[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [xen-4.12-testing test] 143302: regressions - FAIL



On 29.10.2019 23:52, osstest service owner wrote:
> flight 143302 xen-4.12-testing real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/143302/
> 
> Regressions :-(
> 
> Tests which did not succeed and are blocking,
> including tests which could not be run:
>  test-amd64-i386-xl-qemut-ws16-amd64  7 xen-boot          fail REGR. vs. 
> 143190
>  test-amd64-amd64-livepatch    7 xen-boot                 fail REGR. vs. 
> 143190
>  test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 14 guest-saverestore.2 
> fail REGR. vs. 143190
>  test-amd64-i386-xl-raw      19 guest-start/debian.repeat fail REGR. vs. 
> 143190

Looking at this one I see

2019-10-29 19:40:59 Z executing ssh ... root@172.16.144.29 mkdir -p 
/var/lib/xen/images/debian
mount /dev/mapper/chardonnay1--vg-debian.stretch.guest.osstest--disk 
/var/lib/xen/images/debian;
 
mount: /dev/mapper/chardonnay1--vg-debian.stretch.guest.osstest--disk is 
already mounted or /var/lib/xen/images/debian busy
       /dev/mapper/chardonnay1--vg-debian.stretch.guest.osstest--disk is 
already mounted on /var/lib/xen/images/debian
2019-10-29 19:41:00 Z command nonzero waitstatus 8192: timeout 60 ssh -o 
StrictHostKeyChecking=no -o BatchMode=yes -o ConnectTimeout=100 -o 
ServerAliveInterval=100 -o PasswordAuthentication=no -o 
ChallengeResponseAuthentication=no -o 
UserKnownHostsFile=tmp/t.known_hosts_143302.test-amd64-i386-xl-raw 
root@172.16.144.29 mkdir -p /var/lib/xen/images/debian
mount /dev/mapper/chardonnay1--vg-debian.stretch.guest.osstest--disk 
/var/lib/xen/images/debian;
 
status 8192 at Osstest/TestSupport.pm line 550.

It shouldn't be timeout, so I assume it's the mount that fails.
Some new glitch in osstest (seen also on the most recent 4.11
flight)? Or am I misreading the above? In any event I can't spot
a similar mkdir invocation in a random other test's
guest-start/debian.repeat step.

What I find further puzzling (albeit not necessarily related to the
test failure, at least the serial logs don't immediately suggest so
except for the guest no longer being there when the debug keys get
processed, but this may well have been a guest of a previous test
step) are instances of

(XEN) d25 L1TF-vulnerable L1e 8000000200000000 - Shadowing

both here and again in the corresponding 4.11 branch flight. I also
don't think it's pure coincidence that it's d1, d2, and d25 in both
cases. Yet this occurring pretty soon after the guest starts, I'd
find it more likely if all guest boot instances showed it. In any
event I'd like to ask if anyone (Jürgen in particular) has an idea
what bogus operation 32-bit Linux may be doing here. Is there
possibly still some 2-part PTE update left, where the low half gets
cleared off of a previously fine entry?

Jan

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.