[LTP] [PATCH v2] open08: rewrite to newlib
Jan Stancek
jstancek@redhat.com
Fri Jun 15 08:11:55 CEST 2018
----- Original Message -----
> On Thu, Jun 14, 2018 at 9:47 PM, Li Wang <liwang@redhat.com> wrote:
> > On Thu, Jun 14, 2018 at 8:48 PM, Jan Stancek <jstancek@redhat.com> wrote:
> >> Fixes: https://github.com/linux-test-project/ltp/issues/330
> >>
> >> EACCES testcase changed:
> >> Test now creates file (0600) in tmpdir, that is owned by privileged user,
> >> and unprivileged user tries to open it for writing.
> >>
> >> EFAULT testcase changed:
> >> Comments say the intent is to use address outside of process mapped space.
> >> So, test is changed to map/unmap rather than map as PROT_NONE.
> >>
> >> uclinux ifdefs dropped.
> >>
> >> Signed-off-by: Jan Stancek <jstancek@redhat.com>
> >> ---
> >> testcases/kernel/syscalls/open/open08.c | 140
> >> +++++++++++++-------------------
> >> 1 file changed, 58 insertions(+), 82 deletions(-)
> >>
> >> diff --git a/testcases/kernel/syscalls/open/open08.c
> >> b/testcases/kernel/syscalls/open/open08.c
> >> index d55d8e6bdd53..d749d1e7100e 100644
> >> --- a/testcases/kernel/syscalls/open/open08.c
> >> +++ b/testcases/kernel/syscalls/open/open08.c
> >> @@ -1,5 +1,6 @@
> >> /*
> >> * Copyright (c) 2013 Wanlong Gao <gaowanlong@cn.fujitsu.com>
> >> + * Copyright (c) 2018 Linux Test Project
> >> *
> >> * This program is free software; you can redistribute it and/or
> >> modify
> >> * it under the terms of the GNU General Public License as published by
> >> @@ -39,7 +40,7 @@
> >> * 4. Attempt to open() a filename which is more than VFS_MAXNAMLEN,
> >> and
> >> * check for errno to be ENAMETOOLONG.
> >> *
> >> - * 5. Attempt to open a test executable in WRONLY mode,
> >> + * 5. Attempt to open a (0600) file owned by different user in WRONLY
> >> mode,
> >> * open(2) should fail with EACCES.
> >> *
> >> * 6. Attempt to pass an invalid pathname with an address pointing
> >> outside
> >> @@ -56,113 +57,88 @@
> >> #include <fcntl.h>
> >> #include <signal.h>
> >> #include <pwd.h>
> >> -#include "test.h"
> >> -#include "safe_macros.h"
> >> -
> >> -static void setup(void);
> >> -static void cleanup(void);
> >> -
> >> -char *TCID = "open08";
> >> -
> >> -static char nobody_uid[] = "nobody";
> >> -static struct passwd *ltpuser;
> >> -
> >> -static char *bad_addr;
> >> +#include "tst_test.h"
> >>
> >> static char filename[40] = "";
> >> -static char fname[] = "/bin/cat";
> >> +static char user2_file[] = "user2_0600";
> >> static char bad_file[] =
> >> "abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstmnopqrstuvwxyzabcdefghijklmnopqrstmnopqrstuvwxyzabcdefghijklmnopqrstmnopqrstuvwxyzabcdefghijklmnopqrstmnopqrstuvwxyzabcdefghijklmnopqrstmnopqrstuvwxyzabcdefghijklmnopqrstmnopqrstuvwxyz";
> >>
> >> +struct test_case_t;
> >> +static void setup_badfname_buf(struct test_case_t *t);
> >> +
> >> static struct test_case_t {
> >> + void (*setup)(struct test_case_t *t);
> >
> > This function pointer named setup make me a little bit confused at first
> > sight.
> > It makes me thinking about what's the relationship to ltp steup()
> > function for a while, actually it does not have.
> >
> > To avoid the situation to other person, how about just using
> > void (*func) (struct test_case_t *t);
> > here?
>
> Or, maybe we could drop the func pointer in the test structure, and
> reset the badfname only in verify_open(). It's hard to say which
> method is better, but seems this can make things more easier I guess.
>
> Which something differ with your patch too:
>
> --- a/testcases/kernel/syscalls/open/open08.c
> +++ b/testcases/kernel/syscalls/open/open08.c
> @@ -63,27 +63,30 @@ static char filename[40] = "";
> static char user2_file[] = "user2_0600";
> static char bad_file[] =
> "abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstmnopqrstuvwxyzabcdefghijklmnopqrstmnopqrstuvwxyzabcdefghijklmnopqrstmnopqrstuvwxyzabcdefghijklmnopqrstmnopqrstuvwxyzabcdefghijklmnopqrstmnopqrstuvwxyzabcdefghijklmnopqrstmnopqrstuvwxyz";
>
> -struct test_case_t;
> -static void setup_badfname_buf(struct test_case_t *t);
> -
> static struct test_case_t {
> - void (*setup)(struct test_case_t *t);
> char *fname;
> int flags;
> int error;
> } tcases[] = {
> - {NULL, filename, O_CREAT | O_EXCL, EEXIST},
> - {NULL, "/tmp", O_RDWR, EISDIR},
> - {NULL, filename, O_DIRECTORY, ENOTDIR},
> - {NULL, bad_file, O_RDWR, ENAMETOOLONG},
> - {NULL, user2_file, O_WRONLY, EACCES},
> - {setup_badfname_buf, NULL, O_CREAT, EFAULT}
> + {filename, O_CREAT | O_EXCL, EEXIST},
> + {"/tmp", O_RDWR, EISDIR},
> + {filename, O_DIRECTORY, ENOTDIR},
> + {bad_file, O_RDWR, ENAMETOOLONG},
> + {user2_file, O_WRONLY, EACCES},
> + {NULL, O_CREAT, EFAULT}
> };
>
> void verify_open(unsigned int i)
> {
> - if (tcases[i].setup)
> - tcases[i].setup(&tcases[i]);
> + if (i == ARRAY_SIZE(tcases) - 1) {
It's same as hardcoding index to array - if someone adds
new testcase it breaks.
But we could set it to some special value (NULL) and check all cases against that.
If it's NULL, then make a bad_addr.
> + char *bad_addr;
> + int len = getpagesize();
> +
> + bad_addr = SAFE_MMAP(0, len, PROT_READ|PROT_WRITE,
> + MAP_PRIVATE | MAP_ANONYMOUS, 0, 0);
> + tcases[i].fname = bad_addr;
> + SAFE_MUNMAP(bad_addr, len);
> + }
>
> TEST(open(tcases[i].fname, tcases[i].flags,
> S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH));
> @@ -104,17 +107,6 @@ void verify_open(unsigned int i)
> }
> }
>
> -static void setup_badfname_buf(struct test_case_t *t)
> -{
> - char *bad_addr;
> - int len = getpagesize();
> -
> - bad_addr = SAFE_MMAP(0, len, PROT_READ|PROT_WRITE,
> - MAP_PRIVATE | MAP_ANONYMOUS, 0, 0);
> - t->fname = bad_addr;
> - SAFE_MUNMAP(bad_addr, len);
> -}
> -
> static void setup(void)
> {
> int fildes;
>
>
>
> --
> Regards,
> Li Wang
>
More information about the ltp
mailing list