From patchwork Tue Nov 15 08:14:10 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Qu Wenruo X-Patchwork-Id: 9429135 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id C5F6A60484 for ; Tue, 15 Nov 2016 08:14:20 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id A4D2128801 for ; Tue, 15 Nov 2016 08:14:20 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 99DFD28951; Tue, 15 Nov 2016 08:14:20 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.9 required=2.0 tests=BAYES_00,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 5312928801 for ; Tue, 15 Nov 2016 08:14:20 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S938719AbcKOIOS (ORCPT ); Tue, 15 Nov 2016 03:14:18 -0500 Received: from cn.fujitsu.com ([222.73.24.84]:25836 "EHLO song.cn.fujitsu.com" rhost-flags-OK-FAIL-OK-OK) by vger.kernel.org with ESMTP id S1755441AbcKOIOQ (ORCPT ); Tue, 15 Nov 2016 03:14:16 -0500 X-IronPort-AV: E=Sophos;i="5.20,367,1444665600"; d="scan'208";a="961693" Received: from unknown (HELO cn.fujitsu.com) ([10.167.250.3]) by song.cn.fujitsu.com with ESMTP; 15 Nov 2016 16:14:14 +0800 Received: from localhost.localdomain (unknown [10.167.226.34]) by cn.fujitsu.com (Postfix) with ESMTP id CBB2E41B4BC6; Tue, 15 Nov 2016 16:14:11 +0800 (CST) From: Qu Wenruo To: linux-btrfs@vger.kernel.org, fstests@vger.kernel.org Subject: [PATCH] fstests: Block btrfs from test case generic/372 Date: Tue, 15 Nov 2016 16:14:10 +0800 Message-Id: <20161115081410.6779-1-quwenruo@cn.fujitsu.com> X-Mailer: git-send-email 2.10.2 MIME-Version: 1.0 X-yoursite-MailScanner-ID: CBB2E41B4BC6.A0B17 X-yoursite-MailScanner: Found to be clean X-yoursite-MailScanner-From: quwenruo@cn.fujitsu.com Sender: linux-btrfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-btrfs@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Since btrfs always return the whole extent even part of it is shared with other files, so the hole/extent counts differs for "file1" in this test case. For example: /------ File 1 Extent 0-------------\ / \ |<----------Extent A------------------>| \ / \ / \ File 2/ \ File 2/ Ext 0~4K Ext 64k~68K In that case, fiemap on File 1 will only return 1 large extent A with SHARED flag. While XFS will split it into 3 extents, first and last 4K with SHARED flag while the rest without SHARED flag. This makes the test case meaningless as btrfs doesn't follow such assumption. So black list btrfs for this test case to avoid false alert. Signed-off-by: Qu Wenruo --- common/rc | 10 ++++++++++ tests/generic/372 | 1 + 2 files changed, 11 insertions(+) diff --git a/common/rc b/common/rc index e3b54ec..6c3de22 100644 --- a/common/rc +++ b/common/rc @@ -3230,6 +3230,16 @@ _normalize_mount_options() echo $MOUNT_OPTIONS | sed -n 's/-o\s*\(\S*\)/\1/gp'| sed 's/,/ /g' } +# skip test if FSTYP is in the black list +_exclude_fs_type() +{ + while [ $# -gt 0 ]; do + if [ $FSTYP == $1 ]; then + _notrun "fs type \"$1\" is not allowed in this test" + fi + done +} + # skip test if MOUNT_OPTIONS contains the given strings _exclude_scratch_mount_option() { diff --git a/tests/generic/372 b/tests/generic/372 index 31dff20..5e4cfff 100755 --- a/tests/generic/372 +++ b/tests/generic/372 @@ -45,6 +45,7 @@ _cleanup() # real QA test starts here _supported_os Linux _supported_fs generic +_exclude_fs_type btrfs _require_scratch_reflink _require_fiemap