On 02/24/16 18:06, David Woodhouse wrote: > On Wed, 2016-02-24 at 17:43 +0100, Laszlo Ersek wrote: >> On 02/24/16 17:26, David Woodhouse wrote: >>> On Wed, 2016-02-24 at 15:46 +0100, Laszlo Ersek wrote: >> >>>> Interestingly, the failure reproduces even when I build OVMF at your >>>> commit a35e4359d; with identical symptoms. >>> >>> Also useful to know; thanks. >> >> The first commit that breaks it is: >> >> commit 6a48e82abc5174e4810e388fdf0fc67564dabb03 >> Author: David Woodhouse <david.woodho...@intel.com> >> Date: Wed Aug 12 12:54:28 2015 +0100 >> >> CryptoPkg/OpensslLib: Update OpenSSL patch > > Haha, well that serves me right.
If it helps, here's the stack trace to the failed ASSERT(): > #0 0x000000007fde9789 in CpuDeadLoop () at > MdePkg/Library/BaseLib/CpuDeadLoop.c:37 > #1 0x000000007fde3ca5 in DebugAssert ( > FileName=0x7fe4f1e8 > "MdePkg/Library/UefiMemoryAllocationLib/MemoryAllocationLib.c", > LineNumber=819, Description=0x7fe4f269 "!EFI_ERROR (Status)") > at OvmfPkg/Library/PlatformDebugLibIoPort/DebugLib.c:153 > #2 0x000000007fdeba3f in FreePool (Buffer=0x0) > at MdePkg/Library/UefiMemoryAllocationLib/MemoryAllocationLib.c:819 > #3 0x000000007fdf0385 in free (ptr=0x0) > at CryptoPkg/Library/BaseCryptLib/SysCall/BaseMemAllocation.c:41 > #4 0x000000007fdf0917 in CRYPTO_free (str=0x0) > at CryptoPkg/Library/OpensslLib/openssl-1.0.2f/crypto/mem.c:442 > #5 0x000000007fe20b47 in PKCS7_verify (p7=0x7ee6ff98, certs=0x0, > store=0x7ee62e58, indata=0x7ee62c18, out=0x0, > flags=128) > at > CryptoPkg/Library/OpensslLib/openssl-1.0.2f/crypto/pkcs7/pk7_smime.c:415 > #6 0x000000007fdef1fb in Pkcs7Verify ( > P7Data=0x7e3a4a30 "0\202!Ü\006\t*\206H\206÷\r\001\a\002 > \202!Í0\202!É\002\001\001\061\017\060\r\006\t`\206H\001e\003\004\002\001\005", > P7Length=8672, TrustedCert=0x7ee76044 "0\202\005×0\202\003¿ > \003\002\001\002\002\na\avV", > CertLength=1499, InData=0x7ee8939a > "0\027\006\n+\006\001\004\001\202\067\002\001\017\060\t\003\001", > DataLength=76) at CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c:875 > #7 0x000000007fdef5b1 in AuthenticodeVerify ( > AuthData=0x7e3a4a30 "0\202!Ü\006\t*\206H\206÷\r\001\a\002 > \202!Í0\202!É\002\001\001\061\017\060\r\006\t`\206H\001e\003\004\002\001\005", > DataSize=8672, TrustedCert=0x7ee76044 "0\202\005×0\202\003¿ > \003\002\001\002\002\na\avV", > CertSize=1499, ImageHash=0x7fe701c0 "Û¯\236\005m=[8¶\205S0J¼\210\202~¼", > HashSize=32) > at CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c:189 > #8 0x000000007fde732a in IsAllowedByDb ( > AuthData=0x7e3a4a30 "0\202!Ü\006\t*\206H\206÷\r\001\a\002 > \202!Í0\202!É\002\001\001\061\017\060\r\006\t`\206H\001e\003\004\002\001\005", > AuthDataSize=8672, IsAuditMode=0 '\000', ImageName=0x0, ImageDevicePath=0x0) > at > SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.c:1600 > #9 0x000000007fde8643 in DxeImageVerificationHandler > (AuthenticationStatus=0, File=0x7ee89418, > FileBuffer=0x7e26b018, FileSize=1293304, BootPolicy=1 '\001') > at > SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.c:2419 > #10 0x000000007fde4cd4 in ExecuteSecurity2Handlers > (AuthenticationOperation=15, AuthenticationStatus=0, > File=0x7ee89418, FileBuffer=0x7e26b018, FileSize=1293304, BootPolicy=1 > '\001') > at > MdeModulePkg/Library/DxeSecurityManagementLib/DxeSecurityManagementLib.c:518 > #11 0x000000007fde38df in Security2StubAuthenticate (This=0x7fe6f248, > File=0x7ee89418, FileBuffer=0x7e26b018, > FileSize=1293304, BootPolicy=1 '\001') > at MdeModulePkg/Universal/SecurityStubDxe/SecurityStub.c:143 > #12 0x000000007ff64c5e in CoreLoadImageCommon (BootPolicy=1 '\001', > ParentImageHandle=0x7f240218, > FilePath=0x7ee89418, SourceBuffer=0x0, SourceSize=0, DstBuffer=0, > NumberOfPages=0x0, ImageHandle=0x7ff5ec60, > EntryPoint=0x0, Attribute=3) at MdeModulePkg/Core/Dxe/Image/Image.c:1170 > #13 0x000000007ff65216 in CoreLoadImage (BootPolicy=1 '\001', > ParentImageHandle=0x7f240218, FilePath=0x7ee89418, > SourceBuffer=0x0, SourceSize=0, ImageHandle=0x7ff5ec60) > at MdeModulePkg/Core/Dxe/Image/Image.c:1441 > #14 0x000000007ebe9a8e in BdsLibBootViaBootOption (Option=0x7f05d3d8, > DevicePath=0x7ee89418, > ExitDataSize=0x7ff5ed38, ExitData=0x7ff5ed30) > at IntelFrameworkModulePkg/Library/GenericBdsLib/BdsBoot.c:2352 > #15 0x000000007ebba00e in BdsBootDeviceSelect () > at IntelFrameworkModulePkg/Universal/BdsDxe/BdsEntry.c:286 > #16 0x000000007ebbab85 in BdsEntry (This=0x7ec06820) > at IntelFrameworkModulePkg/Universal/BdsDxe/BdsEntry.c:659 > #17 0x000000007ff60918 in DxeMain (HobStart=0x7fd14018) > at MdeModulePkg/Core/Dxe/DxeMain/DxeMain.c:511 > #18 0x000000007ff5f71d in ProcessModuleEntryPointList (HobStart=0x7bfde000) > at > Build/OvmfX64/DEBUG_GCC48/X64/MdeModulePkg/Core/Dxe/DxeMain/DEBUG/AutoGen.c:423 > #19 0x000000007ff5f26d in _ModuleEntryPoint (HobStart=0x7bfde000) > at MdePkg/Library/DxeCoreEntryPoint/DxeCoreEntryPoint.c:54 > #20 0x0000000000000000 in ?? () You may ask how I captured this backtrace. The answer is <https://edk2.bluestop.org/w/tianocore/debugging-with-gdb/>. (Thanks again Bruce for writing up my email in such a nice form!) Laszlo _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel