Your message dated Fri, 08 Oct 2021 21:48:49 +0000 with message-id <e1myxjv-0007or...@fasolo.debian.org> and subject line Bug#995656: fixed in edk2 2021.08-2 has caused the Debian Bug report #995656, regarding edk2: autopkgtest arm64 regression: test_aavmf_ms_secure_boot_signed: Access Denied to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 995656: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=995656 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: edk2 Version: 2021.08-1 X-Debbugs-CC: debian...@lists.debian.org Severity: serious User: debian...@lists.debian.org Usertags: regression Dear maintainer(s), With a recent upload of edk2 the autopkgtest of edk2 fails in testing on arm64 when that autopkgtest is run with the binary packages of edk2 from unstable. It passes when run with only packages from testing. In tabular form: pass fail edk2 from testing 2021.08-1 all others from testing from testing I copied some of the output at the bottom of this report. Currently this regression is blocking the migration to testing [1]. Can you please investigate the situation and fix it? More information about this bug and the reason for filing it can be found on https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation Paul [1] https://qa.debian.org/excuses.php?package=edk2 https://ci.debian.net/data/autopkgtest/testing/arm64/e/edk2/15713990/log.gz test_aavmf_ms_secure_boot_signed (__main__.BootToShellTest) ... mkfs.fat 4.2 (2021-01-31) xorriso 1.5.4 : RockRidge filesystem manipulator, libburnia project. Drive current: -outdev 'stdio:/tmp/tmprtuo53fa' Media current: stdio file, overwriteable Media status : is blank Media summary: 0 sessions, 0 data blocks, 0 data, 16.2g free Added to ISO image: directory '/'='/tmp/tmpvt36p18q' xorriso : UPDATE : 2 files added in 1 seconds xorriso : UPDATE : 2 files added in 1 seconds xorriso : UPDATE : 48.36% done ISO image produced: 65741 sectors Written to medium : 65741 sectors at LBA 0 Writing to 'stdio:/tmp/tmprtuo53fa' completed successfully. [2J[01;01H[=3h[2J[01;01HBdsDxe: failed to load Boot0001 "UEFI Misc Device" from VenHw(93E34C7E-B50E-11DF-9223-2443DFD72085,00): Not Found BdsDxe: loading Boot0002 "UEFI Misc Device 2" from PciRoot(0x0)/Pci(0x1,0x0) BdsDxe: failed to load Boot0002 "UEFI Misc Device 2" from PciRoot(0x0)/Pci(0x1,0x0): Access Denied BdsDxe: loading Boot0003 "EFI Internal Shell" from Fv(64074AFE-340A-4BE6-94BA-91B5B4D0F71E)/FvFile(7C04A583-9E3E-4F1C-AD65-E05268D0B4D1) BdsDxe: starting Boot0003 "EFI Internal Shell" from Fv(64074AFE-340A-4BE6-94BA-91B5B4D0F71E)/FvFile(7C04A583-9E3E-4F1C-AD65-E05268D0B4D1) [2J[01;01H[01;01HUEFI Interactive Shell v2.2 EDK II UEFI v2.70 (EDK II, 0x00010000) [1m[33m[40mMapping table[0m[37m[40m [1m[33m[40m FS0:[0m[37m[40m [1m[37m[40mAlias(s):[0m[37m[40mCD0a:;BLK1: PciRoot(0x0)/Pci(0x1,0x0)/CDROM(0x0) [1m[33m[40m BLK2:[0m[37m[40m [1m[37m[40mAlias(s):[0m[37m[40m VenHw(93E34C7E-B50E-11DF-9223-2443DFD72085,00) [1m[33m[40m BLK0:[0m[37m[40m [1m[37m[40mAlias(s):[0m[37m[40m PciRoot(0x0)/Pci(0x1,0x0) [11;01HPress [1m[37m[40mESC[0m[37m[40m in 5 seconds to skip [1m[33m[40mstartup.nsh[0m[37m[40m or any other key to continue. [12;01H[1m[33m[40mShell> [0m[37m[40mfs0: [12;08H[12;08H[12;08Hf[12;09H[12;09Hs[12;10H[12;10H0[12;11H[12;11H:[12;12H[12;12H [13;01H[1m[33m[40mFS0:\> [0m[37m[40m\efi\boot\bootaa64.efi [13;08H[13;08H[13;08H\[13;09H[13;09He[13;10H[13;10Hf[13;11H[13;11Hi[13;12H[13;12H\[13;13H[13;13Hb[13;14H[13;14Ho[13;15H[13;15Ho[13;16H[13;16Ht[13;17H[13;17H\[13;18H[13;18Hb[13;19H[13;19Ho[13;20H[13;20Ho[13;21H[13;21Ht[13;22H[13;22Ha[13;23H[13;23Ha[13;24H[13;24H6[13;25H[13;25H4[13;26H[13;26H.[13;27H[13;27He[13;28H[13;28Hf[13;29H[13;29Hi[13;30H[13;30H Command Error Status: Access Denied [15;01H[1m[33m[40mFS0:\> [0m[37m[40mreset -s [15;08H[15;08H[15;08Hr[15;09H[15;09He[15;10H[15;10Hs[15;11H[15;11He[15;12H[15;12Ht[15;13H[15;13H [15;14H[15;14H-[15;15H[15;15Hs[15;16H[15;16H FAIL
OpenPGP_signature
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---Source: edk2 Source-Version: 2021.08-2 Done: dann frazier <da...@debian.org> We believe that the bug you reported is fixed in the latest version of edk2, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 995...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. dann frazier <da...@debian.org> (supplier of updated edk2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 08 Oct 2021 14:49:45 -0600 Source: edk2 Architecture: source Version: 2021.08-2 Distribution: unstable Urgency: medium Maintainer: Debian QEMU Team <pkg-qemu-de...@lists.alioth.debian.org> Changed-By: dann frazier <da...@debian.org> Closes: 995656 Changes: edk2 (2021.08-2) unstable; urgency=medium . * README.Debian: Document OVMF.fd image. * autopkgtest: Only run AAVMF Secure Boot test on distributions that derive from Ubuntu. Debian's shim-signed on arm64 is currently, in fact, not signed (see #992073). (Closes: #995656) Checksums-Sha1: 9cf1ccf48fdcd620046115752cb4b35dab4d1c32 2658 edk2_2021.08-2.dsc ae5fdae3f1e728a0881f0cc44bec17fd09d0556d 33368 edk2_2021.08-2.debian.tar.xz 533356e37a556cda8c91a989696ac6920a620f23 10481 edk2_2021.08-2_source.buildinfo Checksums-Sha256: 7a5b46fd80f4148450ba7acb4695a62648d66c6d135d2894da43ff9bfc73218a 2658 edk2_2021.08-2.dsc 9d340580472367291b96f89434e8df7c548c5a1c6957d492ffa59bc4002d5511 33368 edk2_2021.08-2.debian.tar.xz aa073f1c71e74a2d4c3786ac93eb3da17ec88995a99e692080e99b7308b53ec3 10481 edk2_2021.08-2_source.buildinfo Files: e643af26ebc9b4eb9b1e9dd2d218f960 2658 misc optional edk2_2021.08-2.dsc 0ad4319bc586417535362ea0a250876c 33368 misc optional edk2_2021.08-2.debian.tar.xz f2a03a8b5b54a25d0dcf7e35d115149b 10481 misc optional edk2_2021.08-2_source.buildinfo -----BEGIN PGP SIGNATURE----- iQJFBAEBCgAvFiEECfR9vy0y7twkQ+vuG/g8XlT8hkAFAmFgtHkRHGRhbm5mQGRl Ymlhbi5vcmcACgkQG/g8XlT8hkBGOw/9EgKZxd7uz0sVlhtwIlHMa2gYUaB5PJsI fXelA9D6gJEIlUOv/r+4hEsYRSJ7pbsavTdu6RjWuDt5Hh3wCQNG1GKtPvTYLOZE qSOvKYUrktrX0DiJFgPJnQ2UmuqN7ZKhQcp1PTJwGErm/BpHhaUgdZQlkFfOaUGl VR/qnVkK8onxouhBE5ULuSEFXVt1ToFVmUFA4uKhp/N7dZt0+O6l3FIvMjTLR8iP 5TzwSd32ANa7ocCmDqITJXaZ/d0/NTZGIMYDGqtbhBKAOD9Y6DPTjr898e2aWXVV rOk966jiNh9QMJ6Odr4NpRHbmjvr0K86H4s+u08e+9g6mW3pvcslo8pheT3Z6Kod joW6tlyEZinJ3QoP35O0utnzlqgp4158sYvztifmyq5UZYG+RO85sX6H2+k/P8Qj TTskw6HydBVgd+1TZF22q/Ob9+S+0e4Bb1ImrnIunDWYkT9HRQXG5Njc//LF3dSS YjXuzv/8xK8bL69qgUAKYSzcbnT+UVwMxRH9Ypa0ilMMjcmGiTp52s8vskFtqajq LoPJHTrMeLfRtdFph5dHJh8Av64XR8x2Qvvdi+BuqGRvRgcUQXTwgfNv6MVTfzPt zY18+n/3F/OI4dpRK9wiiRujKVkMS43diEXe5duWQTv7Qgear0vVjG0OZgTK5grc 9/lrU+oLUxE= =TALW -----END PGP SIGNATURE-----
--- End Message ---