All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] generic/377: filter out xattrs that don't start with 'user.'
@ 2020-07-01 17:52 Jeff Layton
  2020-07-05 11:41 ` Zorro Lang
  0 siblings, 1 reply; 3+ messages in thread
From: Jeff Layton @ 2020-07-01 17:52 UTC (permalink / raw)
  To: fstests

Most hosts that I've been testing on seem to display security.selinux in
listxattr. 377.out doesn't account for that so it routinely fails for me
in testing.

When testing the output of listxattr in generic/377, filter out any xattr
names that don't start with 'user.'. That should help ensure consistent
output on SELinux-enabled hosts.

Signed-off-by: Jeff Layton <jlayton@kernel.org>
---
 tests/generic/377 | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

I'm not sure why this doesn't fail for most people, unless most are
turning off SELinux. Is this the right approach?

diff --git a/tests/generic/377 b/tests/generic/377
index f7835ee8ff9e..f08abdca60a6 100755
--- a/tests/generic/377
+++ b/tests/generic/377
@@ -48,7 +48,7 @@ $SETFATTR_PROG -n user.ping -v pong $testfile
 $SETFATTR_PROG -n user.hello -v there $testfile
 
 # 1. Call listxattr without buffer length argument. This should succeed.
-$listxattr $testfile | sort
+$listxattr $testfile | grep '^xattr: user\.' | sort
 
 # 2. Calling listxattr on nonexistant file should fail with -ENOENT.
 $listxattr ""
@@ -66,7 +66,7 @@ $listxattr $testfile 9
 $listxattr $testfile 11
 
 # 6. Calling listxattr with buffersize bigger than needed should succeed.
-$listxattr $testfile 500 | sort
+$listxattr $testfile 500 | grep '^xattr: user\.' | sort
 
 status=0
 exit
-- 
2.26.2


^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [PATCH] generic/377: filter out xattrs that don't start with 'user.'
  2020-07-01 17:52 [PATCH] generic/377: filter out xattrs that don't start with 'user.' Jeff Layton
@ 2020-07-05 11:41 ` Zorro Lang
  2020-07-06 13:50   ` Jeff Layton
  0 siblings, 1 reply; 3+ messages in thread
From: Zorro Lang @ 2020-07-05 11:41 UTC (permalink / raw)
  To: Jeff Layton; +Cc: fstests

On Wed, Jul 01, 2020 at 01:52:05PM -0400, Jeff Layton wrote:
> Most hosts that I've been testing on seem to display security.selinux in
> listxattr. 377.out doesn't account for that so it routinely fails for me
> in testing.
> 
> When testing the output of listxattr in generic/377, filter out any xattr
> names that don't start with 'user.'. That should help ensure consistent
> output on SELinux-enabled hosts.
> 
> Signed-off-by: Jeff Layton <jlayton@kernel.org>
> ---

Yeah, I hit this error[1] too. This patch looks good to me.

One more question, do you hit similar failure on generic/062, likes [2]? 

Thanks,
Zorro

[1]
--- /dev/fd/63	2020-07-02 12:07:42.948327419 -0400
+++ results/generic/377.out.bad	2020-07-02 12:07:41.990305624 -0400
@@ -1,4 +1,5 @@
 QA output created by 377
+xattr: security.selinux
 xattr: user.foo
 xattr: user.hello
 xattr: user.ping
...

[2]
--- /dev/fd/63	2020-07-02 07:15:09.072853920 -0400
+++ results/generic/062.out.bad	2020-07-02 07:15:08.156833194 -0400
@@ -52,6 +52,7 @@
 SCRATCH_MNT/reg: user.name2: No such attribute or operation not permitted
 *** final list (strings, type=reg, nsp=user)
 # file: SCRATCH_MNT/reg
+security.selinux=0x73797374656d5f753a6f626a6563745f723a6e66735f743a733000
 user.name=0xbabe
 user.name3=0xdeface
...

>  tests/generic/377 | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> I'm not sure why this doesn't fail for most people, unless most are
> turning off SELinux. Is this the right approach?
> 
> diff --git a/tests/generic/377 b/tests/generic/377
> index f7835ee8ff9e..f08abdca60a6 100755
> --- a/tests/generic/377
> +++ b/tests/generic/377
> @@ -48,7 +48,7 @@ $SETFATTR_PROG -n user.ping -v pong $testfile
>  $SETFATTR_PROG -n user.hello -v there $testfile
>  
>  # 1. Call listxattr without buffer length argument. This should succeed.
> -$listxattr $testfile | sort
> +$listxattr $testfile | grep '^xattr: user\.' | sort
>  
>  # 2. Calling listxattr on nonexistant file should fail with -ENOENT.
>  $listxattr ""
> @@ -66,7 +66,7 @@ $listxattr $testfile 9
>  $listxattr $testfile 11
>  
>  # 6. Calling listxattr with buffersize bigger than needed should succeed.
> -$listxattr $testfile 500 | sort
> +$listxattr $testfile 500 | grep '^xattr: user\.' | sort
>  
>  status=0
>  exit
> -- 
> 2.26.2
> 


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH] generic/377: filter out xattrs that don't start with 'user.'
  2020-07-05 11:41 ` Zorro Lang
@ 2020-07-06 13:50   ` Jeff Layton
  0 siblings, 0 replies; 3+ messages in thread
From: Jeff Layton @ 2020-07-06 13:50 UTC (permalink / raw)
  To: Zorro Lang; +Cc: fstests

On Sun, 2020-07-05 at 19:41 +0800, Zorro Lang wrote:
> On Wed, Jul 01, 2020 at 01:52:05PM -0400, Jeff Layton wrote:
> > Most hosts that I've been testing on seem to display security.selinux in
> > listxattr. 377.out doesn't account for that so it routinely fails for me
> > in testing.
> > 
> > When testing the output of listxattr in generic/377, filter out any xattr
> > names that don't start with 'user.'. That should help ensure consistent
> > output on SELinux-enabled hosts.
> > 
> > Signed-off-by: Jeff Layton <jlayton@kernel.org>
> > ---
> 
> Yeah, I hit this error[1] too. This patch looks good to me.
> 
> One more question, do you hit similar failure on generic/062, likes [2]? 
> 
> Thanks,
> Zorro
> 
> [1]
> --- /dev/fd/63	2020-07-02 12:07:42.948327419 -0400
> +++ results/generic/377.out.bad	2020-07-02 12:07:41.990305624 -0400
> @@ -1,4 +1,5 @@
>  QA output created by 377
> +xattr: security.selinux
>  xattr: user.foo
>  xattr: user.hello
>  xattr: user.ping
> ...
> 
> [2]
> --- /dev/fd/63	2020-07-02 07:15:09.072853920 -0400
> +++ results/generic/062.out.bad	2020-07-02 07:15:08.156833194 -0400
> @@ -52,6 +52,7 @@
>  SCRATCH_MNT/reg: user.name2: No such attribute or operation not permitted
>  *** final list (strings, type=reg, nsp=user)
>  # file: SCRATCH_MNT/reg
> +security.selinux=0x73797374656d5f753a6f626a6563745f723a6e66735f743a733000
>  user.name=0xbabe
>  user.name3=0xdeface
> ...
> 

Thanks.

Yes, I generally hit this too. We can do a similar fix for that one. I
just figured I'd float this smaller patch before I went to the effort.

I'll plan to spin up a second patch that similarly fixes generic/062.

> >  tests/generic/377 | 4 ++--
> >  1 file changed, 2 insertions(+), 2 deletions(-)
> > 
> > I'm not sure why this doesn't fail for most people, unless most are
> > turning off SELinux. Is this the right approach?
> > 
> > diff --git a/tests/generic/377 b/tests/generic/377
> > index f7835ee8ff9e..f08abdca60a6 100755
> > --- a/tests/generic/377
> > +++ b/tests/generic/377
> > @@ -48,7 +48,7 @@ $SETFATTR_PROG -n user.ping -v pong $testfile
> >  $SETFATTR_PROG -n user.hello -v there $testfile
> >  
> >  # 1. Call listxattr without buffer length argument. This should succeed.
> > -$listxattr $testfile | sort
> > +$listxattr $testfile | grep '^xattr: user\.' | sort
> >  
> >  # 2. Calling listxattr on nonexistant file should fail with -ENOENT.
> >  $listxattr ""
> > @@ -66,7 +66,7 @@ $listxattr $testfile 9
> >  $listxattr $testfile 11
> >  
> >  # 6. Calling listxattr with buffersize bigger than needed should succeed.
> > -$listxattr $testfile 500 | sort
> > +$listxattr $testfile 500 | grep '^xattr: user\.' | sort
> >  
> >  status=0
> >  exit
> > -- 
> > 2.26.2
> > 

-- 
Jeff Layton <jlayton@kernel.org>


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2020-07-06 13:50 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-07-01 17:52 [PATCH] generic/377: filter out xattrs that don't start with 'user.' Jeff Layton
2020-07-05 11:41 ` Zorro Lang
2020-07-06 13:50   ` Jeff Layton

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.