Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp1529052iob; Thu, 19 May 2022 08:28:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyoOHBQrpJOdwo78/6yrgccBfY9vDusUFBeyuZuMk0LiWlGjmA6Gr3VIp9seZluu9DJgyjM X-Received: by 2002:aa7:ccca:0:b0:42a:c340:ca3c with SMTP id y10-20020aa7ccca000000b0042ac340ca3cmr5813727edt.307.1652974114264; Thu, 19 May 2022 08:28:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652974114; cv=none; d=google.com; s=arc-20160816; b=ND+yRYys02lnHTflAtlrpkiMuqC8PjVjJTxxorjh2VTahil2v2ENaPx2/KsyryDYoe ouU5aeh9ORwxVCA68V9++XJcqqqytXA/9HdI3VIdrW03d2uph/XxWJlD2021o/6mESCT X1Fru8lzez2Liiwkr60umhObm6cNimXnvirDCcNABtD9DKDTl5jq0RpmGo/xerrPcJvB YL0nih2G+hvhV8WsxgxsSBHaTWwRNBwza4ii/ZXUes07jilRsY1ITB5sVSD9xtbr6CzI hbqzMiDrSz7uWYfcJDJbQ6CleY1H1SVXXcGlp9wcm53BJbQbkeLN+mdaqm51eK6dgNwo StsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=jHXfEQJCdzvn+vH6sbYtYQKkduxNJbglCQPnynYEPR8=; b=ZbfpHDYmQq9TpdpQmWKEbDzwLd+87eTLxbc61W9TkqXF16EsFtQcJH7xzt/OVMRKjz yQtoIf5/ml4EJCFKO2C0hYzcMcbEthG7h8nBZlOYp2F5oPl8dzcNTg0LHczNTyqJeOFQ TcIZQelo29Woo2k9Ullr1OlPwgn2MeoAOoTxdFTYwgC+gS7Sv/HaHiVZiylUBefa4pEj 7lcZtKcP+lg8zdtuHwcll02As4wNc7OEgolwTrCoE88WSBZFMsy4UFTUQVCRjJPiuQEH Dx6Yhago1U9xWZG4SIrlMH7XLeoQO2VxnDqzGgKEeCncIEYNng70XnfgdnywMRsNevZl h6xQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="WN821P/U"; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g12-20020a1709061e0c00b006f3b0fab881si5017093ejj.442.2022.05.19.08.28.03; Thu, 19 May 2022 08:28:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="WN821P/U"; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236877AbiESKkp (ORCPT + 99 others); Thu, 19 May 2022 06:40:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38794 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236841AbiESKko (ORCPT ); Thu, 19 May 2022 06:40:44 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 1B096B12 for ; Thu, 19 May 2022 03:40:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1652956842; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=jHXfEQJCdzvn+vH6sbYtYQKkduxNJbglCQPnynYEPR8=; b=WN821P/UrBvp3vIuBGN4YeWKwhom4DXppZNWKSN2pZDnpOHHOL8B69hmXIx4SVuIr4coPW DvjsK+cj9YH+jCp7BDrLvmWIcfg+jJ+o14RlhhRY/tov0CQYwWHjyxdqNezVbyR+82ahuj QwXzee/lmzuRvKgxd0LUkw+wgSHg66U= Received: from mail-qt1-f198.google.com (mail-qt1-f198.google.com [209.85.160.198]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-182-31OLkpUJPrqWAhCb3pLTMA-1; Thu, 19 May 2022 06:40:41 -0400 X-MC-Unique: 31OLkpUJPrqWAhCb3pLTMA-1 Received: by mail-qt1-f198.google.com with SMTP id g1-20020ac85801000000b002f3b281f745so3884317qtg.22 for ; Thu, 19 May 2022 03:40:40 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=jHXfEQJCdzvn+vH6sbYtYQKkduxNJbglCQPnynYEPR8=; b=rTQmn5cPDZ6wtJZmjzALb1y+4IbKgPvlz80+jLjWZvXO0oaF6u+KsmCeY4WPwHFYYL O2/1dB20mOuTB/GfgFzdvLtZwXsi0/PsdWHvc8zZFKaep7qGVZ5tTS50hJ8++ywzfNlT I5W53BfUYfIsbVFsk3XBipfpwixeoJMroGyM6B1wUK1LRXVXDfftTPp9ODJs9e1wMF2r lsJOnsNfhqnfsSSU+BaZbRIq2Bx4xdCZ/ffAG/lPVrU+5Kvdhk15TNIe2x97aOHzGd8a 2U9Wk+Fcvxp75cEuPXO4Mz+Qu9R9HDWqJMW/4j/kO4KJjN0AMLGJKZlNTVHBBXVBBW7q WKOA== X-Gm-Message-State: AOAM531DzGZspoaHBCDK8y/ecJmBxzxvPmbwJJKqD99eKLj0xt6OGC8T an/zIBWba7nNqmeBgnebMVNh8Ws8Mk6T1URuzkA2ZND0FKfozyL6xqZ6BTr3Y/e4vRR06jUmf/U 1IVWPDZQegL4Qo9P0XDqPGQ== X-Received: by 2002:a05:6214:268d:b0:461:f5e4:81f4 with SMTP id gm13-20020a056214268d00b00461f5e481f4mr3048497qvb.33.1652956840424; Thu, 19 May 2022 03:40:40 -0700 (PDT) X-Received: by 2002:a05:6214:268d:b0:461:f5e4:81f4 with SMTP id gm13-20020a056214268d00b00461f5e481f4mr3048489qvb.33.1652956840126; Thu, 19 May 2022 03:40:40 -0700 (PDT) Received: from zlang-mailbox ([209.132.188.80]) by smtp.gmail.com with ESMTPSA id b188-20020a3767c5000000b0069fc13ce250sm1040034qkc.129.2022.05.19.03.40.36 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 19 May 2022 03:40:39 -0700 (PDT) Date: Thu, 19 May 2022 18:40:33 +0800 From: Zorro Lang To: Lukas Czerner Cc: Eric Biggers , fstests@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-ext4@vger.kernel.org Subject: Re: [xfstests PATCH 0/2] update test_dummy_encryption testing in ext4/053 Message-ID: <20220519104033.u7afgq4btpfdxh27@zlang-mailbox> References: <20220501051928.540278-1-ebiggers@kernel.org> <20220518141911.zg73znk2o2krxxwk@zlang-mailbox> <20220518181607.fpzqmtnaky5jdiuw@zlang-mailbox> <20220519044701.w7lf5tabdsl3cwra@zlang-mailbox> <20220519083322.6nfcts7wwevv4eca@fedora> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220519083322.6nfcts7wwevv4eca@fedora> X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Thu, May 19, 2022 at 10:33:22AM +0200, Lukas Czerner wrote: > On Thu, May 19, 2022 at 12:47:01PM +0800, Zorro Lang wrote: > > On Wed, May 18, 2022 at 03:01:08PM -0700, Eric Biggers wrote: > > > Zorro, can you fix your email configuration? Your emails have a > > > Mail-Followup-To header that excludes you, so replying doesn't work correctly; > > > I had to manually fix the recipients list. If you're using mutt, you need to > > > add 'set followup_to = no' to your muttrc. > > > > Oh, I didn't notice that, I use neomutt, it might enable the followup_to by > > default. OK, I've set followup_to = no, and restart my neomutt. Hope it helps:) > > > > > > > > On Thu, May 19, 2022 at 02:16:07AM +0800, Zorro Lang wrote: > > > > > > > > > > > > And I saw some discussion under this patchset, and no any RVB, so I'm wondering > > > > > > if you are still working/changing on it? > > > > > > > > > > > > > > > > I might add a check for kernel version >= 5.19 in patch 1. Otherwise I'm not > > > > > planning any more changes. > > > > > > > > Actually I don't think the kernel version check (in fstests) is a good method. Better > > > > to check a behavior/feature directly likes those "_require_*" functions. > > > > > > > > Why ext4/053 need >=5.12 or even >=5.19, what features restrict that? If some > > > > features testing might break the garden image (.out file), we can refer to > > > > _link_out_file(). Or even split this case to several small cases, make ext4/053 > > > > only test old stable behaviors. Then use other cases to test new features, > > > > and use _require_$feature_you_test for them (avoid the kernel version > > > > restriction). > > > > > > This has been discussed earlier in this thread as well as on the patch that > > > added ext4/053 originally. ext4/053 has been gated on version >= 5.12 since the > > > beginning. Kernel version checks are certainly bad in general, but ext4/053 is > > > a very nit-picky test intended to detect if anything changed, where a change > > > does not necessarily mean a bug. So maybe the kernel version check makes sense > > > > Even on old RHEL-8 system (with a variant of kernel 3.10), the ext4/053 fails > > as [1]. Most of mount options test passed, only a few options (inlinecrypt, > > test_dummy_encryption, prefetch_block_bitmaps, dioread_lock) might not be > > supported. > > No it does not. On RHEL-8 system the test will not run because of kernel > version test. It will be skipped. Yes, it will be skipped, I just ran it by removing that "kernel_gte 5.12" line :) > > > > > I think it's not necessary to mix all old and new ext4 mount options test into > > one single test cause. If it's too complicated, we can move some functions into > > common/ext4 (or others you like), split ext4/053 to several cases. Let ext4/053 > > test stable enough mount option (supported from an old enough kernel). Then let > > other newer mount options in different single cases. > > > > For example, make those CONFIG_FS_ENCRYPTION* tests into a seperated case, > > and add something likes require_(fs_encryption?), and src/feature.c can be > > used too. Then about dioread_lock and prefetch_block_bitmaps things, we can > > deal with them specially, or split them out from ext4/053. I even don't mind > > if you test ext2 and ext3/4 in separate case. > > Sure, but why to split it? It all should be stable enough, it's user > facing interface, that's the whole point of the test. I certainly see > the benefit of having the test for all ext4 mount option in one test - > it's faster and it's easier to see what's there. I would be agains > splitting it. OK, although you can have a 'group name' to help to run all ext4 mount options regression test, but as I said: "as it's an ext4 specific testing, I respect the opinion from ext4 list particularly", so I won't touch this case, if you against :) > > As it is now there is only one kernel_gte() check to avoid testing the > entire history. With any new mount option as a separate test we would > still need kernel_gte test to avoid failing on kernels that don't have > the mount option. At least until kernel gains ability to list supported > mount options it's the only test we have. > > On the other hand I do see some value in making a new test for a new > mount option. But I don't have a strong opinion about that. > > As for the original topic of the discussion, as I said in previous > reply, maybe the right solution here is to treat the change as a bug fix > which is arguably is and let it fail on old behavior. > > Thanks! > -Lukas > > > > > That's my personal opinion, I can try to help to do that after merging this > > patchset, if ext4 forks agree and would like to give me some supports > > (review and Q&A). Anyway, as it's an ext4 specific testing, I respect the > > opinion from ext4 list particularly. > > > > [1] > > +SHOULD FAIL remounting ext2 "commit=7" (remount unexpectedly succeeded) FAILED > > +mounting ext2 "test_dummy_encryption=v1" (failed mount) FAILED > > +mounting ext2 "test_dummy_encryption=v2" (failed mount) FAILED > > +mounting ext2 "test_dummy_encryption=v3" (failed mount) FAILED > > +mounting ext2 "inlinecrypt" (failed mount) FAILED > > +mounting ext2 "prefetch_block_bitmaps" (failed mount) FAILED > > +mounting ext2 "no_prefetch_block_bitmaps" (failed mount) FAILED > > +mounting ext3 "test_dummy_encryption=v1" (failed mount) FAILED > > +mounting ext3 "test_dummy_encryption=v2" (failed mount) FAILED > > +mounting ext3 "test_dummy_encryption=v3" (failed mount) FAILED > > +mounting ext3 "inlinecrypt" (failed mount) FAILED > > +mounting ext3 "prefetch_block_bitmaps" (failed mount) FAILED > > +mounting ext3 "no_prefetch_block_bitmaps" (failed mount) FAILED > > +mounting ext4 "nodioread_nolock" (failed mount) FAILED > > +mounting ext4 "dioread_lock" checking "nodioread_nolock" (not found) FAILED > > +mounting ext4 "test_dummy_encryption=v1" (failed mount) FAILED > > +mounting ext4 "test_dummy_encryption=v2" (failed mount) FAILED > > +mounting ext4 "test_dummy_encryption=v3" (failed mount) FAILED > > +mounting ext4 "inlinecrypt" (failed mount) FAILED > > +mounting ext4 "prefetch_block_bitmaps" (failed mount) FAILED > > +mounting ext4 "no_prefetch_block_bitmaps" (failed mount) FAILED > > > > > there. Lukas, any thoughts about the issues you encountered when running > > > ext4/053 on older kernels? > > > > > > If you don't want a >= 5.19 version check for the test_dummy_encryption test > > > case as well, then I'd rather treat the kernel patch > > > "ext4: only allow test_dummy_encryption when supported" as a bug fix and > > > backport it to the LTS kernels. The patch is fixing the mount option to work > > > the way it should have worked originally. Either that or we just remove the > > > test_dummy_encryption test case as Ted suggested. > > > > Oh, I'd not like to push anyone to do more jobs:) And there're many Linux > > distributions with their downstream kernel, not only LTS kernel project. > > So I don't mean to make fstests' cases support the oldest existing kernel > > version, just hope some common cases try not *only* work for the latest > > one, if they have the chance :) > > > > Thanks, > > Zorro > > > > > > > > - Eric > > > > > >