From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from picard.linux.it (picard.linux.it [213.254.12.146]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id F27C2C433EF for ; Wed, 15 Dec 2021 11:55:58 +0000 (UTC) Received: from picard.linux.it (localhost [IPv6:::1]) by picard.linux.it (Postfix) with ESMTP id 061D03C8F11 for ; Wed, 15 Dec 2021 12:55:57 +0100 (CET) Received: from in-6.smtp.seeweb.it (in-6.smtp.seeweb.it [IPv6:2001:4b78:1:20::6]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by picard.linux.it (Postfix) with ESMTPS id 95A613C042D for ; Wed, 15 Dec 2021 12:55:48 +0100 (CET) Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by in-6.smtp.seeweb.it (Postfix) with ESMTPS id A511414011AF for ; Wed, 15 Dec 2021 12:55:47 +0100 (CET) Received: from relay2.suse.de (relay2.suse.de [149.44.160.134]) by smtp-out1.suse.de (Postfix) with ESMTP id DD9C221135; Wed, 15 Dec 2021 11:55:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1639569346; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=PIEWzjdlwNeiRyXyzRyGVXt2OaYBR6Aqs4msENmx1/Y=; b=a3cQjGTwOaSTuH4uLjF+LcUFMRRp7Eu5y0LDpNWYJx40btJMZ8t3cqEJEImE1iciXh3rmb N60D09mREt+Ui12rXLBDnCMgBRDLPVKV0/7lZZxK2YoImxWzDGwtFKfh8m/ks4/Zw5mHig XNSzvrF7SrynuieponcZGQJHUiWCcpU= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1639569346; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=PIEWzjdlwNeiRyXyzRyGVXt2OaYBR6Aqs4msENmx1/Y=; b=vYUq3orgcinMWBmImfO0Ncb3r1Ol3AWGISFeDerSrYGU7GaIsM9A6VCr/fOoblzX9/IXpC AlxjgvfvkkE/beBw== Received: from g78 (unknown [10.163.24.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by relay2.suse.de (Postfix) with ESMTPS id 8EAD1A3B85; Wed, 15 Dec 2021 11:55:46 +0000 (UTC) References: <20211210134556.26091-1-pvorel@suse.cz> <87tufcao8l.fsf@suse.de> <61B70DE2.4040402@fujitsu.com> <87lf0oaeui.fsf@suse.de> <87h7bca7vu.fsf@suse.de> User-agent: mu4e 1.6.9; emacs 27.2 From: Richard Palethorpe To: Petr Vorel Date: Wed, 15 Dec 2021 11:32:19 +0000 In-reply-to: Message-ID: <874k7a9j5p.fsf@suse.de> MIME-Version: 1.0 X-Virus-Scanned: clamav-milter 0.102.4 at in-6.smtp.seeweb.it X-Virus-Status: Clean Subject: Re: [LTP] [PATCH 1/1] doc/maintainer: Add policy for new functionality X-BeenThere: ltp@lists.linux.it X-Mailman-Version: 2.1.29 Precedence: list List-Id: Linux Test Project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: rpalethorpe@suse.de Cc: pvorel@suze.cz, "ltp@lists.linux.it" Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: ltp-bounces+ltp=archiver.kernel.org@lists.linux.it Sender: "ltp" Hello Petr, Petr Vorel writes: > Hi Richie, all, > >> Hello, > >> Cyril Hrubis writes: > >> > Hi! >> >> >>> The issue is we may forget to merge patch sets for features which are >> >> >>> included (a far worse result). It's more stuff waiting around in the >> >> >>> queue. At the least we should have a procedure for tracking them (like >> >> >>> tagging github issues for review at each mainline release). > >> >> >>> If a test requires a kernel config which doesn't exist in mainline we >> >> >>> could also look for that automatically. > >> >> >> The main issue is that if we happen to release LTP meanwhile with a test >> >> >> for a syscall that didn't get included in the mainline in the end we >> >> >> have released LTP that is supposed to be stable and the test will start >> >> >> to fail when the syscall number is allocated for something else which >> >> >> will happen sooner or later. >> >> > I know a example that is quotactl_path syscall. > > >> >> If the real issue is LTP releases, then why not exclude tests for new >> >> features from them? I assume it's only a small number of commits which >> >> would need to be removed. Possibly we could tag them in git when merging >> >> so it is not a lot more work for whoever does the release (namely >> >> Cyril) to create a branch without them. > >> > That sounds too complex for a test or two we are usually getting during >> > the release cycle. > >> > Note that people who contribute the functionality to the kernel are used >> > to wait for next release window, kernel releases are aprox. twice as >> > fast as LTP. > >> >> My main concern is this will throw up a barrier to motivated >> >> contributors working on the cutting edge. > >> > So far really nobody complained, which may not be a good metric. But >> > still unless there is a evidence that this happens I wouldn't consider >> > spending effort on this. > >> OK, well if it comes up again we can revisit it. However Petr please >> could you add the reasoning about not adding unstable tests into >> releases. > Isn't "... because it can be reverted in later rc if problematic" enough? > If not what would you add? Cyril posted test getting released in LTP and later > unstable. I could be more verbose, but not sure if that's better: > > * Tests for new functionality in mainline kernel should be merged after final > release of kernel which contains that functionality. It's not enough when the > feature gets into rc1, because in later rc the functionality can be changed or > even reverted if problematic. And this could lead to broken test. It's only a problem because of LTP releases. We can just fix or revert tests otherwise. Especially if the test author is also developing the kernel feature and updating the test in lockstep. Without LTP releases then a test can be added for a feature only in RC and removed again. Only people who test the RC will get a result other than TCONF from the test before it disappears again or is updated to support the final feature. Assuming of course people update LTP from HEAD on a regular basis. Which of course they won't or can't, so we have releases. We don't have a separate unstable branch because no one has volunteered to create and maintain it. If we did we could just add such tests to that. > >> With that you can add > >> Acked-by: Richard Palethorpe > > Kind regards, > Petr -- Thank you, Richard. -- Mailing list info: https://lists.linux.it/listinfo/ltp