From: Jan Kara <jack@suse.cz>
To: ltp@lists.linux.it
Cc: Jan Kara <jack@suse.cz>
Subject: [LTP] [PATCH 1/3] fanotify10: Use named initializers
Date: Tue, 15 Nov 2022 13:47:36 +0100 [thread overview]
Message-ID: <20221115124741.14400-1-jack@suse.cz> (raw)
In-Reply-To: <20221115123721.12176-1-jack@suse.cz>
Convert the testcase to use named initializers instead of anonymous
ones.
Signed-off-by: Jan Kara <jack@suse.cz>
---
.../kernel/syscalls/fanotify/fanotify10.c | 408 +++++++++++-------
1 file changed, 249 insertions(+), 159 deletions(-)
diff --git a/testcases/kernel/syscalls/fanotify/fanotify10.c b/testcases/kernel/syscalls/fanotify/fanotify10.c
index ca0d8a9e4a4a..6f21094bed2c 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify10.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify10.c
@@ -133,227 +133,317 @@ static struct tcase {
unsigned long long expected_mask_without_ignore;
} tcases[] = {
{
- "ignore mount events created on a specific file",
- MOUNT_PATH, FANOTIFY_MOUNT,
- FILE_MNT2, FANOTIFY_INODE,
- 0,
- FILE_PATH, 0, FAN_OPEN
+ .tname = "ignore mount events created on a specific file",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_MOUNT,
+ .ignore_path = FILE_MNT2,
+ .ignore_mark_type = FANOTIFY_INODE,
+ .event_path = FILE_PATH,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "ignore exec mount events created on a specific file",
- MOUNT_PATH, FANOTIFY_MOUNT,
- FILE_EXEC_PATH2, FANOTIFY_INODE,
- 0,
- FILE_EXEC_PATH, FAN_OPEN_EXEC, FAN_OPEN | FAN_OPEN_EXEC
+ .tname = "ignore exec mount events created on a specific file",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_MOUNT,
+ .ignore_path = FILE_EXEC_PATH2,
+ .ignore_mark_type = FANOTIFY_INODE,
+ .event_path = FILE_EXEC_PATH,
+ .expected_mask_with_ignore = FAN_OPEN_EXEC,
+ .expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
},
{
- "don't ignore mount events created on another file",
- MOUNT_PATH, FANOTIFY_MOUNT,
- FILE_PATH, FANOTIFY_INODE,
- 0,
- FILE2_PATH, FAN_OPEN, FAN_OPEN
+ .tname = "don't ignore mount events created on another file",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_MOUNT,
+ .ignore_path = FILE_PATH,
+ .ignore_mark_type = FANOTIFY_INODE,
+ .event_path = FILE2_PATH,
+ .expected_mask_with_ignore = FAN_OPEN,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "don't ignore exec mount events created on another file",
- MOUNT_PATH, FANOTIFY_MOUNT,
- FILE_EXEC_PATH, FANOTIFY_INODE,
- 0,
- FILE2_EXEC_PATH, FAN_OPEN | FAN_OPEN_EXEC,
- FAN_OPEN | FAN_OPEN_EXEC
+ .tname = "don't ignore exec mount events created on another file",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_MOUNT,
+ .ignore_path = FILE_EXEC_PATH,
+ .ignore_mark_type = FANOTIFY_INODE,
+ .event_path = FILE2_EXEC_PATH,
+ .expected_mask_with_ignore = FAN_OPEN | FAN_OPEN_EXEC,
+ .expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
},
{
- "ignore inode events created on a specific mount point",
- FILE_PATH, FANOTIFY_INODE,
- MNT2_PATH, FANOTIFY_MOUNT,
- 0,
- FILE_MNT2, 0, FAN_OPEN
+ .tname = "ignore inode events created on a specific mount point",
+ .mark_path = FILE_PATH,
+ .mark_type = FANOTIFY_INODE,
+ .ignore_path = MNT2_PATH,
+ .ignore_mark_type = FANOTIFY_MOUNT,
+ .event_path = FILE_MNT2,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "ignore exec inode events created on a specific mount point",
- FILE_EXEC_PATH, FANOTIFY_INODE,
- MNT2_PATH, FANOTIFY_MOUNT,
- 0,
- FILE_EXEC_PATH2, FAN_OPEN_EXEC, FAN_OPEN | FAN_OPEN_EXEC
+ .tname = "ignore exec inode events created on a specific mount point",
+ .mark_path = FILE_EXEC_PATH,
+ .mark_type = FANOTIFY_INODE,
+ .ignore_path = MNT2_PATH,
+ .ignore_mark_type = FANOTIFY_MOUNT,
+ .event_path = FILE_EXEC_PATH2,
+ .expected_mask_with_ignore = FAN_OPEN_EXEC,
+ .expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
},
{
- "don't ignore inode events created on another mount point",
- FILE_MNT2, FANOTIFY_INODE,
- MNT2_PATH, FANOTIFY_MOUNT,
- 0,
- FILE_PATH, FAN_OPEN, FAN_OPEN
+ .tname = "don't ignore inode events created on another mount point",
+ .mark_path = FILE_MNT2,
+ .mark_type = FANOTIFY_INODE,
+ .ignore_path = MNT2_PATH,
+ .ignore_mark_type = FANOTIFY_MOUNT,
+ .event_path = FILE_PATH,
+ .expected_mask_with_ignore = FAN_OPEN,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "don't ignore exec inode events created on another mount point",
- FILE_EXEC_PATH2, FANOTIFY_INODE,
- MNT2_PATH, FANOTIFY_MOUNT,
- 0,
- FILE_EXEC_PATH, FAN_OPEN | FAN_OPEN_EXEC,
- FAN_OPEN | FAN_OPEN_EXEC
+ .tname = "don't ignore exec inode events created on another mount point",
+ .mark_path = FILE_EXEC_PATH2,
+ .mark_type = FANOTIFY_INODE,
+ .ignore_path = MNT2_PATH,
+ .ignore_mark_type = FANOTIFY_MOUNT,
+ .event_path = FILE_EXEC_PATH,
+ .expected_mask_with_ignore = FAN_OPEN | FAN_OPEN_EXEC,
+ .expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
},
{
- "ignore fs events created on a specific file",
- MOUNT_PATH, FANOTIFY_FILESYSTEM,
- FILE_PATH, FANOTIFY_INODE,
- 0,
- FILE_PATH, 0, FAN_OPEN
+ .tname = "ignore fs events created on a specific file",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_FILESYSTEM,
+ .ignore_path = FILE_PATH,
+ .ignore_mark_type = FANOTIFY_INODE,
+ .event_path = FILE_PATH,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "ignore exec fs events created on a specific file",
- MOUNT_PATH, FANOTIFY_FILESYSTEM,
- FILE_EXEC_PATH, FANOTIFY_INODE,
- 0,
- FILE_EXEC_PATH, FAN_OPEN_EXEC, FAN_OPEN | FAN_OPEN_EXEC
+ .tname = "ignore exec fs events created on a specific file",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_FILESYSTEM,
+ .ignore_path = FILE_EXEC_PATH,
+ .ignore_mark_type = FANOTIFY_INODE,
+ .event_path = FILE_EXEC_PATH,
+ .expected_mask_with_ignore = FAN_OPEN_EXEC,
+ .expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
},
{
- "don't ignore mount events created on another file",
- MOUNT_PATH, FANOTIFY_FILESYSTEM,
- FILE_PATH, FANOTIFY_INODE,
- 0,
- FILE2_PATH, FAN_OPEN, FAN_OPEN
+ .tname = "don't ignore mount events created on another file",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_FILESYSTEM,
+ .ignore_path = FILE_PATH,
+ .ignore_mark_type = FANOTIFY_INODE,
+ .event_path = FILE2_PATH,
+ .expected_mask_with_ignore = FAN_OPEN,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "don't ignore exec mount events created on another file",
- MOUNT_PATH, FANOTIFY_FILESYSTEM,
- FILE_EXEC_PATH, FANOTIFY_INODE,
- 0,
- FILE2_EXEC_PATH, FAN_OPEN | FAN_OPEN_EXEC,
- FAN_OPEN | FAN_OPEN_EXEC
+ .tname = "don't ignore exec mount events created on another file",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_FILESYSTEM,
+ .ignore_path = FILE_EXEC_PATH,
+ .ignore_mark_type = FANOTIFY_INODE,
+ .event_path = FILE2_EXEC_PATH,
+ .expected_mask_with_ignore = FAN_OPEN | FAN_OPEN_EXEC,
+ .expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
},
{
- "ignore fs events created on a specific mount point",
- MOUNT_PATH, FANOTIFY_FILESYSTEM,
- MNT2_PATH, FANOTIFY_MOUNT,
- 0,
- FILE_MNT2, 0, FAN_OPEN
+ .tname = "ignore fs events created on a specific mount point",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_FILESYSTEM,
+ .ignore_path = MNT2_PATH,
+ .ignore_mark_type = FANOTIFY_MOUNT,
+ .event_path = FILE_MNT2,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "ignore exec fs events created on a specific mount point",
- MOUNT_PATH, FANOTIFY_FILESYSTEM,
- MNT2_PATH, FANOTIFY_MOUNT,
- 0,
- FILE_EXEC_PATH2, FAN_OPEN_EXEC, FAN_OPEN | FAN_OPEN_EXEC
+ .tname = "ignore exec fs events created on a specific mount point",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_FILESYSTEM,
+ .ignore_path = MNT2_PATH,
+ .ignore_mark_type = FANOTIFY_MOUNT,
+ .event_path = FILE_EXEC_PATH2,
+ .expected_mask_with_ignore = FAN_OPEN_EXEC,
+ .expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
},
{
- "don't ignore fs events created on another mount point",
- MOUNT_PATH, FANOTIFY_FILESYSTEM,
- MNT2_PATH, FANOTIFY_MOUNT,
- 0,
- FILE_PATH, FAN_OPEN, FAN_OPEN
+ .tname = "don't ignore fs events created on another mount point",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_FILESYSTEM,
+ .ignore_path = MNT2_PATH,
+ .ignore_mark_type = FANOTIFY_MOUNT,
+ .event_path = FILE_PATH,
+ .expected_mask_with_ignore = FAN_OPEN,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "don't ignore exec fs events created on another mount point",
- MOUNT_PATH, FANOTIFY_FILESYSTEM,
- MNT2_PATH, FANOTIFY_MOUNT,
- 0,
- FILE_EXEC_PATH, FAN_OPEN | FAN_OPEN_EXEC,
- FAN_OPEN | FAN_OPEN_EXEC
+ .tname = "don't ignore exec fs events created on another mount point",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_FILESYSTEM,
+ .ignore_path = MNT2_PATH,
+ .ignore_mark_type = FANOTIFY_MOUNT,
+ .event_path = FILE_EXEC_PATH,
+ .expected_mask_with_ignore = FAN_OPEN | FAN_OPEN_EXEC,
+ .expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
},
{
- "ignore child exec events created on a specific mount point",
- MOUNT_PATH, FANOTIFY_PARENT,
- MOUNT_PATH, FANOTIFY_MOUNT,
- 0,
- FILE_EXEC_PATH, FAN_OPEN_EXEC, FAN_OPEN | FAN_OPEN_EXEC
+ .tname = "ignore child exec events created on a specific mount point",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_PARENT,
+ .ignore_path = MOUNT_PATH,
+ .ignore_mark_type = FANOTIFY_MOUNT,
+ .event_path = FILE_EXEC_PATH,
+ .expected_mask_with_ignore = FAN_OPEN_EXEC,
+ .expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
},
{
- "ignore events on children of directory created on a specific file",
- DIR_PATH, FANOTIFY_PARENT,
- DIR_PATH, FANOTIFY_PARENT,
- FAN_EVENT_ON_CHILD,
- FILE_PATH, 0, FAN_OPEN
+ .tname = "ignore events on children of directory created on a specific file",
+ .mark_path = DIR_PATH,
+ .mark_type = FANOTIFY_PARENT,
+ .ignore_path = DIR_PATH,
+ .ignore_mark_type = FANOTIFY_PARENT,
+ .ignored_flags = FAN_EVENT_ON_CHILD,
+ .event_path = FILE_PATH,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "ignore events on file created inside a parent watching children",
- FILE_PATH, FANOTIFY_INODE,
- DIR_PATH, FANOTIFY_PARENT,
- FAN_EVENT_ON_CHILD,
- FILE_PATH, 0, FAN_OPEN
+ .tname = "ignore events on file created inside a parent watching children",
+ .mark_path = FILE_PATH,
+ .mark_type = FANOTIFY_INODE,
+ .ignore_path = DIR_PATH,
+ .ignore_mark_type = FANOTIFY_PARENT,
+ .ignored_flags = FAN_EVENT_ON_CHILD,
+ .event_path = FILE_PATH,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "don't ignore events on file created inside a parent not watching children",
- FILE_PATH, FANOTIFY_INODE,
- DIR_PATH, FANOTIFY_PARENT,
- 0,
- FILE_PATH, FAN_OPEN, FAN_OPEN
+ .tname = "don't ignore events on file created inside a parent not watching children",
+ .mark_path = FILE_PATH,
+ .mark_type = FANOTIFY_INODE,
+ .ignore_path = DIR_PATH,
+ .ignore_mark_type = FANOTIFY_PARENT,
+ .event_path = FILE_PATH,
+ .expected_mask_with_ignore = FAN_OPEN,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "ignore mount events created inside a parent watching children",
- FILE_PATH, FANOTIFY_MOUNT,
- DIR_PATH, FANOTIFY_PARENT,
- FAN_EVENT_ON_CHILD,
- FILE_PATH, 0, FAN_OPEN
+ .tname = "ignore mount events created inside a parent watching children",
+ .mark_path = FILE_PATH,
+ .mark_type = FANOTIFY_MOUNT,
+ .ignore_path = DIR_PATH,
+ .ignore_mark_type = FANOTIFY_PARENT,
+ .ignored_flags = FAN_EVENT_ON_CHILD,
+ .event_path = FILE_PATH,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "don't ignore mount events created inside a parent not watching children",
- FILE_PATH, FANOTIFY_MOUNT,
- DIR_PATH, FANOTIFY_PARENT,
- 0,
- FILE_PATH, FAN_OPEN, FAN_OPEN
+ .tname = "don't ignore mount events created inside a parent not watching children",
+ .mark_path = FILE_PATH,
+ .mark_type = FANOTIFY_MOUNT,
+ .ignore_path = DIR_PATH,
+ .ignore_mark_type = FANOTIFY_PARENT,
+ .event_path = FILE_PATH,
+ .expected_mask_with_ignore = FAN_OPEN,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "ignore fs events created inside a parent watching children",
- FILE_PATH, FANOTIFY_FILESYSTEM,
- DIR_PATH, FANOTIFY_PARENT,
- FAN_EVENT_ON_CHILD,
- FILE_PATH, 0, FAN_OPEN
+ .tname = "ignore fs events created inside a parent watching children",
+ .mark_path = FILE_PATH,
+ .mark_type = FANOTIFY_FILESYSTEM,
+ .ignore_path = DIR_PATH,
+ .ignore_mark_type = FANOTIFY_PARENT,
+ .ignored_flags = FAN_EVENT_ON_CHILD,
+ .event_path = FILE_PATH,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "don't ignore fs events created inside a parent not watching children",
- FILE_PATH, FANOTIFY_FILESYSTEM,
- DIR_PATH, FANOTIFY_PARENT,
- 0,
- FILE_PATH, FAN_OPEN, FAN_OPEN
+ .tname = "don't ignore fs events created inside a parent not watching children",
+ .mark_path = FILE_PATH,
+ .mark_type = FANOTIFY_FILESYSTEM,
+ .ignore_path = DIR_PATH,
+ .ignore_mark_type = FANOTIFY_PARENT,
+ .event_path = FILE_PATH,
+ .expected_mask_with_ignore = FAN_OPEN,
+ .expected_mask_without_ignore = FAN_OPEN
},
/* Evictable ignore mark test cases */
{
- "don't ignore mount events created on file with evicted ignore mark",
- MOUNT_PATH, FANOTIFY_MOUNT,
- FILE_PATH, FANOTIFY_EVICTABLE,
- 0,
- FILE_PATH, FAN_OPEN, FAN_OPEN
+ .tname = "don't ignore mount events created on file with evicted ignore mark",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_MOUNT,
+ .ignore_path = FILE_PATH,
+ .ignore_mark_type = FANOTIFY_EVICTABLE,
+ .event_path = FILE_PATH,
+ .expected_mask_with_ignore = FAN_OPEN,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "don't ignore fs events created on a file with evicted ignore mark",
- MOUNT_PATH, FANOTIFY_FILESYSTEM,
- FILE_PATH, FANOTIFY_EVICTABLE,
- 0,
- FILE_PATH, FAN_OPEN, FAN_OPEN
+ .tname = "don't ignore fs events created on a file with evicted ignore mark",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_FILESYSTEM,
+ .ignore_path = FILE_PATH,
+ .ignore_mark_type = FANOTIFY_EVICTABLE,
+ .event_path = FILE_PATH,
+ .expected_mask_with_ignore = FAN_OPEN,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "don't ignore mount events created inside a parent with evicted ignore mark",
- MOUNT_PATH, FANOTIFY_MOUNT,
- DIR_PATH, FANOTIFY_EVICTABLE,
- FAN_EVENT_ON_CHILD,
- FILE_PATH, FAN_OPEN, FAN_OPEN
+ .tname = "don't ignore mount events created inside a parent with evicted ignore mark",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_MOUNT,
+ .ignore_path = DIR_PATH,
+ .ignore_mark_type = FANOTIFY_EVICTABLE,
+ .ignored_flags = FAN_EVENT_ON_CHILD,
+ .event_path = FILE_PATH,
+ .expected_mask_with_ignore = FAN_OPEN,
+ .expected_mask_without_ignore = FAN_OPEN
},
{
- "don't ignore fs events created inside a parent with evicted ignore mark",
- MOUNT_PATH, FANOTIFY_FILESYSTEM,
- DIR_PATH, FANOTIFY_EVICTABLE,
- FAN_EVENT_ON_CHILD,
- FILE_PATH, FAN_OPEN, FAN_OPEN
+ .tname = "don't ignore fs events created inside a parent with evicted ignore mark",
+ .mark_path = MOUNT_PATH,
+ .mark_type = FANOTIFY_FILESYSTEM,
+ .ignore_path = DIR_PATH,
+ .ignore_mark_type = FANOTIFY_EVICTABLE,
+ .ignored_flags = FAN_EVENT_ON_CHILD,
+ .event_path = FILE_PATH,
+ .expected_mask_with_ignore = FAN_OPEN,
+ .expected_mask_without_ignore = FAN_OPEN
},
/* FAN_MARK_IGNORE specific test cases */
{
- "ignore events on subdir inside a parent watching subdirs",
- SUBDIR_PATH, FANOTIFY_SUBDIR,
- DIR_PATH, FANOTIFY_PARENT,
- FAN_EVENT_ON_CHILD | FAN_ONDIR,
- SUBDIR_PATH, 0, FAN_OPEN | FAN_ONDIR
+ .tname = "ignore events on subdir inside a parent watching subdirs",
+ .mark_path = SUBDIR_PATH,
+ .mark_type = FANOTIFY_SUBDIR,
+ .ignore_path = DIR_PATH,
+ .ignore_mark_type = FANOTIFY_PARENT,
+ .ignored_flags = FAN_EVENT_ON_CHILD | FAN_ONDIR,
+ .event_path = SUBDIR_PATH,
+ .expected_mask_with_ignore = 0,
+ .expected_mask_without_ignore = FAN_OPEN | FAN_ONDIR
},
{
- "don't ignore events on subdir inside a parent not watching children",
- SUBDIR_PATH, FANOTIFY_SUBDIR,
- DIR_PATH, FANOTIFY_PARENT,
- FAN_ONDIR,
- SUBDIR_PATH, FAN_OPEN | FAN_ONDIR, FAN_OPEN | FAN_ONDIR
+ .tname = "don't ignore events on subdir inside a parent not watching children",
+ .mark_path = SUBDIR_PATH,
+ .mark_type = FANOTIFY_SUBDIR,
+ .ignore_path = DIR_PATH,
+ .ignore_mark_type = FANOTIFY_PARENT,
+ .ignored_flags = FAN_ONDIR,
+ .event_path = SUBDIR_PATH,
+ .expected_mask_with_ignore = FAN_OPEN | FAN_ONDIR,
+ .expected_mask_without_ignore = FAN_OPEN | FAN_ONDIR
},
{
- "don't ignore events on subdir inside a parent watching non-dir children",
- SUBDIR_PATH, FANOTIFY_SUBDIR,
- DIR_PATH, FANOTIFY_PARENT,
- FAN_EVENT_ON_CHILD,
- SUBDIR_PATH, FAN_OPEN | FAN_ONDIR, FAN_OPEN | FAN_ONDIR
+ .tname = "don't ignore events on subdir inside a parent watching non-dir children",
+ .mark_path = SUBDIR_PATH,
+ .mark_type = FANOTIFY_SUBDIR,
+ .ignore_path = DIR_PATH,
+ .ignore_mark_type = FANOTIFY_PARENT,
+ .ignored_flags = FAN_EVENT_ON_CHILD,
+ .event_path = SUBDIR_PATH,
+ .expected_mask_with_ignore = FAN_OPEN | FAN_ONDIR,
+ .expected_mask_without_ignore = FAN_OPEN | FAN_ONDIR
},
};
--
2.35.3
--
Mailing list info: https://lists.linux.it/listinfo/ltp
next prev parent reply other threads:[~2022-11-15 12:48 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-11-15 12:47 [LTP] [PATCH 0/3] Make fanotify10 test yet more reliable Jan Kara
2022-11-15 12:47 ` Jan Kara [this message]
2022-11-15 12:47 ` [LTP] [PATCH 2/3] fanotify10: Add support for multiple event files Jan Kara
2022-11-17 15:58 ` Petr Vorel
2022-11-21 9:14 ` Jan Kara
2022-11-21 9:33 ` Petr Vorel
2022-11-21 9:39 ` Cyril Hrubis
2022-11-22 8:19 ` Petr Vorel
2022-11-22 10:10 ` Petr Vorel
2022-11-21 9:53 ` Jan Kara
2022-11-21 14:24 ` Richard Palethorpe
2022-11-22 8:17 ` Petr Vorel
2022-11-22 8:57 ` Richard Palethorpe
2022-11-21 15:04 ` Cyril Hrubis
2022-11-22 12:10 ` Richard Palethorpe
2022-11-22 12:56 ` Cyril Hrubis
2022-11-15 12:47 ` [LTP] [PATCH 3/3] fanotify10: Make evictable marks tests more reliable Jan Kara
2022-11-16 2:17 ` Pengfei Xu
2022-11-16 10:58 ` Jan Kara
2022-11-16 16:32 ` Amir Goldstein
2022-11-17 15:50 ` Petr Vorel
2022-11-21 15:09 ` Cyril Hrubis
2022-11-22 10:30 ` Petr Vorel
2022-11-22 12:42 ` Cyril Hrubis
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20221115124741.14400-1-jack@suse.cz \
--to=jack@suse.cz \
--cc=ltp@lists.linux.it \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox