All of lore.kernel.org
 help / color / mirror / Atom feed
From: Greg KH <gregkh@linuxfoundation.org>
To: Jan Stancek <jstancek@redhat.com>
Cc: CKI Project <cki-project@redhat.com>,
	Jaroslav Kysela <jkysela@redhat.com>,
	alsa-devel@alsa-project.org,
	LTP Mailing List <ltp@lists.linux.it>,
	Linux Stable maillist <stable@vger.kernel.org>,
	Memory Management <mm-qe@redhat.com>
Subject: Re: ❌ FAIL: Test report for kernel 5.3.9-rc1-dfe283e.cki (stable)
Date: Mon, 4 Nov 2019 17:30:33 +0100	[thread overview]
Message-ID: <20191104163033.GB2253150@kroah.com> (raw)
In-Reply-To: <251943262.10356408.1572881121044.JavaMail.zimbra@redhat.com>

On Mon, Nov 04, 2019 at 10:25:21AM -0500, Jan Stancek wrote:
> 
> ----- Original Message -----
> > On Mon, Nov 04, 2019 at 09:28:10AM -0500, Jan Stancek wrote:
> > > 
> > > 
> > > ----- Original Message -----
> > > > On Mon, Nov 04, 2019 at 08:35:51AM -0500, Jan Stancek wrote:
> > > > > 
> > > > > 
> > > > > ----- Original Message -----
> > > > > > 
> > > > > > Hello,
> > > > > > 
> > > > > > We ran automated tests on a recent commit from this kernel tree:
> > > > > > 
> > > > > >        Kernel repo:
> > > > > >        git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
> > > > > >             Commit: dfe283e9fdac - Linux 5.3.9-rc1
> > > > > > 
> > > > > > The results of these automated tests are provided below.
> > > > > > 
> > > > > >     Overall result: FAILED (see details below)
> > > > > >              Merge: OK
> > > > > >            Compile: OK
> > > > > >              Tests: FAILED
> > > > > > 
> > > > > > All kernel binaries, config files, and logs are available for
> > > > > > download
> > > > > > here:
> > > > > > 
> > > > > >   https://artifacts.cki-project.org/pipelines/262380
> > > > > > 
> > > > > > One or more kernel tests failed:
> > > > > > 
> > > > > >     x86_64:
> > > > > >      ❌ LTP lite
> > > > > >
> > > > > 
> > > > > Not a 5.3 -stable regression.
> > > > > 
> > > > > Failure comes from test that sanity checks all /proc files by doing
> > > > > 1k read from each. There are couple issues it hits wrt. snd_hda_*.
> > > > > 
> > > > > Example reproducer:
> > > > >   dd if=/sys/kernel/debug/regmap/hdaudioC0D3-hdaudio/access of=out.txt
> > > > >   count=1 bs=1024 iflag=nonblock
> > > > 
> > > > That's not a proc file :)
> > > 
> > > Right. It's same test that's used for /proc too.
> > > 
> > > > 
> > > > > It's slow and triggers soft lockups [1]. And it also requires lot
> > > > > of memory, triggering OOMs on smaller VMs:
> > > > > 0x0000000024f0437b-0x000000001a32b1c8 1073745920 seq_read+0x131/0x400
> > > > > pages=262144 vmalloc vpages N0=262144
> > > > > 
> > > > > I'm leaning towards skipping all regmap entries in this test.
> > > > > Comments are welcomed.
> > > > 
> > > > Randomly poking around in debugfs is a sure way to cause crashes and
> > > > major problems.  Also, debugfs files are NOT stable and only for
> > > > debugging and should never be enabled on "real" systems.
> > > > 
> > > > So what exactly is the test trying to do here?
> > > 
> > > It's (unprivileged) user trying to open/read anything it can (/proc, /sys)
> > > to see if that triggers anything bad.
> > > 
> > > It can run as privileged user too, which was the case above.
> > 
> > Sure, you can do tons of bad things as root poking around in sysfs,
> > debugfs, and procfs.  What exactly are you trying to do, break the
> > system?
> 
> We are talking about read-only here. Is it unreasonable to expect
> that root can read all /proc entries without crashing the system?

