From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by sourceware.org (Postfix) with ESMTPS id DA9E93858D32 for ; Fri, 3 Nov 2023 17:42:10 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org DA9E93858D32 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=redhat.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org DA9E93858D32 Authentication-Results: server2.sourceware.org; arc=none smtp.remote-ip=170.10.133.124 ARC-Seal: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1699033332; cv=none; b=F2D0qLXGbJaY1fyAd00txawFRhMbl1+L8+emDNA3GJYHwYKh30+CMKXT5Ym2b000coPxL5Ua9UkYExnAgPH3h5Dd/swSXYy9EFq+sqBlB/B7/grj6iI9ybhaAhSBlLV2U/zHZqaFOCtKgyzUS6/RX5YWHpojYDZVU4TFyWFkGaw= ARC-Message-Signature: i=1; a=rsa-sha256; d=sourceware.org; s=key; t=1699033332; c=relaxed/simple; bh=oZpR59pKjPGYm/NwYyd43faQ5OKc/XVykRSlAuXGVus=; h=DKIM-Signature:Message-ID:Date:MIME-Version:Subject:To:From; b=PzHc23IeN0b/WmIC5jW+O7bp0mwook/XR3kiVsNHlDYh7g1nNNlttoKJpFdRWZj9UjoRXtB+GVwVMuyOllo+wfN6neY/OIAUrF0BVrnQ1KOwpN+TJZOE7j4T9peg+zSIvbImeb974gN6jBobBZhPLTmDwfm5nMSSgIN0Q5H3HQ0= ARC-Authentication-Results: i=1; server2.sourceware.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1699033330; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=mljQl8MUd2XhHPFSGBVD6gBzBHCzGDHSL+qqZlF9HKA=; b=iYjniojDcKovJUu1GK/UxLEq02VFmiuk3CsVDlPvFs+/DbBzzWUNKoYvqf3J4T4KtXt9z5 csdaZGvRp6dV6Ne4MlQ1bbWY/g857sBij81C+a/Ya24uChJEzmfbwUHA29lqn3Gr7RmSPf RyG484TcA1GDGLne7WVDqcyyN+wR42U= Received: from mimecast-mx02.redhat.com (mx-ext.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-672-ZDoX4q8bNBut9LYGgVLZeA-1; Fri, 03 Nov 2023 13:42:09 -0400 X-MC-Unique: ZDoX4q8bNBut9LYGgVLZeA-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.rdu2.redhat.com [10.11.54.2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 19BFA2801E48 for ; Fri, 3 Nov 2023 17:42:09 +0000 (UTC) Received: from [10.22.16.46] (unknown [10.22.16.46]) by smtp.corp.redhat.com (Postfix) with ESMTP id DD0C340C6EBF; Fri, 3 Nov 2023 17:42:08 +0000 (UTC) Message-ID: <6b91a0f0-174f-482c-981d-0bbd4e5c0352@redhat.com> Date: Fri, 3 Nov 2023 13:42:08 -0400 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Cc: wcohen@redhat.com, systemtap@sourceware.org Subject: Re: Systmetap Testsuite results and areas to fix To: Martin Cermak References: <9f9d8e3a-fad6-4481-834b-d16771bcee3b@redhat.com> <20231103145821.ekt5wler6r74yqyj@lida.tpb.lab.eng.brq.redhat.com> From: William Cohen In-Reply-To: <20231103145821.ekt5wler6r74yqyj@lida.tpb.lab.eng.brq.redhat.com> X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.2 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE,TXREP,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: On 11/3/23 10:58, Martin Cermak wrote: > On Thu 2023-11-02 13:48 , William Cohen via Systemtap wrote: >> Overall on x86_64 RHEL8/RHEL9/F38/rawhide the systemtap testsuite >> complete. There are still on the order of 1500 failures on the x86_64 >> machine, which is more than desired. >> >> I went looking for failures/issues in the testsuite that cause multiple >> failures in the the test results. For example previously fixed >> runtime to avoid conflicts with added glibc functions to allow dyninst >> code to build without error on Fedora rawhide and turn off gcc warning >> about string ops for the syscall tests to allow the test to be built. >> >> - A number of the syscall test fail because the syscall string >> argument is not properly fetched and printed. This appears to be a >> large portion of the 700 syscall.exp failures. >> >> >> - About 200 of the "listing_mode" tests fail. They all reported: >> >> received: "child process exited abnormally" >> >> Going to investigate this more closely. I tracked this down to DWARF5 call site information being different than DWARF4 (pr31028). A fix has been pushed upstream for this and should eliminate these (and some other failures). >> >> >> - About 150 of the tracepoints_list tests fail. Most are reporting >> "not found by systemtap" but a few ('dlm', sof', and 'sof_int') fail >> compilation because headers are not found. >> >> >> - Approximately 130 failures in the tapset_functions.exp tests. >> This looks like an issue with the test itself rather than >> systemtap. A lot of messages of the form: >> >> FAIL: tapset_functions_stress (list_values(unknown)) >> FAIL: tapset_functions_stress (default_value(unknown)) > > I've looked into this one. I've found some issues there, but > none of them appeared to be a systemtap bug. After checking with > Frank on the channel, however, I've dropped this testcase entirely. > > m. The elimination of tapset_functions.exp test and addition of the DWARF5 callee will reduce the number of FAILs significantly. -Will>> >> Think this might have been by conscious language initiative changes >> (d1804e051dd) around november 2020. Going to check to see if >> systemtap-4.4 built before these patches has the >> systemtap.stress/tapset_functions.exp test work. >> >> -Will >> >