[LTP] [PATCH v3 1/3] security/dirtyc0w: Fix bug caused by default umask
Zou Wei
zou_wei@huawei.com
Mon Mar 30 09:27:47 CEST 2020
v3:
The case is only successful when system default umask is 0022.
When default umask is 0077 or other values, should clear current umask by umask(0) in setup().
Signed-off-by: Zou Wei <zou_wei@huawei.com>
---
testcases/kernel/security/dirtyc0w/dirtyc0w.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/testcases/kernel/security/dirtyc0w/dirtyc0w.c b/testcases/kernel/security/dirtyc0w/dirtyc0w.c
index a0a81b6..6455f9c 100644
--- a/testcases/kernel/security/dirtyc0w/dirtyc0w.c
+++ b/testcases/kernel/security/dirtyc0w/dirtyc0w.c
@@ -45,6 +45,8 @@ static void setup(void)
{
struct passwd *pw;
+ umask(0);
+
pw = SAFE_GETPWNAM("nobody");
nobody_uid = pw->pw_uid;
--
2.6.2
More information about the ltp
mailing list