Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp879523pxb; Wed, 27 Oct 2021 14:20:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzyrhacp4U36cChcrO0qCSjahNRgb4sNJO95uiDWEoVL+lSlbJGJU4I3IygRQMqTkAntbaP X-Received: by 2002:a17:906:1db2:: with SMTP id u18mr25888ejh.227.1635369639633; Wed, 27 Oct 2021 14:20:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635369639; cv=none; d=google.com; s=arc-20160816; b=e/If5+a+gZJL2ogVBgJEfIjm66cPDuELn/8t6jlb+fSMxZmG8mvNXgSyccK7SdnZn6 1EWltr5fgzIwRV+dsZT7TboY/UTWH/BuuYDplDeQ9SQjNs0WccEMHxdjHdJtaLu3ycj7 NXwt7xDS/kmA7OwjMRU3mWnZeMkkSl0ERfxBQuezSuKNJnXkucLW16pHrljAvl/bjfSZ Vk4BncU+xDN2OtKCczjKXD9ZYwhJsHsMAE5Me9bYInHz0ttet1KaAR0fyuChlaDke8Ty doRY6rsqb/tFwvRGM/NKMPRnaiujK9mcKNwlflT1lpHc5UNleYUn9QUVC6PzrtsFN5+H K36g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=/WrogrSAm5ZF8GRQoSCA7MqzK4VmLEjqv6Sj4BzXSI8=; b=QDUckS125RXwFeoebBOdf0P7NW0577WAwQmhFWcKSJBQH2Fw04m33xGjr2Jl/wJLJZ bLSmOZk+8/EopWnCc4r9lIeU2Zjaetk9tC+uv3Afi48K2SURKqqcXRfpjkJmJIkUsTy7 ySNwcRQ1lPsKe6ZZxnKoak3LQeHai6hmx+RruvTWmnPWPt9gIFyBjrYHhJsrcj3StRSH J67uT//0FeDqtJh4un17VMZyQ0Qn6NEzfsOZOvzq3G+K5JZdvpXY4zxsA77ztQoqOiAL rOianimaxYLiEA7zXYaGKoUK3U3TLw+sdS/DN58HNtG2T1kdVO+Sk3o2fw4wDFLp73wI UHqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=gJ1kRlkb; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dm8si1515596ejc.204.2021.10.27.14.20.16; Wed, 27 Oct 2021 14:20:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=gJ1kRlkb; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234550AbhJ0KAJ (ORCPT + 99 others); Wed, 27 Oct 2021 06:00:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37696 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233423AbhJ0KAJ (ORCPT ); Wed, 27 Oct 2021 06:00:09 -0400 Received: from mail-io1-xd35.google.com (mail-io1-xd35.google.com [IPv6:2607:f8b0:4864:20::d35]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D3E12C061570 for ; Wed, 27 Oct 2021 02:57:43 -0700 (PDT) Received: by mail-io1-xd35.google.com with SMTP id i14so2827836ioa.13 for ; Wed, 27 Oct 2021 02:57:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=/WrogrSAm5ZF8GRQoSCA7MqzK4VmLEjqv6Sj4BzXSI8=; b=gJ1kRlkb85aCjZRi5kTYIJXO6lIC/gpLa0Cr5Ip8nKJzgLQxdp+cifFEUdzA04LAF/ F/7ZF1yeTU1zOFFnhmD12CUxT710VppK4ZIdHuJrJOykeiNr+QnWfm+fxk9JlSxtbeiy YZiO9Lpa6pV4yY2eMGk0L6CcafzLwyl7n1Ap7H4uSZ40pIqnAclbQkAgAkw633eqWPAj 8f9SpTLjwwTp4VgG2d7kBnIae9R/jjuZFYeOoVRlYFyUdsvalNLe+hymWu8Cc8WNDlwM jTAWvC4wHrTJTfLfjR2PnloR/zaptnjFGc3o+hceICpr/NO5nhgTbRNCQKnMfeOGvnt7 GesQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=/WrogrSAm5ZF8GRQoSCA7MqzK4VmLEjqv6Sj4BzXSI8=; b=mYwRXIF2DiAiHqlOr3I5kfjh4rBtkiYzaXvkooVhQO/t10Q80WVaOvxOCW0C+Z2mtV 8sUOM/SQ7d4QFF6nPQsK6IMSk37ph2K3exhJRp1IoRczAu9uM0a8n2BwQVXFLxXKOkhv 