[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [libvirt test] 30391: regressions - FAIL
flight 30391 libvirt real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/30391/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-libvirt 5 libvirt-build fail REGR. vs. 30376 build-armhf-libvirt 5 libvirt-build fail REGR. vs. 30376 build-amd64-libvirt 5 libvirt-build fail REGR. vs. 30376 Tests which did not succeed, but are not blocking: test-amd64-i386-libvirt 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 1 build-check(1) blocked n/a test-armhf-armhf-libvirt 1 build-check(1) blocked n/a version targeted for testing: libvirt d3489548b52083d7b4ff757e727a7a9471e1fe4f baseline version: libvirt a9bad1a3379ea99d5c250446e0eef3ef5c261a67 ------------------------------------------------------------ People who touched revisions under test: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx> Cole Robinson <crobinso@xxxxxxxxxx> Daniel P. Berrange <berrange@xxxxxxxxxx> Jincheng Miao <jmiao@xxxxxxxxxx> Ján Tomko <jtomko@xxxxxxxxxx> Michal Privoznik <mprivozn@xxxxxxxxxx> Pavel Hrdina <phrdina@xxxxxxxxxx> Peter Krempa <pkrempa@xxxxxxxxxx> ------------------------------------------------------------ jobs: build-amd64 pass build-armhf pass build-i386 pass build-amd64-libvirt fail build-armhf-libvirt fail build-i386-libvirt fail build-amd64-pvops pass build-armhf-pvops pass build-i386-pvops pass test-amd64-amd64-libvirt blocked test-armhf-armhf-libvirt blocked test-amd64-i386-libvirt blocked ------------------------------------------------------------ sg-report-flight on osstest.cam.xci-test.com logs: /home/xc_osstest/logs images: /home/xc_osstest/images Logs, config files, etc. are available at http://www.chiark.greenend.org.uk/~xensrcts/logs Test harness code can be found at http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary Not pushing. ------------------------------------------------------------ commit d3489548b52083d7b4ff757e727a7a9471e1fe4f Author: Cole Robinson <crobinso@xxxxxxxxxx> Date: Wed Sep 24 11:47:46 2014 -0400 security: Fix labelling host devices (bz 1145968) The check for ISCSI devices was missing a check of subsys type, which meant we could skip labelling of other host devices as well. This fixes USB hotplug on F21 https://bugzilla.redhat.com/show_bug.cgi?id=1145968 commit b8b3c56566712757eebd76ac199b69673766226a Author: Pavel Hrdina <phrdina@xxxxxxxxxx> Date: Wed Sep 24 11:07:08 2014 +0200 Fix MinGW build When building on mingw the format string for long long/unsigned long long have to be I64d/I64u instead of lld/llu. Signed-off-by: Pavel Hrdina <phrdina@xxxxxxxxxx> commit 308c0c5a95209731b57a7a0512637d535f39e6e8 Author: Daniel P. Berrange <berrange@xxxxxxxxxx> Date: Wed Sep 10 14:52:48 2014 +0100 Convert polkit code to use DBus API instead of CLI helper Spawning the pkcheck program every time a permission check is required is hugely expensive on CPU. The pkcheck program is just a dumb wrapper for the DBus API, so rewrite the code to use the DBus API directly. This also simplifies error handling a bit. Signed-off-by: Daniel P. Berrange <berrange@xxxxxxxxxx> commit 88a2dc1f4c58060d4add0e2ea305200f4fdffcb3 Author: Daniel P. Berrange <berrange@xxxxxxxxxx> Date: Tue Sep 9 15:19:58 2014 +0100 Support passing dict by reference for dbus messages Currently DBus dict values must be passed inline virDBusMessageEncode("a{ss}", 3, "key1", "val1", "key2", "val2", "key3", "val3"); virDBusMessageDecode("a{ss}", 3, &key1, &val1, &key2, &val2, &key3, &val3); This allows them to be passed by reference const char **dictin = { "key1", "val1", "key2", "val2", "key3", "val3" }; char **dictout; size_t ndictout; virDBusMessageEncode("a&{ss}", ARRAY_CARDINALITY(dict) / 2, dictin); virDBusMessageDecode("a&{ss}", &ndictout, &dictout); Signed-off-by: Daniel P. Berrange <berrange@xxxxxxxxxx> commit c75425734710181b19537c71da0c4d267f52f63c Author: Daniel P. Berrange <berrange@xxxxxxxxxx> Date: Thu Aug 22 17:09:03 2013 +0100 Convert remote daemon & acl code to use polkit API Convert the remote daemon auth check and the access control code to use the common polkit API for checking auth. Signed-off-by: Daniel P. Berrange <berrange@xxxxxxxxxx> commit 64a5dc1b6a5a19f69ae23704c1c5b587374829ff Author: Daniel P. Berrange <berrange@xxxxxxxxxx> Date: Thu Aug 22 17:02:40 2013 +0100 Convert callers to use typesafe APIs for getting identity attrs Convert virAccessDriverPolkitFormatProcess to use typesafe API for getting process ID attribute. Signed-off-by: Daniel P. Berrange <berrange@xxxxxxxxxx> commit 5282ed8d1cb015810154143697a12cc1d73f8b83 Author: Daniel P. Berrange <berrange@xxxxxxxxxx> Date: Thu Aug 22 16:58:58 2013 +0100 Convert callers to use typesafe APIs for setting identity attrs Update virNetServerClientCreateIdentity and virIdentityGetSystem to use the new typesafe APIs for setting identity attributes Signed-off-by: Daniel P. Berrange <berrange@xxxxxxxxxx> commit b4b41521fa5a2ea21528d4ebf14509e3e1289283 Author: Daniel P. Berrange <berrange@xxxxxxxxxx> Date: Thu Aug 22 16:43:35 2013 +0100 Add typesafe APIs for virIdentity attributes Instead of requiring the caller to format to/from strings, add typesafe APIs todo this work. Signed-off-by: Daniel P. Berrange <berrange@xxxxxxxxxx> commit 1b854c76c76b5cb496243653f311bd87ca1e745f Author: Daniel P. Berrange <berrange@xxxxxxxxxx> Date: Thu Aug 22 14:27:19 2013 +0100 Add common API for doing polkit authentication There are now two places in libvirt which use polkit. Currently they use pkexec, which is set to be replaced by direct DBus API calls. Add a common API which they will both be able to use for this purpose. No tests are added at this time, since the impl will be gutted in favour of a DBus API call shortly. Signed-off-by: Daniel P. Berrange <berrange@xxxxxxxxxx> commit 2d79e1752a0609eb17eef06223e4645f79fbb2cd Author: Ján Tomko <jtomko@xxxxxxxxxx> Date: Thu Sep 11 12:58:04 2014 +0200 qemu: wire up virtio-net segment offloading options Format the segment offloading options specified by <driver> <host .../> <guest .../> </driver> on virtio-net command line. commit 5b3536ae90a27e6c83ad222e286f08856037c195 Author: Ján Tomko <jtomko@xxxxxxxxxx> Date: Thu Sep 11 12:56:31 2014 +0200 conf: add options for disabling segment offloading Add options for tuning segment offloading: <driver> <host csum='off' gso='off' tso4='off' tso6='off' ecn='off' ufo='off'/> <guest csum='off' tso4='off' tso6='off' ecn='off' ufo='off'/> </driver> which control the respective host_ and guest_ properties of the virtio-net device. commit 8baf0f025f975267e3f9a3af71f69137130907b7 Author: Jincheng Miao <jmiao@xxxxxxxxxx> Date: Wed Sep 24 13:45:30 2014 +0800 nodeinfo: fix nodeGetFreePages when max node is zero In nodeGetFreePages, if startCell is given by '0', and the max node number is '0' too. The for-loop wouldn't be executed. So convert it to while-loop. Before: > virsh freepages --cellno 0 --pagesize 4 error: internal error: no suitable info found After: > virsh freepages --cellno 0 --pagesize 4 4KiB: 472637 Signed-off-by: Jincheng Miao <jmiao@xxxxxxxxxx> Signed-off-by: Michal Privoznik <mprivozn@xxxxxxxxxx> commit 0114a1e7037e3df30c08f587d5c6256a89c91aed Author: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx> Date: Tue Sep 23 11:40:03 2014 +0800 LXC: emphasis uid start of idmap only accept '0' in docs We don't accept any other values except '0'. Signed-off-by: Chen Hanxiao <chenhanxiao@xxxxxxxxxxxxxx> commit a71f741ec57634957adcac8a59b1ef27641580ad Author: Pavel Hrdina <phrdina@xxxxxxxxxx> Date: Thu Sep 18 15:06:44 2014 +0200 Fix bug with loading bridge name for active domain during libvirtd start If you have a bridge network in running domain and libvirtd is restarted the information about host bridge interface is lost from live xml. Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=1140085 Signed-off-by: Pavel Hrdina <phrdina@xxxxxxxxxx> commit eaf43e37552e6b40468b72b2819d9b7a5874095e Author: Peter Krempa <pkrempa@xxxxxxxxxx> Date: Thu Sep 11 19:09:48 2014 +0200 storage: Improve error message when traversing backing chains Report also the name of the parent file and uid/gid used to access it to help debugging broken storage configurations. commit 639a00984a1b6b328093c2e89f2b329ed4f341e4 Author: Peter Krempa <pkrempa@xxxxxxxxxx> Date: Thu Sep 11 18:59:32 2014 +0200 qemu: Report better errors from broken backing chains Request erroring out from the backing chain traveller and drop qemu's internal backing chain integrity tester. The backing chain traveller reports errors by itself with possibly more detail than qemuDiskChainCheckBroken ever could. We also need to make sure that we reconnect to existing qemu instances even at the cost of losing the backing chain info (this really should be stored in the XML rather than reloaded from disk, but that needs some work). commit 172ca0e748714799bc0abec1144d7896e681728b Author: Peter Krempa <pkrempa@xxxxxxxxxx> Date: Thu Sep 18 11:21:10 2014 +0200 qemu: Sanitize argument names and empty disk check in qemuDomainDetermineDiskChain Reuse virStorageSourceIsEmpty and rename "force" argument to "force_probe". commit b8549877a1e3ca1854fab2527508637b38e63f0d Author: Peter Krempa <pkrempa@xxxxxxxxxx> Date: Thu Sep 11 18:28:47 2014 +0200 util: storage: Allow metadata crawler to report useful errors Add a new parameter to virStorageFileGetMetadata that will break the backing chain detection process and report useful error message rather than having to use virStorageFileChainGetBroken. This patch just introduces the option, usage will be provided separately. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |