[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable bisection] complete build-i386-xsm



branch xen-unstable
xenbranch xen-unstable
job build-i386-xsm
testid xen-build

Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  53e9ecffde88ae65a2e357925a213114e6262505
  Bug not present: cd7dedad8209753e0fc8a97e61d04b74912b53dc
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/144492/


  commit 53e9ecffde88ae65a2e357925a213114e6262505
  Author: julian.tuminaro@xxxxxxxxx <julian.tuminaro@xxxxxxxxx>
  Date:   Wed Nov 13 23:55:41 2019 -0500
  
      kdd.c: Add support for initial handshake in KD protocol for Win 7, 8 and 
10 (64 bit)
      
      Current implementation of find_os is based on the hard-coded values for
      different Windows version. It uses the value for get the address to
      start looking for DOS header in the given specified range. However, this
      is not scalable to all version of Windows as it will require us to keep
      adding new entries and also due to KASLR, chances of not hitting the PE
      header is significant. We implement a way for 64-bit systems to use IDT
      entry to get a valid exception/interrupt handler and then move back into
      the memory to find the valid DOS header. Since IDT entries are protected
      by PatchGuard, we think our assumption that IDT entries will not be
      corrupted is valid for our purpose. Once we have the image base, we
      search for the DBGKD_GET_VERSION64 structure type in .data section to
      get information required for handshake.
      
      Currently, this is a work in progress feature and current patch only
      supports the handshake and memory read/write on 64-bit systems.
      
      NOTE: This is the Updated version of the previous patch submitted
      NOTE: This has currently been only tested when debugging was not enabled
      on the guest Windows.
      
      Signed-off-by: Jenish Rakholiya <rjenish@xxxxxxx>
      Signed-off-by: Julian Tuminaro <jtuminar@xxxxxxxxxxxxxx>
      Reviewed-by: Tim Deegan <tim@xxxxxxx>
      Reviewed-by: Paul Durrant <paul@xxxxxxx>


For bisection revision-tuple graph see:
   
http://logs.test-lab.xenproject.org/osstest/results/bisect/xen-unstable/build-i386-xsm.xen-build.html
Revision IDs in each graph node refer, respectively, to the Trees above.

----------------------------------------
Running cs-bisection-step 
--graph-out=/home/logs/results/bisect/xen-unstable/build-i386-xsm.xen-build 
--summary-out=tmp/144492.bisection-summary --basis-template=144377 
--blessings=real,real-bisect xen-unstable build-i386-xsm xen-build
Searching for failure / basis pass:
 144471 fail [host=elbling0] / 144377 [host=huxelrebe0] 144358 [host=baroque0] 
144349 [host=baroque0] 144344 [host=huxelrebe0] 144323 [host=huxelrebe0] 144313 
[host=baroque0] 144301 [host=baroque0] 144295 [host=huxelrebe1] 144289 
[host=huxelrebe0] 144283 [host=huxelrebe0] 144276 ok.
Failure / basis pass flights: 144471 / 144276
(tree with no url: minios)
(tree with no url: ovmf)
(tree with no url: seabios)
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
Latest d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
Basis pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
183f354e1430087879de071f0c7122e42703916e
Generating revisions with ./adhoc-revtuple-generator  
git://xenbits.xen.org/qemu-xen-traditional.git#d0d8ad39ecb51cd7497cd524484fe09f50876798-d0d8ad39ecb51cd7497cd524484fe09f50876798
 
git://xenbits.xen.org/qemu-xen.git#933ebad2470a169504799a1d95b8e410bd9847ef-933ebad2470a169504799a1d95b8e410bd9847ef
 
git://xenbits.xen.org/xen.git#183f354e1430087879de071f0c7122e42703916e-f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
Loaded 5001 nodes in revision graph
Searching for test results:
 144276 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
183f354e1430087879de071f0c7122e42703916e
 144283 [host=huxelrebe0]
 144289 [host=huxelrebe0]
 144295 [host=huxelrebe1]
 144301 [host=baroque0]
 144313 [host=baroque0]
 144349 [host=baroque0]
 144323 [host=huxelrebe0]
 144344 [host=huxelrebe0]
 144358 [host=baroque0]
 144377 [host=huxelrebe0]
 144409 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
 144479 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
c7d52a5be62ea253a9baac68510683c47efbcb8c
 144464 [host=elbling1]
 144489 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
cd7dedad8209753e0fc8a97e61d04b74912b53dc
 144480 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
be18e39d2f69038804b27c30026754deaeefa543
 144450 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
 144467 [host=elbling1]
 144422 [host=elbling1]
 144482 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
680d18763aef6a0b9cb90dcff8e59a6a91fbfb77
 144470 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
183f354e1430087879de071f0c7122e42703916e
 144471 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
 144472 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
 144460 [host=elbling1]
 144483 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
cd7dedad8209753e0fc8a97e61d04b74912b53dc
 144485 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
53e9ecffde88ae65a2e357925a213114e6262505
 144475 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
2d55b2985f19149623e65c2e454c4b03131e7320
 144492 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
53e9ecffde88ae65a2e357925a213114e6262505
 144486 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
cd7dedad8209753e0fc8a97e61d04b74912b53dc
 144488 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
53e9ecffde88ae65a2e357925a213114e6262505
Searching for interesting versions
 Result found: flight 144276 (pass), for basis pass
 Result found: flight 144409 (fail), for basis failure
 Repro found: flight 144470 (pass), for basis pass
 Repro found: flight 144471 (fail), for basis failure
 0 revisions at d0d8ad39ecb51cd7497cd524484fe09f50876798 
933ebad2470a169504799a1d95b8e410bd9847ef 
cd7dedad8209753e0fc8a97e61d04b74912b53dc
No revisions left to test, checking graph state.
 Result found: flight 144483 (pass), for last pass
 Result found: flight 144485 (fail), for first failure
 Repro found: flight 144486 (pass), for last pass
 Repro found: flight 144488 (fail), for first failure
 Repro found: flight 144489 (pass), for last pass
 Repro found: flight 144492 (fail), for first failure

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  53e9ecffde88ae65a2e357925a213114e6262505
  Bug not present: cd7dedad8209753e0fc8a97e61d04b74912b53dc
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/144492/


  commit 53e9ecffde88ae65a2e357925a213114e6262505
  Author: julian.tuminaro@xxxxxxxxx <julian.tuminaro@xxxxxxxxx>
  Date:   Wed Nov 13 23:55:41 2019 -0500
  
      kdd.c: Add support for initial handshake in KD protocol for Win 7, 8 and 
10 (64 bit)
      
      Current implementation of find_os is based on the hard-coded values for
      different Windows version. It uses the value for get the address to
      start looking for DOS header in the given specified range. However, this
      is not scalable to all version of Windows as it will require us to keep
      adding new entries and also due to KASLR, chances of not hitting the PE
      header is significant. We implement a way for 64-bit systems to use IDT
      entry to get a valid exception/interrupt handler and then move back into
      the memory to find the valid DOS header. Since IDT entries are protected
      by PatchGuard, we think our assumption that IDT entries will not be
      corrupted is valid for our purpose. Once we have the image base, we
      search for the DBGKD_GET_VERSION64 structure type in .data section to
      get information required for handshake.
      
      Currently, this is a work in progress feature and current patch only
      supports the handshake and memory read/write on 64-bit systems.
      
      NOTE: This is the Updated version of the previous patch submitted
      NOTE: This has currently been only tested when debugging was not enabled
      on the guest Windows.
      
      Signed-off-by: Jenish Rakholiya <rjenish@xxxxxxx>
      Signed-off-by: Julian Tuminaro <jtuminar@xxxxxxxxxxxxxx>
      Reviewed-by: Tim Deegan <tim@xxxxxxx>
      Reviewed-by: Paul Durrant <paul@xxxxxxx>

Revision graph left in 
/home/logs/results/bisect/xen-unstable/build-i386-xsm.xen-build.{dot,ps,png,html,svg}.
----------------------------------------
144492: tolerable ALL FAIL

flight 144492 xen-unstable real-bisect [real]
http://logs.test-lab.xenproject.org/osstest/logs/144492/

Failures :-/ but no regressions.

Tests which did not succeed,
including tests which could not be run:
 build-i386-xsm                6 xen-build               fail baseline untested


jobs:
 build-i386-xsm                                               fail    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.