Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7F71AC7EE2F for ; Fri, 3 Mar 2023 11:33:42 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229437AbjCCLdl (ORCPT ); Fri, 3 Mar 2023 06:33:41 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49610 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230490AbjCCLdi (ORCPT ); Fri, 3 Mar 2023 06:33:38 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 72F9030E7; Fri, 3 Mar 2023 03:32:54 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id DE1BDB818A6; Fri, 3 Mar 2023 11:31:46 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id F239CC433EF; Fri, 3 Mar 2023 11:31:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1677843105; bh=jR+QCEQFJCzNfqYb/md+DBKXs+PmGlbXDXTESltRKcQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=UAl0CVM7O+qdCC4Kms3+Bdubi2KBYFJlpYcctFCHxB8qv9A6WGsl/wwA56S/92b/S uHtZ57SLgiNC80am71rFRlRZl4xtUEtpwD2uxyUria/SDfmM9bW46YczFtBOkwxLmq 4297nrlvGSVowOULU42P4wanBTdBUDSbKVA/vsDM= Date: Fri, 3 Mar 2023 12:31:43 +0100 From: Greg Kroah-Hartman To: Matthieu Baerts Cc: Naresh Kamboju , Paolo Abeni , stable@vger.kernel.org, patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de, mptcp@lists.linux.dev, Florian Westphal , Mat Martineau , Anders Roxell Subject: Re: [PATCH 6.1 00/42] 6.1.15-rc1 review Message-ID: References: <9586d0f99e27483b600d8eb3b5c6635b50905d82.camel@redhat.com> <3d92e773-896c-43c3-94ae-cb7851213c55@tessares.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 03, 2023 at 11:56:26AM +0100, Matthieu Baerts wrote: > Hi Greg, > > 3 Mar 2023 11:26:46 Greg Kroah-Hartman : > > > On Fri, Mar 03, 2023 at 10:47:33AM +0100, Matthieu Baerts wrote: > >> Hi Greg, Naresh, Paolo, > >> > >> Thank you for the new version and for having reported the issue and running MPTCP selftests! > >> > >> 3 Mar 2023 10:23:06 Greg Kroah-Hartman : > >> > >>> On Fri, Mar 03, 2023 at 02:34:05PM +0530, Naresh Kamboju wrote: > >>>> On Fri, 3 Mar 2023 at 13:34, Paolo Abeni wrote: > >>>>> > >>>>> Hello, > >>>>> > >>>>> On Fri, 2023-03-03 at 01:32 +0530, Naresh Kamboju wrote: > >>>>>> … > >>>>> > >>>>> I read the above as you are running self-tests from 6.2.1 on top of an > >>>>> older (6.1) kernel. Is that correct? > >>>> > >>>> correct. > >>>> > >>>>> If so failures are expected; > >>> > >>> Shouldn't the test be able to know that "new features" are not present > >>> and properly skip the test for when that happens?  Otherwise this feels > >>> like a problem going forward as no one will know if this feature can be > >>> used or not (assuming it is a new feature and not just a functional > >>> change.) > >> > >> All MPTCP selftests are designed to run on the same kernel version > >> they are attached to. This allows us to do more checks knowing they > >> are not supposed to fail on newer kernel versions and not being > >> skipped if there is an error when trying to use the new feature. If > >> there are fixes, we make sure the stable team is Cc'ed. If there are > >> API changes, it would be visible because we would need to adapt > >> existing selftests. > > > > "Features" are not usually limited to specific kernel versions (think > > about the mess that "enterprise" kernels create by backports).  And if > > they are, running a userspace test should be able to detect if the > > feature is present or not by the error returned to it, right?  If not, > > then the feature is mis-designed. > > Thank you for the explanation. (I didn't know these tests had to support "enterprise" kernels.) Tests have to run anywhere. > For features where the userspace explicitly asks to use them, that's easy. For events that are only created from a specific kernel version, that will be harder but it is maybe a sign that something else is missing on our side :) Think about userspace, how will it even know if a feature is present or not in the kernel it is running on? It needs to know "I tried to use this and it failed because of it not being there or because something else went wrong". Userspace has to be able to distinguish between the two somehow, otherwise no one will be able to use your feature very well. So just rewrite the test to handle "not present", like we can handle ioctls or syscalls not being present vs. "an error happened". > >> That's how we thought we should design MPTCP selftests. Maybe we need to change this design? > > > > Yes, please "skip" tests for features that are just not present, do not > > fail them. > > It might take a bit of time but we will look at that. I think we don't > even check MPTCP is available before starting the first test, we just > assume it is there if someone explicitly starts these tests :-) That too should probably be fixed up :) thanks, greg k-h