Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp1366054rwd; Wed, 7 Jun 2023 15:18:27 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7VpH7bn375jKK8C7z6KU4wrNDnf57iKCOHOcYGUIY3o7cjBU6woGcovLpFfIzbcgOOJJEA X-Received: by 2002:a17:90b:682:b0:250:132a:5d93 with SMTP id m2-20020a17090b068200b00250132a5d93mr5375523pjz.49.1686176307434; Wed, 07 Jun 2023 15:18:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686176307; cv=none; d=google.com; s=arc-20160816; b=CHaV3i8scBa4l7RjZbqiD65pAQHRJXkypHS2N52MbECyWRiZK9T5CxQpFO4u7Ms9rH 4Vd6knE5g0k75He8Eoe2VNiPyKRQGssOgQmOT2tAP/XZZHkivj4W34/oEqOj7h2q9GNq Tj1LM+wlnKNsyv44nnnzK/pP1wpVqZKSa4PasxG5UkesJ+jXBnEUmuWdRZ8W3x7i8TY4 kix859jXrXkJKmvlLDWKsg0q2ziOjsuicRW4AZBuQ2/Rf2e9VmUKH0XcgK1ow5k/nDh4 s6h9GppJS0y3qKfVMM7ES0X9hMWlFGVA4lnLaCfJ4kkdUMozKVNqCXtn2TERLix3Gpxv mgKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:dkim-signature:date; bh=pQ9vvxki5YLy1NsCzvkhpdugXedCaJ81g7oe9b6lLqQ=; b=M8UIwrwGZqLb35gHCnUjdyFMUBM1dv2+jynXMVjlktPaEdJUCcEw4BmBECh0cTpy9R B57yD6fMVE8sUyWwOdE1jR/fQn1WMgVcee9DgPFUFwkMnwfYWvYwOyPrI7asLr8NtzUt z3gXnhTCIw2SlMS6wvMdhzA02fIVXJ2Z2vePvx9Uyskz8WhBbgYMfUucPuN9C1wyHROr p+IIA0u50szDJeWczqr8dP31frvuDGe5eiK7Jq9YMGeWGv+c9Ry+ENlpSxXBfkRiGx3K 8EgT46waaB583+MYI5U+GNF8kJFsJ8z/AYECbjW89F1KnWgeZGtDzqAORTC5Sj3S/3bN HOiw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@t-8ch.de header.s=mail header.b=krsgNIC+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m17-20020a17090a7f9100b0025960d035c6si1686331pjl.138.2023.06.07.15.18.13; Wed, 07 Jun 2023 15:18:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@t-8ch.de header.s=mail header.b=krsgNIC+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231261AbjFGWPm (ORCPT + 99 others); Wed, 7 Jun 2023 18:15:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33412 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230324AbjFGWPk (ORCPT ); Wed, 7 Jun 2023 18:15:40 -0400 Received: from todd.t-8ch.de (todd.t-8ch.de [159.69.126.157]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A5FD52119; Wed, 7 Jun 2023 15:15:39 -0700 (PDT) Date: Thu, 8 Jun 2023 00:15:27 +0200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=t-8ch.de; s=mail; t=1686176138; bh=pQ9vvxki5YLy1NsCzvkhpdugXedCaJ81g7oe9b6lLqQ=; h=Date:From:To:Cc:Subject:From; b=krsgNIC+PDmePAlT5yaqB8FqM26sR1ktyu5vo8ZKFISmrxo23SKTna31AkAJYDJoZ GJsPcJL34RRM3itkxsQLSL/dQnEmHWqbCbWSiy0AMJf+XNiMtPbefL4JQ91PMWPWEg aUZCJsrFYlDKyOZ2wL/1Ad9frz66XtoSM5gWRWWk= From: Thomas =?utf-8?Q?Wei=C3=9Fschuh?= To: Willy Tarreau , Zhangjin Wu Cc: linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org Subject: nolibc: KTAP output and test reports Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Willy, Zhangjin, after your recent discussions about the test output and report I wondered if it would make sense to switch nolibc-test to KTAP output format [0]. With this it would be possible to have a wrapper script run each architecture test as its own test subcomponent. A (K)TAP parser/runner could then directly recognize and report failing testcases, making it easier to validate. Also maybe we can hook it up into the regular kselftests setup and have the bots run it as part of that. The kernel even includes a header-only library to implement the format [1]. It also should be fairly easy to emit the format without a library. Thomas [0] Documentation/dev-tools/ktap.rst [1] Documentation/dev-tools/kselftest.rst (Test harness)