From patchwork Tue Mar 28 14:40:31 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Petr Vorel X-Patchwork-Id: 1762348 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.linux.it (client-ip=213.254.12.146; helo=picard.linux.it; envelope-from=ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=suse.cz header.i=@suse.cz header.a=rsa-sha256 header.s=susede2_rsa header.b=i4iMVmAH; dkim=fail reason="signature verification failed" header.d=suse.cz header.i=@suse.cz header.a=ed25519-sha256 header.s=susede2_ed25519 header.b=236cL7s7; dkim-atps=neutral Received: from picard.linux.it (picard.linux.it [213.254.12.146]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4PmC626jR4z1yYS for ; Wed, 29 Mar 2023 01:40:41 +1100 (AEDT) Received: from picard.linux.it (localhost [IPv6:::1]) by picard.linux.it (Postfix) with ESMTP id D0CF23CCB17 for ; Tue, 28 Mar 2023 16:40:38 +0200 (CEST) X-Original-To: ltp@lists.linux.it Delivered-To: ltp@picard.linux.it Received: from in-3.smtp.seeweb.it (in-3.smtp.seeweb.it [IPv6:2001:4b78:1:20::3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384)) (No client certificate requested) by picard.linux.it (Postfix) with ESMTPS id 0CF5E3CA33C for ; Tue, 28 Mar 2023 16:40:36 +0200 (CEST) Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2001:67c:2178:6::1c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by in-3.smtp.seeweb.it (Postfix) with ESMTPS id 75BF21A006EB for ; Tue, 28 Mar 2023 16:40:35 +0200 (CEST) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 38DDB21A2E; Tue, 28 Mar 2023 14:40:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1680014435; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=fVFZvyNchICZzslacihJCXq/GLk9zqVn44ydLsYCRxk=; b=i4iMVmAHKvczfHC1ygLk13IVNNQJ9zWyDaVjLmKmiKLqjzESqtWi1uPKzW48X/c8SuG9Fq pF7fO0pPhzB0xi8cbxT/zQ+YVxsMXt0AARW5h8uoBg84XyI3z0EKOhLUE7A5feG9fct848 3t5/U/rBAXyWAsaX3RJ6cHfvut6Eh7c= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1680014435; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=fVFZvyNchICZzslacihJCXq/GLk9zqVn44ydLsYCRxk=; b=236cL7s7fl7Zw3jZ5y1r78zunRwkqZsKrbe2tk+niEHNpHqFcJabygE1QkZeCxZLSxTwOB KbL/uSrkCubSCTBQ== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 073951390D; Tue, 28 Mar 2023 14:40:35 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id /i4xAGP8ImQDfgAAMHmgww (envelope-from ); Tue, 28 Mar 2023 14:40:35 +0000 From: Petr Vorel To: ltp@lists.linux.it Date: Tue, 28 Mar 2023 16:40:31 +0200 Message-Id: <20230328144031.791212-1-pvorel@suse.cz> X-Mailer: git-send-email 2.40.0 MIME-Version: 1.0 X-Virus-Scanned: clamav-milter 0.102.4 at in-3.smtp.seeweb.it X-Virus-Status: Clean X-Spam-Status: No, score=0.1 required=7.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_SOFTFAIL autolearn=disabled version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on in-3.smtp.seeweb.it Subject: [LTP] [PATCH 1/1] fsconfig03: Skip on FUSE X-BeenThere: ltp@lists.linux.it X-Mailman-Version: 2.1.29 Precedence: list List-Id: Linux Test Project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it Sender: "ltp" fsconfig03 is broken not only on vfat and ntfs, but also over FUSE: tst_supported_fs_types.c:120: TINFO: FUSE does support exfat tst_supported_fs_types.c:55: TINFO: mkfs.exfat does exist ... tst_test.c:1634: TINFO: === Testing on exfat === tst_test.c:1093: TINFO: Formatting /dev/loop0 with exfat opts='' extra opts='' fsconfig03.c:38: TBROK: fsopen() failed: ENODEV (19) NOTE: it actually works on vfat which is not over FUSE: tst_supported_fs_types.c:90: TINFO: Kernel supports vfat tst_supported_fs_types.c:55: TINFO: mkfs.vfat does exist ... tst_test.c:1634: TINFO: === Testing on vfat === tst_test.c:1093: TINFO: Formatting /dev/loop0 with vfat opts='' extra opts='' fsconfig03.c:72: TPASS: kernel seems to be fine on vfat Reported-by: Wei Gao Signed-off-by: Petr Vorel Reviewed-by: Avinesh Kumar Tested-by: Avinesh Kumar --- Verifying NTFS as kernel module (I'd be surprised if it was not working). The setup is the same as for fsconfig01.c (fsconfig02.c is for expected errors, thus has less strict requirements). Kind regards, Petr testcases/kernel/syscalls/fsconfig/fsconfig03.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/testcases/kernel/syscalls/fsconfig/fsconfig03.c b/testcases/kernel/syscalls/fsconfig/fsconfig03.c index e891c9f98..0ba5355d3 100644 --- a/testcases/kernel/syscalls/fsconfig/fsconfig03.c +++ b/testcases/kernel/syscalls/fsconfig/fsconfig03.c @@ -88,7 +88,7 @@ static struct tst_test test = { .mntpoint = MNTPOINT, .all_filesystems = 1, .taint_check = TST_TAINT_W | TST_TAINT_D, - .skip_filesystems = (const char *const []){"ntfs", "vfat", NULL}, + .skip_filesystems = (const char *const []){"fuse", NULL}, .tags = (const struct tst_tag[]) { {"linux-git", "722d94847de29"}, {"CVE", "2022-0185"},