[LTP] [PATCH 1/4] fanotify14: Print human-readable test case flags

Petr Vorel pvorel@suse.cz
Thu Oct 13 23:36:29 CEST 2022


Hi Martin,

> It's hard to tell which test case is failing from the current fanotify14
> output. Print test case flags to make failure analysis easier.

> Signed-off-by: Martin Doucha <mdoucha@suse.cz>
> ---
>  .../kernel/syscalls/fanotify/fanotify14.c     | 194 ++++++++++--------
>  1 file changed, 108 insertions(+), 86 deletions(-)

> diff --git a/testcases/kernel/syscalls/fanotify/fanotify14.c b/testcases/kernel/syscalls/fanotify/fanotify14.c
> index 594259ccf..ee42aaf68 100644
> --- a/testcases/kernel/syscalls/fanotify/fanotify14.c
> +++ b/testcases/kernel/syscalls/fanotify/fanotify14.c
> @@ -38,6 +38,8 @@
>  #define INODE_EVENTS (FAN_ATTRIB | FAN_CREATE | FAN_DELETE | FAN_MOVE | \
>  		      FAN_DELETE_SELF | FAN_MOVE_SELF)

> +#define FLAGS_DESC(flags) (flags), (#flags)
+1 for add ing description. But macro like this gets false positive in make
check:

fanotify14.c:41: ERROR: Macros with complex values should be enclosed in parentheses

Also quite recently, in dbb9db6ec ("syscalls/fanotify09: Make test case
definitions more readable") was single test migrated to use
.foo = value, .bar = value struct setup. This is about source code readability,
you aim for test output readability, IMHO both is important.


>  static int fanotify_fd;
>  static int fan_report_target_fid_unsupported;
>  static int ignore_mark_unsupported;
> @@ -49,101 +51,113 @@ static int ignore_mark_unsupported;
>   */
>  static struct test_case_t {
>  	unsigned int init_flags;
> +	const char *init_desc;
>  	unsigned int mark_flags;
> +	const char *mark_desc;
>  	/* zero mask expects to fail on fanotify_init() */
>  	unsigned long long mask;
> +	const char *mask_desc;
>  	int expected_errno;
>  } test_cases[] = {
> -	{
> -		/* FAN_REPORT_FID without class FAN_CLASS_NOTIF is not valid */
> -		FAN_CLASS_CONTENT | FAN_REPORT_FID, 0, 0, EINVAL
> -	},
> -	{
> -		/* FAN_REPORT_FID without class FAN_CLASS_NOTIF is not valid */
> -		FAN_CLASS_PRE_CONTENT | FAN_REPORT_FID, 0, 0, EINVAL
> -	},
> -	{
> -		/* INODE_EVENTS in mask without class FAN_REPORT_FID are not valid */
> -		FAN_CLASS_NOTIF, 0, INODE_EVENTS, EINVAL
> -	},
> -	{
> -		/* INODE_EVENTS in mask with FAN_MARK_MOUNT are not valid */
> -		FAN_CLASS_NOTIF | FAN_REPORT_FID, FAN_MARK_MOUNT, INODE_EVENTS, EINVAL
> -	},
> -	{
> -		/* FAN_REPORT_NAME without FAN_REPORT_DIR_FID is not valid */
> -		FAN_CLASS_NOTIF | FAN_REPORT_NAME, 0, 0, EINVAL
> -	},
> -	{
> -		/* FAN_REPORT_NAME without FAN_REPORT_DIR_FID is not valid */
> -		FAN_CLASS_NOTIF | FAN_REPORT_FID | FAN_REPORT_NAME, 0, 0, EINVAL
> -	},
> -	{
> -		/* FAN_REPORT_TARGET_FID without FAN_REPORT_FID is not valid */
> -		FAN_CLASS_NOTIF | FAN_REPORT_TARGET_FID | FAN_REPORT_DFID_NAME, 0, 0, EINVAL
> -	},
> -	{
> -		/* FAN_REPORT_TARGET_FID without FAN_REPORT_NAME is not valid */
> -		FAN_CLASS_NOTIF | FAN_REPORT_TARGET_FID | FAN_REPORT_DFID_FID, 0, 0, EINVAL
> -	},
> -	{
> -		/* FAN_RENAME without FAN_REPORT_NAME is not valid */
> -		FAN_CLASS_NOTIF | FAN_REPORT_DFID_FID, 0, FAN_RENAME, EINVAL
> -	},
> -	{
> -		/* With FAN_MARK_ONLYDIR on non-dir is not valid */
> -		FAN_CLASS_NOTIF, FAN_MARK_ONLYDIR, FAN_OPEN, ENOTDIR
> -	},
> -	{
> -		/* With FAN_REPORT_TARGET_FID, FAN_DELETE on non-dir is not valid */
> -		FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME_TARGET, 0, FAN_DELETE, ENOTDIR
> -	},
> -	{
> -		/* With FAN_REPORT_TARGET_FID, FAN_RENAME on non-dir is not valid */
> -		FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME_TARGET, 0, FAN_RENAME, ENOTDIR
> -	},
> -	{
> -		/* With FAN_REPORT_TARGET_FID, FAN_ONDIR on non-dir is not valid */
> -		FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME_TARGET, 0, FAN_OPEN | FAN_ONDIR, ENOTDIR
> -	},
> -	{
> -		/* With FAN_REPORT_TARGET_FID, FAN_EVENT_ON_CHILD on non-dir is not valid */
> -		FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME_TARGET, 0, FAN_OPEN | FAN_EVENT_ON_CHILD, ENOTDIR
> -	},
> -	{
> -		/* FAN_MARK_IGNORE_SURV with FAN_DELETE on non-dir is not valid */
> -		FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME, FAN_MARK_IGNORE_SURV, FAN_DELETE, ENOTDIR
> -	},
> -	{
> -		/* FAN_MARK_IGNORE_SURV with FAN_RENAME on non-dir is not valid */
> -		FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME, FAN_MARK_IGNORE_SURV, FAN_RENAME, ENOTDIR
> -	},
> -	{
> -		/* FAN_MARK_IGNORE_SURV with FAN_ONDIR on non-dir is not valid */
> -		FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME, FAN_MARK_IGNORE_SURV, FAN_OPEN | FAN_ONDIR, ENOTDIR
> -	},
> -	{
> -		/* FAN_MARK_IGNORE_SURV with FAN_EVENT_ON_CHILD on non-dir is not valid */
> -		FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME, FAN_MARK_IGNORE_SURV, FAN_OPEN | FAN_EVENT_ON_CHILD, ENOTDIR
> -	},
> -	{
> -		/* FAN_MARK_IGNORE without FAN_MARK_IGNORED_SURV_MODIFY on directory is not valid */
> -		FAN_CLASS_NOTIF, FAN_MARK_IGNORE, FAN_OPEN, EISDIR
> -	},
> -	{
> -		/* FAN_MARK_IGNORE without FAN_MARK_IGNORED_SURV_MODIFY on mount mark is not valid */
> -		FAN_CLASS_NOTIF, FAN_MARK_MOUNT | FAN_MARK_IGNORE, FAN_OPEN, EINVAL
> -	},
> -	{
> -		/* FAN_MARK_IGNORE without FAN_MARK_IGNORED_SURV_MODIFY on filesystem mark is not valid */
> -		FAN_CLASS_NOTIF, FAN_MARK_FILESYSTEM | FAN_MARK_IGNORE, FAN_OPEN, EINVAL
> -	},
> +	/* FAN_REPORT_FID without class FAN_CLASS_NOTIF is not valid */
> +	{FLAGS_DESC(FAN_CLASS_CONTENT | FAN_REPORT_FID), 0, NULL, 0, NULL,
> +		EINVAL},
> +
> +	/* FAN_REPORT_FID without class FAN_CLASS_NOTIF is not valid */
> +	{FLAGS_DESC(FAN_CLASS_PRE_CONTENT | FAN_REPORT_FID), 0, NULL, 0, NULL,
> +		EINVAL},
> +
> +	/* INODE_EVENTS in mask without class FAN_REPORT_FID are not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF), FLAGS_DESC(0), FLAGS_DESC(INODE_EVENTS),
> +		EINVAL},
> +
> +	/* INODE_EVENTS in mask with FAN_MARK_MOUNT are not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF | FAN_REPORT_FID),
> +		FLAGS_DESC(FAN_MARK_MOUNT), FLAGS_DESC(INODE_EVENTS), EINVAL},
> +
> +	/* FAN_REPORT_NAME without FAN_REPORT_DIR_FID is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF | FAN_REPORT_NAME), 0, NULL, 0, NULL,
> +		EINVAL},
> +
> +	/* FAN_REPORT_NAME without FAN_REPORT_DIR_FID is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF | FAN_REPORT_FID | FAN_REPORT_NAME), 0,
> +		NULL, 0, NULL, EINVAL},
> +
> +	/* FAN_REPORT_TARGET_FID without FAN_REPORT_FID is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF | FAN_REPORT_TARGET_FID | FAN_REPORT_DFID_NAME),
> +		0, NULL, 0, NULL, EINVAL},
> +
> +	/* FAN_REPORT_TARGET_FID without FAN_REPORT_NAME is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF | FAN_REPORT_TARGET_FID | FAN_REPORT_DFID_FID),
> +		0, NULL, 0, NULL, EINVAL},
> +
> +	/* FAN_RENAME without FAN_REPORT_NAME is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF | FAN_REPORT_DFID_FID), FLAGS_DESC(0),
> +		FLAGS_DESC(FAN_RENAME), EINVAL},
> +
> +	/* With FAN_MARK_ONLYDIR on non-dir is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF), FLAGS_DESC(FAN_MARK_ONLYDIR),
> +		FLAGS_DESC(FAN_OPEN), ENOTDIR},
> +
> +	/* With FAN_REPORT_TARGET_FID, FAN_DELETE on non-dir is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME_TARGET),
> +		FLAGS_DESC(0), FLAGS_DESC(FAN_DELETE), ENOTDIR},
> +
> +	/* With FAN_REPORT_TARGET_FID, FAN_RENAME on non-dir is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME_TARGET),
> +		FLAGS_DESC(0), FLAGS_DESC(FAN_RENAME), ENOTDIR},
> +
> +	/* With FAN_REPORT_TARGET_FID, FAN_ONDIR on non-dir is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME_TARGET),
> +		FLAGS_DESC(0), FLAGS_DESC(FAN_OPEN | FAN_ONDIR), ENOTDIR},
> +
> +	/* With FAN_REPORT_TARGET_FID, FAN_EVENT_ON_CHILD on non-dir is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME_TARGET),
> +		FLAGS_DESC(0), FLAGS_DESC(FAN_OPEN | FAN_EVENT_ON_CHILD),
> +		ENOTDIR},
> +
> +	/* FAN_MARK_IGNORE_SURV with FAN_DELETE on non-dir is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME),
> +		FLAGS_DESC(FAN_MARK_IGNORE_SURV), FLAGS_DESC(FAN_DELETE),
> +		ENOTDIR},
> +
> +	/* FAN_MARK_IGNORE_SURV with FAN_RENAME on non-dir is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME),
> +		FLAGS_DESC(FAN_MARK_IGNORE_SURV), FLAGS_DESC(FAN_RENAME),
> +		ENOTDIR},
> +
> +	/* FAN_MARK_IGNORE_SURV with FAN_ONDIR on non-dir is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME),
> +		FLAGS_DESC(FAN_MARK_IGNORE_SURV),
> +		FLAGS_DESC(FAN_OPEN | FAN_ONDIR), ENOTDIR},
> +
> +	/* FAN_MARK_IGNORE_SURV with FAN_EVENT_ON_CHILD on non-dir is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF | FAN_REPORT_DFID_NAME),
> +		FLAGS_DESC(FAN_MARK_IGNORE_SURV),
> +		FLAGS_DESC(FAN_OPEN | FAN_EVENT_ON_CHILD), ENOTDIR},
> +
> +	/* FAN_MARK_IGNORE without FAN_MARK_IGNORED_SURV_MODIFY on directory is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF), FLAGS_DESC(FAN_MARK_IGNORE),
> +		FLAGS_DESC(FAN_OPEN), EISDIR},
> +
> +	/* FAN_MARK_IGNORE without FAN_MARK_IGNORED_SURV_MODIFY on mount mark is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF),
> +		FLAGS_DESC(FAN_MARK_MOUNT | FAN_MARK_IGNORE),
> +		FLAGS_DESC(FAN_OPEN), EINVAL},
> +
> +	/* FAN_MARK_IGNORE without FAN_MARK_IGNORED_SURV_MODIFY on filesystem mark is not valid */
> +	{FLAGS_DESC(FAN_CLASS_NOTIF),
> +		FLAGS_DESC(FAN_MARK_FILESYSTEM | FAN_MARK_IGNORE),
> +		FLAGS_DESC(FAN_OPEN), EINVAL},
>  };

>  static void do_test(unsigned int number)
>  {
>  	struct test_case_t *tc = &test_cases[number];

> +	tst_res(TINFO, "Test case %d: fanotify_init(%s, O_RDONLY)", number,
> +		tc->init_desc);
> +
>  	if (fan_report_target_fid_unsupported && tc->init_flags & FAN_REPORT_TARGET_FID) {
>  		FANOTIFY_INIT_FLAGS_ERR_MSG(FAN_REPORT_TARGET_FID,
>  					    fan_report_target_fid_unsupported);
> @@ -155,8 +169,14 @@ static void do_test(unsigned int number)
>  		return;
>  	}

> -	TST_EXP_FD_OR_FAIL(fanotify_fd = fanotify_init(tc->init_flags, O_RDONLY),
> -			   !tc->mask && tc->expected_errno ? tc->expected_errno : 0);
TST_EXP_FD_OR_FAIL was added only to be used by fanotify tests.
What's wrong with it?

Kind regards,
Petr

> +	if (!tc->mask && tc->expected_errno) {
> +		TST_EXP_FAIL(fanotify_init(tc->init_flags, O_RDONLY),
> +			tc->expected_errno);
> +	} else {
> +		TST_EXP_FD(fanotify_init(tc->init_flags, O_RDONLY));
> +	}
> +
> +	fanotify_fd = TST_RET;

>  	if (fanotify_fd < 0)
>  		return;
> @@ -167,6 +187,8 @@ static void do_test(unsigned int number)
>  	/* Set mark on non-dir only when expecting error ENOTDIR */
>  	const char *path = tc->expected_errno == ENOTDIR ? FILE1 : MNTPOINT;

> +	tst_res(TINFO, "Testing fanotify_mark(FAN_MARK_ADD | %s, %s)",
> +		tc->mark_desc, tc->mask_desc);
>  	TST_EXP_FD_OR_FAIL(fanotify_mark(fanotify_fd, FAN_MARK_ADD | tc->mark_flags,
>  					 tc->mask, AT_FDCWD, path),
>  					 tc->expected_errno);


More information about the ltp mailing list