You are NOT reading /proc/ here.  You are reading debugfs which you
really have NOT idea what is in there.  As you saw, you are reading from
hardware that is slow and doing odd things when you read from it.

And yes, there are some /proc/ files that you should not read from as
root and expect things to always work.  PCI devices are notorious for
this, and if you are reading those files as root, you "know" you know
what you are doing and can accept the risk for when things go wrong.

It is fine to write tests to read specific /proc/ files that you know
what is happening in them.  To pick random ones is never a good idea.

thanks,

greg k-h

WARNING: multiple messages have this Message-ID (diff)
From: Greg KH <gregkh@linuxfoundation.org>
To: Jan Stancek <jstancek@redhat.com>
Cc: alsa-devel@alsa-project.org, Memory Management <mm-qe@redhat.com>,
	Linux Stable maillist <stable@vger.kernel.org>,
	Jaroslav Kysela <jkysela@redhat.com>,
	CKI Project <cki-project@redhat.com>,
	LTP Mailing List <ltp@lists.linux.it>
Subject: Re: [alsa-devel] ❌ FAIL: Test report for kernel 5.3.9-rc1-dfe283e.cki (stable)
Date: Mon, 4 Nov 2019 17:30:33 +0100	[thread overview]
Message-ID: <20191104163033.GB2253150@kroah.com> (raw)
In-Reply-To: <251943262.10356408.1572881121044.JavaMail.zimbra@redhat.com>

On Mon, Nov 04, 2019 at 10:25:21AM -0500, Jan Stancek wrote:
> 
> ----- Original Message -----
> > On Mon, Nov 04, 2019 at 09:28:10AM -0500, Jan Stancek wrote:
> > > 
> > > 
> > > ----- Original Message -----
> > > > On Mon, Nov 04, 2019 at 08:35:51AM -0500, Jan Stancek wrote:
> > > > > 
> > > > > 
> > > > > ----- Original Message -----
> > > > > > 
> > > > > > Hello,
> > > > > > 
> > > > > > We ran automated tests on a recent commit from this kernel tree:
> > > > > > 
> > > > > >        Kernel repo:
> > > > > >        git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
> > > > > >             Commit: dfe283e9fdac - Linux 5.3.9-rc1
> > > > > > 
> > > > > > The results of these automated tests are provided below.
> > > > > > 
> > > > > >     Overall result: FAILED (see details below)
> > > > > >              Merge: OK
> > > > > >            Compile: OK
> > > > > >              Tests: FAILED
> > > > > > 
> > > > > > All kernel binaries, config files, and logs are available for
> > > > > > download
> > > > > > here:
> > > > > > 
> > > > > >   https://artifacts.cki-project.org/pipelines/262380
> > > > > > 
> > > > > > One or more kernel tests failed:
> > > > > > 
> > > > > >     x86_64:
> > > > > >      ❌ LTP lite
> > > > > >
> > > > > 
> > > > > Not a 5.3 -stable regression.
> > > > > 
> > > > > Failure comes from test that sanity checks all /proc files by doing
> > > > > 1k read from each. There are couple issues it hits wrt. snd_hda_*.
> > > > > 
> > > > > Example reproducer:
> > > > >   dd if=/sys/kernel/debug/regmap/hdaudioC0D3-hdaudio/access of=out.txt
> > > > >   count=1 bs=1024 iflag=nonblock
> > > > 
> > > > That's not a proc file :)
> > > 
> > > Right. It's same test that's used for /proc too.
> > > 
> > > > 
> > > > > It's slow and triggers soft lockups [1]. And it also requires lot
> > > > > of memory, triggering OOMs on smaller VMs:
> > > > > 0x0000000024f0437b-0x000000001a32b1c8 1073745920 seq_read+0x131/0x400
> > > > > pages=262144 vmalloc vpages N0=262144
> > > > > 
> > > > > I'm leaning towards skipping all regmap entries in this test.
> > > > > Comments are welcomed.
> > > > 
> > > > Randomly poking around in debugfs is a sure way to cause crashes and
> > > > major problems.  Also, debugfs files are NOT stable and only for
> > > > debugging and should never be enabled on "real" systems.
> > > > 
> > > > So what exactly is the test trying to do here?
> > > 
> > > It's (unprivileged) user trying to open/read anything it can (/proc, /sys)
> > > to see if that triggers anything bad.
> > > 
> > > It can run as privileged user too, which was the case above.
> > 
> > Sure, you can do tons of bad things as root poking around in sysfs,
> > debugfs, and procfs.  What exactly are you trying to do, break the
> > system?
> 
> We are talking about read-only here. Is it unreasonable to expect
> that root can read all /proc entries without crashing the system?

You are NOT reading /proc/ here.  You are reading debugfs which you
really have NOT idea what is in there.  As you saw, you are reading from
hardware that is slow and doing odd things when you read from it.

And yes, there are some /proc/ files that you should not read from as
root and expect things to always work.  PCI devices are notorious for
this, and if you are reading those files as root, you "know" you know
what you are doing and can accept the risk for when things go wrong.

It is fine to write tests to read specific /proc/ files that you know
what is happening in them.  To pick random ones is never a good idea.

thanks,

greg k-h
_______________________________________________
Alsa-devel mailing list
Alsa-devel@alsa-project.org
https://mailman.alsa-project.org/mailman/listinfo/alsa-devel

WARNING: multiple messages have this Message-ID (diff)
From: Greg KH <gregkh@linuxfoundation.org>
To: ltp@lists.linux.it
Subject: [LTP]  ❌ FAIL: Test report for kernel 5.3.9-rc1-dfe283e.cki (stable)
Date: Mon, 4 Nov 2019 17:30:33 +0100	[thread overview]
Message-ID: <20191104163033.GB2253150@kroah.com> (raw)
In-Reply-To: <251943262.10356408.1572881121044.JavaMail.zimbra@redhat.com>

On Mon, Nov 04, 2019 at 10:25:21AM -0500, Jan Stancek wrote:
> 
> ----- Original Message -----
> > On Mon, Nov 04, 2019 at 09:28:10AM -0500, Jan Stancek wrote:
> > > 
> > > 
> > > ----- Original Message -----
> > > > On Mon, Nov 04, 2019 at 08:35:51AM -0500, Jan Stancek wrote:
> > > > > 
> > > > > 
> > > > > ----- Original Message -----
> > > > > > 
> > > > > > Hello,
> > > > > > 
> > > > > > We ran automated tests on a recent commit from this kernel tree:
> > > > > > 
> > > > > >        Kernel repo:
> > > > > >        git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
> > > > > >             Commit: dfe283e9fdac - Linux 5.3.9-rc1
> > > > > > 
> > > > > > The results of these automated tests are provided below.
> > > > > > 
> > > > > >     Overall result: FAILED (see details below)
> > > > > >              Merge: OK
> > > > > >            Compile: OK
> > > > > >              Tests: FAILED
> > > > > > 
> > > > > > All kernel binaries, config files, and logs are available for
> > > > > > download
> > > > > > here:
> > > > > > 
> > > > > >   https://artifacts.cki-project.org/pipelines/262380
> > > > > > 
> > > > > > One or more kernel tests failed:
> > > > > > 
> > > > > >     x86_64:
> > > > > >      ? LTP lite
> > > > > >
> > > > > 
> > > > > Not a 5.3 -stable regression.
> > > > > 
> > > > > Failure comes from test that sanity checks all /proc files by doing
> > > > > 1k read from each. There are couple issues it hits wrt. snd_hda_*.
> > > > > 
> > > > > Example reproducer:
> > > > >   dd if=/sys/kernel/debug/regmap/hdaudioC0D3-hdaudio/access of=out.txt
> > > > >   count=1 bs=1024 iflag=nonblock
> > > > 
> > > > That's not a proc file :)
> > > 
> > > Right. It's same test that's used for /proc too.
> > > 
> > > > 
> > > > > It's slow and triggers soft lockups [1]. And it also requires lot
> > > > > of memory, triggering OOMs on smaller VMs:
> > > > > 0x0000000024f0437b-0x000000001a32b1c8 1073745920 seq_read+0x131/0x400
> > > > > pages=262144 vmalloc vpages N0=262144
> > > > > 
> > > > > I'm leaning towards skipping all regmap entries in this test.
> > > > > Comments are welcomed.
> > > > 
> > > > Randomly poking around in debugfs is a sure way to cause crashes and
> > > > major problems.  Also, debugfs files are NOT stable and only for
> > > > debugging and should never be enabled on "real" systems.
> > > > 
> > > > So what exactly is the test trying to do here?
> > > 
> > > It's (unprivileged) user trying to open/read anything it can (/proc, /sys)
> > > to see if that triggers anything bad.
> > > 
> > > It can run as privileged user too, which was the case above.
> > 
> > Sure, you can do tons of bad things as root poking around in sysfs,
> > debugfs, and procfs.  What exactly are you trying to do, break the
> > system?
> 
> We are talking about read-only here. Is it unreasonable to expect
> that root can read all /proc entries without crashing the system?

