Received: by 2002:a05:7412:8d11:b0:fa:4934:9f with SMTP id bj17csp371434rdb; Sun, 14 Jan 2024 22:59:39 -0800 (PST) X-Google-Smtp-Source: AGHT+IF9HXpo0ygkrXLA3bf6E+X6BQPUy+CfN0bK3QZ1CFbXxs7BCmwNY8k2VP0tyoahuqfzyiRR X-Received: by 2002:a17:902:e808:b0:1d4:1d5d:6b9 with SMTP id u8-20020a170902e80800b001d41d5d06b9mr2706793plg.50.1705301979168; Sun, 14 Jan 2024 22:59:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1705301979; cv=none; d=google.com; s=arc-20160816; b=VesftT0zi2np39+IC1WwaIiOPvYAtjLL0JvykBlqVAGK5uGf3JoaDP9YK2cJksayuA gEzkvlceTcfyPbdDCbLSVh+Qw4rsDYqCp11U7XAOgoOnwQF7zmztW7bBbtag8bXJryxl s77ZIzsq28/Qv6PPu1yV+5shsIFX0NObrDXjxtIzl5kmTLhUNclPaukOSLDn7Ylruvye KITbfXm60DG00BTn5lbpteiuUFzRtqHte/9d2CyCGhIMcSEEfZz61M8hTT+8JMsWO/ys 8lg9Hyd5xhvGJ/x0GCgzPSR4doAi+KvzgQ5mDmvzekXDioRJYOh0D+COxF1h+IFvem7w eVug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:to :content-language:subject:cc:user-agent:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:date:message-id :dkim-signature; bh=X1mGZPNqR1VutiB4f8CGyXOdq7/LY5vNtMgTZcXL4nw=; fh=iTPyhlSubrcIF68QIO+J0Gztzafkjal2m6iEJ5dmkqs=; b=AE1taAi4cm77rI58v1jKGcGfVoWWeL1hHEYfduu64vVerqcD0cAQR5UM6wxH0DwZBn SMwQpazweeMrT8Vy72/OCyOV+wc5l2iVVfGo4eOPE1ZiLnxTAZgol31i2zIhh1eQ+j+b jj7WVOL4pcHgXiGe0HL6JVRWAQgMgfGvA76M41bNCGF2xUo8puFrP2z23Z6UuNvMRtLT sOBPcxkd+rqNsk4aRcMBPvz7/xk+Vyd/04kfwunoGng051Y9FRY1MpEUOJbtshTtaZA4 tmD/Jl3woykWBEnEJutx091lvIjheGfdM+6iQFtpsuhWLSvEbCXxHfLcGJNRhi+DhpoH KpVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@collabora.com header.s=mail header.b=x4G0IDWO; spf=pass (google.com: domain of linux-kernel+bounces-25667-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-25667-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=collabora.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id i9-20020a170902eb4900b001cc53dbf53dsi101238pli.648.2024.01.14.22.59.38 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 14 Jan 2024 22:59:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-25667-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@collabora.com header.s=mail header.b=x4G0IDWO; spf=pass (google.com: domain of linux-kernel+bounces-25667-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-25667-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=collabora.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id CBB252815DC for ; Mon, 15 Jan 2024 06:59:38 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id DD1B83C23; Mon, 15 Jan 2024 06:59:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=collabora.com header.i=@collabora.com header.b="x4G0IDWO" Received: from madrid.collaboradmins.com (madrid.collaboradmins.com [46.235.227.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 958123C0B; Mon, 15 Jan 2024 06:59:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=collabora.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=collabora.