Your message dated Mon, 03 Nov 2025 14:36:24 +0000
with message-id <[email protected]>
and subject line Bug#1119982: fixed in edk2 2025.05-1
has caused the Debian Bug report #1119982,
regarding FTBFS w/ nasm 3.01
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1119982: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1119982
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: edk2
Version: 2025.02-10
Severity: serious
Tags: ftbfs
Justification: fails to build from source
Control: affects -1 + nasm

After the nasm update to 3.01-1, edk2 no longer builds. It can be
reproduced with:

$ make -f debian/rules build-ovmf-secboot

Relevant portion of the log follows:

[...]
make[1]: Leaving directory 
'/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/OvmfPkg/Library/PxeBcPcdProducerLib/PxeBcPcdProducerLib'
Building ... 
/tmp/edk2-2025.02/build/ovmf/secboot/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.inf
 [X64]
make[1]: Leaving directory 
'/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/MicrocodeLib/MicrocodeLib'
Trim --asm-file -o 
/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/CpuExceptionHandlerLib/DxeCpuExceptionHandlerLib/OUTPUT/X64/ExceptionHandlerAsm.i
 -i 
/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/CpuExceptionHandlerLib/DxeCpuExceptionHandlerLib/OUTPUT/inc.lst
 
/tmp/edk2-2025.02/build/ovmf/secboot/UefiCpuPkg/Library/CpuExceptionHandlerLib/X64/ExceptionHandlerAsm.nasm
"gcc" -MMD -MF 
/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/CpuExceptionHandlerLib/PeiCpuExceptionHandlerLib/OUTPUT/PeiDxeSmmCpuException.obj.deps
 -g -Os -fshort-wchar -fno-builtin -fno-strict-aliasing -Wall -Werror 
-Wno-array-bounds -include AutoGen.h -fno-common -fstack-protector 
-ffunction-sections -fdata-sections -fno-stack-protector 
-DSTRING_ARRAY_NAME=PeiCpuExceptionHandlerLibStrings 
-mstack-protector-guard=global -m64 -march=x86-64 
"-DEFIAPI=__attribute__((ms_abi))" -maccumulate-outgoing-args -mno-red-zone 
-Wno-address -mcmodel=small -fpie -fno-asynchronous-unwind-tables -Wno-address 
-fno-omit-frame-pointer -flto -DUSING_LTO -Wno-unused-but-set-variable 
-Wno-unused-const-variable -DMDEPKG_NDEBUG -mno-mmx -mno-sse -D 
DISABLE_NEW_DEPRECATED_INTERFACES -D TDX_GUEST_SUPPORTED -D 
ENABLE_MD5_DEPRECATED_INTERFACES -c -o 
/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/CpuExceptionHandlerLib/PeiCpuExceptionHandlerLib/OUTPUT/./PeiDxeSmmCpuException.obj
 
-I/tmp/edk2-2025.02/build/ovmf/secboot/UefiCpuPkg/Library/CpuExceptionHandlerLib/X64
 
-I/tmp/edk2-2025.02/build/ovmf/secboot/UefiCpuPkg/Library/CpuExceptionHandlerLib
 
-I/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/CpuExceptionHandlerLib/PeiCpuExceptionHandlerLib/DEBUG
 -I/tmp/edk2-2025.02/build/ovmf/secboot/MdePkg 
-I/tmp/edk2-2025.02/build/ovmf/secboot/MdePkg/Include 
-I/tmp/edk2-2025.02/build/ovmf/secboot/MdePkg/Test/UnitTest/Include 
-I/tmp/edk2-2025.02/build/ovmf/secboot/MdePkg/Test/Mock/Include 
-I/tmp/edk2-2025.02/build/ovmf/secboot/MdePkg/Library/MipiSysTLib/mipisyst/library/include
 -I/tmp/edk2-2025.02/build/ovmf/secboot/MdePkg/Include/X64 
-I/tmp/edk2-2025.02/build/ovmf/secboot/MdeModulePkg 
-I/tmp/edk2-2025.02/build/ovmf/secboot/MdeModulePkg/Test/Mock/Include 
-I/tmp/edk2-2025.02/build/ovmf/secboot/MdeModulePkg/Include 
-I/tmp/edk2-2025.02/build/ovmf/secboot/UefiCpuPkg 
-I/tmp/edk2-2025.02/build/ovmf/secboot/UefiCpuPkg/Include 
/tmp/edk2-2025.02/build/ovmf/secboot/UefiCpuPkg/Library/CpuExceptionHandlerLib/PeiDxeSmmCpuException.c
/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/CpuExceptionHandlerLib/SmmCpuExceptionHandlerLib/OUTPUT/X64/ExceptionHandlerAsm.iii:60:
 error: instruction not valid with 32-bit operand size
/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/CpuExceptionHandlerLib/SmmCpuExceptionHandlerLib/OUTPUT/X64/ExceptionHandlerAsm.iii:60:
 error: instruction not valid with 32-bit operand size
[... repeats ...]
/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/CpuExceptionHandlerLib/SmmCpuExceptionHandlerLib/OUTPUT/X64/ExceptionHandlerAsm.iii:60:
 error: instruction not valid with 32-bit operand size
/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/CpuExceptionHandlerLib/SmmCpuExceptionHandlerLib/OUTPUT/X64/ExceptionHandlerAsm.iii:60:
 error: instruction not valid with 32-bit operand size
/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/CpuExceptionHandlerLib/SmmCpuExceptionHandlerLib/OUTPUT/X64/ExceptionHandlerAsm.iii:73:
 error: instruction not valid with 32-bit operand size
make[1]: *** [GNUmakefile:343: 
/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/CpuExceptionHandlerLib/SmmCpuExceptionHandlerLib/OUTPUT/X64/ExceptionHandlerAsm.obj]
 Error 1
make[1]: Leaving directory 
'/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/CpuExceptionHandlerLib/SmmCpuExceptionHandlerLib'


build.py...
 : error 7000: Failed to execute command
        make tbuild 
[/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/CpuExceptionHandlerLib/SmmCpuExceptionHandlerLib]


build.py...
 : error 7000: Failed to execute command
        make tbuild 
[/tmp/edk2-2025.02/build/ovmf/secboot/Build/OvmfX64/RELEASE_GCC5/X64/UefiCpuPkg/Library/CpuExceptionHandlerLib/DxeCpuExceptionHandlerLib]

-- System Information:
Debian Release: forky/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.17.2-amd64 (SMP w/24 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

--- End Message ---
--- Begin Message ---
Source: edk2
Source-Version: 2025.05-1
Done: dann frazier <[email protected]>

We believe that the bug you reported is fixed in the latest version of
edk2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <[email protected]> (supplier of updated edk2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 03 Nov 2025 07:07:21 -0700
Source: edk2
Architecture: source
Version: 2025.05-1
Distribution: unstable
Urgency: medium
Maintainer: Debian QEMU Team <[email protected]>
Changed-By: dann frazier <[email protected]>
Closes: 1119982
Changes:
 edk2 (2025.05-1) unstable; urgency=medium
 .
   * New upstream release, based on edk2-stable202505 tag.
     - Drop patches merged upstream:
       + 0001-OvmfPkg-Use-user-specified-opt-ovmf-X-PciMmio64Mb-va.patch
       + 0001-NetworkPkg-IScsiDxe-Fix-for-Remote-Memory-Exposure-i.patch
       + 0001-OvmfPkg-QemuKernelLoaderFsDxe-fix-allocation-failure.patch
       + 0001-SecurityPkg-Out-of-bound-read-in-HashPeImageByType.patch
       + 0002-SecurityPkg-Improving-HashPeImageByType-logic.patch
       + 0003-SecurityPkg-Improving-SecureBootConfigImpl-HashPeIma.patch
       + 0004-SecurityPkg-Update-SecurityFixes.yaml-for-CVE-2024-3.patch
       + 0001-Fix-timing-side-channel-in-ECDSA-signature-computati.patch
       + 0001-NetworkPkg-IScsiDxe-Fix-for-out-of-bound-memory-acce.patch
     - Refresh patches:
       + OvmfPkg-X64-add-opt-org.tianocore-UninstallMemAttrPr.patch
   * debian/tests/shell.py: Upstream has disabled autoboot for the EFI
     Shell for a number of platforms. Create a boot entry for the shell
     before running the test on those platforms.
   * Apply DBXUpdate-2025-10-16.amd64.bin.
   * ovmf: Fix regression in previous upload that dropped the amdsev
     image. Thanks to Hector Cao.
   * d/p/fix_nasm_compile.patch: Add patch to fix FTBFS w/ nasm 3.01.
     (Closes: #1119982)
Checksums-Sha1:
 a934022f9aa2a0bdb1b363b826eb93f090ed637d 3116 edk2_2025.05-1.dsc
 43cc752999b757b397a4562613c9d9dd72c6e9cd 29938816 edk2_2025.05.orig.tar.xz
 d0f832882d5d33e849b573a3e2cb6fea829f1472 68980 edk2_2025.05-1.debian.tar.xz
 fa2527f714db3633e8f8ca0e5555361c8b0ce86c 11531 edk2_2025.05-1_source.buildinfo
Checksums-Sha256:
 caa1cf9ab5493b81a921d9c91ec3d9c47e87c67326392278e39ca62ae5c2b4b6 3116 
edk2_2025.05-1.dsc
 a6c101d7c44f714bd35041ea350d5c32fb0f801f73ee07bd5b131ba4becb462d 29938816 
edk2_2025.05.orig.tar.xz
 6c4749644337934315e43ccd97b26dec495e3b16c25f1f867557cf4a67813621 68980 
edk2_2025.05-1.debian.tar.xz
 f85bfc4be7a822d050e475efef7024de54cef3460e2acbfb5cfea5d199e5f1ca 11531 
edk2_2025.05-1_source.buildinfo
Files:
 a31f197d3529853eb1af2f5492c78dd6 3116 misc optional edk2_2025.05-1.dsc
 b2e12f15d351e80225527a9e3cbbc081 29938816 misc optional 
edk2_2025.05.orig.tar.xz
 45459f66a697ff6b9e4fefc66dcd0974 68980 misc optional 
edk2_2025.05-1.debian.tar.xz
 9bace66ac9618409851bb5b5ecda2229 11531 misc optional 
edk2_2025.05-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

wr0EARYKAG8FgmkIt0gJEFRbhkD0YjpYRxQAAAAAAB4AIHNhbHRAbm90YXRpb25z
LnNlcXVvaWEtcGdwLm9yZx5K61GJv9xb6Winikxl15Y2GRJ4eUkHWumGkwhaWkz0
FiEEKBpcS4ojw8R0IfYuVFuGQPRiOlgAACfeAP4tJWv/42LsJ3yMeddlxDcLBQTP
UUd2uGTU1h/yIHAAWQEA08vRmRAIXD/E1RsHUJuVl00wZlr1poICuIx/1B/Nrgw=
=d4ox
-----END PGP SIGNATURE-----

Attachment: pgpxx9idf0Ex4.pgp
Description: PGP signature


--- End Message ---

Reply via email to