On 02/24/16 18:06, David Woodhouse wrote:
> On Wed, 2016-02-24 at 17:43 +0100, Laszlo Ersek wrote:
>> On 02/24/16 17:26, David Woodhouse wrote:
>>> On Wed, 2016-02-24 at 15:46 +0100, Laszlo Ersek wrote:
>>
>>>> Interestingly, the failure reproduces even when I build OVMF at your
>>>> commit a35e4359d; with identical symptoms.
>>>  
>>> Also useful to know; thanks.
>>
>> The first commit that breaks it is:
>>
>> commit 6a48e82abc5174e4810e388fdf0fc67564dabb03
>> Author: David Woodhouse <david.woodho...@intel.com>
>> Date:   Wed Aug 12 12:54:28 2015 +0100
>>
>>     CryptoPkg/OpensslLib: Update OpenSSL patch
> 
> Haha, well that serves me right.

If it helps, here's the stack trace to the failed ASSERT():

> #0  0x000000007fde9789 in CpuDeadLoop () at 
> MdePkg/Library/BaseLib/CpuDeadLoop.c:37
> #1  0x000000007fde3ca5 in DebugAssert (
>     FileName=0x7fe4f1e8 
> "MdePkg/Library/UefiMemoryAllocationLib/MemoryAllocationLib.c", 
> LineNumber=819, Description=0x7fe4f269 "!EFI_ERROR (Status)")
>     at OvmfPkg/Library/PlatformDebugLibIoPort/DebugLib.c:153
> #2  0x000000007fdeba3f in FreePool (Buffer=0x0)
>     at MdePkg/Library/UefiMemoryAllocationLib/MemoryAllocationLib.c:819
> #3  0x000000007fdf0385 in free (ptr=0x0)
>     at CryptoPkg/Library/BaseCryptLib/SysCall/BaseMemAllocation.c:41
> #4  0x000000007fdf0917 in CRYPTO_free (str=0x0)
>     at CryptoPkg/Library/OpensslLib/openssl-1.0.2f/crypto/mem.c:442
> #5  0x000000007fe20b47 in PKCS7_verify (p7=0x7ee6ff98, certs=0x0, 
> store=0x7ee62e58, indata=0x7ee62c18, out=0x0, 
>     flags=128)
>     at 
> CryptoPkg/Library/OpensslLib/openssl-1.0.2f/crypto/pkcs7/pk7_smime.c:415
> #6  0x000000007fdef1fb in Pkcs7Verify (
>     P7Data=0x7e3a4a30 "0\202!Ü\006\t*\206H\206÷\r\001\a\002 
> \202!Í0\202!É\002\001\001\061\017\060\r\006\t`\206H\001e\003\004\002\001\005",
>  P7Length=8672, TrustedCert=0x7ee76044 "0\202\005×0\202\003¿ 
> \003\002\001\002\002\na\avV", 
>     CertLength=1499, InData=0x7ee8939a 
> "0\027\006\n+\006\001\004\001\202\067\002\001\017\060\t\003\001", 
>     DataLength=76) at CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c:875
> #7  0x000000007fdef5b1 in AuthenticodeVerify (
>     AuthData=0x7e3a4a30 "0\202!Ü\006\t*\206H\206÷\r\001\a\002 
> \202!Í0\202!É\002\001\001\061\017\060\r\006\t`\206H\001e\003\004\002\001\005",
>  DataSize=8672, TrustedCert=0x7ee76044 "0\202\005×0\202\003¿ 
> \003\002\001\002\002\na\avV", 
>     CertSize=1499, ImageHash=0x7fe701c0 "Û¯\236\005m=[8¶\205S0J¼\210\202~¼", 
> HashSize=32)
>     at CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c:189
> #8  0x000000007fde732a in IsAllowedByDb (
>     AuthData=0x7e3a4a30 "0\202!Ü\006\t*\206H\206÷\r\001\a\002 
> \202!Í0\202!É\002\001\001\061\017\060\r\006\t`\206H\001e\003\004\002\001\005",
>  AuthDataSize=8672, IsAuditMode=0 '\000', ImageName=0x0, ImageDevicePath=0x0)
>     at 
> SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.c:1600
> #9  0x000000007fde8643 in DxeImageVerificationHandler 
> (AuthenticationStatus=0, File=0x7ee89418, 
>     FileBuffer=0x7e26b018, FileSize=1293304, BootPolicy=1 '\001')
>     at 
> SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.c:2419
> #10 0x000000007fde4cd4 in ExecuteSecurity2Handlers 
> (AuthenticationOperation=15, AuthenticationStatus=0, 
>     File=0x7ee89418, FileBuffer=0x7e26b018, FileSize=1293304, BootPolicy=1 
> '\001')
>     at 
> MdeModulePkg/Library/DxeSecurityManagementLib/DxeSecurityManagementLib.c:518
> #11 0x000000007fde38df in Security2StubAuthenticate (This=0x7fe6f248, 
> File=0x7ee89418, FileBuffer=0x7e26b018, 
>     FileSize=1293304, BootPolicy=1 '\001')
>     at MdeModulePkg/Universal/SecurityStubDxe/SecurityStub.c:143
> #12 0x000000007ff64c5e in CoreLoadImageCommon (BootPolicy=1 '\001', 
> ParentImageHandle=0x7f240218, 
>     FilePath=0x7ee89418, SourceBuffer=0x0, SourceSize=0, DstBuffer=0, 
> NumberOfPages=0x0, ImageHandle=0x7ff5ec60, 
>     EntryPoint=0x0, Attribute=3) at MdeModulePkg/Core/Dxe/Image/Image.c:1170
> #13 0x000000007ff65216 in CoreLoadImage (BootPolicy=1 '\001', 
> ParentImageHandle=0x7f240218, FilePath=0x7ee89418, 
>     SourceBuffer=0x0, SourceSize=0, ImageHandle=0x7ff5ec60)
>     at MdeModulePkg/Core/Dxe/Image/Image.c:1441
> #14 0x000000007ebe9a8e in BdsLibBootViaBootOption (Option=0x7f05d3d8, 
> DevicePath=0x7ee89418, 
>     ExitDataSize=0x7ff5ed38, ExitData=0x7ff5ed30)
>     at IntelFrameworkModulePkg/Library/GenericBdsLib/BdsBoot.c:2352
> #15 0x000000007ebba00e in BdsBootDeviceSelect ()
>     at IntelFrameworkModulePkg/Universal/BdsDxe/BdsEntry.c:286
> #16 0x000000007ebbab85 in BdsEntry (This=0x7ec06820)
>     at IntelFrameworkModulePkg/Universal/BdsDxe/BdsEntry.c:659
> #17 0x000000007ff60918 in DxeMain (HobStart=0x7fd14018)
>     at MdeModulePkg/Core/Dxe/DxeMain/DxeMain.c:511
> #18 0x000000007ff5f71d in ProcessModuleEntryPointList (HobStart=0x7bfde000)
>     at 
> Build/OvmfX64/DEBUG_GCC48/X64/MdeModulePkg/Core/Dxe/DxeMain/DEBUG/AutoGen.c:423
> #19 0x000000007ff5f26d in _ModuleEntryPoint (HobStart=0x7bfde000)
>     at MdePkg/Library/DxeCoreEntryPoint/DxeCoreEntryPoint.c:54
> #20 0x0000000000000000 in ?? ()

You may ask how I captured this backtrace.

The answer is <https://edk2.bluestop.org/w/tianocore/debugging-with-gdb/>.

(Thanks again Bruce for writing up my email in such a nice form!)

Laszlo
_______________________________________________
edk2-devel mailing list
edk2-devel@lists.01.org
https://lists.01.org/mailman/listinfo/edk2-devel

Reply via email to