diff options
| author | Shuah Khan <shuahkh@osg.samsung.com> | 2017-06-29 18:54:57 -0400 |
|---|---|---|
| committer | Shuah Khan <shuahkh@osg.samsung.com> | 2017-06-30 18:16:23 -0400 |
| commit | e67f85fb96ca80e5a60ea69c536affed0affc77d (patch) | |
| tree | 47e015c9c6e077e19b163357020ec181cdbf57c9 /tools/testing | |
| parent | 0732d06ee563bbcdf34ec889918baa62451b580d (diff) | |
selftests: membarrier: use ksft_* var arg msg api
Use ksft_* var arg msg to include strerror() info. in test output. Remove
redundant SKIP/FAIL/PASS logic as it is no longer needed with ksft_ api.
Improve test output to be consistent and clear.
Signed-off-by: Shuah Khan <shuahkh@osg.samsung.com>
Diffstat (limited to 'tools/testing')
| -rw-r--r-- | tools/testing/selftests/membarrier/membarrier_test.c | 91 |
1 files changed, 41 insertions, 50 deletions
diff --git a/tools/testing/selftests/membarrier/membarrier_test.c b/tools/testing/selftests/membarrier/membarrier_test.c index 74a712eab2e6..21399fcf1a59 100644 --- a/tools/testing/selftests/membarrier/membarrier_test.c +++ b/tools/testing/selftests/membarrier/membarrier_test.c | |||
| @@ -7,62 +7,63 @@ | |||
| 7 | 7 | ||
| 8 | #include "../kselftest.h" | 8 | #include "../kselftest.h" |
| 9 | 9 | ||
| 10 | enum test_membarrier_status { | ||
| 11 | TEST_MEMBARRIER_PASS = 0, | ||
| 12 | TEST_MEMBARRIER_FAIL, | ||
| 13 | TEST_MEMBARRIER_SKIP, | ||
| 14 | }; | ||
| 15 | |||
| 16 | static int sys_membarrier(int cmd, int flags) | 10 | static int sys_membarrier(int cmd, int flags) |
| 17 | { | 11 | { |
| 18 | return syscall(__NR_membarrier, cmd, flags); | 12 | return syscall(__NR_membarrier, cmd, flags); |
| 19 | } | 13 | } |
| 20 | 14 | ||
| 21 | static enum test_membarrier_status test_membarrier_cmd_fail(void) | 15 | static int test_membarrier_cmd_fail(void) |
| 22 | { | 16 | { |
| 23 | int cmd = -1, flags = 0; | 17 | int cmd = -1, flags = 0; |
| 24 | const char *test_name = "membarrier command cmd=-1. Wrong command should fail"; | ||
| 25 | 18 | ||
| 26 | if (sys_membarrier(cmd, flags) != -1) { | 19 | if (sys_membarrier(cmd, flags) != -1) { |
| 27 | ksft_test_result_fail(test_name); | 20 | ksft_exit_fail_msg( |
| 28 | return TEST_MEMBARRIER_FAIL; | 21 | "sys membarrier invalid command test: command = %d, flags = %d. Should fail, but passed\n", |
| 22 | cmd, flags); | ||
| 29 | } | 23 | } |
| 30 | 24 | ||
| 31 | ksft_test_result_pass(test_name); | 25 | ksft_test_result_pass( |
| 32 | return TEST_MEMBARRIER_PASS; | 26 | "sys membarrier invalid command test: command = %d, flags = %d. Failed as expected\n", |
| 27 | cmd, flags); | ||
| 28 | return 0; | ||
| 33 | } | 29 | } |
| 34 | 30 | ||
| 35 | static enum test_membarrier_status test_membarrier_flags_fail(void) | 31 | static int test_membarrier_flags_fail(void) |
| 36 | { | 32 | { |
| 37 | int cmd = MEMBARRIER_CMD_QUERY, flags = 1; | 33 | int cmd = MEMBARRIER_CMD_QUERY, flags = 1; |
| 38 | const char *test_name = "MEMBARRIER_CMD_QUERY, flags=1, Wrong flags should fail"; | ||
| 39 | 34 | ||
| 40 | if (sys_membarrier(cmd, flags) != -1) { | 35 | if (sys_membarrier(cmd, flags) != -1) { |
| 41 | ksft_test_result_fail(test_name); | 36 | ksft_exit_fail_msg( |
| 42 | return TEST_MEMBARRIER_FAIL; | 37 | "sys membarrier MEMBARRIER_CMD_QUERY invalid flags test: flags = %d. Should fail, but passed\n", |
| 38 | flags); | ||
| 43 | } | 39 | } |
| 44 | 40 | ||
| 45 | ksft_test_result_pass(test_name); | 41 | ksft_test_result_pass( |
| 46 | return TEST_MEMBARRIER_PASS; | 42 | "sys membarrier MEMBARRIER_CMD_QUERY invalid flags test: flags = %d. Failed as expected\n", |
| 43 | flags); | ||
| 44 | return 0; | ||
| 47 | } | 45 | } |
| 48 | 46 | ||
| 49 | static enum test_membarrier_status test_membarrier_success(void) | 47 | static int test_membarrier_success(void) |
| 50 | { | 48 | { |
| 51 | int cmd = MEMBARRIER_CMD_SHARED, flags = 0; | 49 | int cmd = MEMBARRIER_CMD_SHARED, flags = 0; |
| 52 | const char *test_name = "execute MEMBARRIER_CMD_SHARED"; | 50 | const char *test_name = "sys membarrier MEMBARRIER_CMD_SHARED\n"; |
| 53 | 51 | ||
| 54 | if (sys_membarrier(cmd, flags) != 0) { | 52 | if (sys_membarrier(cmd, flags) != 0) { |
| 55 | ksft_test_result_fail(test_name); | 53 | ksft_exit_fail_msg( |
| 56 | return TEST_MEMBARRIER_FAIL; | 54 | "sys membarrier MEMBARRIER_CMD_SHARED test: flags = %d\n", |
| 55 | flags); | ||
| 57 | } | 56 | } |
| 58 | 57 | ||
| 59 | ksft_test_result_pass(test_name); | 58 | ksft_test_result_pass( |
| 60 | return TEST_MEMBARRIER_PASS; | 59 | "sys membarrier MEMBARRIER_CMD_SHARED test: flags = %d\n", |
| 60 | flags); | ||
| 61 | return 0; | ||
| 61 | } | 62 | } |
| 62 | 63 | ||
| 63 | static enum test_membarrier_status test_membarrier(void) | 64 | static int test_membarrier(void) |
| 64 | { | 65 | { |
| 65 | enum test_membarrier_status status; | 66 | int status; |
| 66 | 67 | ||
| 67 | status = test_membarrier_cmd_fail(); | 68 | status = test_membarrier_cmd_fail(); |
| 68 | if (status) | 69 | if (status) |
| @@ -73,10 +74,10 @@ static enum test_membarrier_status test_membarrier(void) | |||
| 73 | status = test_membarrier_success(); | 74 | status = test_membarrier_success(); |
| 74 | if (status) | 75 | if (status) |
| 75 | return status; | 76 | return status; |
| 76 | return TEST_MEMBARRIER_PASS; | 77 | return 0; |
| 77 | } | 78 | } |
| 78 | 79 | ||
| 79 | static enum test_membarrier_status test_membarrier_query(void) | 80 | static int test_membarrier_query(void) |
| 80 | { | 81 | { |
| 81 | int flags = 0, ret; | 82 | int flags = 0, ret; |
| 82 | 83 | ||
| @@ -87,34 +88,24 @@ static enum test_membarrier_status test_membarrier_query(void) | |||
| 87 | * It is valid to build a kernel with | 88 | * It is valid to build a kernel with |
| 88 | * CONFIG_MEMBARRIER=n. However, this skips the tests. | 89 | * CONFIG_MEMBARRIER=n. However, this skips the tests. |
| 89 | */ | 90 | */ |
| 90 | ksft_exit_skip("CONFIG_MEMBARRIER is not enabled\n"); | 91 | ksft_exit_skip( |
| 92 | "sys membarrier (CONFIG_MEMBARRIER) is disabled.\n"); | ||
| 91 | } | 93 | } |
| 92 | ksft_test_result_fail("sys_membarrier() failed\n"); | 94 | ksft_exit_fail_msg("sys_membarrier() failed\n"); |
| 93 | return TEST_MEMBARRIER_FAIL; | ||
| 94 | } | ||
| 95 | if (!(ret & MEMBARRIER_CMD_SHARED)) { | ||
| 96 | ksft_test_result_fail("command MEMBARRIER_CMD_SHARED is not supported.\n"); | ||
| 97 | return TEST_MEMBARRIER_FAIL; | ||
| 98 | } | 95 | } |
| 99 | ksft_test_result_pass("sys_membarrier available"); | 96 | if (!(ret & MEMBARRIER_CMD_SHARED)) |
| 100 | return TEST_MEMBARRIER_PASS; | 97 | ksft_exit_fail_msg("sys_membarrier is not supported.\n"); |
| 98 | |||
| 99 | ksft_test_result_pass("sys_membarrier available\n"); | ||
| 100 | return 0; | ||
| 101 | } | 101 | } |
| 102 | 102 | ||
| 103 | int main(int argc, char **argv) | 103 | int main(int argc, char **argv) |
| 104 | { | 104 | { |
| 105 | ksft_print_header(); | 105 | ksft_print_header(); |
| 106 | switch (test_membarrier_query()) { | ||
| 107 | case TEST_MEMBARRIER_FAIL: | ||
| 108 | return ksft_exit_fail(); | ||
| 109 | case TEST_MEMBARRIER_SKIP: | ||
| 110 | return ksft_exit_skip(NULL); | ||
| 111 | } | ||
| 112 | switch (test_membarrier()) { | ||
| 113 | case TEST_MEMBARRIER_FAIL: | ||
| 114 | return ksft_exit_fail(); | ||
| 115 | case TEST_MEMBARRIER_SKIP: | ||
| 116 | return ksft_exit_skip(NULL); | ||
| 117 | } | ||
| 118 | 106 | ||
| 119 | return ksft_exit_pass(); | 107 | test_membarrier_query(); |
| 108 | test_membarrier(); | ||
| 109 | |||
| 110 | ksft_exit_pass(); | ||
| 120 | } | 111 | } |
