libvirt List Archives
Sign In
Sign Up
Manage this list
Sign In
Sign Up
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
CI
Thread
Start a new thread
Download
Threads by
month
----- 2025 -----
September
August
July
June
May
April
March
February
January
----- 2024 -----
December
November
October
September
August
July
June
May
April
March
February
January
----- 2023 -----
December
November
October
September
August
July
June
May
April
March
February
January
----- 2022 -----
December
November
October
September
August
July
June
May
April
March
February
January
----- 2021 -----
December
November
October
September
August
July
June
May
April
March
February
January
----- 2020 -----
December
November
October
September
August
July
June
May
April
March
February
January
----- 2019 -----
December
November
October
September
August
July
June
May
April
March
February
January
----- 2018 -----
December
November
October
September
August
July
June
May
April
March
February
January
----- 2017 -----
December
November
October
September
August
July
June
May
April
March
February
January
----- 2016 -----
December
November
October
September
August
July
ci@lists.libvirt.org
March 2021
2 participants
47 discussions
Failed pipeline for master | libvirt-go-xml | a3b0e660
by GitLab
08 Mar '21
08 Mar '21
Pipeline #267369988 has failed! Project: libvirt-go-xml (
https://gitlab.com/libvirt/libvirt-go-xml
) Branch: master (
https://gitlab.com/libvirt/libvirt-go-xml/-/commits/master
) Commit: a3b0e660 (
https://gitlab.com/libvirt/libvirt-go-xml/-/commit/a3b0e6608ffde5643d9d4f18…
) Commit Message: Add support for teaming for PCI hostdevs Signe... Commit Author: Daniel P_ Berrangé (
https://gitlab.com/berrange
) Pipeline #267369988 (
https://gitlab.com/libvirt/libvirt-go-xml/-/pipelines/267369988
) triggered by Daniel P_ Berrangé (
https://gitlab.com/berrange
) had 5 failed builds. Job #1082307026 (
https://gitlab.com/libvirt/libvirt-go-xml/-/jobs/1082307026/raw
) Stage: build Name: go_1_14 Job #1082307020 (
https://gitlab.com/libvirt/libvirt-go-xml/-/jobs/1082307020/raw
) Stage: build Name: go_1_12 Job #1082307014 (
https://gitlab.com/libvirt/libvirt-go-xml/-/jobs/1082307014/raw
) Stage: build Name: go_1_11 Job #1082307013 (
https://gitlab.com/libvirt/libvirt-go-xml/-/jobs/1082307013/raw
) Stage: build Name: go_1_10 Job #1082307022 (
https://gitlab.com/libvirt/libvirt-go-xml/-/jobs/1082307022/raw
) Stage: build Name: go_1_13 -- You're receiving this email because of your account on
gitlab.com
.
1
0
0
0
New Defects reported by Coverity Scan for libvirt
by scan-admin@coverity.com
06 Mar '21
06 Mar '21
Hi, Please find the latest report on new defect(s) introduced to libvirt found with Coverity Scan. 9 new defect(s) introduced to libvirt found with Coverity Scan. 2 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan. New defect(s) Reported-by: Coverity Scan Showing 9 of 9 defect(s) ** CID 314804: Memory - corruptions (OVERRUN) ________________________________________________________________________________________________________ *** CID 314804: Memory - corruptions (OVERRUN) /src/util/virdevmapper.c: 243 in virDevMapperGetTargetsImpl() 237 if (!virIsDevMapperDevice(path)) 238 return 0; 239 240 if (!(sanitizedPath = virDMSanitizepath(path))) 241 return 0; 242 >>> CID 314804: Memory - corruptions (OVERRUN) >>> Overrunning array "dm.name" of 128 bytes by passing it to a function which accesses it at byte offset 3241737482 using argument "3241737483UL". 243 if (virStrcpy(dm.name, sanitizedPath, DM_TABLE_DEPS) < 0) { 244 virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s", 245 _("Resolved device mapper name too long")); 246 return -1; 247 } 248 ** CID 314803: (OVERRUN) ________________________________________________________________________________________________________ *** CID 314803: (OVERRUN) /src/nwfilter/nwfilter_ebiptables_driver.c: 2325 in ebtablesCreateRuleInstance() 2319 if (printDataType(vars, 2320 number, sizeof(number), 2321 &rule->p.ipv6HdrFilter.dataICMPTypeStart) < 0) 2322 return -1; 2323 lo = true; 2324 } else { >>> CID 314803: (OVERRUN) >>> Overrunning array ""0"" of 2 bytes by passing it to a function which accesses it at byte offset 20 using argument "21UL". 2325 ignore_value(virStrcpyStatic(number, "0")); 2326 } 2327 2328 virBufferStrcat(&buf, number, ":", NULL); 2329 2330 if (HAS_ENTRY_ITEM(&rule->p.ipv6HdrFilter.dataICMPTypeEnd)) { /src/nwfilter/nwfilter_ebiptables_driver.c: 2353 in ebtablesCreateRuleInstance() 2347 if (printDataType(vars, 2348 number, sizeof(number), 2349 &rule->p.ipv6HdrFilter.dataICMPCodeStart) < 0) 2350 return -1; 2351 lo = true; 2352 } else { >>> CID 314803: (OVERRUN) >>> Overrunning array ""0"" of 2 bytes by passing it to a function which accesses it at byte offset 20 using argument "21UL". 2353 ignore_value(virStrcpyStatic(number, "0")); 2354 } 2355 2356 virBufferStrcat(&buf, number, ":", NULL); 2357 2358 if (HAS_ENTRY_ITEM(&rule->p.ipv6HdrFilter.dataICMPCodeEnd)) { /src/nwfilter/nwfilter_ebiptables_driver.c: 2367 in ebtablesCreateRuleInstance() 2361 &rule->p.ipv6HdrFilter.dataICMPCodeEnd) < 0) 2362 return -1; 2363 } else { 2364 if (lo) 2365 ignore_value(virStrcpyStatic(numberalt, number)); 2366 else >>> CID 314803: (OVERRUN) >>> Overrunning array ""255"" of 4 bytes by passing it to a function which accesses it at byte offset 20 using argument "21UL". 2367 ignore_value(virStrcpyStatic(numberalt, "255")); 2368 } 2369 2370 virBufferStrcat(&buf, numberalt, NULL); 2371 2372 if (ENTRY_WANT_NEG_SIGN(&rule->p.ipv6HdrFilter.dataICMPTypeStart)) ** CID 314802: Null pointer dereferences (FORWARD_NULL) ________________________________________________________________________________________________________ *** CID 314802: Null pointer dereferences (FORWARD_NULL) /tests/virtypedparamtest.c: 139 in testTypedParamsAddStringList() 133 int nparams = 0, maxparams = 0, i; 134 135 const char *values[] = { 136 "foo", "bar", "foobar", NULL 137 }; 138 >>> CID 314802: Null pointer dereferences (FORWARD_NULL) >>> Passing "¶ms" to "virTypedParamsAddStringList", which dereferences null "params". 139 rv = virTypedParamsAddStringList(¶ms, &nparams, &maxparams, "param", 140 values); 141 142 for (i = 0; i < nparams; i++) { 143 if (STRNEQ(params[i].field, "param") || 144 STRNEQ(params[i].value.s, values[i]) || ** CID 314801: Memory - corruptions (OVERRUN) ________________________________________________________________________________________________________ *** CID 314801: Memory - corruptions (OVERRUN) /src/util/virlog.c: 949 in virLogOutputToJournald() 943 nmetadata++; 944 } 945 } 946 947 memset(&sa, 0, sizeof(sa)); 948 sa.sun_family = AF_UNIX; >>> CID 314801: Memory - corruptions (OVERRUN) >>> Overrunning array ""/run/systemd/journal/socket"" of 28 bytes by passing it to a function which accesses it at byte offset 107 using argument "108UL". 949 if (virStrcpyStatic(sa.sun_path, "/run/systemd/journal/socket") < 0) 950 return; 951 952 memset(&mh, 0, sizeof(mh)); 953 mh.msg_name = &sa; 954 mh.msg_namelen = offsetof(struct sockaddr_un, sun_path) + strlen(sa.sun_path); ** CID 314800: Memory - corruptions (OVERRUN) ________________________________________________________________________________________________________ *** CID 314800: Memory - corruptions (OVERRUN) /src/util/virnetdevvportprofile.c: 1054 in virNetDevVPortProfileOp8021Qbg() 1048 1049 if (!ifname) 1050 return -1; 1051 1052 vf = PORT_SELF_VF; 1053 >>> CID 314800: Memory - corruptions (OVERRUN) >>> Overrunning array "physdev_ifname" of 16 bytes by passing it to a function which accesses it at byte offset 23. 1054 if (virNetDevVPortProfileGetPhysdevAndVlan(ifname, &physdev_ifindex, 1055 physdev_ifname, &vlanid) < 0) { 1056 return -1; 1057 } 1058 1059 if (vlanid < 0) ** CID 314799: Memory - corruptions (OVERRUN) ________________________________________________________________________________________________________ *** CID 314799: Memory - corruptions (OVERRUN) /src/locking/lock_driver_sanlock.c: 205 in virLockManagerSanlockSetupLockspace() 199 char *dir = NULL; 200 int retries = LOCKSPACE_RETRIES; 201 202 path = g_strdup_printf("%s/%s", driver->autoDiskLeasePath, 203 VIR_LOCK_MANAGER_SANLOCK_AUTO_DISK_LOCKSPACE); 204 >>> CID 314799: Memory - corruptions (OVERRUN) >>> Overrunning array ""__LIBVIRT__DISKS__"" of 19 bytes by passing it to a function which accesses it at byte offset 47 using argument "48UL". 205 if (virStrcpyStatic(ls.name, 206 VIR_LOCK_MANAGER_SANLOCK_AUTO_DISK_LOCKSPACE) < 0) { 207 virReportError(VIR_ERR_INTERNAL_ERROR, 208 _("Lockspace path '%s' exceeded %d characters"), 209 VIR_LOCK_MANAGER_SANLOCK_AUTO_DISK_LOCKSPACE, 210 SANLK_PATH_LEN); ** CID 314798: Memory - corruptions (OVERRUN) ________________________________________________________________________________________________________ *** CID 314798: Memory - corruptions (OVERRUN) /tools/virsh-domain-monitor.c: 2033 in cmdList() 2027 2028 dom = list->domains[i]; 2029 id = virDomainGetID(dom); 2030 if (id != (unsigned int) -1) 2031 g_snprintf(id_buf, sizeof(id_buf), "%d", id); 2032 else >>> CID 314798: Memory - corruptions (OVERRUN) >>> Overrunning array ""-"" of 2 bytes by passing it to a function which accesses it at byte offset 20 using argument "21UL". 2033 ignore_value(virStrcpyStatic(id_buf, "-")); 2034 2035 if (optTable) { 2036 state = virshDomainState(ctl, dom, NULL); 2037 2038 /* Domain could've been removed in the meantime */ ** CID 314797: Memory - corruptions (OVERRUN) ________________________________________________________________________________________________________ *** CID 314797: Memory - corruptions (OVERRUN) /src/locking/lock_driver_sanlock.c: 614 in virLockManagerSanlockAddDisk() 608 virReportError(VIR_ERR_INTERNAL_ERROR, 609 _("Lease path '%s' exceeds %d characters"), 610 path, SANLK_PATH_LEN); 611 return -1; 612 } 613 >>> CID 314797: Memory - corruptions (OVERRUN) >>> Overrunning array ""__LIBVIRT__DISKS__"" of 19 bytes by passing it to a function which accesses it at byte offset 47 using argument "48UL". 614 if (virStrcpy(res->lockspace_name, 615 VIR_LOCK_MANAGER_SANLOCK_AUTO_DISK_LOCKSPACE, 616 SANLK_NAME_LEN) < 0) { 617 virReportError(VIR_ERR_INTERNAL_ERROR, 618 _("Resource lockspace '%s' exceeds %d characters"), 619 VIR_LOCK_MANAGER_SANLOCK_AUTO_DISK_LOCKSPACE, SANLK_NAME_LEN); ** CID 309208: Memory - illegal accesses (USE_AFTER_FREE) ________________________________________________________________________________________________________ *** CID 309208: Memory - illegal accesses (USE_AFTER_FREE) /src/qemu/qemu_driver.c: 7041 in qemuDomainAttachDeviceLive() 7035 virObjectEventPtr event; 7036 event = virDomainEventDeviceAddedNewFromObj(vm, alias); 7037 virObjectEventStateQueue(driver->domainEventState, event); 7038 } 7039 7040 if (ret == 0) >>> CID 309208: Memory - illegal accesses (USE_AFTER_FREE) >>> Calling "qemuDomainUpdateDeviceList" dereferences freed pointer "driver->config". 7041 ret = qemuDomainUpdateDeviceList(driver, vm, QEMU_ASYNC_JOB_NONE); 7042 7043 return ret; 7044 } 7045 7046 ________________________________________________________________________________________________________ To view the defects in Coverity Scan visit,
https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P…
1
0
0
0
Failed pipeline for master | libvirt | bfbed3c7
by GitLab
05 Mar '21
05 Mar '21
Pipeline #265955598 has failed! Project: libvirt (
https://gitlab.com/libvirt/libvirt
) Branch: master (
https://gitlab.com/libvirt/libvirt/-/commits/master
) Commit: bfbed3c7 (
https://gitlab.com/libvirt/libvirt/-/commit/bfbed3c7184e7bc562b7146fa249d80…
) Commit Message: docs: Document qemu.conf locations Surprisingl... Commit Author: Michal Privoznik Pipeline #265955598 (
https://gitlab.com/libvirt/libvirt/-/pipelines/265955598
) triggered by Michal Prívozník (
https://gitlab.com/MichalPrivoznik
) had 1 failed build. Job #1075775139 (
https://gitlab.com/libvirt/libvirt/-/jobs/1075775139/raw
) Stage: builds Name: x64-debian-10 -- You're receiving this email because of your account on
gitlab.com
.
1
0
0
0
Failed pipeline for master | libvirt | f81d504b
by GitLab
05 Mar '21
05 Mar '21
Pipeline #265844316 has failed! Project: libvirt (
https://gitlab.com/libvirt/libvirt
) Branch: master (
https://gitlab.com/libvirt/libvirt/-/commits/master
) Commit: f81d504b (
https://gitlab.com/libvirt/libvirt/-/commit/f81d504b71a86ed501f8caca2f08613…
) Commit Message: util: Drop virFileMakePath() and virFileMakePat... Commit Author: Michal Privoznik Pipeline #265844316 (
https://gitlab.com/libvirt/libvirt/-/pipelines/265844316
) triggered by Pavel Hrdina (
https://gitlab.com/phrdina
) had 1 failed build. Job #1075214839 (
https://gitlab.com/libvirt/libvirt/-/jobs/1075214839/raw
) Stage: builds Name: coverity -- You're receiving this email because of your account on
gitlab.com
.
1
0
0
0
Failed pipeline for master | libvirt | 9386eada
by GitLab
04 Mar '21
04 Mar '21
Pipeline #265589405 has failed! Project: libvirt (
https://gitlab.com/libvirt/libvirt
) Branch: master (
https://gitlab.com/libvirt/libvirt/-/commits/master
) Commit: 9386eada (
https://gitlab.com/libvirt/libvirt/-/commit/9386eadad464194df06ebb02ad4f5a9…
) Commit Message: build: Require glib >= 2.56 There are a few u... Commit Author: Jim Fehlig (
https://gitlab.com/jfehlig
) Pipeline #265589405 (
https://gitlab.com/libvirt/libvirt/-/pipelines/265589405
) triggered by Jim Fehlig (
https://gitlab.com/jfehlig
) had 1 failed build. Job #1073922686 (
https://gitlab.com/libvirt/libvirt/-/jobs/1073922686/raw
) Stage: builds Name: armv6l-debian-10 -- You're receiving this email because of your account on
gitlab.com
.
1
0
0
0
Failed pipeline for master | libvirt | a924927c
by GitLab
04 Mar '21
04 Mar '21
Pipeline #265295650 has failed! Project: libvirt (
https://gitlab.com/libvirt/libvirt
) Branch: master (
https://gitlab.com/libvirt/libvirt/-/commits/master
) Commit: a924927c (
https://gitlab.com/libvirt/libvirt/-/commit/a924927c39c22e57e4eb559ef0ccd96…
) Commit Message: vircgroup: drop unused function virCgroupSetupC... Commit Author: Pavel Hrdina (
https://gitlab.com/phrdina
) Pipeline #265295650 (
https://gitlab.com/libvirt/libvirt/-/pipelines/265295650
) triggered by Pavel Hrdina (
https://gitlab.com/phrdina
) had 3 failed builds. Job #1072440549 (
https://gitlab.com/libvirt/libvirt/-/jobs/1072440549/raw
) Stage: builds Name: x64-freebsd-11-build Job #1072440552 (
https://gitlab.com/libvirt/libvirt/-/jobs/1072440552/raw
) Stage: builds Name: x64-macos-11-build Job #1072440550 (
https://gitlab.com/libvirt/libvirt/-/jobs/1072440550/raw
) Stage: builds Name: x64-freebsd-12-build -- You're receiving this email because of your account on
gitlab.com
.
1
0
0
0
New Defects reported by Coverity Scan for libvirt
by scan-admin@coverity.com
03 Mar '21
03 Mar '21
Hi, Please find the latest report on new defect(s) introduced to libvirt found with Coverity Scan. 2 new defect(s) introduced to libvirt found with Coverity Scan. 1 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan. New defect(s) Reported-by: Coverity Scan Showing 2 of 2 defect(s) ** CID 314770: Memory - corruptions (USE_AFTER_FREE) ________________________________________________________________________________________________________ *** CID 314770: Memory - corruptions (USE_AFTER_FREE) /src/qemu/qemu_extdevice.c: 138 in qemuExtDevicesPrepareHost() 132 virDomainDefPtr def = vm->def; 133 size_t i; 134 135 if (qemuExtDevicesInitPaths(driver, def) < 0) 136 return -1; 137 >>> CID 314770: Memory - corruptions (USE_AFTER_FREE) >>> Calling "qemuExtTPMPrepareHost" frees pointer "driver->config" which has already been freed. 138 if (def->ntpms > 0 && 139 qemuExtTPMPrepareHost(driver, def) < 0) 140 return -1; 141 142 for (i = 0; i < def->nnets; i++) { 143 virDomainNetDefPtr net = def->nets[i]; ** CID 314769: Null pointer dereferences (FORWARD_NULL) /src/util/virfirewall.c: 769 in virFirewallApply() ________________________________________________________________________________________________________ *** CID 314769: Null pointer dereferences (FORWARD_NULL) /src/util/virfirewall.c: 769 in virFirewallApply() 763 */ 764 virReportError(VIR_ERR_INTERNAL_ERROR, "%s", 765 _("Failed to initialize a valid firewall backend")); 766 goto cleanup; 767 } 768 if (!firewall || firewall->err) { >>> CID 314769: Null pointer dereferences (FORWARD_NULL) >>> Dereferencing null pointer "firewall". 769 virReportSystemError(firewall->err, "%s", 770 _("Unable to create rule")); 771 goto cleanup; 772 } 773 774 VIR_DEBUG("Applying groups for %p", firewall); ________________________________________________________________________________________________________ To view the defects in Coverity Scan visit,
https://u15810271.ct.sendgrid.net/ls/click?upn=HRESupC-2F2Czv4BOaCWWCy7my0P…
1
0
0
0
← Newer
1
2
3
4
5
Older →
Jump to page:
1
2
3
4
5
Results per page:
10
25
50
100
200