-
Notifications
You must be signed in to change notification settings - Fork 278
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
LTP: Add 'Call Trace:' as failure in dmesg #20012
Conversation
Great PR! Please pay attention to the following items before merging: Files matching
This is an automatically generated QA checklist based on modified files. |
36f7dd2
to
65d70e8
Compare
65d70e8
to
b725121
Compare
@mdoucha kindly did a verification for re-enabled serial for micro and it failed horribly, thus I removed that commit.
Although the original test
|
241c019
to
012f25d
Compare
@mdoucha rebased |
012f25d
to
dd1c1ca
Compare
lib/known_bugs.pm
Outdated
@@ -65,6 +65,7 @@ sub create_list_of_serial_failures { | |||
push @$serial_failures, {type => $type, message => 'Kernel stack is corrupted', pattern => quotemeta 'stack-protector: Kernel stack is corrupted'}; | |||
push @$serial_failures, {type => $type, message => 'Kernel BUG found', pattern => quotemeta 'BUG: failure at'}; | |||
push @$serial_failures, {type => $type, message => 'Kernel Ooops found', pattern => quotemeta '-[ cut here ]-'}; | |||
push @$serial_failures, {type => $type, message => 'Kernel Call Trace found', pattern => quotemeta 'Call Trace:'}; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've just notice that every test which intentionally triggers OOM killer will produce a call trace in dmesg log. That'll also trigger this check. We should either set type => 'soft'
here or drop the PR entirely.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
OK, I need to add type => 'soft'
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@mdoucha FYI updated to soft.
This PR would allow detecting the printk issue. VR on SLEM: https://openqa.suse.de/tests/15245908#step/boot_ltp/174 |
At least syslog11 on unfixed SLERT-15SP6 produced this output in dmesg. Link: https://bugzilla.suse.com/show_bug.cgi?id=1229025#c1 Signed-off-by: Petr Vorel <[email protected]>
dd1c1ca
to
a56e954
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
This is a result of the same function being defined in lib/main_common.pm and lib/main_security.pm. Worth to note, both are implemented differently. |
There were a lot more redefined function warnings but I've fixed them in #20026. We should leave this one to whoever actually uses |
At least syslog11 on unfixed SLERT-15SP6 produced this output in dmesg.
Verification run: https://openqa.suse.de/tests/15246031#step/boot_ltp/174
(I was not able to find a test which would fail like this any more - although I cloned https://openqa.suse.de/tests/15153541, which has failing 6.4.0-150600.10.3-rt, test run with 6.4.0-150600.10.5-rt, which is already fixed).