<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Makefile</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>aca5a094 - selftests/mount_setattr: fix to make run_tests failure</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/mount_setattr/Makefile#aca5a094</link>
        <description>selftests/mount_setattr: fix to make run_tests failuremake run_tests doesn&apos;t run the test. Fix Makefile to set TEST_GEN_PROGSinstead of TEST_GEN_FILES to fix the problem.run_tests runs TEST_GEN_PROGS, TEST_CUSTOM_PROGS, and TEST_PROGS.TEST_GEN_FILES is for files generated by tests.Signed-off-by: Shuah Khan &lt;skhan@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/mount_setattr/Makefile</description>
        <pubDate>Mon, 13 Feb 2023 21:52:47 +0000</pubDate>
        <dc:creator>Shuah Khan &lt;skhan@linuxfoundation.org&gt;</dc:creator>
    </item>
<item>
        <title>5d11f2d0 - selftests: mount_setattr: Fix incorrect kernel headers search path</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/mount_setattr/Makefile#5d11f2d0</link>
        <description>selftests: mount_setattr: Fix incorrect kernel headers search pathUse $(KHDR_INCLUDES) as lookup path for kernel headers. This preventsbuilding against kernel headers from the build environment in scenarioswhere kernel headers are installed into a specific output directory(O=...).Signed-off-by: Mathieu Desnoyers &lt;mathieu.desnoyers@efficios.com&gt;Cc: Shuah Khan &lt;shuah@kernel.org&gt;Cc: linux-kselftest@vger.kernel.orgCc: Ingo Molnar &lt;mingo@redhat.com&gt;Cc: &lt;stable@vger.kernel.org&gt;  # 5.18+Signed-off-by: Shuah Khan &lt;skhan@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/mount_setattr/Makefile</description>
        <pubDate>Fri, 27 Jan 2023 13:57:36 +0000</pubDate>
        <dc:creator>Mathieu Desnoyers &lt;mathieu.desnoyers@efficios.com&gt;</dc:creator>
    </item>
<item>
        <title>01eadc8d - tests: add mount_setattr() selftests</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/tools/testing/selftests/mount_setattr/Makefile#01eadc8d</link>
        <description>tests: add mount_setattr() selftestsAdd a range of selftests for the new mount_setattr() syscall to verifythat it works as expected. This tests that:- no invalid flags can be specified- changing properties of a single mount works and leaves other mounts in  the mount tree unchanged- changing a mount tre to read-only when one of the mounts has writers  fails and leaves the whole mount tree unchanged- changing mount properties from multiple threads works- changing atime settings works- changing mount propagation works- changing the mount options of a mount tree where the individual mounts  in the tree have different mount options only changes the flags that  were requested to change- changing mount options from another mount namespace fails- changing mount options from another user namespace fails- idmapped mountsNote, the main test-suite for idmapped mounts is part of xfstests and ispretty huge. These tests here just make sure that the syscalls bits workcorrectly. TAP version 13 1..20 # Starting 20 tests from 3 test cases. #  RUN           mount_setattr.invalid_attributes ... #            OK  mount_setattr.invalid_attributes ok 1 mount_setattr.invalid_attributes #  RUN           mount_setattr.extensibility ... #            OK  mount_setattr.extensibility ok 2 mount_setattr.extensibility #  RUN           mount_setattr.basic ... #            OK  mount_setattr.basic ok 3 mount_setattr.basic #  RUN           mount_setattr.basic_recursive ... #            OK  mount_setattr.basic_recursive ok 4 mount_setattr.basic_recursive #  RUN           mount_setattr.mount_has_writers ... #            OK  mount_setattr.mount_has_writers ok 5 mount_setattr.mount_has_writers #  RUN           mount_setattr.mixed_mount_options ... #            OK  mount_setattr.mixed_mount_options ok 6 mount_setattr.mixed_mount_options #  RUN           mount_setattr.time_changes ... #            OK  mount_setattr.time_changes ok 7 mount_setattr.time_changes #  RUN           mount_setattr.multi_threaded ... #            OK  mount_setattr.multi_threaded ok 8 mount_setattr.multi_threaded #  RUN           mount_setattr.wrong_user_namespace ... #            OK  mount_setattr.wrong_user_namespace ok 9 mount_setattr.wrong_user_namespace #  RUN           mount_setattr.wrong_mount_namespace ... #            OK  mount_setattr.wrong_mount_namespace ok 10 mount_setattr.wrong_mount_namespace #  RUN           mount_setattr_idmapped.invalid_fd_negative ... #            OK  mount_setattr_idmapped.invalid_fd_negative ok 11 mount_setattr_idmapped.invalid_fd_negative #  RUN           mount_setattr_idmapped.invalid_fd_large ... #            OK  mount_setattr_idmapped.invalid_fd_large ok 12 mount_setattr_idmapped.invalid_fd_large #  RUN           mount_setattr_idmapped.invalid_fd_closed ... #            OK  mount_setattr_idmapped.invalid_fd_closed ok 13 mount_setattr_idmapped.invalid_fd_closed #  RUN           mount_setattr_idmapped.invalid_fd_initial_userns ... #            OK  mount_setattr_idmapped.invalid_fd_initial_userns ok 14 mount_setattr_idmapped.invalid_fd_initial_userns #  RUN           mount_setattr_idmapped.attached_mount_inside_current_mount_namespace ... #            OK  mount_setattr_idmapped.attached_mount_inside_current_mount_namespace ok 15 mount_setattr_idmapped.attached_mount_inside_current_mount_namespace #  RUN           mount_setattr_idmapped.attached_mount_outside_current_mount_namespace ... #            OK  mount_setattr_idmapped.attached_mount_outside_current_mount_namespace ok 16 mount_setattr_idmapped.attached_mount_outside_current_mount_namespace #  RUN           mount_setattr_idmapped.detached_mount_inside_current_mount_namespace ... #            OK  mount_setattr_idmapped.detached_mount_inside_current_mount_namespace ok 17 mount_setattr_idmapped.detached_mount_inside_current_mount_namespace #  RUN           mount_setattr_idmapped.detached_mount_outside_current_mount_namespace ... #            OK  mount_setattr_idmapped.detached_mount_outside_current_mount_namespace ok 18 mount_setattr_idmapped.detached_mount_outside_current_mount_namespace #  RUN           mount_setattr_idmapped.change_idmapping ... #            OK  mount_setattr_idmapped.change_idmapping ok 19 mount_setattr_idmapped.change_idmapping #  RUN           mount_setattr_idmapped.idmap_mount_tree_invalid ... #            OK  mount_setattr_idmapped.idmap_mount_tree_invalid ok 20 mount_setattr_idmapped.idmap_mount_tree_invalid # PASSED: 20 / 20 tests passed. # Totals: pass:20 fail:0 xfail:0 xpass:0 skip:0 error:0Link: https://lore.kernel.org/r/20210121131959.646623-37-christian.brauner@ubuntu.comCc: Christoph Hellwig &lt;hch@lst.de&gt;Cc: David Howells &lt;dhowells@redhat.com&gt;Cc: Al Viro &lt;viro@zeniv.linux.org.uk&gt;Cc: linux-fsdevel@vger.kernel.orgSigned-off-by: Christian Brauner &lt;christian.brauner@ubuntu.com&gt;

            List of files:
            /linux-6.15/tools/testing/selftests/mount_setattr/Makefile</description>
        <pubDate>Thu, 21 Jan 2021 13:19:55 +0000</pubDate>
        <dc:creator>Christian Brauner &lt;christian.brauner@ubuntu.com&gt;</dc:creator>
    </item>
</channel>
</rss>
