From: xen.org <ian.jackson@eu.citrix.com>
To: xen-devel@lists.xensource.com
Cc: ian.jackson@eu.citrix.com
Subject: [xen-unstable test] 8374: regressions - FAIL
Date: Wed, 10 Aug 2011 10:27:13 +0100 [thread overview]
Message-ID: <osstest-8374-mainreport@xen.org> (raw)
flight 8374 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/8374/
Regressions :-(
Tests which did not succeed and are blocking:
test-amd64-i386-xl-win-vcpus1 5 xen-boot fail REGR. vs. 8363
Tests which are failing intermittently (not blocking):
test-amd64-i386-pv 5 xen-boot fail pass in 8369
test-amd64-i386-win-vcpus1 5 xen-boot fail pass in 8369
test-i386-i386-xl 5 xen-boot fail in 8369 pass in 8374
test-amd64-i386-pair 7 xen-boot/src_host fail in 8369 pass in 8374
test-amd64-i386-pair 8 xen-boot/dst_host fail in 8369 pass in 8374
Tests which did not succeed, but are not blocking,
including regressions (tests previously passed) regarded as allowable:
test-amd64-amd64-xl-pcipt-intel 9 guest-start fail never pass
test-amd64-i386-rhel6hvm-intel 9 guest-start.2 fail never pass
test-amd64-i386-xl-multivcpu 5 xen-boot fail like 8363
test-amd64-i386-rhel6hvm-amd 5 xen-boot fail like 8363
test-i386-i386-win 5 xen-boot fail like 8363
test-amd64-amd64-win 5 xen-boot fail like 8363
test-amd64-amd64-xl-win 13 guest-stop fail never pass
test-amd64-i386-win 16 leak-check/check fail never pass
test-i386-i386-xl-win 13 guest-stop fail never pass
test-i386-i386-win 16 leak-check/check fail in 8369 never pass
test-amd64-amd64-win 16 leak-check/check fail in 8369 never pass
test-amd64-i386-win-vcpus1 16 leak-check/check fail in 8369 never pass
test-amd64-amd64-xl-win 5 xen-boot fail in 8369 like 8363
test-amd64-i386-win 5 xen-boot fail in 8369 like 8363
test-i386-i386-xl-win 5 xen-boot fail in 8369 like 8363
test-amd64-amd64-xl 5 xen-boot fail in 8369 like 8363
version targeted for testing:
xen ae10d7804168
baseline version:
xen aca07ff1f0a5
------------------------------------------------------------
People who touched revisions under test:
Ian Jackson <ian.jackson@eu.citrix.com>
Keir Fraser <keir@xen.org>
Olaf Hering <olaf@aepfle.de>
------------------------------------------------------------
jobs:
build-amd64 pass
build-i386 pass
build-amd64-oldkern pass
build-i386-oldkern pass
build-amd64-pvops pass
build-i386-pvops pass
test-amd64-amd64-xl pass
test-amd64-i386-xl pass
test-i386-i386-xl pass
test-amd64-i386-rhel6hvm-amd fail
test-amd64-i386-xl-credit2 pass
test-amd64-amd64-xl-pcipt-intel fail
test-amd64-i386-rhel6hvm-intel fail
test-amd64-i386-xl-multivcpu fail
test-amd64-amd64-pair pass
test-amd64-i386-pair pass
test-i386-i386-pair pass
test-amd64-amd64-pv pass
test-amd64-i386-pv fail
test-i386-i386-pv pass
test-amd64-i386-win-vcpus1 fail
test-amd64-i386-xl-win-vcpus1 fail
test-amd64-amd64-win fail
test-amd64-i386-win fail
test-i386-i386-win fail
test-amd64-amd64-xl-win fail
test-i386-i386-xl-win fail
------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images
Logs, config files, etc. are available at
http://www.chiark.greenend.org.uk/~xensrcts/logs
Test harness code can be found at
http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary
Not pushing.
------------------------------------------------------------
changeset: 23760:ae10d7804168
tag: tip
user: Keir Fraser <keir@xen.org>
date: Tue Aug 09 18:06:43 2011 +0100
ACPI ERST: Revert change to erst_check_table() to be more permissive.
Permits tables that apparently Xen cannot handle (causes boot failure
on many systems).
Signed-off-by: Keir Fraser <keir@xen.org>
changeset: 23759:aca07ff1f0a5
user: Ian Jackson <Ian.Jackson@eu.citrix.com>
date: Tue Aug 09 17:48:16 2011 +0100
Revert 23757:f5176c177b99 "xenstored: allow guests to reintroduce themselves"
This patch seems to have been applied by mistake, despite adverse
comments on the list and a lack of an appropriate ack.
Committed-by: Ian Jackson <ian.jackson@eu.citrix.com>
========================================
commit cd776ee9408ff127f934a707c1a339ee600bc127
Author: Ian Jackson <ian.jackson@eu.citrix.com>
Date: Tue Jun 28 13:50:53 2011 +0100
qemu-char.c: fix incorrect CONFIG_STUBDOM handling
qemu-char.c:1123:7: warning: "CONFIG_STUBDOM" is not defined [-Wundef]
Signed-off-by: Olaf Hering <olaf@aepfle.de>
Acked-by: Ian Jackson <ian.jackson@eu.citrix.com>
reply other threads:[~2011-08-10 9:27 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=osstest-8374-mainreport@xen.org \
--to=ian.jackson@eu.citrix.com \
--cc=xen-devel@lists.xensource.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.