All of lore.kernel.org
 help / color / mirror / Atom feed
* [LTP]  [PATCH] prot_hsymlinks: Fix failure on read-only machine
@ 2017-03-10  0:54 the_hoang0709
  2017-03-22  3:06 ` Hoang Nguyen
  2017-04-05 17:25 ` Alexey Kodanev
  0 siblings, 2 replies; 5+ messages in thread
From: the_hoang0709 @ 2017-03-10  0:54 UTC (permalink / raw)
  To: ltp

From: Hoang Nguyen <the_hoang0709@yahoo.com>

Return 32 if /etc/passwd is read-only.
Also move tst_tmpdir before useradd in setup, to avoid "TESTDIR was
NULL" in tst_rmdir in cleanup.

Fixes #88

Signed-off-by: Hoang Nguyen <the_hoang0709@yahoo.com>
---
 testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c | 14 ++++++++++----
 1 file changed, 10 insertions(+), 4 deletions(-)

diff --git a/testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c b/testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c
index b23064a..31ddefa 100644
--- a/testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c
+++ b/testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c
@@ -206,6 +206,8 @@ static void setup(int argc, char *argv[])
 
 	tst_sig(FORK, DEF_HANDLER, cleanup);
 
+	tst_tmpdir();
+
 	test_user_cmd("useradd");
 	/*
 	 * enable hardlinks and symlinks restrictions,
@@ -220,8 +222,6 @@ static void setup(int argc, char *argv[])
 		disable_protected_slinks = 1;
 	}
 
-	tst_tmpdir();
-
 	init_base_dirs();
 
 	init_files_dirs();
@@ -273,7 +273,8 @@ static void cleanup(void)
 	if (skip_cleanup)
 		return;
 
-	test_user_cmd("userdel -r");
+	if (!eaccess("/etc/passwd", W_OK))
+		test_user_cmd("userdel -r");
 
 	if (disable_protected_hlinks) {
 		tst_resm(TINFO, "Disable protected hardlinks mode back");
@@ -316,8 +317,13 @@ static void test_user_cmd(const char *user_cmd)
 	char cmd[MAX_CMD_LEN];
 	snprintf(cmd, MAX_CMD_LEN, "%s %s", user_cmd, users[TEST_USER].name);
 	if (system(cmd) != 0) {
-		tst_brkm(TBROK, cleanup, "Failed to run cmd: %s %s",
+		if (eaccess("/etc/passwd", W_OK)) {
+			tst_brkm(TCONF, cleanup,
+			"/etc/passwd is not accessible");
+		} else {
+			tst_brkm(TBROK, cleanup, "Failed to run cmd: %s %s",
 			user_cmd, users[TEST_USER].name);
+		}
 	}
 }
 
-- 
2.7.4


^ permalink raw reply related	[flat|nested] 5+ messages in thread

* [LTP] [PATCH] prot_hsymlinks: Fix failure on read-only machine
  2017-03-10  0:54 [LTP] [PATCH] prot_hsymlinks: Fix failure on read-only machine the_hoang0709
@ 2017-03-22  3:06 ` Hoang Nguyen
  2017-04-05  1:14   ` Hoang Nguyen
  2017-04-05 17:25 ` Alexey Kodanev
  1 sibling, 1 reply; 5+ messages in thread
From: Hoang Nguyen @ 2017-03-22  3:06 UTC (permalink / raw)
  To: ltp

Hi,
Could you help to check, so that we can close the Issue ?
Thanks and regards
Hoang

Sent from Yahoo Mail on Android 
 
  On Fri, Mar 10, 2017 at 7:55, the_hoang0709@yahoo.com<the_hoang0709@yahoo.com> wrote:   From: Hoang Nguyen <the_hoang0709@yahoo.com>

Return 32 if /etc/passwd is read-only.
Also move tst_tmpdir before useradd in setup, to avoid "TESTDIR was
NULL" in tst_rmdir in cleanup.

Fixes #88

Signed-off-by: Hoang Nguyen <the_hoang0709@yahoo.com>
---
 testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c | 14 ++++++++++----
 1 file changed, 10 insertions(+), 4 deletions(-)

diff --git a/testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c b/testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c
index b23064a..31ddefa 100644
--- a/testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c
+++ b/testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c
@@ -206,6 +206,8 @@ static void setup(int argc, char *argv[])
 
     tst_sig(FORK, DEF_HANDLER, cleanup);
 
+    tst_tmpdir();
+
     test_user_cmd("useradd");
     /*
     * enable hardlinks and symlinks restrictions,
@@ -220,8 +222,6 @@ static void setup(int argc, char *argv[])
         disable_protected_slinks = 1;
     }
 
-    tst_tmpdir();
-
     init_base_dirs();
 
     init_files_dirs();
@@ -273,7 +273,8 @@ static void cleanup(void)
     if (skip_cleanup)
         return;
 
-    test_user_cmd("userdel -r");
+    if (!eaccess("/etc/passwd", W_OK))
+        test_user_cmd("userdel -r");
 
     if (disable_protected_hlinks) {
         tst_resm(TINFO, "Disable protected hardlinks mode back");
@@ -316,8 +317,13 @@ static void test_user_cmd(const char *user_cmd)
     char cmd[MAX_CMD_LEN];
     snprintf(cmd, MAX_CMD_LEN, "%s %s", user_cmd, users[TEST_USER].name);
     if (system(cmd) != 0) {
-        tst_brkm(TBROK, cleanup, "Failed to run cmd: %s %s",
+        if (eaccess("/etc/passwd", W_OK)) {
+            tst_brkm(TCONF, cleanup,
+            "/etc/passwd is not accessible");
+        } else {
+            tst_brkm(TBROK, cleanup, "Failed to run cmd: %s %s",
             user_cmd, users[TEST_USER].name);
+        }
     }
 }
 
-- 
2.7.4

  
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.linux.it/pipermail/ltp/attachments/20170322/668fd6c7/attachment-0001.html>

^ permalink raw reply related	[flat|nested] 5+ messages in thread

* [LTP] [PATCH] prot_hsymlinks: Fix failure on read-only machine
  2017-03-22  3:06 ` Hoang Nguyen
@ 2017-04-05  1:14   ` Hoang Nguyen
  0 siblings, 0 replies; 5+ messages in thread
From: Hoang Nguyen @ 2017-04-05  1:14 UTC (permalink / raw)
  To: ltp

Hello,
Could you help to check if the patch is ok or not ?
Thanks and regards.
Hoang

      From: Hoang Nguyen <the_hoang0709@yahoo.com>
 To: "the_hoang0709@yahoo.com" <the_hoang0709@yahoo.com>; "ltp@lists.linux.it" <ltp@lists.linux.it> 
 Sent: Wednesday, 22 March 2017, 10:06
 Subject: Re: [LTP] [PATCH] prot_hsymlinks: Fix failure on read-only machine
   
Hi,
Could you help to check, so that we can close the Issue ?
Thanks and regards
Hoang

Sent from Yahoo Mail on Android 
 
 On Fri, Mar 10, 2017 at 7:55, the_hoang0709@yahoo.com<the_hoang0709@yahoo.com> wrote:  From: Hoang Nguyen <the_hoang0709@yahoo.com>

Return 32 if /etc/passwd is read-only.
Also move tst_tmpdir before useradd in setup, to avoid "TESTDIR was
NULL" in tst_rmdir in cleanup.

Fixes #88

Signed-off-by: Hoang Nguyen <the_hoang0709@yahoo.com>
---
 testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c | 14 ++++++++++----
 1 file changed, 10 insertions(+), 4 deletions(-)

diff --git a/testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c b/testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c
index b23064a..31ddefa 100644
--- a/testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c
+++ b/testcases/kernel/security/prot_hsymlinks/prot_hsymlinks.c
@@ -206,6 +206,8 @@ static void setup(int argc, char *argv[])
 
     tst_sig(FORK, DEF_HANDLER, cleanup);
 
+    tst_tmpdir();
+
     test_user_cmd("useradd");
     /*
     * enable hardlinks and symlinks restrictions,
@@ -220,8 +222,6 @@ static void setup(int argc, char *argv[])
         disable_protected_slinks = 1;
     }
 
-    tst_tmpdir();
-
     init_base_dirs();
 
     init_files_dirs();
@@ -273,7 +273,8 @@ static void cleanup(void)
     if (skip_cleanup)
         return;
 
-    test_user_cmd("userdel -r");
+    if (!eaccess("/etc/passwd", W_OK))
+        test_user_cmd("userdel -r");
 
     if (disable_protected_hlinks) {
         tst_resm(TINFO, "Disable protected hardlinks mode back");
@@ -316,8 +317,13 @@ static void test_user_cmd(const char *user_cmd)
     char cmd[MAX_CMD_LEN];
     snprintf(cmd, MAX_CMD_LEN, "%s %s", user_cmd, users[TEST_USER].name);
     if (system(cmd) != 0) {
-        tst_brkm(TBROK, cleanup, "Failed to run cmd: %s %s",
+        if (eaccess("/etc/passwd", W_OK)) {
+            tst_brkm(TCONF, cleanup,
+            "/etc/passwd is not accessible");
+        } else {
+            tst_brkm(TBROK, cleanup, "Failed to run cmd: %s %s",
             user_cmd, users[TEST_USER].name);
+        }
     }
 }
 
-- 
2.7.4

  


   
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.linux.it/pipermail/ltp/attachments/20170405/1007f06e/attachment.html>

^ permalink raw reply related	[flat|nested] 5+ messages in thread

* [LTP] [PATCH] prot_hsymlinks: Fix failure on read-only machine
  2017-03-10  0:54 [LTP] [PATCH] prot_hsymlinks: Fix failure on read-only machine the_hoang0709
  2017-03-22  3:06 ` Hoang Nguyen
@ 2017-04-05 17:25 ` Alexey Kodanev
  2017-04-09  8:29   ` Hoang Nguyen
  1 sibling, 1 reply; 5+ messages in thread
From: Alexey Kodanev @ 2017-04-05 17:25 UTC (permalink / raw)
  To: ltp

Hi,
On 10.03.2017 3:54, the_hoang0709@yahoo.com wrote:
> ...
>  	if (disable_protected_hlinks) {
>  		tst_resm(TINFO, "Disable protected hardlinks mode back");
> @@ -316,8 +317,13 @@ static void test_user_cmd(const char *user_cmd)
>  	char cmd[MAX_CMD_LEN];
>  	snprintf(cmd, MAX_CMD_LEN, "%s %s", user_cmd, users[TEST_USER].name);
>  	if (system(cmd) != 0) {
> -		tst_brkm(TBROK, cleanup, "Failed to run cmd: %s %s",
> +		if (eaccess("/etc/passwd", W_OK)) {
> +			tst_brkm(TCONF, cleanup,
> +			"/etc/passwd is not accessible");

It would be better to add this check to the top of setup(), right after
tst_kvercmp(), and exit without doing cleanup.

Thanks,
Alexey


^ permalink raw reply	[flat|nested] 5+ messages in thread

* [LTP] [PATCH] prot_hsymlinks: Fix failure on read-only machine
  2017-04-05 17:25 ` Alexey Kodanev
@ 2017-04-09  8:29   ` Hoang Nguyen
  0 siblings, 0 replies; 5+ messages in thread
From: Hoang Nguyen @ 2017-04-09  8:29 UTC (permalink / raw)
  To: ltp

Hi,
Thanks Alexey, this would be much simpler. I'll send new patch. (also setpriority01 fails on my read-only system, I'll update it similiarly)

Thanks a lot for your help,
Best regards,
Hoang

      From: Alexey Kodanev <alexey.kodanev@oracle.com>
 To: the_hoang0709@yahoo.com; ltp@lists.linux.it 
 Sent: Thursday, 6 April 2017, 0:25
 Subject: Re: [LTP] [PATCH] prot_hsymlinks: Fix failure on read-only machine
   
Hi,
On 10.03.2017 3:54, the_hoang0709@yahoo.com wrote:
> ...
>      if (disable_protected_hlinks) {
>          tst_resm(TINFO, "Disable protected hardlinks mode back");
> @@ -316,8 +317,13 @@ static void test_user_cmd(const char *user_cmd)
>      char cmd[MAX_CMD_LEN];
>      snprintf(cmd, MAX_CMD_LEN, "%s %s", user_cmd, users[TEST_USER].name);
>      if (system(cmd) != 0) {
> -        tst_brkm(TBROK, cleanup, "Failed to run cmd: %s %s",
> +        if (eaccess("/etc/passwd", W_OK)) {
> +            tst_brkm(TCONF, cleanup,
> +            "/etc/passwd is not accessible");

It would be better to add this check to the top of setup(), right after
tst_kvercmp(), and exit without doing cleanup.

Thanks,
Alexey



   
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.linux.it/pipermail/ltp/attachments/20170409/d764cf7c/attachment-0001.html>

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2017-04-09  8:29 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-03-10  0:54 [LTP] [PATCH] prot_hsymlinks: Fix failure on read-only machine the_hoang0709
2017-03-22  3:06 ` Hoang Nguyen
2017-04-05  1:14   ` Hoang Nguyen
2017-04-05 17:25 ` Alexey Kodanev
2017-04-09  8:29   ` Hoang Nguyen

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.