From patchwork Mon Jan 21 16:33:14 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jeff Mahoney X-Patchwork-Id: 10774191 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 806241515 for ; Mon, 21 Jan 2019 16:33:50 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 6FD7129385 for ; Mon, 21 Jan 2019 16:33:50 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 64A1A29ADF; Mon, 21 Jan 2019 16:33:50 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.9 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 1D84B2972C for ; Mon, 21 Jan 2019 16:33:50 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730116AbfAUQdt (ORCPT ); Mon, 21 Jan 2019 11:33:49 -0500 Received: from mx2.suse.de ([195.135.220.15]:46334 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730023AbfAUQdo (ORCPT ); Mon, 21 Jan 2019 11:33:44 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 81786AFA3 for ; Mon, 21 Jan 2019 16:33:43 +0000 (UTC) Received: from starscream.home.jeffm.io (starscream-1.home.jeffm.io [192.168.1.254]) by mail.home.jeffm.io (Postfix) with ESMTPS id 9EC4081AD3EC; Mon, 21 Jan 2019 11:31:58 -0500 (EST) Received: by starscream.home.jeffm.io (Postfix, from userid 1000) id 3C70D265DAD; Mon, 21 Jan 2019 11:33:42 -0500 (EST) From: jeffm@suse.com To: fstests@vger.kernel.org Cc: Jeff Mahoney Subject: [PATCH 5/7] btrfs/023: skip trying to test raid56 without kernel support Date: Mon, 21 Jan 2019 11:33:14 -0500 Message-Id: <20190121163316.20616-5-jeffm@suse.com> X-Mailer: git-send-email 2.16.4 In-Reply-To: <20190121163316.20616-1-jeffm@suse.com> References: <20190121163316.20616-1-jeffm@suse.com> Sender: fstests-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: fstests@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP From: Jeff Mahoney Older kernels don't support raid56. This test is still valid for other profiles, so skip raid56 if the kernel doesn't support it. Signed-off-by: Jeff Mahoney Reviewed-by: Filipe Manana --- tests/btrfs/023 | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/tests/btrfs/023 b/tests/btrfs/023 index 6d9cc443..6c02113b 100755 --- a/tests/btrfs/023 +++ b/tests/btrfs/023 @@ -63,11 +63,13 @@ check_group_profile "RAID1" create_group_profile "raid10" check_group_profile "RAID10" -create_group_profile "raid5" -check_group_profile "RAID5" +if [ -e "/sys/fs/btrfs/features/raid56" ]; then + create_group_profile "raid5" + check_group_profile "RAID5" -create_group_profile "raid6" -check_group_profile "RAID6" + create_group_profile "raid6" + check_group_profile "RAID6" +fi # success, all done echo "Silence is golden"