[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [OSSTEST PATCH 7/7] make-flight: Stripy xenstored

  • To: Ian Jackson <iwj@xxxxxxxxxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Fri, 22 Jan 2021 16:29:49 +0000
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8Jw7KHiSwwCynEmSwy2n8HXXHzxss4QsTgbRYA5ujr4=; b=ZXHysHmLwyIwwO5oDM78ycUF6HHw9Ap+EKapvVSsKPExucoEkev/OmTNM7hcZtHz9PyHPmbHyEaCye7i5u7zsUsdjSufdh2CfTKnDjOCiDkFybpmjJnZRE1stpI4k5saJxXuvBsWbfqpA7YXC2t0LLo/YPp9zEZML3dnx8dnt650TAhbpT261UkZUvMx0lZ/zQc3/pBYgrmHV+GToZH9Aa48s7xA6tN5FZP5+ICQUoduQbznM5ojAH8PnkxvLMwv7VdV5XUfCEcO5Dk9IZWvK0c7PTvlAZgFlUbmrKPtp3/To9Vi6mePQPK0UL0q/KKnKVK5gN+ENYra/2SzpN9Wkg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lWY1B1Adi3JQSLCpLAbkB2QNtyADeAvbo6AOGQRebS67TEaDgvmJ0AohZnlVYjMFQYzU9tFb0JYyyYdKwR03a/GB15Sqds7PJCn5F6+4IK8X+ekoY0mxmtgEO0XpPahCQVlwmfne7YId4J6pIGCOulqEDu2IJNuyh37IEw/964pEv0btPBrdUtF4pbXbje8I1GaWVjhPn3JDvXGEBZgv76S1vuWXq1aUV5nLVUvYGXg3h8yj0HiDgURBak31xyUQV0o9YNf0BKqu16hXDw/TkPEEuOtLPMSkwSqOx1yKHmTqamkVNlcQ+45xNAloD+kT5c6R6cUGRdltlWBcXWq+iA==
  • Authentication-results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Edwin Török <edvin.torok@xxxxxxxxxx>, Christian Lindig <christian.lindig@xxxxxxxxxx>, Jürgen Groß <jgross@xxxxxxxx>, Wei Liu <wl@xxxxxxx>
  • Delivery-date: Fri, 22 Jan 2021 16:30:01 +0000
  • Ironport-sdr: w1WV9bz2jKtZGFJJ0/7e4I0lW6ZBPnnPnul+iH5DtqIPUqx/XIrER94YNt+6WJlHvFrRHeoyZf kCWANHsTFWhG3DPO8keLqHbmyJAhwiA1X8nkzpSq0Kd9JEIFlRNYNe2IL9XV6RZt41OrfpzZY9 bJ7ps6uuzjVR7YSzCc9zilIH075sxGawbVj2FAj0t2NTzOsezlCknX33DmxbGVaR0eyUtabiaq 6EQdaNfg8x0cz7i0MEZ5gM1c9GgqChB2N61djYei3+CawlwSxi6Yn056+oA/NjRQiVYJ7ih645 S0M=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 22/01/2021 16:22, Ian Jackson wrote:
> Andrew Cooper writes ("Re: [OSSTEST PATCH 7/7] make-flight: Stripy 
> xenstored"):
>> A couple of quick questions/observations.  Does this cope in a sensible
>> way if, for whatever reason, the chosen daemon isn't present?
> That would depend on what you mean by "sensible".  I think that given
> that we now think we support both on all architectures, "sensible"
> means "the tests fail if one of the xenstoreds doesn't build".  And
> that's what this will do :-).

Right, but nothing will actually fail the build.

So the way this error will manifest is the first non-trivial `xl $FOO`
executed in dom0 hanging until the job timeout.

Or does OSSTest have an explicit "is xenstored running" check after
boot, before any further testing occurs?

>> How hard would it be to add the 3rd option, stub-cxenstored into this
>> mix?  It is just one other key in xencommons to tweak.
> We would presumably want to do that for a smaller set of tests, but
> yes, that could be done as a future enhancement.
>> SUPPORT.md doesn't appear to make any statements about the disposition
>> of xenstoreds, but stub-cxenstored is used by at least two major
>> downstreams so is obviously has security support in practice, and ought
>> to be tested.
> Looking at /etc/default/xencommons, I think that testing would be done
> by setting XENSTORETYPE=domain.  Do we want to test stub C xentored or
> stub ocaml xenstored or both ?  The config seems not to have a way to
> specify which.  Do we build only one ?

There is no such thing as an ocaml stub-xenstored yet, but I have asked
the Mirage folk if they'd like to remedy this.




Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.