[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [ovmf baseline-only test] 68217: all pass



This run is configured for baseline tests only.

flight 68217 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68217/

Perfect :-)
All tests in this flight passed as required
version targeted for testing:
 ovmf                 94a1bc1212edf521b7c96bfb9dc653818c95bec7
baseline version:
 ovmf                 8b78de74dc6a7d655de50f1e203cbc830de1d9ae

Last test of basis    68213  2016-12-12 22:20:39 Z    1 days
Testing same since    68217  2016-12-13 23:21:14 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Liming Gao <liming.gao@xxxxxxxxx>
  Star Zeng <star.zeng@xxxxxxxxx>

jobs:
 build-amd64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    


------------------------------------------------------------
sg-report-flight on osstest.xs.citrite.net
logs: /home/osstest/logs
images: /home/osstest/images

Logs, config files, etc. are available at
    http://osstest.xs.citrite.net/~osstest/testlogs/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Push not applicable.

------------------------------------------------------------
commit 94a1bc1212edf521b7c96bfb9dc653818c95bec7
Author: Liming Gao <liming.gao@xxxxxxxxx>
Date:   Mon Dec 12 10:09:51 2016 +0800

    MdeModulePkg PiSmmCore: Retrieve Smram base address from system table
    
    PiSmmIpl records LoadModuleAtFixAddressSmramBase in LMFAConfigurationTable.
    Update PiSmmCore to directly get the address from this system table.
    
    Cc: Star Zeng <star.zeng@xxxxxxxxx>
    Cc: Jiewen Yao <jiewen.yao@xxxxxxxxx>
    Contributed-under: TianoCore Contribution Agreement 1.0
    Signed-off-by: Liming Gao <liming.gao@xxxxxxxxx>
    Reviewed-by: Star Zeng <star.zeng@xxxxxxxxx>

commit a7d10bb09dda44e25029b4d0da67ac9348a29f31
Author: Liming Gao <liming.gao@xxxxxxxxx>
Date:   Thu Dec 1 14:49:33 2016 +0800

    MdeModulePkg SmmIpl: Fill Smram range for SMM driver when LMFA enable
    
    Allocate the additional Smram range to describe the reserved smram for
    SMM core and driver when LMFA feature is enabled.
    
    Cc: Star Zeng <star.zeng@xxxxxxxxx>
    Cc: Jiewen Yao <jiewen.yao@xxxxxxxxx>
    Contributed-under: TianoCore Contribution Agreement 1.0
    Signed-off-by: Liming Gao <liming.gao@xxxxxxxxx>
    Reviewed-by: Star Zeng <star.zeng@xxxxxxxxx>

commit ddfae2640c59e6226f2a9242483b7b294edaccab
Author: Liming Gao <liming.gao@xxxxxxxxx>
Date:   Thu Dec 1 14:47:55 2016 +0800

    MdeModulePkg PiSmmCore: Update FreePages to handle zero address and pages
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=278
    
    Zero memory address or zero number pages are invalid to SmmFreePages().
    
    Cc: Star Zeng <star.zeng@xxxxxxxxx>
    Cc: Jiewen Yao <jiewen.yao@xxxxxxxxx>
    Contributed-under: TianoCore Contribution Agreement 1.0
    Signed-off-by: Liming Gao <liming.gao@xxxxxxxxx>
    Reviewed-by: Star Zeng <star.zeng@xxxxxxxxx>

commit d5aef955b917e1afc2a76b68f91154aa77e0e12c
Author: Star Zeng <star.zeng@xxxxxxxxx>
Date:   Thu Dec 8 18:16:05 2016 +0800

    MdeModulePkg VariableSmm: Check InfoSize correctly
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=290
    
    Current SmmVariableGetStatistics() in VariableSmm.c is always
    checking input InfoSize against the first variable info,
    it is incorrect.
    
    For instance, there are three variables.
    BootOrder
    Boot0000
    Boot0001
    
    If the input InfoEntry is holding the second variable info (Boot0000)
    and InfoSize is sizeof (VARIABLE_INFO_ENTRY) + StrSize (L"Boot0000"),
    current code will return EFI_BUFFER_TOO_SMALL, but it should return
    the third variable info (Boot0001).
    
    This patch is to refine the code logic.
    
    Cc: Jiewen Yao <jiewen.yao@xxxxxxxxx>
    Contributed-under: TianoCore Contribution Agreement 1.0
    Signed-off-by: Star Zeng <star.zeng@xxxxxxxxx>
    Reviewed-by: Jiewen Yao <jiewen.yao@xxxxxxxxx>

commit 62016c1e898434a0326f658912b1e7e0a9c5575e
Author: Star Zeng <star.zeng@xxxxxxxxx>
Date:   Fri Dec 9 14:47:03 2016 +0800

    MdeModulePkg VariableSmm: Do not need check CommBufferSize buffer
    
    Current code in SmmVariableHandler() checks CommBufferSize
    buffer to make sure it points to outside SMRAM in
    "case SMM_VARIABLE_FUNCTION_GET_STATISTICS".
    
    But after eaae7b33b1cf6b9f21db1636f219c2b6a8d88afd,
    CommBufferSize buffer points to SMRAM that was used by
    SMM core to cache CommSize from SmmCommunication protocol,
    then the check will fail definitely and GET_STATISTICS
    feature breaks.
    
    In fact, do not need check CommBufferSize buffer at all
    even before eaae7b33b1cf6b9f21db1636f219c2b6a8d88afd.
    Before eaae7b33b1cf6b9f21db1636f219c2b6a8d88afd,
    CommBufferSize buffer pointed to gSmmCorePrivate->BufferSize
    that is outside SMRAM, the check will success definitely;
    after eaae7b33b1cf6b9f21db1636f219c2b6a8d88afd,
    CommBufferSize buffer points to local variable BufferSize
    (in SMRAM) in SmmEntryPoint(), the check is not needed
    definitely.
    
    The patch is to remove the check.
    
    Cc: Jiewen Yao <jiewen.yao@xxxxxxxxx>
    Cc: Jeff Fan <jeff.fan@xxxxxxxxx>
    Contributed-under: TianoCore Contribution Agreement 1.0
    Signed-off-by: Star Zeng <star.zeng@xxxxxxxxx>
    Reviewed-by: Jiewen Yao <jiewen.yao@xxxxxxxxx>

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.