[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable bisection] complete build-i386



branch xen-unstable
xen branch xen-unstable
job build-i386
test xen-build

Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen git://xenbits.xen.org/xen.git

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  5c3705c900581af6f30be124ab8fb64603bdca03
  Bug not present: 0b182202fef8ebfc093a00ead9414a683eb8807c


  commit 5c3705c900581af6f30be124ab8fb64603bdca03
  Author: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  Date:   Mon Apr 21 13:22:57 2014 -0400
  
      vtpmmgr: add TPM group support
      
      This is a complete rewrite of the disk format and key hierarchy for the
      TPM Manager. The new format supports multiple groups of vTPMs which
      define the permitted configurations where a given vTPM's keys are
      available, allowing upgrades of critical components while retaining the
      secrecy of cryptographic keys.
      
      New features of the TPM Manager are explained in the README and in the
      definitions of the management commands in vtpm_manager.h.
      
      New features for vTPMs:
      
      1. The size of the state blob for a vTPM is expanded from 52 to 64
      bytes in order to support future vTPMs using SHA-2/3 instead of SHA-1.
      
      2. vTPMs can obtain a quote from the physical TPM with certain
      resettable PCRs set to include information about the vTPM. This can be
      used by a vTPM to provide evidence of its integrity, including the
      secrecy of its EK, and for deep quotes.
      
      Some additional changes made by this rewrite that may impact existing
      users:
      
      1. The value of WELLKNOWN_OWNER_AUTH was incorrect for the physical TPM;
      the convention is to use all zero bits for well-known authentication
      values, not all one bits.
      
      2. Randomly generating the owner auth value for the physical TPM is no
      longer supported, as it prevents later creation or certification of
      AIKs (which the old manager did not support).
      
      3. The vTPM Manager needs to be provisioned with a PCR composite and an
      upgrade authority's public key before it will save data across boots.
      
      The current implementation still has some limitations:
       * 5 valid system PCR selections per group
       * The vTPM Manager's disk can use at most 2MB of space
       * The vTPM domain's build hash is always set to null/zero
      
      Most of the code relating to upgrade and rollback protection is
      currently stubbed out, but future versions can add:
       * Support for using the TPM's monotonic counter to prevent rollback
         of vTPM data by taking and restoring disk snapshots
       * Masking the master disk encryption key using a value stored in the
         TPM's NVRAM so that revocation of old data is possible without
         relying on all previously authorized software stacks to respect the
         monotonic counter's value
      
      Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
      Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>


For bisection revision-tuple graph see:
   
http://www.chiark.greenend.org.uk/~xensrcts/results/bisect.xen-unstable.build-i386.xen-build.html
Revision IDs in each graph node refer, respectively, to the Trees above.

----------------------------------------
Searching for failure / basis pass:
 25984 fail [host=moss-bug] / 25960 [host=grain-weevil] 25954 
[host=grain-weevil] 25945 [host=lace-bug] 25938 [host=grain-weevil] 25931 
[host=lace-bug] 25923 [host=field-cricket] 25919 ok.
Failure / basis pass flights: 25984 / 25919
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen git://xenbits.xen.org/xen.git
Latest 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
c7ee02d23fde573f0bb145610c984b64d71d20cb
Basis pass 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
01feb234d0cb3bff248694d99397fb63a9757490
Generating revisions with ./adhoc-revtuple-generator  
git://xenbits.xen.org/staging/qemu-xen-unstable.git#7f5b3c338e0f8938ba575dec18255dcbee0c2ee2-7f5b3c338e0f8938ba575dec18255dcbee0c2ee2
 
git://xenbits.xen.org/staging/qemu-upstream-unstable.git#65fc9b78ba3d868a26952db0d8e51cecf01d47b4-65fc9b78ba3d868a26952db0d8e51cecf01d47b4
 
git://xenbits.xen.org/xen.git#01feb234d0cb3bff248694d99397fb63a9757490-c7ee02d23fde573f0bb145610c984b64d71d20cb
Cloning into bare repository /export/home/osstest/repos/xen...
Cloning into bare repository /export/home/osstest/repos/xen...
Loaded 1001 nodes in revision graph
Searching for test results:
 25905 [host=lace-bug]
 25915 [host=grain-weevil]
 25917 [host=lace-bug]
 25912 [host=field-cricket]
 25919 pass 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
01feb234d0cb3bff248694d99397fb63a9757490
 25923 [host=field-cricket]
 25991 pass 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
cda12fa0cee7023878598ff8ced3613b57576ce3
 26002 pass 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
0b182202fef8ebfc093a00ead9414a683eb8807c
 25954 [host=grain-weevil]
 25931 [host=lace-bug]
 25975 pass 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
01feb234d0cb3bff248694d99397fb63a9757490
 25938 [host=grain-weevil]
 25992 pass 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
a0453db0c6ead85e0e2143c133268bcc5a017f73
 25960 [host=grain-weevil]
 25945 [host=lace-bug]
 25982 fail 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
bf70db7cea3794cf2f3c8d714b460bba86b04791
 26003 fail 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
5c3705c900581af6f30be124ab8fb64603bdca03
 25974 fail 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
208ae82a265c065b7f39ca38b4ba25c14d2df0f0
 25984 fail 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
c7ee02d23fde573f0bb145610c984b64d71d20cb
 25967 pass 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
8cfc8e520679e029bed51ccc2540a136fc0fbd9b
 25983 fail 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
5ff49ec44b0fa74b624fe2291e563a858c606087
 26004 pass 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
0b182202fef8ebfc093a00ead9414a683eb8807c
 25973 [host=lace-bug]
 25966 fail 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
bf70db7cea3794cf2f3c8d714b460bba86b04791
 25995 pass 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
0b182202fef8ebfc093a00ead9414a683eb8807c
 26005 fail 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
5c3705c900581af6f30be124ab8fb64603bdca03
 25985 fail 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
208ae82a265c065b7f39ca38b4ba25c14d2df0f0
 25997 pass 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
01feb234d0cb3bff248694d99397fb63a9757490
 25989 fail 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
5c3705c900581af6f30be124ab8fb64603bdca03
 25998 fail 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
c7ee02d23fde573f0bb145610c984b64d71d20cb
 26001 fail 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
5c3705c900581af6f30be124ab8fb64603bdca03
Searching for interesting versions
 Result found: flight 25919 (pass), for basis pass
 Result found: flight 25984 (fail), for basis failure
 Repro found: flight 25997 (pass), for basis pass
 Repro found: flight 25998 (fail), for basis failure
 0 revisions at 7f5b3c338e0f8938ba575dec18255dcbee0c2ee2 
65fc9b78ba3d868a26952db0d8e51cecf01d47b4 
0b182202fef8ebfc093a00ead9414a683eb8807c
No revisions left to test, checking graph state.
 Result found: flight 25995 (pass), for last pass
 Result found: flight 26001 (fail), for first failure
 Repro found: flight 26002 (pass), for last pass
 Repro found: flight 26003 (fail), for first failure
 Repro found: flight 26004 (pass), for last pass
 Repro found: flight 26005 (fail), for first failure

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  5c3705c900581af6f30be124ab8fb64603bdca03
  Bug not present: 0b182202fef8ebfc093a00ead9414a683eb8807c

Cloning into bare repository /export/home/osstest/repos/xen...

  commit 5c3705c900581af6f30be124ab8fb64603bdca03
  Author: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  Date:   Mon Apr 21 13:22:57 2014 -0400
  
      vtpmmgr: add TPM group support
      
      This is a complete rewrite of the disk format and key hierarchy for the
      TPM Manager. The new format supports multiple groups of vTPMs which
      define the permitted configurations where a given vTPM's keys are
      available, allowing upgrades of critical components while retaining the
      secrecy of cryptographic keys.
      
      New features of the TPM Manager are explained in the README and in the
      definitions of the management commands in vtpm_manager.h.
      
      New features for vTPMs:
      
      1. The size of the state blob for a vTPM is expanded from 52 to 64
      bytes in order to support future vTPMs using SHA-2/3 instead of SHA-1.
      
      2. vTPMs can obtain a quote from the physical TPM with certain
      resettable PCRs set to include information about the vTPM. This can be
      used by a vTPM to provide evidence of its integrity, including the
      secrecy of its EK, and for deep quotes.
      
      Some additional changes made by this rewrite that may impact existing
      users:
      
      1. The value of WELLKNOWN_OWNER_AUTH was incorrect for the physical TPM;
      the convention is to use all zero bits for well-known authentication
      values, not all one bits.
      
      2. Randomly generating the owner auth value for the physical TPM is no
      longer supported, as it prevents later creation or certification of
      AIKs (which the old manager did not support).
      
      3. The vTPM Manager needs to be provisioned with a PCR composite and an
      upgrade authority's public key before it will save data across boots.
      
      The current implementation still has some limitations:
       * 5 valid system PCR selections per group
       * The vTPM Manager's disk can use at most 2MB of space
       * The vTPM domain's build hash is always set to null/zero
      
      Most of the code relating to upgrade and rollback protection is
      currently stubbed out, but future versions can add:
       * Support for using the TPM's monotonic counter to prevent rollback
         of vTPM data by taking and restoring disk snapshots
       * Masking the master disk encryption key using a value stored in the
         TPM's NVRAM so that revocation of old data is possible without
         relying on all previously authorized software stacks to respect the
         monotonic counter's value
      
      Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
      Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

Revision graph left in 
/home/xc_osstest/results/bisect.xen-unstable.build-i386.xen-build.{dot,ps,png,html}.
----------------------------------------
26005: tolerable ALL FAIL

flight 26005 xen-unstable real-bisect [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/26005/

Failures :-/ but no regressions.

Tests which did not succeed,
including tests which could not be run:
 build-i386                    4 xen-build               fail baseline untested


jobs:
 build-i386                                                   fail    


------------------------------------------------------------
sg-report-flight on osstest.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.