So this arose because Stefano was unaware that 4.2 was no longer supported.
Neither am I ever confident about where the cut-off lie, e.g. I always have
to ask if I am doing backports for a security issue.

We should add rows to http://wiki.xen.org/wiki/Xen_Release_Features right
under Initial Release giving first the date until which that tree is
supported with backports and second the date until which security support
will exist. We might also want to add a third "status" row. e.g.
"Supported", "Security Support only", "EOL" (we'll deal with extended
support by a third party when that next arises).

I'm happy to make the edits, however I don't know what dates I would write 
here. Taking it to be 18 months of Support and a further 18 months of
security support I would get:

                        Xen 4.0         Xen 4.1         Xen 4.2         Xen 4.3 
        Xen 4.4         Xen 4.5         Xen 4.6
Initial Release         7 April 2010    25 March 2011   17 Sept 2012    9 July 
2013     10 March 2014   15 Jan 2015     13 Oct 2015 
Supported until         EOL - ???       EOL - ???       EOL - ???       EOL - 
Jan 2015  EOL - Sept 2015 July 2016       April 2017
Security support til    EOL - ???       EOL - ???       EOL - ???       July 
2016       March 2016      Jan 2017        Oct 2018

(maybe those EOLs - ??? could be whatever the respective dates were, I
didn't try and backtrack to try and find out if reality matched the plan)

Ian.

On Thu, 2016-01-07 at 09:56 +0000, Ian Campbell wrote:
> On Wed, 2016-01-06 at 18:28 +0000, osstest service owner wrote:
> > flight 77180 qemu-upstream-4.2-testing real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/77180/
> > 
> > Regressions :-(
> > 
> > Tests which did not succeed and are blocking,
> > including tests which could not be run:
> >  build-i386                    5 xen-build                 fail REGR.
> > vs. 62044
> >  build-amd64                   5 xen-build                 fail REGR.
> > vs. 62044
> 
> This is "man/xl.pod.1 around line 854: Expected text after =item, not a
> bullet" exposed by the Jessie upgrade.
> 
> However per Ian in <22154.35021.750846.695...@mariner.uk.xensource.com> [
> 0]
> :
> 
>     ...] 4.2 has had no commits since October - in particular, none
>     of the recent security fixes - and I would be reluctant to give it a
>     veneer of activity.
> 
> So our choices WRT these fixes in qemu-xen.git#staging-4.2, given they
> have
> already been pushed, are:
> 
>    1. Fix xen.git#staging-4.2 to build on Jessie and wait for it to
> propagate.
>    2. Revert the fixes from qemu-xen.git#staging-4.2 and force push the
>       resulting tree (which would be identical to something which
> previously
>       passed).
>    3. Rollback qemu-xen.git#staging-4.2.
>    4. Force push.
>    5. Drop a stop file.
>    6. Shave yakks in osstest to allow per-branch selection of the Debian
> suite
>       and pin xen-4.2 and earlier to Wheezy.
> 
> #1 is contrary to the quote above, which makes a reasonable argument
> IMHO.
> 
> #3, #4 and #5 all seem like bad ideas to me.
> 
> #2 is a bit odd (to have the fixes in the branch but reverted), but seems
> least bad compared with #3..#5.
> 
> #6 is potentially a lot of work, but might be the right long term answer.
> 
> Ian.
> 
> [0] http://lists.xenproject.org/archives/html/xen-devel/2016-01/msg00112.
> html
> > 
> > Tests which did not succeed, but are not blocking:
> >  build-i386-libvirt            1 build-
> > check(1)               blocked  n/a
> >  test-amd64-i386-xl-qemuu-win7-amd64  1 build-
> > check(1)              blocked n/a
> >  test-amd64-i386-qemuu-rhel6hvm-intel  1 build-
> > check(1)             blocked n/a
> >  test-i386-i386-xl-qemuu-winxpsp3  1 build-
> > check(1)               blocked  n/a
> >  test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-
> > check(1)              blocked n/a
> >  test-amd64-i386-qemuu-rhel6hvm-amd  1 build-
> > check(1)               blocked n/a
> >  test-amd64-i386-xl-qemuu-winxpsp3-vcpus1  1 build-
> > check(1)         blocked n/a
> >  test-amd64-i386-xend-qemuu-winxpsp3  1 build-
> > check(1)              blocked n/a
> >  test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-
> > check(1)         blocked n/a
> >  build-amd64-libvirt           1 build-
> > check(1)               blocked  n/a
> >  test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-
> > check(1)        blocked n/a
> >  test-amd64-amd64-xl-qemuu-win7-amd64  1 build-
> > check(1)             blocked n/a
> >  test-amd64-amd64-xl-qemuu-winxpsp3  1 build-
> > check(1)               blocked n/a
> >  test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-
> > check(1)             blocked n/a
> > 
> > version targeted for testing:
> >  qemuu                5081fc1c773d2a83ec7a867f030323b8b6956cd1
> > baseline version:
> >  qemuu                c17e602ae64fb24405ebd256679ba9a6f5819086
> > 
> > Last test of basis    62044  2015-09-15 15:06:42 Z  113 days
> > Testing same since    66542  2015-12-18 16:37:10 Z   19 days   11
> > attempts
> > 
> > ------------------------------------------------------------
> > People who touched revisions under test:
> >   Stefano Stabellini <stefano.stabell...@eu.citrix.com>
> > 
> > jobs:
> >  build-amd64                                                  fail    
> >  build-i386                                                   fail    
> >  build-amd64-libvirt                                          blocked 
> >  build-i386-libvirt                                           blocked 
> >  build-amd64-pvops                                            pass    
> >  build-i386-pvops                                             pass    
> >  test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
> >  test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
> >  test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
> >  test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
> >  test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
> >  test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
> >  test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
> >  test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
> >  test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     blocked 
> >  test-amd64-i386-xend-qemuu-winxpsp3                          blocked 
> >  test-amd64-amd64-xl-qemuu-winxpsp3                           blocked 
> >  test-i386-i386-xl-qemuu-winxpsp3                             blocked 
> > 
> > 
> > ------------------------------------------------------------
> > sg-report-flight on osstest.test-lab.xenproject.org
> > logs: /home/logs/logs
> > images: /home/logs/images
> > 
> > Logs, config files, etc. are available at
> >     http://logs.test-lab.xenproject.org/osstest/logs
> > 
> > Explanation of these reports, and of osstest in general, is at
> >     http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;
> > hb
> > =master
> >     http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=mas
> > te
> > r
> > 
> > Test harness code can be found at
> >     http://xenbits.xen.org/gitweb?p=osstest.git;a=summary
> > 
> > 
> > Not pushing.
> > 
> > ------------------------------------------------------------
> > commit 5081fc1c773d2a83ec7a867f030323b8b6956cd1
> > Author: Stefano Stabellini <stefano.stabell...@eu.citrix.com>
> > Date:   Fri Dec 18 15:45:14 2015 +0000
> > 
> >     xenfb: avoid reading twice the same fields from the shared page
> >     
> >     Reading twice the same field could give the guest an attack of
> >     opportunity. In the case of event->type, gcc could compile the
> > switch
> >     statement into a jump table, effectively ending up reading the type
> >     field multiple times.
> >     
> >     This is part of XSA-155.
> >     
> >     Signed-off-by: Stefano Stabellini <stefano.stabell...@eu.citrix.com
> > >
> > 
> > commit 74fab2ef4c0ba42af477e9e445c9883cc45cf9e6
> > Author: Stefano Stabellini <stefano.stabell...@eu.citrix.com>
> > Date:   Fri Dec 18 15:44:58 2015 +0000
> > 
> >     xen/blkif: Avoid double access to src->nr_segments
> >     
> >     src is stored in shared memory and src->nr_segments is dereferenced
> >     twice at the end of the function.  If a compiler decides to compile
> > this
> >     into two separate memory accesses then the size limitation could be
> >     bypassed.
> >     
> >     Fix it by removing the double access to src->nr_segments.
> >     
> >     This is part of XSA-155.
> >     
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to