[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [libvirt test] 60880: regressions - FAIL



flight 60880 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60880/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 16 
guest-start/debianhvm.repeat fail REGR. vs. 60848

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt-vhd  9 debian-di-install            fail   never pass
 test-armhf-armhf-libvirt-raw  9 debian-di-install            fail   never pass
 test-armhf-armhf-libvirt-qcow2  9 debian-di-install            fail never pass
 test-armhf-armhf-libvirt-xsm 12 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-xsm 14 guest-saverestore            fail   never pass
 test-amd64-i386-libvirt-xsm  12 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 12 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     14 guest-saverestore            fail   never pass
 test-armhf-armhf-libvirt     12 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     12 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-amd64-amd64-libvirt-pair 21 guest-migrate/src_host/dst_host fail never 
pass
 test-amd64-i386-libvirt-pair 21 guest-migrate/src_host/dst_host fail never pass
 test-amd64-amd64-libvirt-qcow2 11 migrate-support-check        fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-amd64-i386-libvirt      12 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-vhd  11 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-qcow2 11 migrate-support-check        fail  never pass
 test-amd64-i386-libvirt-raw  11 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-raw 11 migrate-support-check        fail   never pass

version targeted for testing:
 libvirt              bf2788218ad29719467260aa4ecad6dc31c97046
baseline version:
 libvirt              7dc52241b314adb19ca4f0af156d772e3d5a29a5

Last test of basis    60848  2015-08-23 18:44:07 Z    4 days
Testing same since    60880  2015-08-25 23:18:39 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Erik Skultety <eskultet@xxxxxxxxxx>
  Guido Günther <agx@xxxxxxxxxxx>
  intrigeri <intrigeri@xxxxxxxxxx>
  Laine Stump <laine@xxxxxxxxx>
  Luyao Huang <lhuang@xxxxxxxxxx>
  Martin Kletzander <mkletzan@xxxxxxxxxx>
  Sergey Bronnikov <sergeyb@xxxxxxxxxx>
  Tomas Meszaros <exo@xxxxxx>
  Vasiliy Tolstov <v.tolstov@xxxxxxxxx>

jobs:
 build-amd64-xsm                                              pass
 build-armhf-xsm                                              pass
 build-i386-xsm                                               pass
 build-amd64                                                  pass
 build-armhf                                                  pass
 build-i386                                                   pass
 build-amd64-libvirt                                          pass
 build-armhf-libvirt                                          pass
 build-i386-libvirt                                           pass
 build-amd64-pvops                                            pass
 build-armhf-pvops                                            pass
 build-i386-pvops                                             pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            fail
 test-amd64-amd64-libvirt-xsm                                 pass
 test-armhf-armhf-libvirt-xsm                                 fail
 test-amd64-i386-libvirt-xsm                                  pass
 test-amd64-amd64-libvirt                                     pass
 test-armhf-armhf-libvirt                                     fail
 test-amd64-i386-libvirt                                      pass
 test-amd64-amd64-libvirt-pair                                fail
 test-amd64-i386-libvirt-pair                                 fail
 test-amd64-amd64-libvirt-qcow2                               pass
 test-armhf-armhf-libvirt-qcow2                               fail
 test-amd64-i386-libvirt-qcow2                                pass
 test-amd64-amd64-libvirt-raw                                 pass
 test-armhf-armhf-libvirt-raw                                 fail
 test-amd64-i386-libvirt-raw                                  pass
 test-amd64-amd64-libvirt-vhd                                 pass
 test-armhf-armhf-libvirt-vhd                                 fail
 test-amd64-i386-libvirt-vhd                                  pass


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit bf2788218ad29719467260aa4ecad6dc31c97046
Author: Luyao Huang <lhuang@xxxxxxxxxx>
Date:   Wed Aug 19 11:56:33 2015 +0800

    qemu: Update blkio.weight value after successful set

    https://bugzilla.redhat.com/show_bug.cgi?id=1253107

    Make a call virCgroupGetBlkioWeight to re-read blkio.weight right
    after it is set in order to keep internal data up-to-date.

    Signed-off-by: Luyao Huang <lhuang@xxxxxxxxxx>

commit ed7b4814b6a0d3ed010e8cbb9e6cd0b16c195a63
Author: Sergey Bronnikov <sergeyb@xxxxxxxxxx>
Date:   Sat Aug 22 00:44:11 2015 +0300

    Rename page about vz driver

commit 4076d30f85d54cf34fd6646acccd6f16ab566928
Author: Sergey Bronnikov <sergeyb@xxxxxxxxxx>
Date:   Sat Aug 22 00:43:48 2015 +0300

    docs: Rename 'parallels' to 'vz'

    Parallels driver was renamed to Virtuozzo. Replace old name by new
    one for libvirt docs and schemas.

commit bbc705d1309b8ec2eb4cdae011dc702802c96d11
Author: Vasiliy Tolstov <v.tolstov@xxxxxxxxx>
Date:   Sat Aug 22 15:33:15 2015 +0000

    Eliminate incorrect and unnecessary check for changed IP address

    Commit aa2cc7 modified a previously unnecessary but innocuous check
    for interface IP address during interface update incorrectly, causing
    all attempted updates (e.g. changing link state) to interfaces of
    type='ethernet' for QEMU to fail.

    This patch fixes the issue by completely removing the check for IP
    address, which is pointless since QEMU doesn't support setting
    interface IP addresses from the domain interface XML anyway.

    Signed-off-by: Vasiliy Tolstov <v.tolstov@xxxxxxxxx>
    Signed-off-by: Laine Stump <laine@xxxxxxxxx>

commit 6c2702eddf468ec71ab021873af7c7ae0b09f30f
Author: Tomas Meszaros <exo@xxxxxx>
Date:   Tue Aug 18 22:22:07 2015 +0200

    virDomainRename: Extend API documentation

    Signed-off-by: Tomas Meszaros <exo@xxxxxx>

commit c8e5177303f1b17a5e3116c6a8693391a3539bb9
Author: Luyao Huang <lhuang@xxxxxxxxxx>
Date:   Fri Aug 14 17:37:28 2015 +0800

    qemu: add a check for nodeset in qemuDomainSetNumaParamsLive

    We will try to set the node to cpuset.mems without check if
    it is available, since we already have helper to check this.
    Call virNumaNodesetIsAvailable to check if node is available,
    then try to change it in the cgroup.

    Signed-off-by: Luyao Huang <lhuang@xxxxxxxxxx>

commit 4d4c90dfd5475c100c6fd3fb705011e0d90d793e
Author: Guido Günther <agx@xxxxxxxxxxx>
Date:   Mon Aug 24 14:04:37 2015 +0200

    selinux: fix compile errors

    Remove unused variable, tag unused parameter and adjust return type.

    introduced by 3f48345f7ec0c44b8ce2371cab454d2118f830b4

    CC     security/libvirt_security_manager_la-security_selinux.lo
    security/security_selinux.c: In function 
'virSecuritySELinuxDomainSetDirLabel':
    security/security_selinux.c:2520:5: error: return makes pointer from 
integer without a cast [-Werror]
    security/security_selinux.c:2514:9: error: unused variable 'ret' 
[-Werror=unused-variable]
    security/security_selinux.c:2509:59: error: unused parameter 'mgr' 
[-Werror=unused-parameter]

commit 269d39afe5c59ecb3d3d64dba52f8cfa8d63d197
Author: Guido Günther <agx@xxxxxxxxxxx>
Date:   Sun Aug 23 22:03:54 2015 +0200

    storage: only run safezero if allocation is > 0

    While a zero allocation in safezero should be fine it isn't when we use
    posix_fallocate which returns EINVAL on a zero allocation.

    While we could skip the zero allocation in safezero_posix_fallocate it's
    an optimization to do it for all allocations.

    This fixes vm installation via virtinst for me which otherwise aborts
    like:

       Starting install...
       Retrieving file linux...               | 5.9 MB     00:01 ...
       Retrieving file initrd.gz...           |  29 MB     00:07 ...
       ERROR    Couldn't create storage volume 'virtinst-linux.sBgds4': 'cannot 
fill file '/var/lib/libvirt/boot/virtinst-linux.sBgds4': Invalid argument'

    The error was introduced by e30297b0 as spotted by Chunyan Liu

commit 2f01cfdf05448513d150ff1914d3444161c531b9
Author: intrigeri <intrigeri@xxxxxxxxxx>
Date:   Fri Aug 21 10:52:52 2015 +0200

    virt-aa-helper: allow access to /usr/share/ovmf/

    We forbid access to /usr/share/, but (at least on Debian-based systems)
    the Open Virtual Machine Firmware files needed for booting UEFI virtual
    machines in QEMU live in /usr/share/ovmf/. Therefore, we need to add
    that directory to the list of read only paths.

    A similar patch was suggested by Jamie Strandboge <jamie@xxxxxxxxxxxxx>
    on https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1483071.

commit d25a5e087ae10142d3d533ed193146736526b2ae
Author: Guido Günther <agx@xxxxxxxxxxx>
Date:   Fri Aug 21 10:49:15 2015 +0200

    virt-aa-helper: Simplify restriction logic

    First check overrides, then read only files then restricted access
    itself.

    This allows us to mark files for read only access whose parents were
    already restricted for read write.

    Based on a proposal by Martin Kletzander

commit 26c5fa3a9bd37624ddd1509daf7d6a84268f089e
Author: Guido Günther <agx@xxxxxxxxxxx>
Date:   Fri Aug 21 12:29:25 2015 +0200

    virt-aa-helper: document --probing and --dry-run

commit f1e927c4bfd3da9511fd54bd6070149af04b5ee5
Author: Martin Kletzander <mkletzan@xxxxxxxxxx>
Date:   Thu Aug 13 11:00:48 2015 +0200

    tests: Use qemuProcessPrepareMonitorChr in qemuxmlnstest

    The output of that function was not tested until now.  In order to keep
    the paths in /tmp, the test driver config is "fixed" as well.

    Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx>

commit f1f68ca33433825ce0deed2d96f1990200bc6618
Author: Martin Kletzander <mkletzan@xxxxxxxxxx>
Date:   Fri Aug 7 14:42:31 2015 +0200

    qemu: Fix access to auto-generated socket paths

    We are automatically generating some socket paths for domains, but all
    those paths end up in a directory that's the same for multiple domains.
    The problem is that multiple domains can each run with different
    seclabels (users, selinux contexts, etc.).  The idea here is to create a
    per-domain directory labelled in a way that each domain can access its
    own unix sockets.

    Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=1146886

    Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx>

commit f4c60dfbf2ec606a5fc148b4c6ff1cd17ffd79ec
Author: Martin Kletzander <mkletzan@xxxxxxxxxx>
Date:   Mon Aug 17 11:15:58 2015 -0700

    security_dac: Add SetDirLabel support

    Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx>

commit 3f48345f7ec0c44b8ce2371cab454d2118f830b4
Author: Martin Kletzander <mkletzan@xxxxxxxxxx>
Date:   Mon Aug 17 11:07:07 2015 -0700

    security_selinux: Add SetDirLabel support

    Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx>

commit 99cf04e32d94025a8a969057fba4451eb416a56e
Author: Martin Kletzander <mkletzan@xxxxxxxxxx>
Date:   Mon Aug 17 11:01:12 2015 -0700

    security_stack: Add SetDirLabel support

    Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx>

commit f65a2a12f4b9ab6144a979774f0486cdc4f7a60a
Author: Martin Kletzander <mkletzan@xxxxxxxxxx>
Date:   Mon Aug 17 10:43:43 2015 -0700

    security: Add virSecurityDomainSetDirLabel

    That function can be used for setting security labels on arbitrary
    directories.

    Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx>

commit 7b6953bc2256200a5ff4b985c431bfe3c3e0cfb1
Author: Martin Kletzander <mkletzan@xxxxxxxxxx>
Date:   Thu Aug 13 07:36:30 2015 +0200

    security_dac: Label non-listening sockets

    SELinux security driver already does that, but DAC driver somehow missed
    the memo.  Let's fix it so it works the same way.

    Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx>

commit 4ac6ce38d3bc60f45491509ede4fc8437348048c
Author: Martin Kletzander <mkletzan@xxxxxxxxxx>
Date:   Thu Aug 13 07:35:10 2015 +0200

    security_selinux: Use proper structure to access socket data

    In virSecuritySELinuxSetSecurityChardevLabel() we are labelling unix
    socket path, but accessing another structure of the union.  This does
    not pose a problem currently as both paths are at the same offset, but
    this should be fixed for the future.

    Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx>

commit f08b1c58f3cee046a8b5fb6abecaaa065ffd3e15
Author: Erik Skultety <eskultet@xxxxxxxxxx>
Date:   Thu Aug 20 16:56:32 2015 +0200

    locking: Remove redundant 'srv' element from virLockDaemon

    Now that we have virNetDaemon object holding all the data and being
    capable of referencing multiple servers, having a duplicate reference to
    a single server stored in virLockDaemon isn't necessary anymore. This
    patch removes the above described element.

commit 4ac0d545e88c088bfec732ebd3f3d0ce9afea1e1
Author: Erik Skultety <eskultet@xxxxxxxxxx>
Date:   Thu Aug 6 15:33:58 2015 +0200

    test: Replace tabs with spaces in virnetdaemondata json files

    JSON data that are used to initialize tests in virnetdaemontest should
    be in a consistent format, i.e. not using tabs for indentation, those
    should be replaced by spaces.

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.