From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8F278C4332F for ; Mon, 17 Oct 2022 15:11:29 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230102AbiJQPL2 (ORCPT ); Mon, 17 Oct 2022 11:11:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40982 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230310AbiJQPL1 (ORCPT ); Mon, 17 Oct 2022 11:11:27 -0400 Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 18A5E1D339 for ; Mon, 17 Oct 2022 08:11:23 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 7EA7D34895; Mon, 17 Oct 2022 15:11:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1666019482; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=7QZAhtFXO40KHSXJYSNZ8k5I5wAiUxdwQgNwnqOTre0=; b=yyY/qttsPfPwXxFGtp9Os8u3IBQqu4udARVVNC6PDei3KN3tWKhMyLcxM9ZKpFtUfRD0bc /jmAUBbaPPzoShjUWekG3EEYuvX1Ekkx2+8NND42wlKhg7orFwCxkailhZ6dxm91DFZ6El ym/yqRBBaNE+awJhqwT2NPj2umOHvO4= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1666019482; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=7QZAhtFXO40KHSXJYSNZ8k5I5wAiUxdwQgNwnqOTre0=; b=Gh2E/yD+GOASVZIn5XMKu3+KNhIT2M32YhpFPj84m1UUCF+qBewdVMHbPDWMeTWGzhfDL+ U+cQUJn7NjOVqBBA== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 3FC7113ABE; Mon, 17 Oct 2022 15:11:22 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id t7XMDZpwTWMTGAAAMHmgww (envelope-from ); Mon, 17 Oct 2022 15:11:22 +0000 Date: Mon, 17 Oct 2022 17:11:20 +0200 From: Petr Vorel To: Richard Palethorpe Cc: linux-xfs@vger.kernel.org, Eric Sandeen , "Darrick J . Wong" , ltp@lists.linux.it, Cyril Hrubis Subject: Re: [LTP] [PATCH 1/1] df01.sh: Use own fsfreeze implementation for XFS Message-ID: Reply-To: Petr Vorel References: <20221004090810.9023-1-pvorel@suse.cz> <87sfjmmswf.fsf@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87sfjmmswf.fsf@suse.de> Precedence: bulk List-ID: X-Mailing-List: linux-xfs@vger.kernel.org Hi Richie, > Hello, > Petr Vorel writes: > > df01.sh started to fail on XFS on certain configuration since mkfs.xfs > > and kernel 5.19. Implement fsfreeze instead of introducing external > > dependency. NOTE: implementation could fail on other filesystems > > (EOPNOTSUPP on exfat, ntfs, vfat). > > Suggested-by: Darrick J. Wong > > Suggested-by: Eric Sandeen > > Signed-off-by: Petr Vorel > > --- > > Hi, > > FYI the background of this issue: > > https://lore.kernel.org/ltp/Yv5oaxsX6z2qxxF3@magnolia/ > > https://lore.kernel.org/ltp/974cc110-d47e-5fae-af5f-e2e610720e2d@redhat.com/ > > @LTP developers: not sure if the consensus is to avoid LTP API > > completely (even use it just with TST_NO_DEFAULT_MAIN), if required I > Why would that be the consensus? :-) $ ls testcases/lib/*.c |wc -l 19 $ git grep -l TST_NO_DEFAULT_MAIN testcases/lib/*.c |wc -l 9 => 10 tests not use tst_test.h at all. => none is *not* defining TST_NO_DEFAULT_MAIN (not a big surprise), but 2 of them (testcases/lib/tst_device.c, testcases/lib/tst_get_free_pids.c) implement workaround to force messages to be printed from the new library (tst_test.c). static struct tst_test test = { }; tst_test = &test; My opinion also was based on Cyril's comments on nfs05_make_tree.c patch, but he probably meant to just use TST_NO_DEFAULT_MAIN instead of struct tst_test test: https://lore.kernel.org/ltp/YqxFo1iFzHatNRIl@yuki/ > > can rewrite to use it just to get SAFE_*() macros (like > > testcases/lib/tst_checkpoint.c) or even with tst_test workarounds > > (testcases/lib/tst_get_free_pids.c). > Yes, it should work fine with TST_NO_DEFAULT_MAIN Both versions IMHO work well, the question what we prefer more. Do you vote for rewriting? Kind regards, Petr > > Kind regards, > > Petr > > testcases/commands/df/Makefile | 4 +- > > testcases/commands/df/df01.sh | 3 ++ > > testcases/commands/df/df01_fsfreeze.c | 55 +++++++++++++++++++++++++++ > > 3 files changed, 61 insertions(+), 1 deletion(-) > > create mode 100644 testcases/commands/df/df01_fsfreeze.c > > diff --git a/testcases/commands/df/Makefile b/testcases/commands/df/Makefile > > index 2787bb43a..1e0b4283a 100644 > > --- a/testcases/commands/df/Makefile > > +++ b/testcases/commands/df/Makefile > > @@ -1,11 +1,13 @@ > > # SPDX-License-Identifier: GPL-2.0-or-later > > +# Copyright (c) Linux Test Project, 2021-2022 > > # Copyright (c) 2015 Fujitsu Ltd. > > -# Author:Zhang Jin > > +# Author: Zhang Jin > > top_srcdir ?= ../../.. > > include $(top_srcdir)/include/mk/env_pre.mk > > INSTALL_TARGETS := df01.sh > > +MAKE_TARGETS := df01_fsfreeze > > include $(top_srcdir)/include/mk/generic_leaf_target.mk > > diff --git a/testcases/commands/df/df01.sh b/testcases/commands/df/df01.sh > > index ae0449c3c..c59d2a01d 100755 > > --- a/testcases/commands/df/df01.sh > > +++ b/testcases/commands/df/df01.sh > > @@ -46,6 +46,9 @@ df_test() > > ROD_SILENT rm -rf $TST_MNTPOINT/testimg > > + # ensure free space change can be seen by statfs > > + [ "$fs" = "xfs" ] && ROD_SILENT df01_fsfreeze $TST_MNTPOINT > > + > > # flush file system buffers, then we can get the actual sizes. > > sync > > } > > diff --git a/testcases/commands/df/df01_fsfreeze.c b/testcases/commands/df/df01_fsfreeze.c > > new file mode 100644 > > index 000000000..d47e1b01a > > --- /dev/null > > +++ b/testcases/commands/df/df01_fsfreeze.c > > @@ -0,0 +1,55 @@ > > +// SPDX-License-Identifier: GPL-2.0-or-later > > +/* > > + * Copyright (c) 2010 Hajime Taira > > + * Copyright (c) 2010 Masatake Yamato > > + * Copyright (c) 2022 Petr Vorel > > + */ > > + > > +#include > > +#include > > +#include > > +#include > > +#include > > +#include > > +#include > > +#include > > +#include > > + > > +#define err_exit(...) ({ \ > > + fprintf(stderr, __VA_ARGS__); \ > > + if (errno) \ > > + fprintf(stderr, ": %s (%d)", strerror(errno), errno); \ > > + fprintf(stderr, "\n"); \ > > + exit(EXIT_FAILURE); \ > > +}) > > + > > +int main(int argc, char *argv[]) > > +{ > > + int fd; > > + struct stat sb; > > + > > + if (argc < 2) > > + err_exit("USAGE: df01_fsfreeze "); > > + > > + fd = open(argv[1], O_RDONLY); > > + if (fd < 0) > > + err_exit("open '%s' failed", argv[1]); > > + > > + if (fstat(fd, &sb) == -1) > > + err_exit("stat of '%s' failed", argv[1]); > > + > > + if (!S_ISDIR(sb.st_mode)) > > + err_exit("%s: is not a directory", argv[1]); > > + > > + if (ioctl(fd, FIFREEZE, 0) < 0) > > + err_exit("ioctl FIFREEZE on '%s' failed", argv[1]); > > + > > + usleep(100); > > + > > + if (ioctl(fd, FITHAW, 0) < 0) > > + err_exit("ioctl FITHAW on '%s' failed", argv[1]); > > + > > + close(fd); > > + > > + return EXIT_SUCCESS; > > +} > > -- > > 2.37.3