guix-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: staging evaluation in progress


From: Mark H Weaver
Subject: Re: staging evaluation in progress
Date: Wed, 25 Apr 2018 10:32:43 -0400
User-agent: Gnus/5.13 (Gnus v5.13) Emacs/25.3 (gnu/linux)

Efraim Flashner <address@hidden> writes:

> On Mon, Apr 23, 2018 at 09:53:04PM -0400, Mark H Weaver wrote:
>> Marius Bakke <address@hidden> writes:
>> 
>> > Mark H Weaver <address@hidden> writes:
>> >
>> >> Hi Marius,
>> >>
>> >> Marius Bakke <address@hidden> writes:
>> >>
>> >>> I just started a 'staging' evaluation:
>> >>>
>> >>> https://hydra.gnu.org/jobset/gnu/staging
>> >>>
>> >>> Fairly minor changes this round, highlights include Wayland 1.15 and
>> >>> GStreamer 1.14.  We narrowly missed Mesa 17.3.9 which was scheduled for
>> >>> today but delayed, hopefully 17.3.8 doesn't introduce any new bugs.
>> >>>
>> >>> Results should start ticking in tomorrow.
>> >>
>> >> The main issue I see so far is that 'gst-plugins-base' seems to
>> >> consistently fail the "elements/opus" test on i686-linux.  It failed
>> >> twice in a row, anyway:
>> >>
>> >>   https://hydra.gnu.org/build/2635798
>> >
>> > I can reproduce this failure locally, and could not find related bug
>> > reports or git commits upstream.  For now I downgraded to 1.12.5 so we
>> > can proceed, and will report the i686 and armhf issues upstream.
>> 
>> Instead of downgrading gstreamer, I think it would be better to simply
>> disable that test on i686 for now.  Most likely, it is due to tests that
>> are intolerant of the double rounding that occurs on i686 without SSE2,
>> where the old x87 FP instructions are used instead.  The double rounding
>> happens because x87 operations are performed on 80-bit double-extended
>> precision floating-point numbers, which must then be rounded a second
>> time when they are converted to 64-bit doubles as used in C.
>> 
>> What do you think?
>> 
>>       Mark
>> 
>
> somewhat random tests fail on aarch64 also, different ones from the
> other architectures. I'd suggest we wait it out until 1.14.1 and watch
> upstream for bug fixes.

Do we know if there are any security fixes in 1.14.0 that are not in
1.12.5?  Is the 1.12.x branch still receiving security updates?

       Mark



reply via email to

[Prev in Thread] Current Thread [Next in Thread]