[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[xen-unstable bisection] complete build-i386



branch xen-unstable
xenbranch xen-unstable
job build-i386
testid xen-build

Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  53e9ecffde88ae65a2e357925a213114e6262505
  Bug not present: cd7dedad8209753e0fc8a97e61d04b74912b53dc
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/144459/


  commit 53e9ecffde88ae65a2e357925a213114e6262505
  Author: julian.tuminaro@xxxxxxxxx <julian.tuminaro@xxxxxxxxx>
  Date:   Wed Nov 13 23:55:41 2019 -0500
  
      kdd.c: Add support for initial handshake in KD protocol for Win 7, 8 and 
10 (64 bit)
      
      Current implementation of find_os is based on the hard-coded values for
      different Windows version. It uses the value for get the address to
      start looking for DOS header in the given specified range. However, this
      is not scalable to all version of Windows as it will require us to keep
      adding new entries and also due to KASLR, chances of not hitting the PE
      header is significant. We implement a way for 64-bit systems to use IDT
      entry to get a valid exception/interrupt handler and then move back into
      the memory to find the valid DOS header. Since IDT entries are protected
      by PatchGuard, we think our assumption that IDT entries will not be
      corrupted is valid for our purpose. Once we have the image base, we
      search for the DBGKD_GET_VERSION64 structure type in .data section to
      get information required for handshake.
      
      Currently, this is a work in progress feature and current patch only
      supports the handshake and memory read/write on 64-bit systems.
      
      NOTE: This is the Updated version of the previous patch submitted
      NOTE: This has currently been only tested when debugging was not enabled
      on the guest Windows.
      
      Signed-off-by: Jenish Rakholiya <rjenish@xxxxxxx>
      Signed-off-by: Julian Tuminaro <jtuminar@xxxxxxxxxxxxxx>
      Reviewed-by: Tim Deegan <tim@xxxxxxx>
      Reviewed-by: Paul Durrant <paul@xxxxxxx>


For bisection revision-tuple graph see:
   
http://logs.test-lab.xenproject.org/osstest/results/bisect/xen-unstable/build-i386.xen-build.html
Revision IDs in each graph node refer, respectively, to the Trees above.

----------------------------------------
Running cs-bisection-step 
--graph-out=/home/logs/results/bisect/xen-unstable/build-i386.xen-build 
--summary-out=tmp/144459.bisection-summary --basis-template=144377 
--blessings=real,real-bisect xen-unstable build-i386 xen-build
Searching for failure / basis pass:
 144422 fail [host=albana1] / 144377 [host=huxelrebe0] 144358 [host=baroque0] 
144349 [host=baroque0] 144344 [host=huxelrebe0] 144323 [host=huxelrebe1] 144313 
[host=baroque0] 144301 [host=baroque0] 144295 [host=huxelrebe1] 144289 
[host=huxelrebe0] 144283 [host=huxelrebe0] 144276 [host=elbling0] 144264 
[host=huxelrebe0] 144252 [host=huxelrebe1] 144245 [host=huxelrebe0] 144239 
[host=baroque0] 144232 [host=huxelrebe0] 144222 [host=huxelrebe1] 144211 
[host=huxelrebe0] 144205 [host=huxelrebe0] 144199 \
 [host=huxelrebe0] 144193 [host=elbling0] 144189 [host=huxelrebe0] 144180 
[host=huxelrebe1] 144171 [host=huxelrebe0] 144162 [host=huxelrebe0] 144149 
[host=huxelrebe0] 144124 [host=huxelrebe0] 144091 [host=huxelrebe0] 144067 
[host=huxelrebe1] 144042 [host=huxelrebe0] 144020 [host=huxelrebe0] 144001 ok.
Failure / basis pass flights: 144422 / 144001
(tree with no url: minios)
(tree with no url: ovmf)
(tree with no url: seabios)
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
Latest d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
Basis pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
a458d3bd0d2585275c128556ec0cbd818c6a7b0d
Generating revisions with ./adhoc-revtuple-generator  
git://xenbits.xen.org/qemu-xen-traditional.git#d0d8ad39ecb51cd7497cd524484fe09f50876798-d0d8ad39ecb51cd7497cd524484fe09f50876798
 
git://xenbits.xen.org/qemu-xen.git#933ebad2470a169504799a1d95b8e410bd9847ef-933ebad2470a169504799a1d95b8e410bd9847ef
 
git://xenbits.xen.org/xen.git#a458d3bd0d2585275c128556ec0cbd818c6a7b0d-f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
Loaded 5001 nodes in revision graph
Searching for test results:
 143552 [host=debina0]
 143557 [host=elbling0]
 143563 [host=debina0]
 143715 [host=albana0]
 143692 [host=huxelrebe0]
 143895 [host=albana0]
 143937 [host=elbling0]
 143985 [host=huxelrebe0]
 144001 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
a458d3bd0d2585275c128556ec0cbd818c6a7b0d
 143967 [host=elbling0]
 144020 [host=huxelrebe0]
 144042 [host=huxelrebe0]
 144067 [host=huxelrebe1]
 144090 [host=huxelrebe0]
 144110 [host=chardonnay1]
 144113 [host=albana0]
 144091 [host=huxelrebe0]
 144149 [host=huxelrebe0]
 144118 [host=chardonnay1]
 144124 [host=huxelrebe0]
 144162 [host=huxelrebe0]
 144171 [host=huxelrebe0]
 144180 [host=huxelrebe1]
 144189 [host=huxelrebe0]
 144211 [host=huxelrebe0]
 144245 [host=huxelrebe0]
 144193 [host=elbling0]
 144232 [host=huxelrebe0]
 144199 [host=huxelrebe0]
 144205 [host=huxelrebe0]
 144222 [host=huxelrebe1]
 144239 [host=baroque0]
 144252 [host=huxelrebe1]
 144264 [host=huxelrebe0]
 144276 [host=elbling0]
 144283 [host=huxelrebe0]
 144289 [host=huxelrebe0]
 144295 [host=huxelrebe1]
 144301 [host=baroque0]
 144313 [host=baroque0]
 144349 [host=baroque0]
 144323 [host=huxelrebe1]
 144344 [host=huxelrebe0]
 144356 [host=baroque0]
 144363 [host=elbling0]
 144358 [host=baroque0]
 144377 [host=huxelrebe0]
 144409 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
 144448 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
53e9ecffde88ae65a2e357925a213114e6262505
 144451 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
cd7dedad8209753e0fc8a97e61d04b74912b53dc
 144421 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
a458d3bd0d2585275c128556ec0cbd818c6a7b0d
 144434 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
 144453 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
53e9ecffde88ae65a2e357925a213114e6262505
 144437 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
83ac5ab54bba37e2761d77584ab9e2d8a24401c9
 144438 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
1d758bc6d1a8c0f658a874470c349ee4e27aee46
 144457 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
cd7dedad8209753e0fc8a97e61d04b74912b53dc
 144441 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
5731a7f7b0732ae7290a43ad46fdf03609db382c
 144422 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
 144442 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
be18e39d2f69038804b27c30026754deaeefa543
 144445 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
680d18763aef6a0b9cb90dcff8e59a6a91fbfb77
 144446 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
cd7dedad8209753e0fc8a97e61d04b74912b53dc
 144459 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
53e9ecffde88ae65a2e357925a213114e6262505
Searching for interesting versions
 Result found: flight 144001 (pass), for basis pass
 Result found: flight 144409 (fail), for basis failure
 Repro found: flight 144421 (pass), for basis pass
 Repro found: flight 144422 (fail), for basis failure
 0 revisions at d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
cd7dedad8209753e0fc8a97e61d04b74912b53dc
No revisions left to test, checking graph state.
 Result found: flight 144446 (pass), for last pass
 Result found: flight 144448 (fail), for first failure
 Repro found: flight 144451 (pass), for last pass
 Repro found: flight 144453 (fail), for first failure
 Repro found: flight 144457 (pass), for last pass
 Repro found: flight 144459 (fail), for first failure

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  53e9ecffde88ae65a2e357925a213114e6262505
  Bug not present: cd7dedad8209753e0fc8a97e61d04b74912b53dc
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/144459/


  commit 53e9ecffde88ae65a2e357925a213114e6262505
  Author: julian.tuminaro@xxxxxxxxx <julian.tuminaro@xxxxxxxxx>
  Date:   Wed Nov 13 23:55:41 2019 -0500
  
      kdd.c: Add support for initial handshake in KD protocol for Win 7, 8 and 
10 (64 bit)
      
      Current implementation of find_os is based on the hard-coded values for
      different Windows version. It uses the value for get the address to
      start looking for DOS header in the given specified range. However, this
      is not scalable to all version of Windows as it will require us to keep
      adding new entries and also due to KASLR, chances of not hitting the PE
      header is significant. We implement a way for 64-bit systems to use IDT
      entry to get a valid exception/interrupt handler and then move back into
      the memory to find the valid DOS header. Since IDT entries are protected
      by PatchGuard, we think our assumption that IDT entries will not be
      corrupted is valid for our purpose. Once we have the image base, we
      search for the DBGKD_GET_VERSION64 structure type in .data section to
      get information required for handshake.
      
      Currently, this is a work in progress feature and current patch only
      supports the handshake and memory read/write on 64-bit systems.
      
      NOTE: This is the Updated version of the previous patch submitted
      NOTE: This has currently been only tested when debugging was not enabled
      on the guest Windows.
      
      Signed-off-by: Jenish Rakholiya <rjenish@xxxxxxx>
      Signed-off-by: Julian Tuminaro <jtuminar@xxxxxxxxxxxxxx>
      Reviewed-by: Tim Deegan <tim@xxxxxxx>
      Reviewed-by: Paul Durrant <paul@xxxxxxx>

Revision graph left in 
/home/logs/results/bisect/xen-unstable/build-i386.xen-build.{dot,ps,png,html,svg}.
----------------------------------------
144459: tolerable ALL FAIL

flight 144459 xen-unstable real-bisect [real]
http://logs.test-lab.xenproject.org/osstest/logs/144459/

Failures :-/ but no regressions.

Tests which did not succeed,
including tests which could not be run:
 build-i386                    6 xen-build               fail baseline untested


jobs:
 build-i386                                                   fail    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


_______________________________________________
osstest-output mailing list
osstest-output@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/osstest-output

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.