Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp6656896iob; Wed, 11 May 2022 02:27:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxbg5tCZ7eEf/i+6DZYSGTjevoWl9BHoesSbUr3axPoqK+FVTty04rCkxoviuLSAxB5H35V X-Received: by 2002:a17:906:4fce:b0:6f4:f41c:3233 with SMTP id i14-20020a1709064fce00b006f4f41c3233mr22794970ejw.117.1652261223249; Wed, 11 May 2022 02:27:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652261223; cv=none; d=google.com; s=arc-20160816; b=DvikCHIWa5agm2uVyPVJrIoU5eWVdMfom0RS+8IsTKk5MWjqxdr6SQKo8ow2MIkHfS DoeQURpDUHynx1R7WC+RBrFyA2oogB/Ae48mXKs/nxatNp2Rt7caxU/H5XpHV98hUhff mAUTDvOspUt9354coiK8QQDo+ozlV0aeTwg1x1yNYY1fplsBN0jFogLIabOfOknr8cbW Qy3JSfELhQT7JCvJEmOI8P3lXwhDn3t3+QoGmkbEvs/3R5QDWOPJjY2agdwxXstCGgBy xYphen6d5cQFbImGyV2WKkniCfrbSYg8aqZZEk2D9cGXtb0397NKm39KXxJ73RHpylCN xIYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:mail-followup-to:message-id:subject:cc:to:from:date :dkim-signature; bh=o3abCV31hEIagI/Cf2hwMAxBja66bv5qyGLhg7RJLWc=; b=oOaGvXnySx2KKmH4LHHR2FuX2twVN3WfyqQBD/n1p3gfwLfp6PODVkOtmigzjjLym2 51uvdeAeY5oBNhgfk30tOV4P2Cw+k9ahVFb9JXxCcNUpMkvceZTKFskNuU74BCkwwO48 xnkymm2S+V3iyKNOP1F92Auuo3TWAgpP0yxV3T4TMAxAiQIAz7/rc6lILP5gs2FWjjrA JQRhPfIWtrOKK4o22DIHRK9CJjZZ7yexMnxzNi3rCwgI/WkrrfsRRf8Godg4e8N9d6AI 35tBOVfI/+ils285wbyJK2mroVeWpd8EMS1DrzwCu4I3IjhUZo8R5SWZnfmDMJrYQwsC gPpA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=eGZx7RL4; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i7-20020a05640200c700b004289e7be14esi1675604edu.105.2022.05.11.02.26.31; Wed, 11 May 2022 02:27:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=eGZx7RL4; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240066AbiEKGZS (ORCPT + 99 others); Wed, 11 May 2022 02:25:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57368 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241359AbiEKGZP (ORCPT ); Wed, 11 May 2022 02:25:15 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 0953C227808 for ; Tue, 10 May 2022 23:25:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1652250313; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=o3abCV31hEIagI/Cf2hwMAxBja66bv5qyGLhg7RJLWc=; b=eGZx7RL4IH10HlDBPFg5K7FGmA71OdE4jXh3DBaWoNQDN4I/PCaWM1LYbyO09IeGHURHiv 0xsPimy9sqIeoncbLjlfqjRA4BRmo0q3p51tUlf4VJBnhAPylqsh5qd3WkCdtCykMMyQf5 rOAARruYqpIW6UJZSQIfAf1PDRZRIsM= Received: from mail-qv1-f71.google.com (mail-qv1-f71.google.com [209.85.219.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-563-nLMKRiw4NUqwYOKrJvGLzw-1; Wed, 11 May 2022 02:25:11 -0400 X-MC-Unique: nLMKRiw4NUqwYOKrJvGLzw-1 Received: by mail-qv1-f71.google.com with SMTP id bu6-20020ad455e6000000b004563a74e3f9so1232767qvb.9 for ; Tue, 10 May 2022 23:25:11 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id :mail-followup-to:references:mime-version:content-disposition :in-reply-to; bh=o3abCV31hEIagI/Cf2hwMAxBja66bv5qyGLhg7RJLWc=; b=fZeuwW+S/gVTdhJPZBHQS3lVhzGjqpA4GrJc70WDSS9j34tRS5+7SNiKMuY4boMwJb q+x8bd6IcRDepyvijewrh9ktYSNQNsmbM1H1g6AYUG2pzXWr7QwD7yrMDfwzAxH0Tjcc 2henSmzszSZtVDx5u+QJ6405+18tifNGisAYm5T+NFxRsVPgL/LMgPw7iXeVzZ/roVak Y1EWmbJm/mDBVOsyMZFq9CP8yXzBPuINtgPKG+yY8bG54NF+RURR2kzf1G8DQdtZVq8/ lzKcGnd70j9m6bNhatf49GBZPqoMCAlP0fTaDE1L4AN81kwpBm4vXOuH0e176uMyk8OI Oj4Q== X-Gm-Message-State: AOAM530UdZZlmLSmpbUY0AdXqFQ5AwuwzfRqaZhkjq7k1H5vI9ccXsRY J7KVVN4pAr5pzzjAdbXu5DXm8aW9eox7Bl5Xgy17BneQ8UHadapvOUCnTzwkERWPkP3/3fAvK5C F1YpuhpzmNRwdeqtiSsgtqA== X-Received: by 2002:a05:620a:40c8:b0:6a0:922b:2d82 with SMTP id g8-20020a05620a40c800b006a0922b2d82mr9969597qko.252.1652250311106; Tue, 10 May 2022 23:25:11 -0700 (PDT) X-Received: by 2002:a05:620a:40c8:b0:6a0:922b:2d82 with SMTP id g8-20020a05620a40c800b006a0922b2d82mr9969586qko.252.1652250310816; Tue, 10 May 2022 23:25:10 -0700 (PDT) Received: from zlang-mailbox ([209.132.188.80]) by smtp.gmail.com with ESMTPSA id h8-20020ac85148000000b002f3ef928fbbsm626311qtn.72.2022.05.10.23.25.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 May 2022 23:25:10 -0700 (PDT) Date: Wed, 11 May 2022 14:25:04 +0800 From: Zorro Lang To: Eric Biggers Cc: Lukas Czerner , fstests@vger.kernel.org, linux-ext4@vger.kernel.org Subject: Re: [xfstests PATCH] ext4/053: fix the rejected mount option testing Message-ID: <20220511062504.c4ed7rhdyqfe54y6@zlang-mailbox> Mail-Followup-To: Eric Biggers , Lukas Czerner , fstests@vger.kernel.org, linux-ext4@vger.kernel.org References: <20220430192130.131842-1-ebiggers@kernel.org> <20220510094308.mhzvcgq5wrat5qao@fedora> <20220510154359.xfhmumcmb4o37qdy@zlang-mailbox> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-3.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Tue, May 10, 2022 at 11:36:18AM -0700, Eric Biggers wrote: > On Tue, May 10, 2022 at 11:43:59PM +0800, Zorro Lang wrote: > > On Tue, May 10, 2022 at 11:43:08AM +0200, Lukas Czerner wrote: > > > On Mon, May 09, 2022 at 04:42:03PM -0700, Eric Biggers wrote: > > > > On Sat, Apr 30, 2022 at 12:21:30PM -0700, Eric Biggers wrote: > > > > > From: Eric Biggers > > > > > > > > > > 'not_mnt OPTIONS' seems to have been intended to test that the > > > > > filesystem cannot be mounted at all with the given OPTIONS, meaning that > > > > > the mount fails as opposed to the options being ignored. However, this > > > > > doesn't actually work, as shown by the fact that the test case 'not_mnt > > > > > test_dummy_encryption=v3' is passing in the !CONFIG_FS_ENCRYPTION case. > > > > > Actually ext4 ignores this mount option when !CONFIG_FS_ENCRYPTION. > > > > > (The ext4 behavior might be changed, but that is besides the point.) > > > > > > > > > > The problem is that the do_mnt() helper function is being misused in a > > > > > context where a mount failure is expected, and it does some additional > > > > > remount tests that don't make sense in that context. So if the mount > > > > > unexpectedly succeeds, then one of these later tests can still "fail", > > > > > causing the unexpected success to be shadowed by a later failure, which > > > > > causes the overall test case to pass since it expects a failure. > > > > > > > > > > Fix this by reworking not_mnt() and not_remount_noumount() to use > > > > > simple_mount() in cases where they are expecting a failure. Also fix > > > > > up some of the naming and calling conventions to be less confusing. > > > > > Finally, make sure to test that remounting fails too, not just mounting. > > > > > > > > > > Signed-off-by: Eric Biggers > > > > > --- > > > > > tests/ext4/053 | 148 ++++++++++++++++++++++++++----------------------- > > > > > 1 file changed, 78 insertions(+), 70 deletions(-) > > > > > > > > Lukas, any thoughts on this patch? You're the author of this test. > > > > > > > > - Eric > > > > > > Haven't tested it myself but the change looks fine, thanks. > > > > Thanks for you help to review this patch. There's an new failure[1] after we > > merged this patch: > > "SHOULD FAIL remounting ext2 "commit=7" (remount unexpectedly succeeded) FAILED" > > > > As this test generally passed, so before I give "Oops" to others, I hope to > > check with you that if this's an expected failure we need to fix in kernel > > or in this case itself? > > > > This appears to be a kernel bug, so to fix it I've sent the patch > "ext4: reject the 'commit' option on ext2 filesystems" > (https://lore.kernel.org/r/20220510183232.172615-1-ebiggers@kernel.org). Thanks, great to know that. > > I didn't notice this earlier because it's not reproducible with > CONFIG_EXT2_FS=y. But it is reproducible with CONFIG_EXT2_FS=n and > CONFIG_EXT4_USE_FOR_EXT2=y. Yes, I tested with this config. I'll remind this failure in next fstests announcement, Thanks a lot! Thanks, Zorro > > - Eric >