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=collabora.com; s=mail; t=1705301966; bh=PUNiFql2LzYt4AfUj6+kFyjiKSLCP2jzF69eYRLV3m8=; h=Date:Cc:Subject:To:References:From:In-Reply-To:From; b=x4G0IDWOY9mEwa96umEJ9cNBDjBE4yobVBcd4b24K9J2SDz+Xbq91JY3wHcD3J0XY cxAEJCIb0PbJP2BRUiPQEJs4eIztkhtfEUAbFOT1ySKJTdmf186KS+TL6RT0TD3hDe XitrekO2fzeO27o9ECzEkxPKXgENniSs/eO5lUGceSw8JL1xyulBqytWZoce0ZRJKh eeZcMa8E9aCWCvLNd4dUETYLqhjVgSa6yQR6wAl541jhZIjTQf1aQLbgQfRdoWHl2S RjwXQxpYLfShFF79t0I+JbDNYqByetDJwhxoxx6/5so3WJSn06WGK15wAwgz9S6NNC EPOpkWzGzaqBw== Received: from [100.96.234.34] (cola.collaboradmins.com [195.201.22.229]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: usama.anjum) by madrid.collaboradmins.com (Postfix) with ESMTPSA id 1CB6E3780C35; Mon, 15 Jan 2024 06:59:24 +0000 (UTC) Message-ID: Date: Mon, 15 Jan 2024 11:59:33 +0500 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Cc: Muhammad Usama Anjum , Andrew Morton , Shuah Khan , kernel@collabora.com, linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 5/7] selftests/mm: hugetlb-read-hwpoison: conform test to TAP format output Content-Language: en-US To: Jiaqi Yan References: <20240112072144.620098-1-usama.anjum@collabora.com> <20240112072144.620098-5-usama.anjum@collabora.com> <0b5a7c8c-d46b-496c-b705-fafc54a91ff0@collabora.com> From: Muhammad Usama Anjum In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit On 1/15/24 11:52 AM, Jiaqi Yan wrote: > On Sun, Jan 14, 2024 at 10:32 PM Muhammad Usama Anjum > wrote: >> >> On 1/13/24 6:08 AM, Jiaqi Yan wrote: >>> On Thu, Jan 11, 2024 at 11:21 PM Muhammad Usama Anjum >>> wrote: >>>> >>>> Conform the layout, informational and status messages to TAP. No >>>> functional change is intended other than the layout of output messages. >>>> >>>> Signed-off-by: Muhammad Usama Anjum >>>> --- >>>> Tested this by reverting the patch a08c7193e4f18dc8508f2d07d0de2c5b94cb39a3 >>>> ("mm/filemap: remove hugetlb special casing in filemap.c") as it has >>>> broken the test. The bug report can be found at [1]. >>>> >>>> Tested with proposed fix as well [2]. >>>> >>>> [1] https://lore.kernel.org/all/079335ab-190f-41f7-b832-6ffe7528fd8b@collabora.com >>>> [2] https://lore.kernel.org/all/a20e7bdb-7344-306d-e8f5-5ee69af7d5ea@oracle.com >>>> --- >>>> .../selftests/mm/hugetlb-read-hwpoison.c | 116 +++++++++--------- >>>> 1 file changed, 56 insertions(+), 60 deletions(-) >>>> >>>> diff --git a/tools/testing/selftests/mm/hugetlb-read-hwpoison.c b/tools/testing/selftests/mm/hugetlb-read-hwpoison.c >>>> index ba6cc6f9cabc..193ad7275df5 100644 >>>> --- a/tools/testing/selftests/mm/hugetlb-read-hwpoison.c >>>> +++ b/tools/testing/selftests/mm/hugetlb-read-hwpoison.c >>>> @@ -58,8 +58,8 @@ static bool verify_chunk(char *buf, size_t len, char val) >>>> >>>> for (i = 0; i < len; ++i) { >>>> if (buf[i] != val) { >>>> - printf(PREFIX ERROR_PREFIX "check fail: buf[%lu] = %u != %u\n", >>>> - i, buf[i], val); >>>> + ksft_print_msg(PREFIX ERROR_PREFIX "check fail: buf[%lu] = %u != %u\n", >>>> + i, buf[i], val); >>>> return false; >>>> } >>>> } >>>> @@ -75,9 +75,9 @@ static bool seek_read_hugepage_filemap(int fd, size_t len, size_t wr_chunk_size, >>>> ssize_t total_ret_count = 0; >>>> char val = offset / wr_chunk_size + offset % wr_chunk_size; >>>> >>>> - printf(PREFIX PREFIX "init val=%u with offset=0x%lx\n", val, offset); >>>> - printf(PREFIX PREFIX "expect to read 0x%lx bytes of data in total\n", >>>> - expected); >>>> + ksft_print_msg(PREFIX PREFIX "init val=%u with offset=0x%lx\n", val, offset); >>>> + ksft_print_msg(PREFIX PREFIX "expect to read 0x%lx bytes of data in total\n", >>>> + expected); >>>> if (lseek(fd, offset, SEEK_SET) < 0) { >>>> perror(PREFIX ERROR_PREFIX "seek failed"); >>>> return false; >>>> @@ -86,7 +86,7 @@ static bool seek_read_hugepage_filemap(int fd, size_t len, size_t wr_chunk_size, >>>> while (offset + total_ret_count < len) { >>>> ret_count = read(fd, buf, wr_chunk_size); >>>> if (ret_count == 0) { >>>> - printf(PREFIX PREFIX "read reach end of the file\n"); >>>> + ksft_print_msg(PREFIX PREFIX "read reach end of the file\n"); >>>> break; >>>> } else if (ret_count < 0) { >>>> perror(PREFIX ERROR_PREFIX "read failed"); >>>> @@ -98,8 +98,8 @@ static bool seek_read_hugepage_filemap(int fd, size_t len, size_t wr_chunk_size, >>>> >>>> total_ret_count += ret_count; >>>> } >>>> - printf(PREFIX PREFIX "actually read 0x%lx bytes of data in total\n", >>>> - total_ret_count); >>>> + ksft_print_msg(PREFIX PREFIX "actually read 0x%lx bytes of data in total\n", >>>> + total_ret_count); >>>> >>>> return total_ret_count == expected; >>>> } >>>> @@ -112,15 +112,15 @@ static bool read_hugepage_filemap(int fd, size_t len, >>>> ssize_t total_ret_count = 0; >>>> char val = 0; >>>> >>>> - printf(PREFIX PREFIX "expect to read 0x%lx bytes of data in total\n", >>>> - expected); >>>> + ksft_print_msg(PREFIX PREFIX "expect to read 0x%lx bytes of data in total\n", >>>> + expected); >>>> while (total_ret_count < len) { >>>> ret_count = read(fd, buf, wr_chunk_size); >>>> if (ret_count == 0) { >>>> - printf(PREFIX PREFIX "read reach end of the file\n"); >>>> + ksft_print_msg(PREFIX PREFIX "read reach end of the file\n"); >>>> break; >>>> } else if (ret_count < 0) { >>>> - perror(PREFIX ERROR_PREFIX "read failed"); >>>> + ksft_print_msg(PREFIX ERROR_PREFIX "read failed"); >>> >>> Should we also include strerror(errno) in log msg, like you did below? >> Looks like I missed it. I'll post a v3. >>> >>> Actually, would ksft_perror be a better choice for perror()s? >> It may or may not be. There aren't ksft_*_perror macros for printing the >> logs at this time. I prefer using just whatever macros are available. They >> aren't generic enough. Maybe mm tests use perror whenever error occurs, but >> other tests don't. > > can't you use this ksft_perror available today? > https://github.com/torvalds/linux/blob/master/tools/testing/selftests/kselftest.h#L161C25-L172 Sorry, I wan't able to find it. It has missing signature in header comment as well. I'll just update this current test. I'll use ksft_perror in future patches. Thanks for mentining it. > >> >>> >>>> >>>> break; >>>> } >>>> ++val; >>>> @@ -129,8 +129,8 @@ static bool read_hugepage_filemap(int fd, size_t len, >>>> >>>> total_ret_count += ret_count; >>>> } >>>> - printf(PREFIX PREFIX "actually read 0x%lx bytes of data in total\n", >>>> - total_ret_count); >>>> + ksft_print_msg(PREFIX PREFIX "actually read 0x%lx bytes of data in total\n", >>>> + total_ret_count); >>>> >>>> return total_ret_count == expected; >>>> } >>>> @@ -142,14 +142,15 @@ test_hugetlb_read(int fd, size_t len, size_t wr_chunk_size) >>>> char *filemap = NULL; >>>> >>>> if (ftruncate(fd, len) < 0) { >>>> - perror(PREFIX ERROR_PREFIX "ftruncate failed"); >>>> + ksft_print_msg(PREFIX ERROR_PREFIX "ftruncate failed: %s\n", strerror(errno)); >>>> return status; >>>> } >>>> >>>> filemap = mmap(NULL, len, PROT_READ | PROT_WRITE, >>>> MAP_SHARED | MAP_POPULATE, fd, 0); >>>> if (filemap == MAP_FAILED) { >>>> - perror(PREFIX ERROR_PREFIX "mmap for primary mapping failed"); >>>> + ksft_print_msg(PREFIX ERROR_PREFIX "mmap for primary mapping failed: %s\n", >>>> + strerror(errno)); >>>> goto done; >>>> } >>>> >>>> @@ -162,7 +163,8 @@ test_hugetlb_read(int fd, size_t len, size_t wr_chunk_size) >>>> munmap(filemap, len); >>>> done: >>>> if (ftruncate(fd, 0) < 0) { >>>> - perror(PREFIX ERROR_PREFIX "ftruncate back to 0 failed"); >>>> + ksft_print_msg(PREFIX ERROR_PREFIX "ftruncate back to 0 failed : %s\n", >>>> + strerror(errno)); >>>> status = TEST_FAILED; >>>> } >>>> >>>> @@ -179,14 +181,15 @@ test_hugetlb_read_hwpoison(int fd, size_t len, size_t wr_chunk_size, >>>> const unsigned long pagesize = getpagesize(); >>>> >>>> if (ftruncate(fd, len) < 0) { >>>> - perror(PREFIX ERROR_PREFIX "ftruncate failed"); >>>> + ksft_print_msg(PREFIX ERROR_PREFIX "ftruncate failed: %s\n", strerror(errno)); >>>> return status; >>>> } >>>> >>>> filemap = mmap(NULL, len, PROT_READ | PROT_WRITE, >>>> MAP_SHARED | MAP_POPULATE, fd, 0); >>>> if (filemap == MAP_FAILED) { >>>> - perror(PREFIX ERROR_PREFIX "mmap for primary mapping failed"); >>>> + ksft_print_msg(PREFIX ERROR_PREFIX "mmap for primary mapping failed: %s\n", >>>> + strerror(errno)); >>>> goto done; >>>> } >>>> >>>> @@ -201,7 +204,7 @@ test_hugetlb_read_hwpoison(int fd, size_t len, size_t wr_chunk_size, >>>> */ >>>> hwp_addr = filemap + len / 2 + pagesize; >>>> if (madvise(hwp_addr, pagesize, MADV_HWPOISON) < 0) { >>>> - perror(PREFIX ERROR_PREFIX "MADV_HWPOISON failed"); >>>> + ksft_print_msg(PREFIX ERROR_PREFIX "MADV_HWPOISON failed: %s\n", strerror(errno)); >>>> goto unmap; >>>> } >>>> >>>> @@ -228,7 +231,8 @@ test_hugetlb_read_hwpoison(int fd, size_t len, size_t wr_chunk_size, >>>> munmap(filemap, len); >>>> done: >>>> if (ftruncate(fd, 0) < 0) { >>>> - perror(PREFIX ERROR_PREFIX "ftruncate back to 0 failed"); >>>> + ksft_print_msg(PREFIX ERROR_PREFIX "ftruncate back to 0 failed: %s\n", >>>> + strerror(errno)); >>>> status = TEST_FAILED; >>>> } >>>> >>>> @@ -240,27 +244,32 @@ static int create_hugetlbfs_file(struct statfs *file_stat) >>>> int fd; >>>> >>>> fd = memfd_create("hugetlb_tmp", MFD_HUGETLB); >>>> - if (fd < 0) { >>>> - perror(PREFIX ERROR_PREFIX "could not open hugetlbfs file"); >>>> - return -1; >>>> - } >>>> + if (fd < 0) >>>> + ksft_exit_fail_msg(PREFIX ERROR_PREFIX "could not open hugetlbfs file: %s\n", >>>> + strerror(errno)); >>>> >>>> memset(file_stat, 0, sizeof(*file_stat)); >>>> + >>>> if (fstatfs(fd, file_stat)) { >>>> - perror(PREFIX ERROR_PREFIX "fstatfs failed"); >>>> - goto close; >>>> + close(fd); >>>> + ksft_exit_fail_msg(PREFIX ERROR_PREFIX "fstatfs failed: %s\n", strerror(errno)); >>>> } >>>> if (file_stat->f_type != HUGETLBFS_MAGIC) { >>>> - printf(PREFIX ERROR_PREFIX "not hugetlbfs file\n"); >>>> - goto close; >>>> + close(fd); >>>> + ksft_exit_fail_msg(PREFIX ERROR_PREFIX "not hugetlbfs file\n"); >>>> } >>>> >>>> return fd; >>>> -close: >>>> - close(fd); >>>> - return -1; >>>> } >>>> >>>> +#define KSFT_PRINT_MSG(status, fmt, ...) \ >>>> + do { \ >>>> + if (status == TEST_SKIPPED) \ >>>> + ksft_test_result_skip(fmt, __VA_ARGS__); \ >>>> + else \ >>>> + ksft_test_result(status == TEST_PASSED, fmt, __VA_ARGS__); \ >>>> + } while (0) >>>> + >>>> int main(void) >>>> { >>>> int fd; >>>> @@ -273,50 +282,37 @@ int main(void) >>>> }; >>>> size_t i; >>>> >>>> + ksft_print_header(); >>>> + ksft_set_plan(12); >>>> + >>>> for (i = 0; i < ARRAY_SIZE(wr_chunk_sizes); ++i) { >>>> - printf("Write/read chunk size=0x%lx\n", >>>> - wr_chunk_sizes[i]); >>>> + ksft_print_msg("Write/read chunk size=0x%lx\n", >>>> + wr_chunk_sizes[i]); >>>> >>>> fd = create_hugetlbfs_file(&file_stat); >>>> - if (fd < 0) >>>> - goto create_failure; >>>> - printf(PREFIX "HugeTLB read regression test...\n"); >>>> + ksft_print_msg(PREFIX "HugeTLB read regression test...\n"); >>>> status = test_hugetlb_read(fd, file_stat.f_bsize, >>>> wr_chunk_sizes[i]); >>>> - printf(PREFIX "HugeTLB read regression test...%s\n", >>>> - status_to_str(status)); >>>> + KSFT_PRINT_MSG(status, PREFIX "HugeTLB read regression test...%s\n", >>>> + status_to_str(status)); >>>> close(fd); >>>> - if (status == TEST_FAILED) >>>> - return -1; >>>> >>>> fd = create_hugetlbfs_file(&file_stat); >>>> - if (fd < 0) >>>> - goto create_failure; >>>> - printf(PREFIX "HugeTLB read HWPOISON test...\n"); >>>> + ksft_print_msg(PREFIX "HugeTLB read HWPOISON test...\n"); >>>> status = test_hugetlb_read_hwpoison(fd, file_stat.f_bsize, >>>> wr_chunk_sizes[i], false); >>>> - printf(PREFIX "HugeTLB read HWPOISON test...%s\n", >>>> - status_to_str(status)); >>>> + KSFT_PRINT_MSG(status, PREFIX "HugeTLB read HWPOISON test..%s\n", >>>> + status_to_str(status)); >>>> close(fd); >>>> - if (status == TEST_FAILED) >>>> - return -1; >>>> >>>> fd = create_hugetlbfs_file(&file_stat); >>>> - if (fd < 0) >>>> - goto create_failure; >>>> - printf(PREFIX "HugeTLB seek then read HWPOISON test...\n"); >>>> + ksft_print_msg(PREFIX "HugeTLB seek then read HWPOISON test...\n"); >>>> status = test_hugetlb_read_hwpoison(fd, file_stat.f_bsize, >>>> wr_chunk_sizes[i], true); >>>> - printf(PREFIX "HugeTLB seek then read HWPOISON test...%s\n", >>>> - status_to_str(status)); >>>> + KSFT_PRINT_MSG(status, PREFIX "HugeTLB seek then read HWPOISON test...%s\n", >>>> + status_to_str(status)); >>>> close(fd); >>>> - if (status == TEST_FAILED) >>>> - return -1; >>>> } >>>> >>>> - return 0; >>>> - >>>> -create_failure: >>>> - printf(ERROR_PREFIX "Abort test: failed to create hugetlbfs file\n"); >>>> - return -1; >>>> + ksft_finished(); >>>> } >>>> -- >>>> 2.42.0 >>>> >>>> >>> >> >> -- >> BR, >> Muhammad Usama Anjum > -- BR, Muhammad Usama Anjum