public inbox for ltp@lists.linux.it
 help / color / mirror / Atom feed
From: Jan Kara <jack@suse.cz>
To: ltp@lists.linux.it
Cc: Jan Kara <jack@suse.cz>
Subject: [LTP] [PATCH 1/3] fanotify10: Use named initializers
Date: Tue, 15 Nov 2022 13:47:36 +0100	[thread overview]
Message-ID: <20221115124741.14400-1-jack@suse.cz> (raw)
In-Reply-To: <20221115123721.12176-1-jack@suse.cz>

Convert the testcase to use named initializers instead of anonymous
ones.

Signed-off-by: Jan Kara <jack@suse.cz>
---
 .../kernel/syscalls/fanotify/fanotify10.c     | 408 +++++++++++-------
 1 file changed, 249 insertions(+), 159 deletions(-)

diff --git a/testcases/kernel/syscalls/fanotify/fanotify10.c b/testcases/kernel/syscalls/fanotify/fanotify10.c
index ca0d8a9e4a4a..6f21094bed2c 100644
--- a/testcases/kernel/syscalls/fanotify/fanotify10.c
+++ b/testcases/kernel/syscalls/fanotify/fanotify10.c
@@ -133,227 +133,317 @@ static struct tcase {
 	unsigned long long expected_mask_without_ignore;
 } tcases[] = {
 	{
-		"ignore mount events created on a specific file",
-		MOUNT_PATH, FANOTIFY_MOUNT,
-		FILE_MNT2, FANOTIFY_INODE,
-		0,
-		FILE_PATH, 0, FAN_OPEN
+		.tname = "ignore mount events created on a specific file",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_MOUNT,
+		.ignore_path = FILE_MNT2,
+		.ignore_mark_type = FANOTIFY_INODE,
+		.event_path = FILE_PATH,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"ignore exec mount events created on a specific file",
-		MOUNT_PATH, FANOTIFY_MOUNT,
-		FILE_EXEC_PATH2, FANOTIFY_INODE,
-		0,
-		FILE_EXEC_PATH, FAN_OPEN_EXEC, FAN_OPEN | FAN_OPEN_EXEC
+		.tname = "ignore exec mount events created on a specific file",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_MOUNT,
+		.ignore_path = FILE_EXEC_PATH2,
+		.ignore_mark_type = FANOTIFY_INODE,
+		.event_path = FILE_EXEC_PATH,
+		.expected_mask_with_ignore = FAN_OPEN_EXEC,
+		.expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
 	},
 	{
-		"don't ignore mount events created on another file",
-		MOUNT_PATH, FANOTIFY_MOUNT,
-		FILE_PATH, FANOTIFY_INODE,
-		0,
-		FILE2_PATH, FAN_OPEN, FAN_OPEN
+		.tname = "don't ignore mount events created on another file",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_MOUNT,
+		.ignore_path = FILE_PATH,
+		.ignore_mark_type = FANOTIFY_INODE,
+		.event_path = FILE2_PATH,
+		.expected_mask_with_ignore = FAN_OPEN,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"don't ignore exec mount events created on another file",
-		MOUNT_PATH, FANOTIFY_MOUNT,
-		FILE_EXEC_PATH, FANOTIFY_INODE,
-		0,
-		FILE2_EXEC_PATH, FAN_OPEN | FAN_OPEN_EXEC,
-		FAN_OPEN | FAN_OPEN_EXEC
+		.tname = "don't ignore exec mount events created on another file",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_MOUNT,
+		.ignore_path = FILE_EXEC_PATH,
+		.ignore_mark_type = FANOTIFY_INODE,
+		.event_path = FILE2_EXEC_PATH,
+		.expected_mask_with_ignore = FAN_OPEN | FAN_OPEN_EXEC,
+		.expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
 	},
 	{
-		"ignore inode events created on a specific mount point",
-		FILE_PATH, FANOTIFY_INODE,
-		MNT2_PATH, FANOTIFY_MOUNT,
-		0,
-		FILE_MNT2, 0, FAN_OPEN
+		.tname = "ignore inode events created on a specific mount point",
+		.mark_path = FILE_PATH,
+		.mark_type = FANOTIFY_INODE,
+		.ignore_path = MNT2_PATH,
+		.ignore_mark_type = FANOTIFY_MOUNT,
+		.event_path = FILE_MNT2,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"ignore exec inode events created on a specific mount point",
-		FILE_EXEC_PATH, FANOTIFY_INODE,
-		MNT2_PATH, FANOTIFY_MOUNT,
-		0,
-		FILE_EXEC_PATH2, FAN_OPEN_EXEC, FAN_OPEN | FAN_OPEN_EXEC
+		.tname = "ignore exec inode events created on a specific mount point",
+		.mark_path = FILE_EXEC_PATH,
+		.mark_type = FANOTIFY_INODE,
+		.ignore_path = MNT2_PATH,
+		.ignore_mark_type = FANOTIFY_MOUNT,
+		.event_path = FILE_EXEC_PATH2,
+		.expected_mask_with_ignore = FAN_OPEN_EXEC,
+		.expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
 	},
 	{
-		"don't ignore inode events created on another mount point",
-		FILE_MNT2, FANOTIFY_INODE,
-		MNT2_PATH, FANOTIFY_MOUNT,
-		0,
-		FILE_PATH, FAN_OPEN, FAN_OPEN
+		.tname = "don't ignore inode events created on another mount point",
+		.mark_path = FILE_MNT2,
+		.mark_type = FANOTIFY_INODE,
+		.ignore_path = MNT2_PATH,
+		.ignore_mark_type = FANOTIFY_MOUNT,
+		.event_path = FILE_PATH,
+		.expected_mask_with_ignore = FAN_OPEN,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"don't ignore exec inode events created on another mount point",
-		FILE_EXEC_PATH2, FANOTIFY_INODE,
-		MNT2_PATH, FANOTIFY_MOUNT,
-		0,
-		FILE_EXEC_PATH, FAN_OPEN | FAN_OPEN_EXEC,
-		FAN_OPEN | FAN_OPEN_EXEC
+		.tname = "don't ignore exec inode events created on another mount point",
+		.mark_path = FILE_EXEC_PATH2,
+		.mark_type = FANOTIFY_INODE,
+		.ignore_path = MNT2_PATH,
+		.ignore_mark_type = FANOTIFY_MOUNT,
+		.event_path = FILE_EXEC_PATH,
+		.expected_mask_with_ignore = FAN_OPEN | FAN_OPEN_EXEC,
+		.expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
 	},
 	{
-		"ignore fs events created on a specific file",
-		MOUNT_PATH, FANOTIFY_FILESYSTEM,
-		FILE_PATH, FANOTIFY_INODE,
-		0,
-		FILE_PATH, 0, FAN_OPEN
+		.tname = "ignore fs events created on a specific file",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_FILESYSTEM,
+		.ignore_path = FILE_PATH,
+		.ignore_mark_type = FANOTIFY_INODE,
+		.event_path = FILE_PATH,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"ignore exec fs events created on a specific file",
-		MOUNT_PATH, FANOTIFY_FILESYSTEM,
-		FILE_EXEC_PATH, FANOTIFY_INODE,
-		0,
-		FILE_EXEC_PATH, FAN_OPEN_EXEC, FAN_OPEN | FAN_OPEN_EXEC
+		.tname = "ignore exec fs events created on a specific file",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_FILESYSTEM,
+		.ignore_path = FILE_EXEC_PATH,
+		.ignore_mark_type = FANOTIFY_INODE,
+		.event_path = FILE_EXEC_PATH,
+		.expected_mask_with_ignore = FAN_OPEN_EXEC,
+		.expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
 	},
 	{
-		"don't ignore mount events created on another file",
-		MOUNT_PATH, FANOTIFY_FILESYSTEM,
-		FILE_PATH, FANOTIFY_INODE,
-		0,
-		FILE2_PATH, FAN_OPEN, FAN_OPEN
+		.tname = "don't ignore mount events created on another file",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_FILESYSTEM,
+		.ignore_path = FILE_PATH,
+		.ignore_mark_type = FANOTIFY_INODE,
+		.event_path = FILE2_PATH,
+		.expected_mask_with_ignore = FAN_OPEN,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"don't ignore exec mount events created on another file",
-		MOUNT_PATH, FANOTIFY_FILESYSTEM,
-		FILE_EXEC_PATH, FANOTIFY_INODE,
-		0,
-		FILE2_EXEC_PATH, FAN_OPEN | FAN_OPEN_EXEC,
-		FAN_OPEN | FAN_OPEN_EXEC
+		.tname = "don't ignore exec mount events created on another file",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_FILESYSTEM,
+		.ignore_path = FILE_EXEC_PATH,
+		.ignore_mark_type = FANOTIFY_INODE,
+		.event_path = FILE2_EXEC_PATH,
+		.expected_mask_with_ignore = FAN_OPEN | FAN_OPEN_EXEC,
+		.expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
 	},
 	{
-		"ignore fs events created on a specific mount point",
-		MOUNT_PATH, FANOTIFY_FILESYSTEM,
-		MNT2_PATH, FANOTIFY_MOUNT,
-		0,
-		FILE_MNT2, 0, FAN_OPEN
+		.tname = "ignore fs events created on a specific mount point",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_FILESYSTEM,
+		.ignore_path = MNT2_PATH,
+		.ignore_mark_type = FANOTIFY_MOUNT,
+		.event_path = FILE_MNT2,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"ignore exec fs events created on a specific mount point",
-		MOUNT_PATH, FANOTIFY_FILESYSTEM,
-		MNT2_PATH, FANOTIFY_MOUNT,
-		0,
-		FILE_EXEC_PATH2, FAN_OPEN_EXEC, FAN_OPEN | FAN_OPEN_EXEC
+		.tname = "ignore exec fs events created on a specific mount point",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_FILESYSTEM,
+		.ignore_path = MNT2_PATH,
+		.ignore_mark_type = FANOTIFY_MOUNT,
+		.event_path = FILE_EXEC_PATH2,
+		.expected_mask_with_ignore = FAN_OPEN_EXEC,
+		.expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
 	},
 	{
-		"don't ignore fs events created on another mount point",
-		MOUNT_PATH, FANOTIFY_FILESYSTEM,
-		MNT2_PATH, FANOTIFY_MOUNT,
-		0,
-		FILE_PATH, FAN_OPEN, FAN_OPEN
+		.tname = "don't ignore fs events created on another mount point",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_FILESYSTEM,
+		.ignore_path = MNT2_PATH,
+		.ignore_mark_type = FANOTIFY_MOUNT,
+		.event_path = FILE_PATH,
+		.expected_mask_with_ignore = FAN_OPEN,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"don't ignore exec fs events created on another mount point",
-		MOUNT_PATH, FANOTIFY_FILESYSTEM,
-		MNT2_PATH, FANOTIFY_MOUNT,
-		0,
-		FILE_EXEC_PATH, FAN_OPEN | FAN_OPEN_EXEC,
-		FAN_OPEN | FAN_OPEN_EXEC
+		.tname = "don't ignore exec fs events created on another mount point",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_FILESYSTEM,
+		.ignore_path = MNT2_PATH,
+		.ignore_mark_type = FANOTIFY_MOUNT,
+		.event_path = FILE_EXEC_PATH,
+		.expected_mask_with_ignore = FAN_OPEN | FAN_OPEN_EXEC,
+		.expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
 	},
 	{
-		"ignore child exec events created on a specific mount point",
-		MOUNT_PATH, FANOTIFY_PARENT,
-		MOUNT_PATH, FANOTIFY_MOUNT,
-		0,
-		FILE_EXEC_PATH, FAN_OPEN_EXEC, FAN_OPEN | FAN_OPEN_EXEC
+		.tname = "ignore child exec events created on a specific mount point",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_PARENT,
+		.ignore_path = MOUNT_PATH,
+		.ignore_mark_type = FANOTIFY_MOUNT,
+		.event_path = FILE_EXEC_PATH,
+		.expected_mask_with_ignore = FAN_OPEN_EXEC,
+		.expected_mask_without_ignore = FAN_OPEN | FAN_OPEN_EXEC
 	},
 	{
-		"ignore events on children of directory created on a specific file",
-		DIR_PATH, FANOTIFY_PARENT,
-		DIR_PATH, FANOTIFY_PARENT,
-		FAN_EVENT_ON_CHILD,
-		FILE_PATH, 0, FAN_OPEN
+		.tname = "ignore events on children of directory created on a specific file",
+		.mark_path = DIR_PATH,
+		.mark_type = FANOTIFY_PARENT,
+		.ignore_path = DIR_PATH,
+		.ignore_mark_type = FANOTIFY_PARENT,
+		.ignored_flags = FAN_EVENT_ON_CHILD,
+		.event_path = FILE_PATH,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"ignore events on file created inside a parent watching children",
-		FILE_PATH, FANOTIFY_INODE,
-		DIR_PATH, FANOTIFY_PARENT,
-		FAN_EVENT_ON_CHILD,
-		FILE_PATH, 0, FAN_OPEN
+		.tname = "ignore events on file created inside a parent watching children",
+		.mark_path = FILE_PATH,
+		.mark_type = FANOTIFY_INODE,
+		.ignore_path = DIR_PATH,
+		.ignore_mark_type = FANOTIFY_PARENT,
+		.ignored_flags = FAN_EVENT_ON_CHILD,
+		.event_path = FILE_PATH,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"don't ignore events on file created inside a parent not watching children",
-		FILE_PATH, FANOTIFY_INODE,
-		DIR_PATH, FANOTIFY_PARENT,
-		0,
-		FILE_PATH, FAN_OPEN, FAN_OPEN
+		.tname = "don't ignore events on file created inside a parent not watching children",
+		.mark_path = FILE_PATH,
+		.mark_type = FANOTIFY_INODE,
+		.ignore_path = DIR_PATH,
+		.ignore_mark_type = FANOTIFY_PARENT,
+		.event_path = FILE_PATH,
+		.expected_mask_with_ignore = FAN_OPEN,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"ignore mount events created inside a parent watching children",
-		FILE_PATH, FANOTIFY_MOUNT,
-		DIR_PATH, FANOTIFY_PARENT,
-		FAN_EVENT_ON_CHILD,
-		FILE_PATH, 0, FAN_OPEN
+		.tname = "ignore mount events created inside a parent watching children",
+		.mark_path = FILE_PATH,
+		.mark_type = FANOTIFY_MOUNT,
+		.ignore_path = DIR_PATH,
+		.ignore_mark_type = FANOTIFY_PARENT,
+		.ignored_flags = FAN_EVENT_ON_CHILD,
+		.event_path = FILE_PATH,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"don't ignore mount events created inside a parent not watching children",
-		FILE_PATH, FANOTIFY_MOUNT,
-		DIR_PATH, FANOTIFY_PARENT,
-		0,
-		FILE_PATH, FAN_OPEN, FAN_OPEN
+		.tname = "don't ignore mount events created inside a parent not watching children",
+		.mark_path = FILE_PATH,
+		.mark_type = FANOTIFY_MOUNT,
+		.ignore_path = DIR_PATH,
+		.ignore_mark_type = FANOTIFY_PARENT,
+		.event_path = FILE_PATH,
+		.expected_mask_with_ignore = FAN_OPEN,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"ignore fs events created inside a parent watching children",
-		FILE_PATH, FANOTIFY_FILESYSTEM,
-		DIR_PATH, FANOTIFY_PARENT,
-		FAN_EVENT_ON_CHILD,
-		FILE_PATH, 0, FAN_OPEN
+		.tname = "ignore fs events created inside a parent watching children",
+		.mark_path = FILE_PATH,
+		.mark_type = FANOTIFY_FILESYSTEM,
+		.ignore_path = DIR_PATH,
+		.ignore_mark_type = FANOTIFY_PARENT,
+		.ignored_flags = FAN_EVENT_ON_CHILD,
+		.event_path = FILE_PATH,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"don't ignore fs events created inside a parent not watching children",
-		FILE_PATH, FANOTIFY_FILESYSTEM,
-		DIR_PATH, FANOTIFY_PARENT,
-		0,
-		FILE_PATH, FAN_OPEN, FAN_OPEN
+		.tname = "don't ignore fs events created inside a parent not watching children",
+		.mark_path = FILE_PATH,
+		.mark_type = FANOTIFY_FILESYSTEM,
+		.ignore_path = DIR_PATH,
+		.ignore_mark_type = FANOTIFY_PARENT,
+		.event_path = FILE_PATH,
+		.expected_mask_with_ignore = FAN_OPEN,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	/* Evictable ignore mark test cases */
 	{
-		"don't ignore mount events created on file with evicted ignore mark",
-		MOUNT_PATH, FANOTIFY_MOUNT,
-		FILE_PATH, FANOTIFY_EVICTABLE,
-		0,
-		FILE_PATH, FAN_OPEN, FAN_OPEN
+		.tname = "don't ignore mount events created on file with evicted ignore mark",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_MOUNT,
+		.ignore_path = FILE_PATH,
+		.ignore_mark_type = FANOTIFY_EVICTABLE,
+		.event_path = FILE_PATH,
+		.expected_mask_with_ignore = FAN_OPEN,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"don't ignore fs events created on a file with evicted ignore mark",
-		MOUNT_PATH, FANOTIFY_FILESYSTEM,
-		FILE_PATH, FANOTIFY_EVICTABLE,
-		0,
-		FILE_PATH, FAN_OPEN, FAN_OPEN
+		.tname = "don't ignore fs events created on a file with evicted ignore mark",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_FILESYSTEM,
+		.ignore_path = FILE_PATH,
+		.ignore_mark_type = FANOTIFY_EVICTABLE,
+		.event_path = FILE_PATH,
+		.expected_mask_with_ignore = FAN_OPEN,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"don't ignore mount events created inside a parent with evicted ignore mark",
-		MOUNT_PATH, FANOTIFY_MOUNT,
-		DIR_PATH, FANOTIFY_EVICTABLE,
-		FAN_EVENT_ON_CHILD,
-		FILE_PATH, FAN_OPEN, FAN_OPEN
+		.tname = "don't ignore mount events created inside a parent with evicted ignore mark",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_MOUNT,
+		.ignore_path = DIR_PATH,
+		.ignore_mark_type = FANOTIFY_EVICTABLE,
+		.ignored_flags = FAN_EVENT_ON_CHILD,
+		.event_path = FILE_PATH,
+		.expected_mask_with_ignore = FAN_OPEN,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	{
-		"don't ignore fs events created inside a parent with evicted ignore mark",
-		MOUNT_PATH, FANOTIFY_FILESYSTEM,
-		DIR_PATH, FANOTIFY_EVICTABLE,
-		FAN_EVENT_ON_CHILD,
-		FILE_PATH, FAN_OPEN, FAN_OPEN
+		.tname = "don't ignore fs events created inside a parent with evicted ignore mark",
+		.mark_path = MOUNT_PATH,
+		.mark_type = FANOTIFY_FILESYSTEM,
+		.ignore_path = DIR_PATH,
+		.ignore_mark_type = FANOTIFY_EVICTABLE,
+		.ignored_flags = FAN_EVENT_ON_CHILD,
+		.event_path = FILE_PATH,
+		.expected_mask_with_ignore = FAN_OPEN,
+		.expected_mask_without_ignore = FAN_OPEN
 	},
 	/* FAN_MARK_IGNORE specific test cases */
 	{
-		"ignore events on subdir inside a parent watching subdirs",
-		SUBDIR_PATH, FANOTIFY_SUBDIR,
-		DIR_PATH, FANOTIFY_PARENT,
-		FAN_EVENT_ON_CHILD | FAN_ONDIR,
-		SUBDIR_PATH, 0, FAN_OPEN | FAN_ONDIR
+		.tname = "ignore events on subdir inside a parent watching subdirs",
+		.mark_path = SUBDIR_PATH,
+		.mark_type = FANOTIFY_SUBDIR,
+		.ignore_path = DIR_PATH,
+		.ignore_mark_type = FANOTIFY_PARENT,
+		.ignored_flags = FAN_EVENT_ON_CHILD | FAN_ONDIR,
+		.event_path = SUBDIR_PATH,
+		.expected_mask_with_ignore = 0,
+		.expected_mask_without_ignore = FAN_OPEN | FAN_ONDIR
 	},
 	{
-		"don't ignore events on subdir inside a parent not watching children",
-		SUBDIR_PATH, FANOTIFY_SUBDIR,
-		DIR_PATH, FANOTIFY_PARENT,
-		FAN_ONDIR,
-		SUBDIR_PATH, FAN_OPEN | FAN_ONDIR, FAN_OPEN | FAN_ONDIR
+		.tname = "don't ignore events on subdir inside a parent not watching children",
+		.mark_path = SUBDIR_PATH,
+		.mark_type = FANOTIFY_SUBDIR,
+		.ignore_path = DIR_PATH,
+		.ignore_mark_type = FANOTIFY_PARENT,
+		.ignored_flags = FAN_ONDIR,
+		.event_path = SUBDIR_PATH,
+		.expected_mask_with_ignore = FAN_OPEN | FAN_ONDIR,
+		.expected_mask_without_ignore = FAN_OPEN | FAN_ONDIR
 	},
 	{
-		"don't ignore events on subdir inside a parent watching non-dir children",
-		SUBDIR_PATH, FANOTIFY_SUBDIR,
-		DIR_PATH, FANOTIFY_PARENT,
-		FAN_EVENT_ON_CHILD,
-		SUBDIR_PATH, FAN_OPEN | FAN_ONDIR, FAN_OPEN | FAN_ONDIR
+		.tname = "don't ignore events on subdir inside a parent watching non-dir children",
+		.mark_path = SUBDIR_PATH,
+		.mark_type = FANOTIFY_SUBDIR,
+		.ignore_path = DIR_PATH,
+		.ignore_mark_type = FANOTIFY_PARENT,
+		.ignored_flags = FAN_EVENT_ON_CHILD,
+		.event_path = SUBDIR_PATH,
+		.expected_mask_with_ignore = FAN_OPEN | FAN_ONDIR,
+		.expected_mask_without_ignore = FAN_OPEN | FAN_ONDIR
 	},
 };
 
-- 
2.35.3


-- 
Mailing list info: https://lists.linux.it/listinfo/ltp

  reply	other threads:[~2022-11-15 12:48 UTC|newest]

Thread overview: 24+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-11-15 12:47 [LTP] [PATCH 0/3] Make fanotify10 test yet more reliable Jan Kara
2022-11-15 12:47 ` Jan Kara [this message]
2022-11-15 12:47 ` [LTP] [PATCH 2/3] fanotify10: Add support for multiple event files Jan Kara
2022-11-17 15:58   ` Petr Vorel
2022-11-21  9:14     ` Jan Kara
2022-11-21  9:33       ` Petr Vorel
2022-11-21  9:39         ` Cyril Hrubis
2022-11-22  8:19           ` Petr Vorel
2022-11-22 10:10             ` Petr Vorel
2022-11-21  9:53         ` Jan Kara
2022-11-21 14:24           ` Richard Palethorpe
2022-11-22  8:17             ` Petr Vorel
2022-11-22  8:57               ` Richard Palethorpe
2022-11-21 15:04   ` Cyril Hrubis
2022-11-22 12:10     ` Richard Palethorpe
2022-11-22 12:56       ` Cyril Hrubis
2022-11-15 12:47 ` [LTP] [PATCH 3/3] fanotify10: Make evictable marks tests more reliable Jan Kara
2022-11-16  2:17   ` Pengfei Xu
2022-11-16 10:58     ` Jan Kara
2022-11-16 16:32       ` Amir Goldstein
2022-11-17 15:50         ` Petr Vorel
2022-11-21 15:09   ` Cyril Hrubis
2022-11-22 10:30     ` Petr Vorel
2022-11-22 12:42       ` Cyril Hrubis

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20221115124741.14400-1-jack@suse.cz \
    --to=jack@suse.cz \
    --cc=ltp@lists.linux.it \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox