From patchwork Tue Nov 4 17:11:09 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Shuah Khan X-Patchwork-Id: 5230011 Return-Path: X-Original-To: patchwork-linux-kbuild@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.19.201]) by patchwork1.web.kernel.org (Postfix) with ESMTP id D11E79F349 for ; Tue, 4 Nov 2014 17:21:48 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 19C912011E for ; Tue, 4 Nov 2014 17:21:48 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 439992015E for ; Tue, 4 Nov 2014 17:21:47 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753143AbaKDRVo (ORCPT ); Tue, 4 Nov 2014 12:21:44 -0500 Received: from mailout.easymail.ca ([64.68.201.169]:50542 "EHLO mailout.easymail.ca" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752144AbaKDRSV (ORCPT ); Tue, 4 Nov 2014 12:18:21 -0500 Received: from localhost (localhost [127.0.0.1]) by mailout.easymail.ca (Postfix) with ESMTP id 96226E186; Tue, 4 Nov 2014 12:11:45 -0500 (EST) X-Quarantine-ID: <5ZXNCFBex1Aj> X-Virus-Scanned: Debian amavisd-new at mailout.easymail.ca X-Amavis-Alert: BAD HEADER SECTION, Duplicate header field: "References" X-Spam-Score: -4.399 X-Spam-Level: X-Spam-Status: No, score=-7.5 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_HI, RP_MATCHES_RCVD, UNPARSEABLE_RELAY autolearn=ham version=3.3.1 Received: from mailout.easymail.ca ([127.0.0.1]) by localhost (easymail-mailout.easydns.vpn [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5ZXNCFBex1Aj; Tue, 4 Nov 2014 12:11:39 -0500 (EST) Received: from mail.gonehiking.org (c-50-134-149-16.hsd1.co.comcast.net [50.134.149.16]) by mailout.easymail.ca (Postfix) with ESMTPA id C742BE1B8; Tue, 4 Nov 2014 12:11:36 -0500 (EST) Received: from lorien.internal (lorien-wl.internal [192.168.1.40]) by mail.gonehiking.org (Postfix) with ESMTP id 5C50A40A02; Tue, 4 Nov 2014 10:11:36 -0700 (MST) From: Shuah Khan To: gregkh@linuxfoundation.org, akpm@linux-foundation.org, mmarek@suse.cz, davem@davemloft.net, keescook@chromium.org, tranmanphong@gmail.com, dh.herrmann@gmail.com, hughd@google.com, bobby.prani@gmail.com, ebiederm@xmission.com, serge.hallyn@ubuntu.com Cc: Shuah Khan , linux-kbuild@vger.kernel.org, linux-kernel@vger.kernel.org, linux-api@vger.kernel.org, netdev@vger.kernel.org Subject: [PATCH 13/20] selftests/mount: add install target to enable installing test Date: Tue, 4 Nov 2014 10:11:09 -0700 Message-Id: <313d51c298bb13b7cd9187555ee8a70ee966e397.1415117102.git.shuahkh@osg.samsung.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: References: In-Reply-To: References: Sender: linux-kbuild-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kbuild@vger.kernel.org X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Add a new make target to enable installing test. This target installs test in the kselftest install location and add to the kselftest script to run the test. Signed-off-by: Shuah Khan --- tools/testing/selftests/mount/Makefile | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/tools/testing/selftests/mount/Makefile b/tools/testing/selftests/mount/Makefile index 337d853..3bcb112 100644 --- a/tools/testing/selftests/mount/Makefile +++ b/tools/testing/selftests/mount/Makefile @@ -9,6 +9,13 @@ unprivileged-remount-test: unprivileged-remount-test.c test_unprivileged_remount: unprivileged-remount-test @if [ -f /proc/self/uid_map ] ; then ./unprivileged-remount-test ; fi +install: all + install ./unprivileged-remount-test $(INSTALL_KSFT_PATH) + echo "\necho \"Start mount test ....\"" >> $(KSELFTEST) + echo "if [ -f /proc/self/uid_map ] ; then ./unprivileged-remount-test ; fi" >> $(KSELFTEST) + echo "echo \"End mount test ....\"" >> $(KSELFTEST) + echo "echo \"==============================\"" >> $(KSELFTEST) + run_tests: all test_unprivileged_remount clean: