Skip to content
This repository was archived by the owner on May 12, 2021. It is now read-only.

versions: Update qemu-virtiofs to 5.0 and cloud-hypervisor 0.9#2840

Merged
likebreath merged 4 commits into
kata-containers:masterfrom
jcvenegas:qemu-5.0-dax
Aug 13, 2020
Merged

versions: Update qemu-virtiofs to 5.0 and cloud-hypervisor 0.9#2840
likebreath merged 4 commits into
kata-containers:masterfrom
jcvenegas:qemu-5.0-dax

Conversation

@jcvenegas
Copy link
Copy Markdown
Member

@jcvenegas jcvenegas commented Jul 20, 2020

Update to qemu 5.0.x with support for virtiofs + dax.

Depends-on: github.com/kata-containers/packaging#1097
Depends-on: github.com/kata-containers/tests#2737

Fixes: #2848

Signed-off-by: Jose Carlos Venegas Munoz jose.carlos.venegas.munoz@intel.com

@jcvenegas jcvenegas added the do-not-merge PR has problems or depends on another label Jul 20, 2020
@auto-comment
Copy link
Copy Markdown

auto-comment Bot commented Jul 20, 2020

Thank you for raising your pull request. Please note that the main development of Kata Containers has moved to the 2.0-dev branch of https://github.com/kata-containers/kata-containers repository. The kata-containers/runtime repository is kept for 1.x release maintenance. Please check twice if your change should go to the 2.0-dev branch directly.

If it is strongly required for adding the change to Kata Containers 1.x releases, please ping @kata-containers/runtime to assign a dedicated developer to be responsible for porting the change to 2.0-dev branch. Thanks!

@jcvenegas
Copy link
Copy Markdown
Member Author

/test

@codecov
Copy link
Copy Markdown

codecov Bot commented Jul 21, 2020

Codecov Report

Merging #2840 into master will increase coverage by 0.03%.
The diff coverage is 85.71%.

@@            Coverage Diff             @@
##           master    #2840      +/-   ##
==========================================
+ Coverage   51.19%   51.22%   +0.03%     
==========================================
  Files         118      118              
  Lines       17392    17405      +13     
==========================================
+ Hits         8903     8916      +13     
  Misses       7408     7408              
  Partials     1081     1081              

@jcvenegas
Copy link
Copy Markdown
Member Author

/test

Copy link
Copy Markdown
Contributor

@likebreath likebreath left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am curious what is the different bwt qemu5.0-virtiofs-dax and kata-v5.6-april-09-2020? I guess that is whether they support DAX or not?

Also, I assume the PR is used to validate how the experimental DAX support from virtio-fs works in Kata, right?

@jcvenegas
Copy link
Copy Markdown
Member Author

/test-virtiofs

@jcvenegas
Copy link
Copy Markdown
Member Author

hey @likebreath, kata-v5.6-april-09-2020 is a kernel based in 5.6 with virtiofs patches on top, yes DAX is what it includes as far as I know.

qemu5.0-virtiofs-dax it is a new rebase of virtiofs changes on top of qemu 5.0: Seems that it includes a few fixes related to virtiofs and most of the patches are related to DAX.

\cc @dagrh @rhvgoyal please correct me if I am wrong.

@dagrh
Copy link
Copy Markdown
Contributor

dagrh commented Jul 23, 2020

qemu5.0-virtiofs-dax it is a new rebase of virtiofs changes on top of qemu 5.0: Seems that it includes a few fixes related to virtiofs and most of the patches are related to DAX.

That sounds about right for the qemu branch; I documented what's in that branch in:
https://gitlab.com/virtio-fs/qemu/-/blob/qemu5.0-virtiofs-dax/README-5.0-virtiofs-kata

\cc @dagrh @rhvgoyal please correct me if I am wrong.

jcvenegas added a commit to jcvenegas/kata-test that referenced this pull request Jul 23, 2020
experimental QEMU will be updated to qemu 5.0, now CI
fails with:

```
failed to set MSR 0x48b to 0x1582e00000000
qemu-virtiofs-system-x86_64:
/root/qemu-virtiofs/target/i386/kvm.c:2695: kvm_buf_set_msrs:
Assertion `ret == cpu->kvm_msr_buf->nmsrs' failed.: unknown.
```

Depends-on: github.com/kata-containers/packaging#1097
Depends-on: github.com/kata-containers/runtime#2840

Fixes: kata-containers#2736

Signed-off-by: Jose Carlos Venegas Munoz <jose.carlos.venegas.munoz@intel.com>
@jcvenegas
Copy link
Copy Markdown
Member Author

/test

jcvenegas added a commit to jcvenegas/kata-packaging that referenced this pull request Jul 23, 2020
Update build scripts for qemu-virtiofs

Depends-on: github.com/kata-containers/runtime#2840
Depends-on: github.com/kata-containers/tests#2737

Fixes: github.com/kata-containers/runtime#2848

Signed-off-by: Jose Carlos Venegas Munoz <jose.carlos.venegas.munoz@intel.com>
@jcvenegas
Copy link
Copy Markdown
Member Author

/test-clh

@jcvenegas
Copy link
Copy Markdown
Member Author

/test-clh

@jcvenegas
Copy link
Copy Markdown
Member Author

/test-clh

@jcvenegas
Copy link
Copy Markdown
Member Author

I see some failures not related with virtiofsd \cc:
@likebreath do you know if is faling recently hot plug block devices

• Failure [42.661 seconds]
run
/tmp/jenkins/workspace/kata-containers-runtime-ubuntu-1804-PR-cloud-hypeprvisor-docker/go/src/github.com/kata-containers/tests/integration/docker/run_test.go:101
  hot plug block devices
  /tmp/jenkins/workspace/kata-containers-runtime-ubuntu-1804-PR-cloud-hypeprvisor-docker/go/src/github.com/kata-containers/tests/integration/docker/run_test.go:146
    should be attached [It]
    /tmp/jenkins/workspace/kata-containers-runtime-ubuntu-1804-PR-cloud-hypeprvisor-docker/go/src/github.com/kata-containers/tests/integration/docker/run_test.go:147

    Expected
        <int>: 125
    to be zero-valued

    /tmp/jenkins/workspace/kata-containers-runtime-ubuntu-1804-PR-cloud-hypeprvisor-docker/go/src/github.com/kata-containers/tests/integration/docker/run_test.go:149
------------------------------
SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS

Summarizing 1 Failure:

[Fail] run hot plug block devices [It] should be attached 
/tmp/jenkins/workspace/kata-containers-runtime-ubuntu-1804-PR-cloud-hypeprvisor-docker/go/src/github.com/kata-containers/tests/integration/docker/run_test.go:149

Ran 193 of 250 Specs in 1382.488 seconds
FAIL! -- 192 Passed | 1 Failed | 0 Pending | 57 Skipped
--- FAIL: TestIntegration (1382.49s)
  • Metrics seems failed to generate memory json data, probably a random errror.

  • Fedora is failing to build cloud-hypervisor because it has not docker installed. I thin @likebreath faced a same issue in other PR.

@jcvenegas
Copy link
Copy Markdown
Member Author

/test-clh-docker

@likebreath
Copy link
Copy Markdown
Contributor

Hi @jcvenegas, thanks for summarizing the issues:

  1. hot plug block devices seems to be working fine by taking a glance from the CI history. The most recent passing was two days ago here. Can you elaborate on why you think the failure can be related to the PR changes?
  2. Right. The failure on Fedora 31 is also observed from another PR.

@jcvenegas
Copy link
Copy Markdown
Member Author

jcvenegas commented Jul 27, 2020

@likebreath

Can you elaborate on why you think the failure can be related to the PR changes?

Sure let me try that test locally

@jcvenegas
Copy link
Copy Markdown
Member Author

My local env has all test passing

@jcvenegas
Copy link
Copy Markdown
Member Author

/test-clh-docker

@jcvenegas
Copy link
Copy Markdown
Member Author

/test-clh

@jcvenegas
Copy link
Copy Markdown
Member Author

@sboeuf I manage to reproduce the CI error, I think is a race condition. Seems that happen after add block devices this are the traces before it fails.

ul 28 12:53:56 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:56.428121697Z" level=debug msg="DEBUG ! hotplug block device &config.BlockDrive{File:\"/dev/loop9\", Format:\"raw\", ID:\"drive-eeb89f24d4c1fa97\", Index:9, MmioAddr:\"\", PCIAddr:\"\", SCSIAddr:\"\
", NvdimmID:\"\", VirtPath:\"/dev/vdj\", DevNo:\"\", ShareRW:false, ReadOnly:false, Pmem:false}: openapi.DiskConfig{Path:\"/dev/loop9\", Readonly:false, Direct:false, Iommu:false, NumQueues:0, QueueSize:0, VhostUser:false, VhostSocket:\"\", PollQueue:false, Id:\"\"}" ar
ch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 name=kata-runtime pid=24271 source=virtcontainers subsystem=cloudHypervisor
Jul 28 12:53:56 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:56.428924603Z" level=info msg="get Capabilities" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 function=capabilities name=kata-runtime pid=2427
1 source=virtcontainers subsystem=cloudHypervisor
Jul 28 12:53:56 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:56.429247646Z" level=info msg="get Capabilities" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 function=capabilities name=kata-runtime pid=2427
1 source=virtcontainers subsystem=cloudHypervisor
Jul 28 12:53:56 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:56.429624295Z" level=info msg="get Capabilities" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 function=capabilities name=kata-runtime pid=2427
1 source=virtcontainers subsystem=cloudHypervisor
Jul 28 12:53:56 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:56.429907333Z" level=info msg="Using sandbox shm" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 name=kata-runtime pid=24271 shm-size=67108864 s
ource=virtcontainers subsystem=kata_agent
Jul 28 12:53:56 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:56.429970541Z" level=debug msg="Replacing OCI mount (/etc/resolv.conf) source /var/lib/docker/containers/f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728/resolv.conf with /run/kata-c
ontainers/shared/containers/f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728-e1a215e1541a6a3f-resolv.conf" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 name=kata-runtime pid=24271 source=virtcontain
ers subsystem=kata_agent
Jul 28 12:53:56 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:56.43003655Z" level=debug msg="Replacing OCI mount (/etc/hostname) source /var/lib/docker/containers/f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728/hostname with /run/kata-containe
rs/shared/containers/f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728-9bcce1490058611a-hostname" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 name=kata-runtime pid=24271 source=virtcontainers subsys
tem=kata_agent
Jul 28 12:53:56 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:56.430093157Z" level=debug msg="Replacing OCI mount (/etc/hosts) source /var/lib/docker/containers/f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728/hosts with /run/kata-containers/sh
ared/containers/f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728-ea2e3dbaae9d4083-hosts" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 name=kata-runtime pid=24271 source=virtcontainers subsystem=kata
_agent
Jul 28 12:53:56 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:56.439979861Z" level=info msg="New client" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 name=kata-runtime pid=24271 proxy=24306 source=virtcon
tainers subsystem=kata_agent url="hvsock:///run/vc/vm/f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728/clh.sock:1024"
Jul 28 12:53:56 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:56.517068929Z" level=debug msg="HybridVsock trivial handshake" name=agent-client pid=24271 response="OK 1073742081\n" source=agent-client
Jul 28 12:53:56 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:56.518343998Z" level=debug msg="sending request" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 name=grpc.CreateContainerRequest pid=24271 req="
container_id:\"f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728\" exec_id:\"f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728\" devices:<type:\"blk\" vm_path:\"/dev/vda\" container_path:\"/dev/loop0\" > devices:<type:\"blk\" vm_path:\"/dev
/vdb\" container_path:\"/dev/loop1\" > devices:<type:\"blk\" vm_path:\"/dev/vdc\" container_path:\"/dev/loop2\" > devices:<type:\"blk\" vm_path:\"/dev/vdd\" container_path:\"/dev/loop3\" > devices:<type:\"blk\" vm_path:\"/dev/vde\" container_path:\"/dev/loop4\" > device
s:<type:\"blk\" vm_path:\"/dev/vdf\" container_path:\"/dev/loop5\" > devices:<type:\"blk\" vm_path:\"/dev/vdg\" container_path:\"/dev/loop6\" > devices:<type:\"blk\" vm_path:\"/dev/vdh\" container_path:\"/dev/loop7\" > devices:<type:\"blk\" vm_path:\"/dev/vdi\" containe
r_path:\"/dev/loop8\" > devices:<type:\"blk\" vm_path:\"/dev/vdj\" container_path:\"/dev/loop9\" > OCI:<Version:\"1.0.1\" Process:<User:<AdditionalGids:10 > Args:\"stat\" Args:\"/dev/loop0\" Args:\"/dev/loop1\" Args:\"/dev/loop2\" Args:\"/dev/loop3\" Args:\"/dev/loop4\"
 Args:\"/dev/loop5\" Args:\"/dev/loop6\" Args:\"/dev/loop7\" Args:\"/dev/loop8\" Args:\"/dev/loop9\" Env:\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\" Env:\"HOSTNAME=f7893243a04c\" Cwd:\"/\" Capabilities:<Bounding:\"CAP_CHOWN\" Bounding:\"CAP_DAC_OVERRIDE\" Bounding:\"CAP_FSETID\" Bounding:\"CAP_FOWNER\" Bounding:\"CAP_MKNOD\" Bounding:\"CAP_NET_RAW\" Bounding:\"CAP_SETGID\" Bounding:\"CAP_SETUID\" Bounding:\"CAP_SETFCAP\" Bounding:\"CAP_SETPCAP\" Bounding:\"CAP_NET_BIND_SERVICE\" Bounding:\"CAP_SYS_CHROOT\" Bounding:\"CAP_KILL\" Bounding:\"CAP_AUDIT_WRITE\" Effective:\"CAP_CHOWN\" Effective:\"CAP_DAC_OVERRIDE\" Effective:\"CAP_FSETID\" Effective:\"CAP_FOWNER\" Effective:\"CAP_MKNOD\" Effective:\"CAP_NET_RAW\" Effective:\"CAP_SETGID\" Effective:\"CAP_SETUID\" Effective:\"CAP_SETFCAP\" Effective:\"CAP_SETPCAP\" Effective:\"CAP_NET_BIND_SERVICE\" Effective:\"CAP_SYS_CHROOT\" Effective:\"CAP_KILL\" Effective:\"CAP_AUDIT_WRITE\" Inheritable:\"CAP_CHOWN\" Inheritable:\"CAP_DAC_OVERRIDE\" Inheritable:\"CAP_FSETID\" Inheritable:\"CAP_FOWNER\" Inheritable:\"CAP_MKNOD\" Inheritable:\"CAP_NET_RAW\" Inheritable:\"CAP_SETGID\" Inheritable:\"CAP_SETUID\" Inheritable:\"CAP_SETFCAP\" Inheritable:\"CAP_SETPCAP\" Inheritable:\"CAP_NET_BIND_SERVICE\" Inheritable:\"CAP_SYS_CHROOT\" Inheritable:\"CAP_KILL\" Inheritable:\"CAP_AUDIT_WRITE\" Permitted:\"CAP_CHOWN\" Permitted:\"CAP_DAC_OVERRIDE\" Permitted:\"CAP_FSETID\" Permitted:\"CAP_FOWNER\" Permitted:\"CAP_MKNOD\" Permitted:\"CAP_NET_RAW\" Permitted:\"CAP_SETGID\" Permitted:\"CAP_SETUID\" Permitted:\"CAP_SETFCAP\" Permitted:\"CAP_SETPCAP\" Permitted:\"CAP_NET_BIND_SERVICE\" Permitted:\"CAP_SYS_CHROOT\" Permitted:\"CAP_KILL\" Permitted:\"CAP_AUDIT_WRITE\" > ApparmorProfile:\"docker-default\" > Root:<Path:\"/run/kata-containers/shared/containers/f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728/rootfs\" > Hostname:\"f7893243a04c\" Mounts:<destination:\"/proc\" source:\"proc\" type:\"proc\" options:\"nosuid\" options:\"noexec\" options:\"nodev\" > Mounts:<destination:\"/dev\" source:\"tmpfs\" type:\"tmpfs\" options:\"nosuid\" options:\"strictatime\" options:\"mode=755\" options:\"size=65536k\" > Mounts:<destination:\"/dev/pts\" source:\"devpts\" type:\"devpts\" options:\"nosuid\" options:\"noexec\" options:\"newinstance\" options:\"ptmxmode=0666\" options:\"mode=0620\" options:\"gid=5\" > Mounts:<destination:\"/sys\" source:\"sysfs\" type:\"sysfs\" options:\"nosuid\" options:\"noexec\" options:\"nodev\" options:\"ro\" > Mounts:<destination:\"/sys/fs/cgroup\" source:\"cgroup\" type:\"cgroup\" options:\"ro\" options:\"nosuid\" options:\"noexec\" options:\"nodev\" > Mounts:<destination:\"/dev/mqueue\" source:\"mqueue\" type:\"mqueue\" options:\"nosuid\" options:\"noexec\" options:\"nodev\" > Mounts:<destination:\"/etc/resolv.conf\" source:\"/run/kata-containers/shared/containers/f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728-e1a215e1541a6a3f-resolv.conf\" type:\"bind\" options:\"rbind\" options:\"rprivate\" > Mounts:<destination:\"/etc/hostname\" source:\"/run/kata-containers/shared/containers/f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728-9bcce1490058611a-hostname\" type:\"bind\" options:\"rbind\" options:\"rprivate\" > Mounts:<destination:\"/etc/hosts\" source:\"/run/kata-containers/shared/containers/f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728-ea2e3dbaae9d4083-hosts\" type:\"bind\" options:\"rbind\" options:\"rprivate\" > Mounts:<destination:\"/dev/shm\" source:\"/run/kata-containers/sandbox/shm\" type:\"bind\" options:\"rbind\" > Linux:<Resources:<Memory:<> CPU:<> > CgroupsPath:\"/docker/f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728\" Namespaces:<Type:\"mount\" > Namespaces:<Type:\"uts\" > Namespaces:<Type:\"ipc\" > Devices:<Path:\"/dev/loop0\" Type:\"b\" Major:7 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop1\" Type:\"b\" Major:7 Minor:1 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop2\" Type:\"b\" Major:7 Minor:2 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop3\" Type:\"b\" Major:7 Minor:3 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop4\" Type:\"b\" Major:7 Minor:4 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop5\" Type:\"b\" Major:7 Minor:5 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop6\" Type:\"b\" Major:7 Minor:6 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop7\" Type:\"b\" Major:7 Minor:7 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop8\" Type:\"b\" Major:7 Minor:8 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop9\" Type:\"b\" Major:7 Minor:9 FileMode:25008 GID:6 > MaskedPaths:\"/proc/acpi\" MaskedPaths:\"/proc/kcore\" MaskedPaths:\"/proc/keys\" MaskedPaths:\"/proc/latency_stats\" MaskedPaths:\"/proc/timer_list\" MaskedPaths:\"/proc/timer_stats\" MaskedPaths:\"/proc/sched_debug\" MaskedPaths:\"/proc/scsi\" MaskedPaths:\"/sys/firmware\" ReadonlyPaths:\"/proc/asound\" ReadonlyPaths:\"/proc/bus\" ReadonlyPaths:\"/proc/fs\" ReadonlyPaths:\"/proc/irq\" ReadonlyPaths:\"/proc/sys\" ReadonlyPaths:\"/proc/sysrq-trigger\" > > " source=virtcontainers subsystem=kata_agent
Jul 28 12:53:58 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:58.81234983Z" level=info msg="Get Sandbox Console" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 function=getSandboxConsole id=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 name=kata-runtime pid=24271 source=virtcontainers subsystem=cloudHypervisor
Jul 28 12:53:58 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:58.823430389Z" level=debug msg="Setting container state from  to ready" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 name=kata-runtime pid=24271 sandbox=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 source=virtcontainers subsystem=container
Jul 28 12:53:58 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:58.825590573Z" level=debug msg="Request to hypervisor to update vCPUs" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 cpus-sandbox=1 name=kata-runtime pid=24271 sandbox=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 source=virtcontainers subsystem=sandbox
Jul 28 12:53:58 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:58.82571689Z" level=debug msg="Request VM info to hypervisor" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 name=kata-runtime pid=24271 source=virtcontainers subsystem=cloudHypervisor
Jul 28 12:53:59 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:59.825994554Z" level=warning msg="VmInfoGet failed" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 error="error: Get http://localhost/api/v1/vm.info: context deadline exceeded reason: " name=kata-runtime pid=24271 source=virtcontainers subsystem=cloudHypervisor
Jul 28 12:53:59 clh-qemu-50 kata-runtime[24271]: time="2020-07-28T12:53:59.826145974Z" level=info msg="[clh] vmInfo failed" arch=amd64 command=create container=f7893243a04cb0d03e999bad89866ccf2bd8ff148a14103f4bdf215bd07e6728 error="error: Get http://localhost/api/v1/vm.info: context deadline exceeded reason: " function=resizeVCPUs name=kata-runtime pid=24271 source=virtcontainers subsystem=cloudHypervisor

  1. Add a lot of block devices (hotplug)
  2. Get VmInfo (here kata fails with timeout for VmInfo ) context deadline exceeded reason:
    2.1. After increae the timeout I see a different error in logs msg="Failed to request to resize cpus to hypervisor: error: error: Get http://localhost/api/v1/vm.info: dial unix /run/vc/vm/83d8ace9f3572676caa379f8f63beee2c5885f3bd72b336f1b6578734b6c2f22/clh-api.sock: connect: connection refused reason: reason: "
Jul 28 13:17:02 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:02.83210684Z" level=debug msg="DEBUG !! hotplug block device &config.BlockDrive{File:\"/dev/loop9\", Format:\"raw\", ID:\"drive-81388cb8c5c61b8b\", Index:9, MmioAddr:\"\", PCIAddr:\"\", SCSIAddr:\"\
", NvdimmID:\"\", VirtPath:\"/dev/vdj\", DevNo:\"\", ShareRW:false, ReadOnly:false, Pmem:false}: openapi.DiskConfig{Path:\"/dev/loop9\", Readonly:false, Direct:false, Iommu:false, NumQueues:0, QueueSize:0, VhostUser:false, VhostSocket:\"\", PollQueue:false, Id:\"\"}" ar
ch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 name=kata-runtime pid=34005 source=virtcontainers subsystem=cloudHypervisor
Jul 28 13:17:02 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:02.842270829Z" level=info msg="get Capabilities" arch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 function=capabilities name=kata-runtime pid=3400
5 source=virtcontainers subsystem=cloudHypervisor
Jul 28 13:17:02 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:02.842752076Z" level=info msg="get Capabilities" arch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 function=capabilities name=kata-runtime pid=3400
5 source=virtcontainers subsystem=cloudHypervisor
Jul 28 13:17:02 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:02.843053205Z" level=info msg="get Capabilities" arch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 function=capabilities name=kata-runtime pid=3400
5 source=virtcontainers subsystem=cloudHypervisor
Jul 28 13:17:02 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:02.850490329Z" level=info msg="Using sandbox shm" arch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 name=kata-runtime pid=34005 shm-size=67108864 s
ource=virtcontainers subsystem=kata_agent
Jul 28 13:17:02 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:02.850579838Z" level=debug msg="Replacing OCI mount (/etc/resolv.conf) source /var/lib/docker/containers/65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96/resolv.conf with /run/kata-c
ontainers/shared/containers/65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96-0edc17132838c667-resolv.conf" arch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 name=kata-runtime pid=34005 source=virtcontain
ers subsystem=kata_agent
Jul 28 13:17:02 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:02.850670947Z" level=debug msg="Replacing OCI mount (/etc/hostname) source /var/lib/docker/containers/65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96/hostname with /run/kata-contain
ers/shared/containers/65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96-fe2d806d3fd6c734-hostname" arch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 name=kata-runtime pid=34005 source=virtcontainers subsy
stem=kata_agent
Jul 28 13:17:02 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:02.850745954Z" level=debug msg="Replacing OCI mount (/etc/hosts) source /var/lib/docker/containers/65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96/hosts with /run/kata-containers/sh
ared/containers/65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96-76bc692f0cea5fc9-hosts" arch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 name=kata-runtime pid=34005 source=virtcontainers subsystem=kata
_agent
Jul 28 13:17:02 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:02.852611936Z" level=info msg="New client" arch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 name=kata-runtime pid=34005 proxy=34037 source=virtcon
tainers subsystem=kata_agent url="hvsock:///run/vc/vm/65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96/clh.sock:1024"
Jul 28 13:17:02 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:02.895213582Z" level=debug msg="HybridVsock trivial handshake" name=agent-client pid=34005 response="OK 1073742074\n" source=agent-client
Jul 28 13:17:02 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:02.898084062Z" level=debug msg="sending request" arch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 name=grpc.CreateContainerRequest pid=34005 req="
container_id:\"65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96\" exec_id:\"65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96\" devices:<type:\"blk\" vm_path:\"/dev/vda\" container_path:\"/dev/loop0\" > devices:<type:\"blk\" vm_path:\"/dev
/vdb\" container_path:\"/dev/loop1\" > devices:<type:\"blk\" vm_path:\"/dev/vdc\" container_path:\"/dev/loop2\" > devices:<type:\"blk\" vm_path:\"/dev/vdd\" container_path:\"/dev/loop3\" > devices:<type:\"blk\" vm_path:\"/dev/vde\" container_path:\"/dev/loop4\" > device
s:<type:\"blk\" vm_path:\"/dev/vdf\" container_path:\"/dev/loop5\" > devices:<type:\"blk\" vm_path:\"/dev/vdg\" container_path:\"/dev/loop6\" > devices:<type:\"blk\" vm_path:\"/dev/vdh\" container_path:\"/dev/loop7\" > devices:<type:\"blk\" vm_path:\"/dev/vdi\" containe
r_path:\"/dev/loop8\" > devices:<type:\"blk\" vm_path:\"/dev/vdj\" container_path:\"/dev/loop9\" > OCI:<Version:\"1.0.1\" Process:<User:<AdditionalGids:10 > Args:\"stat\" Args:\"/dev/loop0\" Args:\"/dev/loop1\" Args:\"/dev/loop2\" Args:\"/dev/loop3\" Args:\"/dev/loop4\"
 Args:\"/dev/loop5\" Args:\"/dev/loop6\" Args:\"/dev/loop7\" Args:\"/dev/loop8\" Args:\"/dev/loop9\" Env:\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\" Env:\"HOSTNAME=65c9e71d324e\" Cwd:\"/\" Capabilities:<Bounding:\"CAP_CHOWN\" Bounding:\"CAP_DAC
_OVERRIDE\" Bounding:\"CAP_FSETID\" Bounding:\"CAP_FOWNER\" Bounding:\"CAP_MKNOD\" Bounding:\"CAP_NET_RAW\" Bounding:\"CAP_SETGID\" Bounding:\"CAP_SETUID\" Bounding:\"CAP_SETFCAP\" Bounding:\"CAP_SETPCAP\" Bounding:\"CAP_NET_BIND_SERVICE\" Bounding:\"CAP_SYS_CHROOT\" Bo
unding:\"CAP_KILL\" Bounding:\"CAP_AUDIT_WRITE\" Effective:\"CAP_CHOWN\" Effective:\"CAP_DAC_OVERRIDE\" Effective:\"CAP_FSETID\" Effective:\"CAP_FOWNER\" Effective:\"CAP_MKNOD\" Effective:\"CAP_NET_RAW\" Effective:\"CAP_SETGID\" Effective:\"CAP_SETUID\" Effective:\"CAP_
SETFCAP\" Effective:\"CAP_SETPCAP\" Effective:\"CAP_NET_BIND_SERVICE\" Effective:\"CAP_SYS_CHROOT\" Effective:\"CAP_KILL\" Effective:\"CAP_AUDIT_WRITE\" Inheritable:\"CAP_CHOWN\" Inheritable:\"CAP_DAC_OVERRIDE\" Inheritable:\"CAP_FSETID\" Inheritable:\"CAP_FOWNER\" Inhe
ritable:\"CAP_MKNOD\" Inheritable:\"CAP_NET_RAW\" Inheritable:\"CAP_SETGID\" Inheritable:\"CAP_SETUID\" Inheritable:\"CAP_SETFCAP\" Inheritable:\"CAP_SETPCAP\" Inheritable:\"CAP_NET_BIND_SERVICE\" Inheritable:\"CAP_SYS_CHROOT\" Inheritable:\"CAP_KILL\" Inheritable:\"CAP
_AUDIT_WRITE\" Permitted:\"CAP_CHOWN\" Permitted:\"CAP_DAC_OVERRIDE\" Permitted:\"CAP_FSETID\" Permitted:\"CAP_FOWNER\" Permitted:\"CAP_MKNOD\" Permitted:\"CAP_NET_RAW\" Permitted:\"CAP_SETGID\" Permitted:\"CAP_SETUID\" Permitted:\"CAP_SETFCAP\" Permitted:\"CAP_SETPCAP\
" Permitted:\"CAP_NET_BIND_SERVICE\" Permitted:\"CAP_SYS_CHROOT\" Permitted:\"CAP_KILL\" Permitted:\"CAP_AUDIT_WRITE\" > ApparmorProfile:\"docker-default\" > Root:<Path:\"/run/kata-containers/shared/containers/65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d
7c96/rootfs\" > Hostname:\"65c9e71d324e\" Mounts:<destination:\"/proc\" source:\"proc\" type:\"proc\" options:\"nosuid\" options:\"noexec\" options:\"nodev\" > Mounts:<destination:\"/dev\" source:\"tmpfs\" type:\"tmpfs\" options:\"nosuid\" options:\"strictatime\" option
s:\"mode=755\" options:\"size=65536k\" > Mounts:<destination:\"/dev/pts\" source:\"devpts\" type:\"devpts\" options:\"nosuid\" options:\"noexec\" options:\"newinstance\" options:\"ptmxmode=0666\" options:\"mode=0620\" options:\"gid=5\" > Mounts:<destination:\"/sys\" sou
rce:\"sysfs\" type:\"sysfs\" options:\"nosuid\" options:\"noexec\" options:\"nodev\" options:\"ro\" > Mounts:<destination:\"/sys/fs/cgroup\" source:\"cgroup\" type:\"cgroup\" options:\"ro\" options:\"nosuid\" options:\"noexec\" options:\"nodev\" > Mounts:<destination:\"
/dev/mqueue\" source:\"mqueue\" type:\"mqueue\" options:\"nosuid\" options:\"noexec\" options:\"nodev\" > Mounts:<destination:\"/etc/resolv.conf\" source:\"/run/kata-containers/shared/containers/65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96-0edc171328
38c667-resolv.conf\" type:\"bind\" options:\"rbind\" options:\"rprivate\" > Mounts:<destination:\"/etc/hostname\" source:\"/run/kata-containers/shared/containers/65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96-fe2d806d3fd6c734-hostname\" type:\"bind\" o
ptions:\"rbind\" options:\"rprivate\" > Mounts:<destination:\"/etc/hosts\" source:\"/run/kata-containers/shared/containers/65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96-76bc692f0cea5fc9-hosts\" type:\"bind\" options:\"rbind\" options:\"rprivate\" > Mo
unts:<destination:\"/dev/shm\" source:\"/run/kata-containers/sandbox/shm\" type:\"bind\" options:\"rbind\" > Linux:<Resources:<Memory:<> CPU:<> > CgroupsPath:\"/docker/65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96\" Namespaces:<Type:\"mount\" > Namesp
aces:<Type:\"uts\" > Namespaces:<Type:\"ipc\" > Devices:<Path:\"/dev/loop0\" Type:\"b\" Major:7 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop1\" Type:\"b\" Major:7 Minor:1 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop2\" Type:\"b\" Major:7 Minor:2 FileMode:25008 G
ID:6 > Devices:<Path:\"/dev/loop3\" Type:\"b\" Major:7 Minor:3 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop4\" Type:\"b\" Major:7 Minor:4 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop5\" Type:\"b\" Major:7 Minor:5 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop6
\" Type:\"b\" Major:7 Minor:6 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop7\" Type:\"b\" Major:7 Minor:7 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop8\" Type:\"b\" Major:7 Minor:8 FileMode:25008 GID:6 > Devices:<Path:\"/dev/loop9\" Type:\"b\" Major:7 Minor:9 Fil
eMode:25008 GID:6 > MaskedPaths:\"/proc/acpi\" MaskedPaths:\"/proc/kcore\" MaskedPaths:\"/proc/keys\" MaskedPaths:\"/proc/latency_stats\" MaskedPaths:\"/proc/timer_list\" MaskedPaths:\"/proc/timer_stats\" MaskedPaths:\"/proc/sched_debug\" MaskedPaths:\"/proc/scsi\" Mask
edPaths:\"/sys/firmware\" ReadonlyPaths:\"/proc/asound\" ReadonlyPaths:\"/proc/bus\" ReadonlyPaths:\"/proc/fs\" ReadonlyPaths:\"/proc/irq\" ReadonlyPaths:\"/proc/sys\" ReadonlyPaths:\"/proc/sysrq-trigger\" > > " source=virtcontainers subsystem=kata_agent
Jul 28 13:17:05 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:05.042401096Z" level=info msg="Get Sandbox Console" arch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 function=getSandboxConsole id=65c9e71d324e1bc
16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 name=kata-runtime pid=34005 source=virtcontainers subsystem=cloudHypervisor
Jul 28 13:17:05 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:05.048022643Z" level=debug msg="Setting container state from  to ready" arch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 name=kata-runtime pid=340
05 sandbox=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 source=virtcontainers subsystem=container
Jul 28 13:17:05 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:05.051038236Z" level=debug msg="Request to hypervisor to update vCPUs" arch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 cpus-sandbox=1 name=kata-r
untime pid=34005 sandbox=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 source=virtcontainers subsystem=sandbox
Jul 28 13:17:05 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:05.051248457Z" level=debug msg="Request VM info to hypervisor" arch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 name=kata-runtime pid=34005 source
=virtcontainers subsystem=cloudHypervisor
Jul 28 13:17:08 clh-qemu-50 kata-runtime[34005]: time="2020-07-28T13:17:08.356263607Z" level=warning msg="VmInfoGet failed" arch=amd64 command=create container=65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96 error="error: Get http://localhost/api/v1/vm.
info: dial unix /run/vc/vm/65c9e71d324e1bc16791946720bce65222f24a0d03263ae62ed5551abd4d7c96/clh-api.sock: connect: connection refused reason: " name=kata-runtime pid=34005 source=virtcontainers subsystem=cloudHypervisor

Here a partial log of clh: https://dpaste.com/E7RWJML22

@jcvenegas
Copy link
Copy Markdown
Member Author

/test-clh-podman

@jcvenegas
Copy link
Copy Markdown
Member Author

/test-clh-metrics

@jcvenegas
Copy link
Copy Markdown
Member Author

/test-metrics-virtiofs

@jcvenegas jcvenegas requested a review from a team as a code owner August 11, 2020 18:11
Update to qemu 5.0.x with support for virtiofs + dax.

Depends-on: github.com/kata-containers/packaging#1097
Depends-on: github.com/kata-containers/tests#2737

Fixes: kata-containers#2848

Signed-off-by: Jose Carlos Venegas Munoz <jose.carlos.venegas.munoz@intel.com>
Highlights for cloud-hypervisor version 0.9.0 include:
virtiofs updates to new dax implementation based in qemu 5.0
Fixed random issues caused due to seccomp filters

io_uring Based Block Device Support

If the io_uring feature is enabled and the host kernel supports it then io_uring will be used for block devices. This results a very significant performance improvement.
Block and Network Device Statistics

Statistics for activity of the virtio network and block devices is now exposed through a new vm.counters HTTP API entry point. These take the form of simple counters which can be used to observe the activity of the VM.
HTTP API Responses

The HTTP API for adding devices now responds with the name that was assigned to the device as well the PCI BDF.
CPU Topology

A topology parameter has been added to --cpus which allows the configuration of the guest CPU topology allowing the user to specify the numbers of sockets, packages per socket, cores per package and threads per core.
Release Build Optimization

Our release build is now built with LTO (Link Time Optimization) which results in a ~20% reduction in the binary size.
Hypervisor Abstraction

A new abstraction has been introduced, in the form of a hypervisor crate so as to enable the support of additional hypervisors beyond KVM.
Snapshot/Restore Improvements

Multiple improvements have been made to the VM snapshot/restore support that was added in the last release. This includes persisting more vCPU state and in particular preserving the guest paravirtualized clock in order to avoid vCPU hangs inside the guest when running with multiple vCPUs.
Virtio Memory Ballooning Support

A virtio-balloon device has been added, controlled through the resize control, which allows the reclamation of host memory by resizing a memory balloon inside the guest.
Enhancements to ARM64 Support

The ARM64 support introduced in the last release has been further enhanced with support for using PCI for exposing devices into the guest as well as multiple bug fixes. It also now supports using an initramfs when booting.
Intel SGX Support

The guest can now use Intel SGX if the host supports it. Details can be found in the dedicated SGX documentation.
Seccomp Sandbox Improvements

The most frequently used virtio devices are now isolated with their own seccomp filters. It is also now possible to pass --seccomp=log which result in the logging of requests that would have otherwise been denied to further aid development.
Notable Bug Fixes

    Our virtio-vsock implementation has been resynced with the implementation from Firecracker and includes multiple bug fixes.
    CPU hotplug has been fixed so that it is now possible to add, remove, and re-add vCPUs (kata-containers#1338)
    A workaround is now in place for when KVM reports MSRs available MSRs that are in fact unreadable preventing snapshot/restore from working correctly (kata-containers#1543).
    virtio-mmio based devices are now more widely tested (kata-containers#275).
    Multiple issues have been fixed with virtio device configuration (kata-containers#1217)
    Console input was wrongly consumed by both virtio-console and the serial. (kata-containers#1521)

Fixes: kata-containers#2864

Signed-off-by: Jose Carlos Venegas Munoz <jose.carlos.venegas.munoz@intel.com>
Update api geneated by openapi.

Signed-off-by: Jose Carlos Venegas Munoz <jose.carlos.venegas.munoz@intel.com>
API now requires cpu topology.

Signed-off-by: Jose Carlos Venegas Munoz <jose.carlos.venegas.munoz@intel.com>
@jcvenegas
Copy link
Copy Markdown
Member Author

/test-clh-docker

@jcvenegas
Copy link
Copy Markdown
Member Author

/test-virtiofs

jcvenegas added a commit to jcvenegas/kata-packaging that referenced this pull request Aug 12, 2020
Update build scripts for qemu-virtiofs

Depends-on: github.com/kata-containers/runtime#2840
Depends-on: github.com/kata-containers/tests#2737

Fixes: github.com/kata-containers/runtime#2848

Signed-off-by: Jose Carlos Venegas Munoz <jose.carlos.venegas.munoz@intel.com>
jcvenegas added a commit to jcvenegas/kata-packaging that referenced this pull request Aug 12, 2020
Update build scripts for qemu-virtiofs

Depends-on: github.com/kata-containers/runtime#2840
Depends-on: github.com/kata-containers/tests#2737

Fixes: github.com/kata-containers/runtime#2848

Signed-off-by: Jose Carlos Venegas Munoz <jose.carlos.venegas.munoz@intel.com>
jcvenegas added a commit to jcvenegas/kata-packaging that referenced this pull request Aug 12, 2020
Update build scripts for qemu-virtiofs.

- virtiofs-0.3 patches are not needed
- Sync build on how vanilla qemu is built
- Apply patches for virtiofsd if any (none today)
- Apply patches that are used for the qemu vanilla
- Apply patches in order

Depends-on: github.com/kata-containers/runtime#2840
Depends-on: github.com/kata-containers/tests#2737

Fixes: github.com/kata-containers/runtime#2848

Signed-off-by: Jose Carlos Venegas Munoz <jose.carlos.venegas.munoz@intel.com>
@jcvenegas
Copy link
Copy Markdown
Member Author

/test

Copy link
Copy Markdown
Contributor

@likebreath likebreath left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. Thanks, @jcvenegas. Are we ready to merge the PR w/ few CI jobs failing?

@jcvenegas
Copy link
Copy Markdown
Member Author

/test-clh-podman

@likebreath
Copy link
Copy Markdown
Contributor

likebreath commented Aug 13, 2020

It looks like the fedora-31 CI is still failing on the docker: command not found error:

I was looking at the wrong CI log, and the current failure seems to be a different one (CI log):

10:19:34 STEP 5: RUN echo 'source $HOME/.cargo/env' >> $HOME/.bashrc
10:19:47 --> 6240ad6066f
10:19:47 STEP 6: ENV PATH="/root/.cargo/bin:${PATH}"
10:19:47 STEP 7: COMMIT cloud-hypervisor-builder
10:19:47 --> b2a81dfc01e
10:21:47 FATAL: command execution failed

@likebreath
Copy link
Copy Markdown
Contributor

/test-clh-metrics
Double check whether the metrics CI is working.

@likebreath
Copy link
Copy Markdown
Contributor

likebreath commented Aug 13, 2020

The metrics CI is failing on the error Failed to load JSON (CI log). We saw this failure before and what we did was normally restart the CI.

/test-clh-metrics

@likebreath
Copy link
Copy Markdown
Contributor

Merging the PR given the failing CI (e.g. ARM, clh-fedora-31, and sles) have not been passing for a while and are not related to the changes from this PR.

@likebreath likebreath changed the title dnm: versions: Update qemu-virtiofs to 5.0 and cloud-hypervisor 0.9 versions: Update qemu-virtiofs to 5.0 and cloud-hypervisor 0.9 Aug 13, 2020
@likebreath likebreath removed the do-not-merge PR has problems or depends on another label Aug 13, 2020
@likebreath likebreath merged commit d4be90a into kata-containers:master Aug 13, 2020
@likebreath
Copy link
Copy Markdown
Contributor

I just noticed that the following dependent PRs are not landed yet. Any blockers to merge them? @jcvenegas @amshinde

Depends-on: github.com/kata-containers/packaging#1097
Depends-on: github.com/kata-containers/tests#2737

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

versions: Move qemu-experimental to qemu-virtiofs based on 5.0

6 participants