From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from picard.linux.it (picard.linux.it [213.254.12.146]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 87147C77B7C for ; Thu, 4 May 2023 10:28:38 +0000 (UTC) Received: from picard.linux.it (localhost [IPv6:::1]) by picard.linux.it (Postfix) with ESMTP id 40A5D3CB7C9 for ; Thu, 4 May 2023 12:28:36 +0200 (CEST) Received: from in-6.smtp.seeweb.it (in-6.smtp.seeweb.it [IPv6:2001:4b78:1:20::6]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384)) (No client certificate requested) by picard.linux.it (Postfix) with ESMTPS id 1FD7A3CB73D for ; Thu, 4 May 2023 12:28:24 +0200 (CEST) Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2001:67c:2178:6::1c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by in-6.smtp.seeweb.it (Postfix) with ESMTPS id CF4C01400BF2 for ; Thu, 4 May 2023 12:28:23 +0200 (CEST) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 1E0E33397B; Thu, 4 May 2023 10:28:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1683196102; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=yk7lzEvsfsHEuUUsXkx0+Kj26i/8OnZs2YUfAP7lyAE=; b=pdylWKvqx7sPyDe79EUFuqfkoQqO8AY7vacd/COyDg3i91rcQlNrNemL5Ctj5gYbn1LE5M Iyp7YWIEOCmZURLXIR3wveq/WxKxCXv/LViWloOdzwZrEVaaAIxqDEisN+hD5teGwAkTh/ A6NEFyR0C7OKxOHZfYAeErKX+GgUknU= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1683196102; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=yk7lzEvsfsHEuUUsXkx0+Kj26i/8OnZs2YUfAP7lyAE=; b=XuzBxCY9dlMGQsu9VmBlb1RsDMq2ZlQ9bD5tA76/aMLcqZ0t3+Odz4AQDfYyEz7uKgZQwo 4S0fKwPfNNS+VtCQ== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 03B2D133F7; Thu, 4 May 2023 10:28:21 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id K2hIO8WIU2SVeQAAMHmgww (envelope-from ); Thu, 04 May 2023 10:28:21 +0000 Date: Thu, 4 May 2023 12:28:36 +0200 From: Petr Vorel To: Cyril Hrubis , ltp@lists.linux.it Message-ID: <20230504102836.GA3806177@pevik> References: <20230502143711.GA3665733@pevik> <20230502151457.GA3677937@pevik> <20230503163239.GA3762958@pevik> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <20230503163239.GA3762958@pevik> X-Virus-Scanned: clamav-milter 0.102.4 at in-6.smtp.seeweb.it X-Virus-Status: Clean Subject: Re: [LTP] LTP release preparations X-BeenThere: ltp@lists.linux.it X-Mailman-Version: 2.1.29 Precedence: list List-Id: Linux Test Project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: Petr Vorel Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: ltp-bounces+ltp=archiver.kernel.org@lists.linux.it Sender: "ltp" > > Hi! > > > * nfs08.sh: Skip on vfat > > > https://patchwork.ozlabs.org/project/ltp/patch/20230502151348.3677809-1-pvorel@suse.cz/ > > This is workaround for bugs found by the "run nfs on all fs" patch, > > right? > Well, this is the problem which was found by this patchset. If you use TMPDIR > with vfat or exfat (unlikely, I know) on current master, it will fail. > I tested it on both loop device (demonstrated below) and on separate disc in VM. > dd if=/dev/zero of=/tmp/dev bs=1M count=500 > losetup /dev/loop0 /tmp/dev > mkfs.exfat /dev/loop0 > mkdir -p /export > mount /dev/loop0 /export > df -hT /export/ > Filesystem Type Size Used Avail Use% Mounted on > /dev/loop0 vfat 500M 0 500M 0% /export > PATH="/opt/ltp/testcases/bin:$PATH" TMPDIR=/export nfs08.sh -v 4 -t tcp > ... > nfs08 1 TINFO: timeout per run is 0h 5m 0s > nfs08 1 TINFO: mount.nfs: (linux nfs-utils 2.6.3) > nfs08 1 TINFO: setup NFSv4, socket type tcp > nfs08 1 TINFO: Mounting NFS: mount -v -t nfs -o proto=tcp,vers=4 10.0.0.2:/export/LTP_nfs08.R9JOL8zozk/4/tcp /export/LTP_nfs08.R9JOL8zozk/4/0 > nfs08 1 TINFO: testing NFS cache invalidation for directories > 1 > nfs08 1 TPASS: ls | grep 1 passed as expected > nfs08 1 TFAIL: ls | grep 2 failed unexpectedly > Actually, nfs08.sh not working on vfat and exfat > => therefore nfs_lib.sh should be without TST_SKIP_FILESYSTEMS (currently all tests whitelists exfat) > and nfs08.sh should have: TST_SKIP_FILESYSTEMS="exfat,vfat" > umount /export > umount: /export: target is busy. > fuser -vm /dev/loop0 > USER PID ACCESS COMMAND > /dev/loop0: root kernel mount /export > root kernel knfsd /export > => Forced me to umount with -l or reboot, regardless used filesystem on > /dev/loop0. This is fixed in this patchset which uses TST_ALL_FILESYSTEMS, > but I'd prefer to merge it instead of fixing master. > This is reproducible even if I just add new device (i.e. not a loop device) to VM. > > I suppose that it may be better not to enable nfs on all filesystems for > > this release so that we have time to figure out what is wrong before > > next release. > > I really do not like applying "temporary" workarounds for real bugs in > > the LTP codebase. There is always danger of "temporary" being forgotten > > and we end up masking the real bug for eternity. > We're masking the problems, because by default we test on what's on /tmp > (often tmpfs, which is unlikely to be used for NFS or ext4 or btrfs). > I need to test more old distros, I suspect that nfs-utils 1.3.3 has problems > with vfat, exfat, tmpfs and fuse, which is in Debian 11 (bullseye). > => Maybe, as a start we could decide to run nfs_lib.sh only on modern linux > filesystems: i.e. btrfs, ext4, xfs > We could have: > TST_SKIP_FILESYSTEMS="btrfs,exfat,ext2,ext3,fuse,ntfs,vfat,tmpfs" I meant here TST_SKIP_FILESYSTEMS="exfat,ext2,ext3,fuse,ntfs,vfat,tmpfs" (i.e. to run on btrfs, ext4, xfs only) Kind regards, Petr > That would shorten the runtime and have more test coverage. > WDYT? I'm about to send v5 and run tests in the loop. Shell I include this > change? > Kind regards, > Petr -- Mailing list info: https://lists.linux.it/listinfo/ltp