunicationLibUsb: Add endpoint config. Currently, DebugCommunicationLibUsb uses the hardcoded endpoints 0x82 and 0x01 to communicate with the EHCI Debug Device. These, however, are not standardized and may vary across different hardware. To solve this problem, the endpoints are retrieved from the USB Device Descriptor directly. V2: - Store endpoint data in the USB Debug Port handle structure. V3: - Remove the static endpoint PCDs as requested. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Marvin Haeuser <Marvin.Haeuser@xxxxxxxxxxx> Reviewed-by: Hao Wu <hao.a.wu@xxxxxxxxx> commit 87a46244723ad8ddce2fcf611e569ada86dc80f2 Author: Marvin Haeuser <Marvin.Haeuser@xxxxxxxxxxx> Date: Sun Jun 17 00:15:35 2018 +0800 BaseTools/WorkspaceCommon: Import used BuildToolError messages. Commit c14b58614ffb992dfc668966a19becb86614aafc added a few build error message display calls to WorkspaceCommon.py without importing the message resources explicitely. This commit adds imports the missing directives. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Marvin Haeuser <Marvin.Haeuser@xxxxxxxxxxx> Reviewed-by: Yonghong Zhu <yonghong.zhu@xxxxxxxxx> commit 02ec23abebcb271a16fae94f8e3659bb9282880d Author: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> Date: Mon Jun 18 22:46:36 2018 +0200 EmbeddedPkg/GdbSerialLib: avoid left shift of negative quantity Clang complains about left shifting a negative value being undefined. EmbeddedPkg/Library/GdbSerialLib/GdbSerialLib.c:151:30: error: shifting a negative signed value is undefined [-Werror,-Wshift-negative-value] OutputData = (UINT8)((~DLAB<<7)|((BreakSet<<6)|((Parity<<3)|((StopBits<<2)| Data)))); Redefine all bit pattern constants as unsigned to work around this. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> Reviewed-by: Leif Lindholm <leif.lindholm@xxxxxxxxxx> commit 1f739a851ce8ea8c9c4d9c4c7a5862fd44ab6ab4 Author: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> Date: Mon Jun 18 20:13:47 2018 +0200 ArmPkg/ArmMtlLib: fix prototype inconsistency in MtlWaitUntilChannelFree Align the prototype of ArmMtlLib's MtlWaitUntilChannelFree () with the one in the ArmMtlNullLib implementation (rather than the other way around, since edk2-platforms has a conflicting implementation as well) Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> Reviewed-by: Leif Lindholm <leif.lindholm@xxxxxxxxxx> commit 6d56ace57b91a48274fa9b9cfbc98065307584ae Author: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> Date: Mon Jun 18 19:31:18 2018 +0200 BaseTools/tools_def CLANG35: add NOOPT build target Create the missing NOOPT target for CLANG35 (which is ARM and AARCH64 only), and align it with the other toolchains: NOOPT has optimizations disabled entirely (for source level debugging), and DEBUG is changed from -O0 to -O1, as is the case for CLANG38 as well. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> Reviewed-by: Leif Lindholm <leif.lindholm@xxxxxxxxxx> commit a50aa9dd88818854ccde20fdf1b7b9286dc6076c Author: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> Date: Mon Jun 18 18:50:12 2018 +0200 Embedded/EmbeddedPkg.dsc: enable NOOPT build target Enable to NOOPT build target so we can build this package with optimizations disabled. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> Reviewed-by: Leif Lindholm <leif.lindholm@xxxxxxxxxx> commit e4bc73d72774207eb8ea610b5903b8a9a9b1b658 Author: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> Date: Mon Jun 18 18:49:30 2018 +0200 ArmPkg/ArmPkg.dsc: enable NOOPT build target Enable to NOOPT build target so we can build this package with optimizations disabled. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> Reviewed-by: Leif Lindholm <leif.lindholm@xxxxxxxxxx> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |