[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [xen-unstable bisection] complete build-i386-xsm
branch xen-unstable xenbranch xen-unstable job build-i386-xsm testid xen-build Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git Tree: qemuu git://xenbits.xen.org/qemu-xen.git Tree: xen git://xenbits.xen.org/xen.git *** Found and reproduced problem changeset *** Bug is in tree: xen git://xenbits.xen.org/xen.git Bug introduced: 53e9ecffde88ae65a2e357925a213114e6262505 Bug not present: cd7dedad8209753e0fc8a97e61d04b74912b53dc Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/144492/ commit 53e9ecffde88ae65a2e357925a213114e6262505 Author: julian.tuminaro@xxxxxxxxx <julian.tuminaro@xxxxxxxxx> Date: Wed Nov 13 23:55:41 2019 -0500 kdd.c: Add support for initial handshake in KD protocol for Win 7, 8 and 10 (64 bit) Current implementation of find_os is based on the hard-coded values for different Windows version. It uses the value for get the address to start looking for DOS header in the given specified range. However, this is not scalable to all version of Windows as it will require us to keep adding new entries and also due to KASLR, chances of not hitting the PE header is significant. We implement a way for 64-bit systems to use IDT entry to get a valid exception/interrupt handler and then move back into the memory to find the valid DOS header. Since IDT entries are protected by PatchGuard, we think our assumption that IDT entries will not be corrupted is valid for our purpose. Once we have the image base, we search for the DBGKD_GET_VERSION64 structure type in .data section to get information required for handshake. Currently, this is a work in progress feature and current patch only supports the handshake and memory read/write on 64-bit systems. NOTE: This is the Updated version of the previous patch submitted NOTE: This has currently been only tested when debugging was not enabled on the guest Windows. Signed-off-by: Jenish Rakholiya <rjenish@xxxxxxx> Signed-off-by: Julian Tuminaro <jtuminar@xxxxxxxxxxxxxx> Reviewed-by: Tim Deegan <tim@xxxxxxx> Reviewed-by: Paul Durrant <paul@xxxxxxx> For bisection revision-tuple graph see: http://logs.test-lab.xenproject.org/osstest/results/bisect/xen-unstable/build-i386-xsm.xen-build.html Revision IDs in each graph node refer, respectively, to the Trees above. ---------------------------------------- Running cs-bisection-step --graph-out=/home/logs/results/bisect/xen-unstable/build-i386-xsm.xen-build --summary-out=tmp/144492.bisection-summary --basis-template=144377 --blessings=real,real-bisect xen-unstable build-i386-xsm xen-build Searching for failure / basis pass: 144471 fail [host=elbling0] / 144377 [host=huxelrebe0] 144358 [host=baroque0] 144349 [host=baroque0] 144344 [host=huxelrebe0] 144323 [host=huxelrebe0] 144313 [host=baroque0] 144301 [host=baroque0] 144295 [host=huxelrebe1] 144289 [host=huxelrebe0] 144283 [host=huxelrebe0] 144276 ok. Failure / basis pass flights: 144471 / 144276 (tree with no url: minios) (tree with no url: ovmf) (tree with no url: seabios) Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git Tree: qemuu git://xenbits.xen.org/qemu-xen.git Tree: xen git://xenbits.xen.org/xen.git Latest d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf Basis pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 183f354e1430087879de071f0c7122e42703916e Generating revisions with ./adhoc-revtuple-generator git://xenbits.xen.org/qemu-xen-traditional.git#d0d8ad39ecb51cd7497cd524484fe09f50876798-d0d8ad39ecb51cd7497cd524484fe09f50876798 git://xenbits.xen.org/qemu-xen.git#933ebad2470a169504799a1d95b8e410bd9847ef-933ebad2470a169504799a1d95b8e410bd9847ef git://xenbits.xen.org/xen.git#183f354e1430087879de071f0c7122e42703916e-f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf Loaded 5001 nodes in revision graph Searching for test results: 144276 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 183f354e1430087879de071f0c7122e42703916e 144283 [host=huxelrebe0] 144289 [host=huxelrebe0] 144295 [host=huxelrebe1] 144301 [host=baroque0] 144313 [host=baroque0] 144349 [host=baroque0] 144323 [host=huxelrebe0] 144344 [host=huxelrebe0] 144358 [host=baroque0] 144377 [host=huxelrebe0] 144409 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf 144479 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef c7d52a5be62ea253a9baac68510683c47efbcb8c 144464 [host=elbling1] 144489 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef cd7dedad8209753e0fc8a97e61d04b74912b53dc 144480 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef be18e39d2f69038804b27c30026754deaeefa543 144450 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf 144467 [host=elbling1] 144422 [host=elbling1] 144482 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 680d18763aef6a0b9cb90dcff8e59a6a91fbfb77 144470 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 183f354e1430087879de071f0c7122e42703916e 144471 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf 144472 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf 144460 [host=elbling1] 144483 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef cd7dedad8209753e0fc8a97e61d04b74912b53dc 144485 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 53e9ecffde88ae65a2e357925a213114e6262505 144475 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 2d55b2985f19149623e65c2e454c4b03131e7320 144492 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 53e9ecffde88ae65a2e357925a213114e6262505 144486 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef cd7dedad8209753e0fc8a97e61d04b74912b53dc 144488 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 53e9ecffde88ae65a2e357925a213114e6262505 Searching for interesting versions Result found: flight 144276 (pass), for basis pass Result found: flight 144409 (fail), for basis failure Repro found: flight 144470 (pass), for basis pass Repro found: flight 144471 (fail), for basis failure 0 revisions at d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef cd7dedad8209753e0fc8a97e61d04b74912b53dc No revisions left to test, checking graph state. Result found: flight 144483 (pass), for last pass Result found: flight 144485 (fail), for first failure Repro found: flight 144486 (pass), for last pass Repro found: flight 144488 (fail), for first failure Repro found: flight 144489 (pass), for last pass Repro found: flight 144492 (fail), for first failure *** Found and reproduced problem changeset *** Bug is in tree: xen git://xenbits.xen.org/xen.git Bug introduced: 53e9ecffde88ae65a2e357925a213114e6262505 Bug not present: cd7dedad8209753e0fc8a97e61d04b74912b53dc Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/144492/ commit 53e9ecffde88ae65a2e357925a213114e6262505 Author: julian.tuminaro@xxxxxxxxx <julian.tuminaro@xxxxxxxxx> Date: Wed Nov 13 23:55:41 2019 -0500 kdd.c: Add support for initial handshake in KD protocol for Win 7, 8 and 10 (64 bit) Current implementation of find_os is based on the hard-coded values for different Windows version. It uses the value for get the address to start looking for DOS header in the given specified range. However, this is not scalable to all version of Windows as it will require us to keep adding new entries and also due to KASLR, chances of not hitting the PE header is significant. We implement a way for 64-bit systems to use IDT entry to get a valid exception/interrupt handler and then move back into the memory to find the valid DOS header. Since IDT entries are protected by PatchGuard, we think our assumption that IDT entries will not be corrupted is valid for our purpose. Once we have the image base, we search for the DBGKD_GET_VERSION64 structure type in .data section to get information required for handshake. Currently, this is a work in progress feature and current patch only supports the handshake and memory read/write on 64-bit systems. NOTE: This is the Updated version of the previous patch submitted NOTE: This has currently been only tested when debugging was not enabled on the guest Windows. Signed-off-by: Jenish Rakholiya <rjenish@xxxxxxx> Signed-off-by: Julian Tuminaro <jtuminar@xxxxxxxxxxxxxx> Reviewed-by: Tim Deegan <tim@xxxxxxx> Reviewed-by: Paul Durrant <paul@xxxxxxx> Revision graph left in /home/logs/results/bisect/xen-unstable/build-i386-xsm.xen-build.{dot,ps,png,html,svg}. ---------------------------------------- 144492: tolerable ALL FAIL flight 144492 xen-unstable real-bisect [real] http://logs.test-lab.xenproject.org/osstest/logs/144492/ Failures :-/ but no regressions. Tests which did not succeed, including tests which could not be run: build-i386-xsm 6 xen-build fail baseline untested jobs: build-i386-xsm fail ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary _______________________________________________ osstest-output mailing list osstest-output@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/osstest-output
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |