Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp315789ybt; Mon, 6 Jul 2020 10:00:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxmHAFJS1asR7gf+2BBSGUl1VqD77ATYH2KW1Hrg3SDx7ugPxN2d+7tmv/Ok9GmZo8JzFLQ X-Received: by 2002:aa7:c657:: with SMTP id z23mr48396886edr.265.1594054853961; Mon, 06 Jul 2020 10:00:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594054853; cv=none; d=google.com; s=arc-20160816; b=0OprjXDsTTab3hcfuZyatKjL080ivfo1+GrJph1H5LYdAhm0Cmf6fhYP2Y05gA1Ihj LPoKRB43XYZ3c1zEBOJEv353GUylOUUDIhbXolfRn3PE7xU5Wa8U9wM9fRCVR0s5bnOr thrntPz4tY/C3sA+YBMpJE7kgYex9mm0wI86ct08z38pIY5aEhqzDrHndpDTJwhP25+y e6l3/ax4gcSFxnb+QjQarhgMXuyv1Td5PtJw2QABrn5hW/vIuntPJ4QXEIlvm+nTsa7m FSIxT+j1Opua2rSOTDa8mAoMt2HR2t9OdEBjuu2hqNDEg6Fgsd8odoyRcnZ56xQ274Bk EsxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:message-id:date:cc:to:from:subject:dkim-signature; bh=OjkZPREvKip3rVS6iZU65nBkLJdMZelkk5lBM6xndR0=; b=QCTtfL/4B3O20yq1tWykP+oIRvQzclOvOMBE78KaItjlarac4docbC547Bzou55ZK/ NwN3gfS92ZHQdXcXGSneenSq9QfvPi2SFKvDeIOc2g4G7mQcJWC7+oevj4Jl6nKc9kEn EyHAfFhJxTYNj2j3ElnfALYfnxE9aZ3sEds6pOujdS5QL+u1hJQbQb5VdBawpG6dr6cu msvvzUjs+L4TDDHgHM6f633nXqXXuGtxIP4jRaFsfww4bvUxiVQ+dlEB1WOWYjtPtQSP TMJK/Ec5h7Xa7QSs7jPeHUO40RSPkeHvNi4f5kjkM/F8gu/ZoXLTSeJoUrLJ2kagBdtZ v6ig== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=bHQJApw8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b19si13384409edy.438.2020.07.06.10.00.31; Mon, 06 Jul 2020 10:00:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=bHQJApw8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729626AbgGFRAX (ORCPT + 99 others); Mon, 6 Jul 2020 13:00:23 -0400 Received: from us-smtp-delivery-1.mimecast.com ([205.139.110.120]:22959 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729495AbgGFRAV (ORCPT ); Mon, 6 Jul 2020 13:00:21 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1594054820; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=OjkZPREvKip3rVS6iZU65nBkLJdMZelkk5lBM6xndR0=; b=bHQJApw8V/G7QFJG5MR09DYC4gNW5p12xPjHvHo6l3FtVO461LL73ukuE7xjZC9ps4ofL1 CI0BAoG/sOYmK2tFd5tVM3sHPzok4f7lOYaBtdCLN1DIT8KC+AdaBG0nSYk+IrLwKkgfvB ncTBZ1TUHl/A6D798Za2AUW9dHappbQ= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-304-pvjmzEPGO5C6GIwqNZljAQ-1; Mon, 06 Jul 2020 13:00:15 -0400 X-MC-Unique: pvjmzEPGO5C6GIwqNZljAQ-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 4EBEA64A74; Mon, 6 Jul 2020 17:00:14 +0000 (UTC) Received: from firesoul.localdomain (unknown [10.40.208.45]) by smtp.corp.redhat.com (Postfix) with ESMTP id 653FE60F8D; Mon, 6 Jul 2020 17:00:07 +0000 (UTC) Received: from [192.168.42.3] (localhost [IPv6:::1]) by firesoul.localdomain (Postfix) with ESMTP id 7139E300019CC; Mon, 6 Jul 2020 19:00:06 +0200 (CEST) Subject: [PATCH bpf-next V2 0/2] BPF selftests test runner 'test_progs' use proper shell exit codes From: Jesper Dangaard Brouer To: bpf@vger.kernel.org, Andrii Nakryiko Cc: Jesper Dangaard Brouer , Hangbin Liu , Daniel Borkmann , Alexei Starovoitov , vkabatov@redhat.com, jbenc@redhat.com, yhs@fb.com, kafai@fb.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Date: Mon, 06 Jul 2020 19:00:06 +0200 Message-ID: <159405478968.1091613.16934652228902650021.stgit@firesoul> User-Agent: StGit/0.19 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patchset makes it easier to use test_progs from shell scripts, by using proper shell exit codes. The process's exit status should be a number between 0 and 255 as defined in man exit(3) else it will be masked to comply. Shell exit codes used by programs should be below 127. As 127 and above are used for indicating signals. E.g. 139 means 11=SIGSEGV $((139 & 127))=11. POSIX defines in man wait(3p) signal check if WIFSIGNALED(STATUS) and WTERMSIG(139)=11. (Hint: cmd 'kill -l' list signals and their numbers). Using Segmentation fault as an example, as these have happened before with different tests (that are part of test_progs). CI people writing these shell-scripts could pickup these hints and report them, if that makes sense. --- Jesper Dangaard Brouer (2): selftests/bpf: test_progs use another shell exit on non-actions selftests/bpf: test_progs avoid minus shell exit codes tools/testing/selftests/bpf/test_progs.c | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) --