On Wed, 2016-01-06 at 18:28 +0000, osstest service owner wrote:
> flight 77180 qemu-upstream-4.2-testing real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/77180/
> 
> Regressions :-(
> 
> Tests which did not succeed and are blocking,
> including tests which could not be run:
>  build-i386                    5 xen-build                 fail REGR. vs. 
> 62044
>  build-amd64                   5 xen-build                 fail REGR. vs. 
> 62044

This is "man/xl.pod.1 around line 854: Expected text after =item, not a
bullet" exposed by the Jessie upgrade.

However per Ian in <22154.35021.750846.695...@mariner.uk.xensource.com> [0]
:

    ...] 4.2 has had no commits since October - in particular, none
    of the recent security fixes - and I would be reluctant to give it a
    veneer of activity.

So our choices WRT these fixes in qemu-xen.git#staging-4.2, given they have
already been pushed, are:

   1. Fix xen.git#staging-4.2 to build on Jessie and wait for it to propagate.
   2. Revert the fixes from qemu-xen.git#staging-4.2 and force push the
      resulting tree (which would be identical to something which previously
      passed).
   3. Rollback qemu-xen.git#staging-4.2.
   4. Force push.
   5. Drop a stop file.
   6. Shave yakks in osstest to allow per-branch selection of the Debian suite
      and pin xen-4.2 and earlier to Wheezy.

#1 is contrary to the quote above, which makes a reasonable argument IMHO.

#3, #4 and #5 all seem like bad ideas to me.

#2 is a bit odd (to have the fixes in the branch but reverted), but seems
least bad compared with #3..#5.

#6 is potentially a lot of work, but might be the right long term answer.

Ian.

[0] http://lists.xenproject.org/archives/html/xen-devel/2016-01/msg00112.html
> 
> Tests which did not succeed, but are not blocking:
>  build-i386-libvirt            1 build-
> check(1)               blocked  n/a
>  test-amd64-i386-xl-qemuu-win7-amd64  1 build-
> check(1)              blocked n/a
>  test-amd64-i386-qemuu-rhel6hvm-intel  1 build-
> check(1)             blocked n/a
>  test-i386-i386-xl-qemuu-winxpsp3  1 build-
> check(1)               blocked  n/a
>  test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-
> check(1)              blocked n/a
>  test-amd64-i386-qemuu-rhel6hvm-amd  1 build-
> check(1)               blocked n/a
>  test-amd64-i386-xl-qemuu-winxpsp3-vcpus1  1 build-
> check(1)         blocked n/a
>  test-amd64-i386-xend-qemuu-winxpsp3  1 build-
> check(1)              blocked n/a
>  test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-
> check(1)         blocked n/a
>  build-amd64-libvirt           1 build-
> check(1)               blocked  n/a
>  test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-
> check(1)        blocked n/a
>  test-amd64-amd64-xl-qemuu-win7-amd64  1 build-
> check(1)             blocked n/a
>  test-amd64-amd64-xl-qemuu-winxpsp3  1 build-
> check(1)               blocked n/a
>  test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-
> check(1)             blocked n/a
> 
> version targeted for testing:
>  qemuu                5081fc1c773d2a83ec7a867f030323b8b6956cd1
> baseline version:
>  qemuu                c17e602ae64fb24405ebd256679ba9a6f5819086
> 
> Last test of basis    62044  2015-09-15 15:06:42 Z  113 days
> Testing same since    66542  2015-12-18 16:37:10 Z   19 days   11
> attempts
> 
> ------------------------------------------------------------
> People who touched revisions under test:
>   Stefano Stabellini <stefano.stabell...@eu.citrix.com>
> 
> jobs:
>  build-amd64                                                  fail    
>  build-i386                                                   fail    
>  build-amd64-libvirt                                          blocked 
>  build-i386-libvirt                                           blocked 
>  build-amd64-pvops                                            pass    
>  build-i386-pvops                                             pass    
>  test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
>  test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
>  test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
>  test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
>  test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
>  test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
>  test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
>  test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
>  test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     blocked 
>  test-amd64-i386-xend-qemuu-winxpsp3                          blocked 
>  test-amd64-amd64-xl-qemuu-winxpsp3                           blocked 
>  test-i386-i386-xl-qemuu-winxpsp3                             blocked 
> 
> 
> ------------------------------------------------------------
> sg-report-flight on osstest.test-lab.xenproject.org
> logs: /home/logs/logs
> images: /home/logs/images
> 
> Logs, config files, etc. are available at
>     http://logs.test-lab.xenproject.org/osstest/logs
> 
> Explanation of these reports, and of osstest in general, is at
>     http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb
> =master
>     http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=maste
> r
> 
> Test harness code can be found at
>     http://xenbits.xen.org/gitweb?p=osstest.git;a=summary
> 
> 
> Not pushing.
> 
> ------------------------------------------------------------
> commit 5081fc1c773d2a83ec7a867f030323b8b6956cd1
> Author: Stefano Stabellini <stefano.stabell...@eu.citrix.com>
> Date:   Fri Dec 18 15:45:14 2015 +0000
> 
>     xenfb: avoid reading twice the same fields from the shared page
>     
>     Reading twice the same field could give the guest an attack of
>     opportunity. In the case of event->type, gcc could compile the switch
>     statement into a jump table, effectively ending up reading the type
>     field multiple times.
>     
>     This is part of XSA-155.
>     
>     Signed-off-by: Stefano Stabellini <stefano.stabell...@eu.citrix.com>
> 
> commit 74fab2ef4c0ba42af477e9e445c9883cc45cf9e6
> Author: Stefano Stabellini <stefano.stabell...@eu.citrix.com>
> Date:   Fri Dec 18 15:44:58 2015 +0000
> 
>     xen/blkif: Avoid double access to src->nr_segments
>     
>     src is stored in shared memory and src->nr_segments is dereferenced
>     twice at the end of the function.  If a compiler decides to compile
> this
>     into two separate memory accesses then the size limitation could be
>     bypassed.
>     
>     Fix it by removing the double access to src->nr_segments.
>     
>     This is part of XSA-155.
>     
>     Signed-off-by: Stefano Stabellini <stefano.stabell...@eu.citrix.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to