You are NOT reading /proc/ here.  You are reading debugfs which you
really have NOT idea what is in there.  As you saw, you are reading from
hardware that is slow and doing odd things when you read from it.

And yes, there are some /proc/ files that you should not read from as
root and expect things to always work.  PCI devices are notorious for
this, and if you are reading those files as root, you "know" you know
what you are doing and can accept the risk for when things go wrong.

It is fine to write tests to read specific /proc/ files that you know
what is happening in them.  To pick random ones is never a good idea.

thanks,

greg k-h

  reply	other threads:[~2019-11-04 16:30 UTC|newest]

Thread overview: 32+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-11-04  3:36 ❌ FAIL: Test report for kernel 5.3.9-rc1-dfe283e.cki (stable) CKI Project
2019-11-04  3:36 ` [LTP] " CKI Project
2019-11-04 13:35 ` Jan Stancek
2019-11-04 13:35   ` [LTP] " Jan Stancek
2019-11-04 13:35   ` [alsa-devel] " Jan Stancek
2019-11-04 13:51   ` Greg KH
2019-11-04 13:51     ` [LTP] " Greg KH
2019-11-04 13:51     ` [alsa-devel] " Greg KH
2019-11-04 14:28     ` Jan Stancek
2019-11-04 14:28       ` [LTP] " Jan Stancek
2019-11-04 14:28       ` [alsa-devel] " Jan Stancek
2019-11-04 14:59       ` Greg KH
2019-11-04 14:59         ` [LTP] " Greg KH
2019-11-04 14:59         ` [alsa-devel] " Greg KH
2019-11-04 15:25         ` Jan Stancek
2019-11-04 15:25           ` [LTP] " Jan Stancek
2019-11-04 15:25           ` [alsa-devel] " Jan Stancek
2019-11-04 16:30           ` Greg KH [this message]
2019-11-04 16:30             ` [LTP] " Greg KH
2019-11-04 16:30             ` [alsa-devel] " Greg KH
2019-11-04 17:02             ` Jan Stancek
2019-11-04 17:02               ` [LTP] " Jan Stancek
2019-11-04 17:02               ` [alsa-devel] " Jan Stancek
2019-11-04 20:32               ` Greg KH
2019-11-04 20:32                 ` [LTP] " Greg KH
2019-11-04 20:32                 ` [alsa-devel] " Greg KH
2019-11-07 11:05                 ` [LTP] " Richard Palethorpe
2019-11-07 11:05                   ` Richard Palethorpe
2019-11-07 11:05                   ` [alsa-devel] " Richard Palethorpe
2019-11-05  8:15   ` [alsa-devel] " Takashi Iwai
2019-11-05  8:15     ` [LTP] " Takashi Iwai
2019-11-05  8:15     ` Takashi Iwai

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20191104163033.GB2253150@kroah.com \
    --to=gregkh@linuxfoundation.org \
    --cc=alsa-devel@alsa-project.org \
    --cc=cki-project@redhat.com \
    --cc=jkysela@redhat.com \
    --cc=jstancek@redhat.com \
    --cc=ltp@lists.linux.it \
    --cc=mm-qe@redhat.com \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.