Mailing List Archive

[xen-unstable bisection] complete build-i386-xsm
branch xen-unstable
xenbranch xen-unstable
job build-i386-xsm
testid xen-build

Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git

*** Found and reproduced problem changeset ***

Bug is in tree: xen git://xenbits.xen.org/xen.git
Bug introduced: 53e9ecffde88ae65a2e357925a213114e6262505
Bug not present: cd7dedad8209753e0fc8a97e61d04b74912b53dc
Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/144492/


commit 53e9ecffde88ae65a2e357925a213114e6262505
Author: julian.tuminaro@gmail.com <julian.tuminaro@gmail.com>
Date: Wed Nov 13 23:55:41 2019 -0500

kdd.c: Add support for initial handshake in KD protocol for Win 7, 8 and 10 (64 bit)

Current implementation of find_os is based on the hard-coded values for
different Windows version. It uses the value for get the address to
start looking for DOS header in the given specified range. However, this
is not scalable to all version of Windows as it will require us to keep
adding new entries and also due to KASLR, chances of not hitting the PE
header is significant. We implement a way for 64-bit systems to use IDT
entry to get a valid exception/interrupt handler and then move back into
the memory to find the valid DOS header. Since IDT entries are protected
by PatchGuard, we think our assumption that IDT entries will not be
corrupted is valid for our purpose. Once we have the image base, we
search for the DBGKD_GET_VERSION64 structure type in .data section to
get information required for handshake.

Currently, this is a work in progress feature and current patch only
supports the handshake and memory read/write on 64-bit systems.

NOTE: This is the Updated version of the previous patch submitted
NOTE: This has currently been only tested when debugging was not enabled
on the guest Windows.

Signed-off-by: Jenish Rakholiya <rjenish@cmu.edu>
Signed-off-by: Julian Tuminaro <jtuminar@andrew.cmu.edu>
Reviewed-by: Tim Deegan <tim@xen.org>
Reviewed-by: Paul Durrant <paul@xen.org>


For bisection revision-tuple graph see:
http://logs.test-lab.xenproject.org/osstest/results/bisect/xen-unstable/build-i386-xsm.xen-build.html
Revision IDs in each graph node refer, respectively, to the Trees above.

----------------------------------------
Running cs-bisection-step --graph-out=/home/logs/results/bisect/xen-unstable/build-i386-xsm.xen-build --summary-out=tmp/144492.bisection-summary --basis-template=144377 --blessings=real,real-bisect xen-unstable build-i386-xsm xen-build
Searching for failure / basis pass:
144471 fail [host=elbling0] / 144377 [host=huxelrebe0] 144358 [host=baroque0] 144349 [host=baroque0] 144344 [host=huxelrebe0] 144323 [host=huxelrebe0] 144313 [host=baroque0] 144301 [host=baroque0] 144295 [host=huxelrebe1] 144289 [host=huxelrebe0] 144283 [host=huxelrebe0] 144276 ok.
Failure / basis pass flights: 144471 / 144276
(tree with no url: minios)
(tree with no url: ovmf)
(tree with no url: seabios)
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
Latest d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
Basis pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 183f354e1430087879de071f0c7122e42703916e
Generating revisions with ./adhoc-revtuple-generator git://xenbits.xen.org/qemu-xen-traditional.git#d0d8ad39ecb51cd7497cd524484fe09f50876798-d0d8ad39ecb51cd7497cd524484fe09f50876798 git://xenbits.xen.org/qemu-xen.git#933ebad2470a169504799a1d95b8e410bd9847ef-933ebad2470a169504799a1d95b8e410bd9847ef git://xenbits.xen.org/xen.git#183f354e1430087879de071f0c7122e42703916e-f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
Loaded 5001 nodes in revision graph
Searching for test results:
144276 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 183f354e1430087879de071f0c7122e42703916e
144283 [host=huxelrebe0]
144289 [host=huxelrebe0]
144295 [host=huxelrebe1]
144301 [host=baroque0]
144313 [host=baroque0]
144349 [host=baroque0]
144323 [host=huxelrebe0]
144344 [host=huxelrebe0]
144358 [host=baroque0]
144377 [host=huxelrebe0]
144409 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
144479 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef c7d52a5be62ea253a9baac68510683c47efbcb8c
144464 [host=elbling1]
144489 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef cd7dedad8209753e0fc8a97e61d04b74912b53dc
144480 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef be18e39d2f69038804b27c30026754deaeefa543
144450 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
144467 [host=elbling1]
144422 [host=elbling1]
144482 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 680d18763aef6a0b9cb90dcff8e59a6a91fbfb77
144470 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 183f354e1430087879de071f0c7122e42703916e
144471 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
144472 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef f2ae59bc4b9b5c3f12de86aa42cdf413d2c3ffbf
144460 [host=elbling1]
144483 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef cd7dedad8209753e0fc8a97e61d04b74912b53dc
144485 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 53e9ecffde88ae65a2e357925a213114e6262505
144475 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 2d55b2985f19149623e65c2e454c4b03131e7320
144492 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 53e9ecffde88ae65a2e357925a213114e6262505
144486 pass d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef cd7dedad8209753e0fc8a97e61d04b74912b53dc
144488 fail d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef 53e9ecffde88ae65a2e357925a213114e6262505
Searching for interesting versions
Result found: flight 144276 (pass), for basis pass
Result found: flight 144409 (fail), for basis failure
Repro found: flight 144470 (pass), for basis pass
Repro found: flight 144471 (fail), for basis failure
0 revisions at d0d8ad39ecb51cd7497cd524484fe09f50876798 933ebad2470a169504799a1d95b8e410bd9847ef cd7dedad8209753e0fc8a97e61d04b74912b53dc
No revisions left to test, checking graph state.
Result found: flight 144483 (pass), for last pass
Result found: flight 144485 (fail), for first failure
Repro found: flight 144486 (pass), for last pass
Repro found: flight 144488 (fail), for first failure
Repro found: flight 144489 (pass), for last pass
Repro found: flight 144492 (fail), for first failure

*** Found and reproduced problem changeset ***

Bug is in tree: xen git://xenbits.xen.org/xen.git
Bug introduced: 53e9ecffde88ae65a2e357925a213114e6262505
Bug not present: cd7dedad8209753e0fc8a97e61d04b74912b53dc
Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/144492/


commit 53e9ecffde88ae65a2e357925a213114e6262505
Author: julian.tuminaro@gmail.com <julian.tuminaro@gmail.com>
Date: Wed Nov 13 23:55:41 2019 -0500

kdd.c: Add support for initial handshake in KD protocol for Win 7, 8 and 10 (64 bit)

Current implementation of find_os is based on the hard-coded values for
different Windows version. It uses the value for get the address to
start looking for DOS header in the given specified range. However, this
is not scalable to all version of Windows as it will require us to keep
adding new entries and also due to KASLR, chances of not hitting the PE
header is significant. We implement a way for 64-bit systems to use IDT
entry to get a valid exception/interrupt handler and then move back into
the memory to find the valid DOS header. Since IDT entries are protected
by PatchGuard, we think our assumption that IDT entries will not be
corrupted is valid for our purpose. Once we have the image base, we
search for the DBGKD_GET_VERSION64 structure type in .data section to
get information required for handshake.

Currently, this is a work in progress feature and current patch only
supports the handshake and memory read/write on 64-bit systems.

NOTE: This is the Updated version of the previous patch submitted
NOTE: This has currently been only tested when debugging was not enabled
on the guest Windows.

Signed-off-by: Jenish Rakholiya <rjenish@cmu.edu>
Signed-off-by: Julian Tuminaro <jtuminar@andrew.cmu.edu>
Reviewed-by: Tim Deegan <tim@xen.org>
Reviewed-by: Paul Durrant <paul@xen.org>

Revision graph left in /home/logs/results/bisect/xen-unstable/build-i386-xsm.xen-build.{dot,ps,png,html,svg}.
----------------------------------------
144492: tolerable ALL FAIL

flight 144492 xen-unstable real-bisect [real]
http://logs.test-lab.xenproject.org/osstest/logs/144492/

Failures :-/ but no regressions.

Tests which did not succeed,
including tests which could not be run:
build-i386-xsm 6 xen-build fail baseline untested


jobs:
build-i386-xsm fail


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel