Received: by 2002:a05:6a10:eb17:0:0:0:0 with SMTP id hx23csp3783949pxb; Tue, 7 Sep 2021 07:31:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwvTBfM1OUmUBXEoTBZJrpBuxbIJtz1VUb71COL4NDGM7CR/9+eSPVCZey+D+APVaGvqKt0 X-Received: by 2002:a05:6638:1606:: with SMTP id x6mr13860051jas.25.1631025103159; Tue, 07 Sep 2021 07:31:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631025103; cv=none; d=google.com; s=arc-20160816; b=Wqyzow/lGqY1SN6MeP0KrBjOFjk9jJe0ytkCMT5azujAwPoPFPc+Xx4MGX1lIQJlLQ itMC/jqbF0vRL+XOBcZPIOt33BlIS+7C5jC6Oc+k6WjMAD04lbjRxLRh1NB5JRCEclf1 aaykaz+sLi9mg05R34cnGNWaVGgJEtQwNgg/+In8xLiW0R6QrSUMKkPylnw16L3SM48T BwOfJJhC+sLkcCHpRN9z8gUxi7bC1awoSeh8Lk2CZx6LL26X0DB0lBhEywYUitQZPDqr WyRcYcvJQLi2f0UsVOa9xEL/E8dVNrvw/X81R5OAdEpt5yX1gVhnQOR1f3ftIZhkichD AR9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=ctrgYRCu6d/htg5Yhi5m8UjXfK/7o0fUxWJpnu3D9cI=; b=sglI+yET+Ux+sq2vG3AxoR7xdXoInMOqYYRtvlkMIrdycstrHAFoGWOIisMMQdqWSs iXMVeX4wDOGAwOFNWmW3Ad3JdmEWJc8pE2dSQ1o+JmfO3S2c5pPa9GbbG4GZJEDaDs26 U0eEcbh7aF7X3hPaviQTUgBD1RL/SkrJhhuH2c/+s4Y0FmkmmaVAa/XXgzMTcKzBq0fn DZFrI6nMsfvkgSOfYQ+QfZEqtceinIxfEe8wpPWZA1KANBzzUIXlh4LCFvVs7/Y0MKHv 1Z/68URfdobVxP6i4eqeSi1mMxlK6DVVaa7+7QrrNyLHqhwf70KfqF42w4ti29MiiSjr 4Qyw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x4si9873933ilj.121.2021.09.07.07.31.30; Tue, 07 Sep 2021 07:31:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344899AbhIGNvr (ORCPT + 99 others); Tue, 7 Sep 2021 09:51:47 -0400 Received: from mx3.molgen.mpg.de ([141.14.17.11]:44801 "EHLO mx1.molgen.mpg.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1344869AbhIGNvr (ORCPT ); Tue, 7 Sep 2021 09:51:47 -0400 Received: from [141.14.13.3] (g258.RadioFreeInternet.molgen.mpg.de [141.14.13.3]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) (Authenticated sender: pmenzel) by mx.molgen.mpg.de (Postfix) with ESMTPSA id E4B5D61E64846; Tue, 7 Sep 2021 15:50:39 +0200 (CEST) Subject: Re: QA: Monitor Linux log messages as port of release (candidate) testing To: Guenter Roeck Cc: LKML References: <458e0604-1fe9-bed0-d22f-84540b05ffb1@molgen.mpg.de> <20210907125354.GE4989@roeck-us.net> From: Paul Menzel Message-ID: <38ac012a-c16e-1ba0-b386-156bb8ddecc4@molgen.mpg.de> Date: Tue, 7 Sep 2021 15:50:39 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.13.0 MIME-Version: 1.0 In-Reply-To: <20210907125354.GE4989@roeck-us.net> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Dear Guenter, Am 07.09.21 um 14:53 schrieb Guenter Roeck: > On Tue, Sep 07, 2021 at 10:40:31AM +0200, Paul Menzel wrote: >> Thank you for testing release candidates and releases [1]. Is your test >> setup documented somewhere? >> > Not really, except its source is available at github: > https://github.com/groeck/linux-build-test Thank you. >> If not happening already, could the Linux messages (at least up to log level >> warning) also be monitored? For example, in Linux 5.14, a new warning snuck >> in by cefc7ca462 (ACPI: PRM: implement OperationRegion handler for the >> PlatformRtMechanism subtype) [2], which could have been caught early on, and >> fixed before the release. >> >> The test summaries would then also notify about possible behavior change. > > Logs are available and can be examined at kerneltests.org/builders. Sorry for being blind. Under *qemu-tests*, looking at build #1831 [1], clicking on *stdio* [2] under *Steps and Logfiles*, I do not see any Linux logs. > Reports are generated manually, so it would be way too much effort to add > build warnings to those. Besides, logs are way too noisy to be useful in a > summary e-mail. Just to avoid misunderstandings, it’s about the Linux run-time logs. > Also, Geert's build reports already provide build warnings and errors. > The same applies to reports sent by 0-day. Indeed, I do see at least > one 0-day report against commit cefc7ca46235. How can I find that report? > What would be the point of adding yet another report of build > warnings on top of that ? If the functionality already exists, great. But to be clear, it’s about the runtime logs. Kind regards, Paul [1]: https://kerneltests.org/builders/hwmon-x86_64-master/builds/1831 [2]: https://kerneltests.org/builders/qemu-x86_64-master/builds/1831/steps/qemubuildcommand/logs/stdio