[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [libvirt test] 60880: regressions - FAIL
flight 60880 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/60880/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 16 guest-start/debianhvm.repeat fail REGR. vs. 60848 Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt-vhd 9 debian-di-install fail never pass test-armhf-armhf-libvirt-raw 9 debian-di-install fail never pass test-armhf-armhf-libvirt-qcow2 9 debian-di-install fail never pass test-armhf-armhf-libvirt-xsm 12 migrate-support-check fail never pass test-armhf-armhf-libvirt-xsm 14 guest-saverestore fail never pass test-amd64-i386-libvirt-xsm 12 migrate-support-check fail never pass test-amd64-amd64-libvirt-xsm 12 migrate-support-check fail never pass test-armhf-armhf-libvirt 14 guest-saverestore fail never pass test-armhf-armhf-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check fail never pass test-amd64-amd64-libvirt-pair 21 guest-migrate/src_host/dst_host fail never pass test-amd64-i386-libvirt-pair 21 guest-migrate/src_host/dst_host fail never pass test-amd64-amd64-libvirt-qcow2 11 migrate-support-check fail never pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check fail never pass test-amd64-i386-libvirt 12 migrate-support-check fail never pass test-amd64-amd64-libvirt-vhd 11 migrate-support-check fail never pass test-amd64-i386-libvirt-vhd 11 migrate-support-check fail never pass test-amd64-i386-libvirt-qcow2 11 migrate-support-check fail never pass test-amd64-i386-libvirt-raw 11 migrate-support-check fail never pass test-amd64-amd64-libvirt-raw 11 migrate-support-check fail never pass version targeted for testing: libvirt bf2788218ad29719467260aa4ecad6dc31c97046 baseline version: libvirt 7dc52241b314adb19ca4f0af156d772e3d5a29a5 Last test of basis 60848 2015-08-23 18:44:07 Z 4 days Testing same since 60880 2015-08-25 23:18:39 Z 1 days 1 attempts ------------------------------------------------------------ People who touched revisions under test: Erik Skultety <eskultet@xxxxxxxxxx> Guido Günther <agx@xxxxxxxxxxx> intrigeri <intrigeri@xxxxxxxxxx> Laine Stump <laine@xxxxxxxxx> Luyao Huang <lhuang@xxxxxxxxxx> Martin Kletzander <mkletzan@xxxxxxxxxx> Sergey Bronnikov <sergeyb@xxxxxxxxxx> Tomas Meszaros <exo@xxxxxx> Vasiliy Tolstov <v.tolstov@xxxxxxxxx> jobs: build-amd64-xsm pass build-armhf-xsm pass build-i386-xsm pass build-amd64 pass build-armhf pass build-i386 pass build-amd64-libvirt pass build-armhf-libvirt pass build-i386-libvirt pass build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm pass test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm fail test-amd64-amd64-libvirt-xsm pass test-armhf-armhf-libvirt-xsm fail test-amd64-i386-libvirt-xsm pass test-amd64-amd64-libvirt pass test-armhf-armhf-libvirt fail test-amd64-i386-libvirt pass test-amd64-amd64-libvirt-pair fail test-amd64-i386-libvirt-pair fail test-amd64-amd64-libvirt-qcow2 pass test-armhf-armhf-libvirt-qcow2 fail test-amd64-i386-libvirt-qcow2 pass test-amd64-amd64-libvirt-raw pass test-armhf-armhf-libvirt-raw fail test-amd64-i386-libvirt-raw pass test-amd64-amd64-libvirt-vhd pass test-armhf-armhf-libvirt-vhd fail test-amd64-i386-libvirt-vhd pass ------------------------------------------------------------ sg-report-flight on osstest.test-lab.xenproject.org logs: /home/logs/logs images: /home/logs/images Logs, config files, etc. are available at http://logs.test-lab.xenproject.org/osstest/logs Explanation of these reports, and of osstest in general, is at http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master Test harness code can be found at http://xenbits.xen.org/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit bf2788218ad29719467260aa4ecad6dc31c97046 Author: Luyao Huang <lhuang@xxxxxxxxxx> Date: Wed Aug 19 11:56:33 2015 +0800 qemu: Update blkio.weight value after successful set https://bugzilla.redhat.com/show_bug.cgi?id=1253107 Make a call virCgroupGetBlkioWeight to re-read blkio.weight right after it is set in order to keep internal data up-to-date. Signed-off-by: Luyao Huang <lhuang@xxxxxxxxxx> commit ed7b4814b6a0d3ed010e8cbb9e6cd0b16c195a63 Author: Sergey Bronnikov <sergeyb@xxxxxxxxxx> Date: Sat Aug 22 00:44:11 2015 +0300 Rename page about vz driver commit 4076d30f85d54cf34fd6646acccd6f16ab566928 Author: Sergey Bronnikov <sergeyb@xxxxxxxxxx> Date: Sat Aug 22 00:43:48 2015 +0300 docs: Rename 'parallels' to 'vz' Parallels driver was renamed to Virtuozzo. Replace old name by new one for libvirt docs and schemas. commit bbc705d1309b8ec2eb4cdae011dc702802c96d11 Author: Vasiliy Tolstov <v.tolstov@xxxxxxxxx> Date: Sat Aug 22 15:33:15 2015 +0000 Eliminate incorrect and unnecessary check for changed IP address Commit aa2cc7 modified a previously unnecessary but innocuous check for interface IP address during interface update incorrectly, causing all attempted updates (e.g. changing link state) to interfaces of type='ethernet' for QEMU to fail. This patch fixes the issue by completely removing the check for IP address, which is pointless since QEMU doesn't support setting interface IP addresses from the domain interface XML anyway. Signed-off-by: Vasiliy Tolstov <v.tolstov@xxxxxxxxx> Signed-off-by: Laine Stump <laine@xxxxxxxxx> commit 6c2702eddf468ec71ab021873af7c7ae0b09f30f Author: Tomas Meszaros <exo@xxxxxx> Date: Tue Aug 18 22:22:07 2015 +0200 virDomainRename: Extend API documentation Signed-off-by: Tomas Meszaros <exo@xxxxxx> commit c8e5177303f1b17a5e3116c6a8693391a3539bb9 Author: Luyao Huang <lhuang@xxxxxxxxxx> Date: Fri Aug 14 17:37:28 2015 +0800 qemu: add a check for nodeset in qemuDomainSetNumaParamsLive We will try to set the node to cpuset.mems without check if it is available, since we already have helper to check this. Call virNumaNodesetIsAvailable to check if node is available, then try to change it in the cgroup. Signed-off-by: Luyao Huang <lhuang@xxxxxxxxxx> commit 4d4c90dfd5475c100c6fd3fb705011e0d90d793e Author: Guido Günther <agx@xxxxxxxxxxx> Date: Mon Aug 24 14:04:37 2015 +0200 selinux: fix compile errors Remove unused variable, tag unused parameter and adjust return type. introduced by 3f48345f7ec0c44b8ce2371cab454d2118f830b4 CC security/libvirt_security_manager_la-security_selinux.lo security/security_selinux.c: In function 'virSecuritySELinuxDomainSetDirLabel': security/security_selinux.c:2520:5: error: return makes pointer from integer without a cast [-Werror] security/security_selinux.c:2514:9: error: unused variable 'ret' [-Werror=unused-variable] security/security_selinux.c:2509:59: error: unused parameter 'mgr' [-Werror=unused-parameter] commit 269d39afe5c59ecb3d3d64dba52f8cfa8d63d197 Author: Guido Günther <agx@xxxxxxxxxxx> Date: Sun Aug 23 22:03:54 2015 +0200 storage: only run safezero if allocation is > 0 While a zero allocation in safezero should be fine it isn't when we use posix_fallocate which returns EINVAL on a zero allocation. While we could skip the zero allocation in safezero_posix_fallocate it's an optimization to do it for all allocations. This fixes vm installation via virtinst for me which otherwise aborts like: Starting install... Retrieving file linux... | 5.9 MB 00:01 ... Retrieving file initrd.gz... | 29 MB 00:07 ... ERROR Couldn't create storage volume 'virtinst-linux.sBgds4': 'cannot fill file '/var/lib/libvirt/boot/virtinst-linux.sBgds4': Invalid argument' The error was introduced by e30297b0 as spotted by Chunyan Liu commit 2f01cfdf05448513d150ff1914d3444161c531b9 Author: intrigeri <intrigeri@xxxxxxxxxx> Date: Fri Aug 21 10:52:52 2015 +0200 virt-aa-helper: allow access to /usr/share/ovmf/ We forbid access to /usr/share/, but (at least on Debian-based systems) the Open Virtual Machine Firmware files needed for booting UEFI virtual machines in QEMU live in /usr/share/ovmf/. Therefore, we need to add that directory to the list of read only paths. A similar patch was suggested by Jamie Strandboge <jamie@xxxxxxxxxxxxx> on https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1483071. commit d25a5e087ae10142d3d533ed193146736526b2ae Author: Guido Günther <agx@xxxxxxxxxxx> Date: Fri Aug 21 10:49:15 2015 +0200 virt-aa-helper: Simplify restriction logic First check overrides, then read only files then restricted access itself. This allows us to mark files for read only access whose parents were already restricted for read write. Based on a proposal by Martin Kletzander commit 26c5fa3a9bd37624ddd1509daf7d6a84268f089e Author: Guido Günther <agx@xxxxxxxxxxx> Date: Fri Aug 21 12:29:25 2015 +0200 virt-aa-helper: document --probing and --dry-run commit f1e927c4bfd3da9511fd54bd6070149af04b5ee5 Author: Martin Kletzander <mkletzan@xxxxxxxxxx> Date: Thu Aug 13 11:00:48 2015 +0200 tests: Use qemuProcessPrepareMonitorChr in qemuxmlnstest The output of that function was not tested until now. In order to keep the paths in /tmp, the test driver config is "fixed" as well. Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx> commit f1f68ca33433825ce0deed2d96f1990200bc6618 Author: Martin Kletzander <mkletzan@xxxxxxxxxx> Date: Fri Aug 7 14:42:31 2015 +0200 qemu: Fix access to auto-generated socket paths We are automatically generating some socket paths for domains, but all those paths end up in a directory that's the same for multiple domains. The problem is that multiple domains can each run with different seclabels (users, selinux contexts, etc.). The idea here is to create a per-domain directory labelled in a way that each domain can access its own unix sockets. Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=1146886 Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx> commit f4c60dfbf2ec606a5fc148b4c6ff1cd17ffd79ec Author: Martin Kletzander <mkletzan@xxxxxxxxxx> Date: Mon Aug 17 11:15:58 2015 -0700 security_dac: Add SetDirLabel support Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx> commit 3f48345f7ec0c44b8ce2371cab454d2118f830b4 Author: Martin Kletzander <mkletzan@xxxxxxxxxx> Date: Mon Aug 17 11:07:07 2015 -0700 security_selinux: Add SetDirLabel support Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx> commit 99cf04e32d94025a8a969057fba4451eb416a56e Author: Martin Kletzander <mkletzan@xxxxxxxxxx> Date: Mon Aug 17 11:01:12 2015 -0700 security_stack: Add SetDirLabel support Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx> commit f65a2a12f4b9ab6144a979774f0486cdc4f7a60a Author: Martin Kletzander <mkletzan@xxxxxxxxxx> Date: Mon Aug 17 10:43:43 2015 -0700 security: Add virSecurityDomainSetDirLabel That function can be used for setting security labels on arbitrary directories. Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx> commit 7b6953bc2256200a5ff4b985c431bfe3c3e0cfb1 Author: Martin Kletzander <mkletzan@xxxxxxxxxx> Date: Thu Aug 13 07:36:30 2015 +0200 security_dac: Label non-listening sockets SELinux security driver already does that, but DAC driver somehow missed the memo. Let's fix it so it works the same way. Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx> commit 4ac6ce38d3bc60f45491509ede4fc8437348048c Author: Martin Kletzander <mkletzan@xxxxxxxxxx> Date: Thu Aug 13 07:35:10 2015 +0200 security_selinux: Use proper structure to access socket data In virSecuritySELinuxSetSecurityChardevLabel() we are labelling unix socket path, but accessing another structure of the union. This does not pose a problem currently as both paths are at the same offset, but this should be fixed for the future. Signed-off-by: Martin Kletzander <mkletzan@xxxxxxxxxx> commit f08b1c58f3cee046a8b5fb6abecaaa065ffd3e15 Author: Erik Skultety <eskultet@xxxxxxxxxx> Date: Thu Aug 20 16:56:32 2015 +0200 locking: Remove redundant 'srv' element from virLockDaemon Now that we have virNetDaemon object holding all the data and being capable of referencing multiple servers, having a duplicate reference to a single server stored in virLockDaemon isn't necessary anymore. This patch removes the above described element. commit 4ac0d545e88c088bfec732ebd3f3d0ce9afea1e1 Author: Erik Skultety <eskultet@xxxxxxxxxx> Date: Thu Aug 6 15:33:58 2015 +0200 test: Replace tabs with spaces in virnetdaemondata json files JSON data that are used to initialize tests in virnetdaemontest should be in a consistent format, i.e. not using tabs for indentation, those should be replaced by spaces. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |