[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable test] 13618: regressions - FAIL



flight 13618 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/13618/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-i386-i386-xl-win        12 guest-localmigrate/x10    fail REGR. vs. 13617

Regressions which are regarded as allowable (not blocking):
 test-i386-i386-xl-qemuu-winxpsp3  9 guest-localmigrate         fail like 13617
 test-amd64-amd64-xl-qemuu-winxpsp3  9 guest-localmigrate       fail like 13617
 test-amd64-amd64-xl-sedf-pin 10 guest-saverestore            fail   like 13617
 test-amd64-amd64-xl-qemuu-win7-amd64  9 guest-localmigrate     fail like 13617

Tests which did not succeed, but are not blocking:
 test-amd64-i386-xend-winxpsp3 16 leak-check/check             fail  never pass
 test-amd64-i386-xl-win-vcpus1 13 guest-stop                   fail  never pass
 test-amd64-i386-win          16 leak-check/check             fail   never pass
 test-amd64-i386-win-vcpus1   16 leak-check/check             fail   never pass
 test-i386-i386-xl-winxpsp3   13 guest-stop                   fail   never pass
 test-amd64-i386-xl-winxpsp3-vcpus1 13 guest-stop               fail never pass
 test-amd64-amd64-xl-win7-amd64 13 guest-stop                   fail never pass
 test-amd64-amd64-xl-winxpsp3 13 guest-stop                   fail   never pass
 test-amd64-amd64-xl-pcipt-intel  9 guest-start                 fail never pass
 test-i386-i386-win           16 leak-check/check             fail   never pass
 test-amd64-amd64-win         16 leak-check/check             fail   never pass
 test-amd64-i386-xl-win7-amd64 13 guest-stop                   fail  never pass
 test-amd64-amd64-xl-win      13 guest-stop                   fail   never pass

version targeted for testing:
 xen                  e6ca45ca03c2
baseline version:
 xen                  73ac4b7ad2e1

------------------------------------------------------------
People who touched revisions under test:
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Keir Fraser <keir@xxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
------------------------------------------------------------

jobs:
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-i386-i386-xl                                            pass    
 test-amd64-i386-rhel6hvm-amd                                 pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-win7-amd64                               fail    
 test-amd64-i386-xl-win7-amd64                                fail    
 test-amd64-i386-xl-credit2                                   pass    
 test-amd64-amd64-xl-pcipt-intel                              fail    
 test-amd64-i386-rhel6hvm-intel                               pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-i386-xl-multivcpu                                 pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-i386-i386-pair                                          pass    
 test-amd64-amd64-xl-sedf-pin                                 fail    
 test-amd64-amd64-pv                                          pass    
 test-amd64-i386-pv                                           pass    
 test-i386-i386-pv                                            pass    
 test-amd64-amd64-xl-sedf                                     pass    
 test-amd64-i386-win-vcpus1                                   fail    
 test-amd64-i386-xl-win-vcpus1                                fail    
 test-amd64-i386-xl-winxpsp3-vcpus1                           fail    
 test-amd64-amd64-win                                         fail    
 test-amd64-i386-win                                          fail    
 test-i386-i386-win                                           fail    
 test-amd64-amd64-xl-win                                      fail    
 test-i386-i386-xl-win                                        fail    
 test-amd64-amd64-xl-qemuu-winxpsp3                           fail    
 test-i386-i386-xl-qemuu-winxpsp3                             fail    
 test-amd64-i386-xend-winxpsp3                                fail    
 test-amd64-amd64-xl-winxpsp3                                 fail    
 test-i386-i386-xl-winxpsp3                                   fail    


------------------------------------------------------------
sg-report-flight on woking.cam.xci-test.com
logs: /home/xc_osstest/logs
images: /home/xc_osstest/images

Logs, config files, etc. are available at
    http://www.chiark.greenend.org.uk/~xensrcts/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
changeset:   25765:e6ca45ca03c2
tag:         tip
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Mon Aug 20 08:46:47 2012 +0200
    
    x86-64: refine the XSA-9 fix
    
    Our product management wasn't happy with the "solution" for XSA-9, and
    demanded that customer systems must continue to boot. Rather than
    having our and perhaps other distros carry non-trivial patches, allow
    for more fine grained control (panic on boot, deny guest creation, or
    merely warn) by means of a single line change.
    
    Also, as this was found to be a problem with remotely managed systems,
    don't default to boot denial (just deny guest creation).
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   25764:4b0d263008cd
user:        Jan Beulich <jbeulich@xxxxxxxx>
date:        Mon Aug 20 08:40:01 2012 +0200
    
    x86: don't expose SYSENTER on unknown CPUs
    
    So far we only ever set up the respective MSRs on Intel CPUs, yet we
    hide the feature only on a 32-bit hypervisor. That prevents booting of
    PV guests on top of a 64-bit hypervisor making use of the instruction
    on unknown CPUs (VIA in this case).
    
    Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Keir Fraser <keir@xxxxxxx>
    
    
changeset:   25763:73ac4b7ad2e1
user:        Ian Campbell <ian.campbell@xxxxxxxxxx>
date:        Fri Aug 17 14:57:29 2012 +0100
    
    docs: console: correct example console type definition
    
    I think this is intended to be under the specific console's directory.
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Committed-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    
    
========================================
commit effd5676225761abdab90becac519716515c3be4
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Tue Aug 14 15:57:49 2012 +0100

    Revert "qemu-xen-traditional: use O_DIRECT to open disk images for IDE"
    
    This reverts commit 1307e42a4b3c1102d75401bc0cffb4eb6c9b7a38.
    
    In fact after a lengthy discussion, we came up with the conclusion
    that WRITEBACK is OK for IDE.
    See: http://marc.info/?l=xen-devel&m=133311527009773
    
    Therefore revert this which was committed in error.

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.