3a8BPFWPzR4VyuXIS6IVWLkyGkN+Fo4yiq7kuSRHk1UD1VxC1wOJcaMpTbPWcWiCc8CC PTyDy4/wXxSr6OlBolp4QXoBMZCdT2qUUOR4LG/OvCzfAus/AtsF5jp5q1VO7oxROELu FMHpc2UR5cyDnedbpZPHS3T7HrcEOVhy2KRSVJCOirUoncTxfDKpsfeKwDFrMkitTEiz Cpgg== X-Gm-Message-State: AOAM5327V6eRfyd4cT8IuznA8hLsFm/1qnb6DyU7Oc5anhJCYTXd3laZ Gk3Igl5qTDoU4qImsvmpTckMHpAaCNLpkZ7wd6uV44H2Z5M= X-Received: by 2002:a05:6638:2607:: with SMTP id m7mr13015209jat.136.1635328663364; Wed, 27 Oct 2021 02:57:43 -0700 (PDT) MIME-Version: 1.0 References: <20211026184239.151156-1-krisman@collabora.com> <20211026184239.151156-10-krisman@collabora.com> In-Reply-To: <20211026184239.151156-10-krisman@collabora.com> From: Amir Goldstein Date: Wed, 27 Oct 2021 12:57:32 +0300 Message-ID: Subject: Re: [PATCH v2 09/10] syscalls/fanotify20: Test file event with broken inode To: Gabriel Krisman Bertazi Cc: LTP List , Jan Kara , Khazhismel Kumykov , kernel@collabora.com, Ext4 , Matthew Bobrowski Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Tue, Oct 26, 2021 at 9:44 PM Gabriel Krisman Bertazi wrote: > > This test corrupts an inode entry with an invalid mode through debugfs > and then tries to access it. This should result in a ext4 error, which > we monitor through the fanotify group. > > Signed-off-by: Gabriel Krisman Bertazi Reviewed-by: Amir Goldstein > --- > .../kernel/syscalls/fanotify/fanotify20.c | 22 +++++++++++++++++++ > 1 file changed, 22 insertions(+) > > diff --git a/testcases/kernel/syscalls/fanotify/fanotify20.c b/testcases/kernel/syscalls/fanotify/fanotify20.c > index 5c5ee3c6fb74..7bcddcaa98cb 100644 > --- a/testcases/kernel/syscalls/fanotify/fanotify20.c > +++ b/testcases/kernel/syscalls/fanotify/fanotify20.c > @@ -38,6 +38,10 @@ > #define FILEID_INVALID 0xff > #endif > > +#ifndef EFSCORRUPTED > +#define EFSCORRUPTED EUCLEAN /* Filesystem is corrupted */ > +#endif > + > #define BUF_SIZE 256 > static char event_buf[BUF_SIZE]; > int fd_notify; > @@ -63,6 +67,17 @@ static void trigger_fs_abort(void) > MS_REMOUNT|MS_RDONLY, "abort"); > } > > +static void tcase2_trigger_lookup(void) > +{ > + int ret; > + > + /* SAFE_OPEN cannot be used here because we expect it to fail. */ > + ret = open(MOUNT_PATH"/"BAD_DIR, O_RDONLY, 0); > + if (ret != -1 && errno != EUCLEAN) > + tst_res(TFAIL, "Unexpected lookup result(%d) of %s (%d!=%d)", > + ret, BAD_DIR, errno, EUCLEAN); > +} > + > static struct test_case { > char *name; > int error; > @@ -77,6 +92,13 @@ static struct test_case { > .error = ESHUTDOWN, > .fid = &null_fid, > }, > + { > + .name = "Lookup of inode with invalid mode", > + .trigger_error = &tcase2_trigger_lookup, > + .error_count = 1, > + .error = EFSCORRUPTED, > + .fid = &bad_file_fid, > + }, > }; > > int check_error_event_info_fid(struct fanotify_event_info_fid *fid, > -- > 2.33.0 >