Your message dated Fri, 08 Oct 2021 21:48:49 +0000
with message-id <e1myxjv-0007or...@fasolo.debian.org>
and subject line Bug#995656: fixed in edk2 2021.08-2
has caused the Debian Bug report #995656,
regarding edk2: autopkgtest arm64 regression: test_aavmf_ms_secure_boot_signed: 
Access Denied
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
995656: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=995656
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: edk2
Version: 2021.08-1
X-Debbugs-CC: debian...@lists.debian.org
Severity: serious
User: debian...@lists.debian.org
Usertags: regression

Dear maintainer(s),

With a recent upload of edk2 the autopkgtest of edk2 fails in testing on
arm64 when that autopkgtest is run with the binary packages of edk2 from
unstable. It passes when run with only packages from testing. In tabular
form:

                       pass            fail
edk2                   from testing    2021.08-1
all others             from testing    from testing

I copied some of the output at the bottom of this report.

Currently this regression is blocking the migration to testing [1]. Can
you please investigate the situation and fix it?

More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[1] https://qa.debian.org/excuses.php?package=edk2

https://ci.debian.net/data/autopkgtest/testing/arm64/e/edk2/15713990/log.gz

test_aavmf_ms_secure_boot_signed (__main__.BootToShellTest) ... mkfs.fat
4.2 (2021-01-31)
xorriso 1.5.4 : RockRidge filesystem manipulator, libburnia project.

Drive current: -outdev 'stdio:/tmp/tmprtuo53fa'
Media current: stdio file, overwriteable
Media status : is blank
Media summary: 0 sessions, 0 data blocks, 0 data, 16.2g free
Added to ISO image: directory '/'='/tmp/tmpvt36p18q'
xorriso : UPDATE :       2 files added in 1 seconds
xorriso : UPDATE :       2 files added in 1 seconds
xorriso : UPDATE :  48.36% done
ISO image produced: 65741 sectors
Written to medium : 65741 sectors at LBA 0
Writing to 'stdio:/tmp/tmprtuo53fa' completed successfully.

[=3hBdsDxe: failed to load Boot0001 "UEFI Misc
Device" from VenHw(93E34C7E-B50E-11DF-9223-2443DFD72085,00): Not Found

BdsDxe: loading Boot0002 "UEFI Misc Device 2" from PciRoot(0x0)/Pci(0x1,0x0)

BdsDxe: failed to load Boot0002 "UEFI Misc Device 2" from
PciRoot(0x0)/Pci(0x1,0x0): Access Denied

BdsDxe: loading Boot0003 "EFI Internal Shell" from
Fv(64074AFE-340A-4BE6-94BA-91B5B4D0F71E)/FvFile(7C04A583-9E3E-4F1C-AD65-E05268D0B4D1)

BdsDxe: starting Boot0003 "EFI Internal Shell" from
Fv(64074AFE-340A-4BE6-94BA-91B5B4D0F71E)/FvFile(7C04A583-9E3E-4F1C-AD65-E05268D0B4D1)

UEFI Interactive Shell v2.2

EDK II

UEFI v2.70 (EDK II, 0x00010000)

Mapping table

      FS0:
Alias(s):CD0a:;BLK1:

          PciRoot(0x0)/Pci(0x1,0x0)/CDROM(0x0)

     BLK2: Alias(s):

          VenHw(93E34C7E-B50E-11DF-9223-2443DFD72085,00)

     BLK0: Alias(s):

          PciRoot(0x0)/Pci(0x1,0x0)

Press ESC in 5 seconds
to skip startup.nsh or any other key to
continue.


Shell> fs0:
fs0:

FS0:\> \efi\boot\bootaa64.efi
\efi\boot\bootaa64.efi

Command Error Status: Access Denied

FS0:\> reset -s
reset
-s

FAIL

Attachment: OpenPGP_signature
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Source: edk2
Source-Version: 2021.08-2
Done: dann frazier <da...@debian.org>

We believe that the bug you reported is fixed in the latest version of
edk2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 995...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <da...@debian.org> (supplier of updated edk2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 08 Oct 2021 14:49:45 -0600
Source: edk2
Architecture: source
Version: 2021.08-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QEMU Team <pkg-qemu-de...@lists.alioth.debian.org>
Changed-By: dann frazier <da...@debian.org>
Closes: 995656
Changes:
 edk2 (2021.08-2) unstable; urgency=medium
 .
   * README.Debian: Document OVMF.fd image.
   * autopkgtest: Only run AAVMF Secure Boot test on distributions that
     derive from Ubuntu. Debian's shim-signed on arm64 is currently, in
     fact, not signed (see #992073). (Closes: #995656)
Checksums-Sha1:
 9cf1ccf48fdcd620046115752cb4b35dab4d1c32 2658 edk2_2021.08-2.dsc
 ae5fdae3f1e728a0881f0cc44bec17fd09d0556d 33368 edk2_2021.08-2.debian.tar.xz
 533356e37a556cda8c91a989696ac6920a620f23 10481 edk2_2021.08-2_source.buildinfo
Checksums-Sha256:
 7a5b46fd80f4148450ba7acb4695a62648d66c6d135d2894da43ff9bfc73218a 2658 
edk2_2021.08-2.dsc
 9d340580472367291b96f89434e8df7c548c5a1c6957d492ffa59bc4002d5511 33368 
edk2_2021.08-2.debian.tar.xz
 aa073f1c71e74a2d4c3786ac93eb3da17ec88995a99e692080e99b7308b53ec3 10481 
edk2_2021.08-2_source.buildinfo
Files:
 e643af26ebc9b4eb9b1e9dd2d218f960 2658 misc optional edk2_2021.08-2.dsc
 0ad4319bc586417535362ea0a250876c 33368 misc optional 
edk2_2021.08-2.debian.tar.xz
 f2a03a8b5b54a25d0dcf7e35d115149b 10481 misc optional 
edk2_2021.08-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=TALW
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to