[Bug 1292234] Re: qcow2 image corruption in trusty (qemu 1.7 and 2.0 candidate)
Serge Hallyn
1292234 at bugs.launchpad.net
Mon Sep 22 21:45:03 UTC 2014
On my main server (3.13.0-32-generic with precise userspace) I installed
a trusty container with ext3 (LVM) backing store. There I installed uvt
and created 4 VMs, 2 precise amd64 and 2 precise i386. I several times
did:
ubuntu at uvttest:~$ cat list
p-precise-server-amd64
p-precise-server-i386
q-precise-server-i386
q-precise-server-amd64
ubuntu at uvttest:~$ for n in `cat list`; do uvt start -fr $n; done
ubuntu at uvttest:~$ for n in `cat list`; do tmux splitw -p 25 -t $TMUX_PANE "expect vmupgrade.expect $n"; done
where vmupgrade.expect is:
=================================================================
#!/usr/bin/expect
set container [lrange $argv 0 0]
spawn ssh $container
#expect "assword:"
#send -- "ubuntu\r"
expect "$container:~$"
send -- "export DEBIAN_FRONTEND=noninteractive\r"
send -- "sudo sed -i 's/never/lts/' /etc/update-manager/release-upgrades\r"
expect "assword for ubuntu:"
send -- "ubuntu\r"
expect "$container:~$"
send -- "sudo apt-get update\r"
expect "$container:~$"
send -- "sudo do-release-upgrade -f DistUpgradeViewNonInteractive\r"
set timeout 11000
expect "$container:~$"
send -- "sudo reboot\r"
=================================================================
Then I find /lib -name xxx; sudo reboot; find /lib -name xxx; and look
through dmesg for errors, then do
ubuntu at uvttest:~$ for n in `cat list`; do uvt stop -fr $n; done
Alas I've seen no corruption yet. The goal here isn't just to reproduce
it, but to do so reliably enough to be able to bisect - this isn't it :(
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1292234
Title:
qcow2 image corruption in trusty (qemu 1.7 and 2.0 candidate)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1292234/+subscriptions
More information about the Ubuntu-server-bugs
mailing list