Message ID | a38a6057866b597e5f931de550f2a6f24404ecdf.1688078605.git.falcon@tinylab.org |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:994d:0:b0:3d9:f83d:47d9 with SMTP id k13csp9997678vqr; Thu, 29 Jun 2023 17:10:43 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6GK28gIKd7l+PO21C7bV/ueQiWRmpTQsTmiCwMZcJ/CMh4dw8KtWQeM/K6JTqJCivUJFwA X-Received: by 2002:a05:6830:b84:b0:6b4:57ad:3d19 with SMTP id a4-20020a0568300b8400b006b457ad3d19mr1666901otv.2.1688083843557; Thu, 29 Jun 2023 17:10:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1688083843; cv=none; d=google.com; s=arc-20160816; b=N/T0RftjIupUemm9jq0/RfzzX9rqPpafGvTdSqWj7Uq6VEAUiUX9GFkfhMuj4RU4XL 0YVgVo/r/P1Eb57VZUITN+schl9xzW16iHV0VO16jIZvJJpgZJavzMRrV9BaHepgSe4X hj35rMolDZB3FAYpj1VVf6wpGZlVBgsk2O8bYlluOrdU5H6ik5OZEkNs+bEv7cqo4qBv 60nJjU+r+ZqTdjxS4Hc/EKJeOv5v1Y4MOB5lBn2E/PUuzr0XiJeHKuiIH2jMz34CveXr B7I6PdM1Q6tP+6CCz06SoRgirRxTLAje9vgTmEQ07p4TaDIM9Ymckj652tviyhkixpc0 7tRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:feedback-id:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from; bh=KErcoTDhwOzWkH5uneST6Xp7xTYjcMG/8WG6s/kGzLo=; fh=GzghTQzqgly4pZn8BwQ4U8bZ8zCadAK8Sl/utskeyEs=; b=EnbUCwPTv586bFVNOd6c4UJ/LnB8FhfpuGwFkMPs1ZwWxVhaZua7SRtOTZWY+uJVGe eL/FC1ygmppe43PPE2UZ/kLmTsmXBSm955YJoxYtLLjMxQLPcpRkvC+mMHSTvfPOZNNr PbMUT+03NQzPtv+nuKo71nmMYlrfEJA4Q6cmIXVESFltX5jZh5cjiKecmNOSk6UXgx4M G28xsI8T8hUwJMjkASDnZdDaD7+ARktoVeJNv9ZJ9FavAyWoGdlHZiY5KDoFD5Dm6C0n BzhQNYkag7LJmBxfPQ5c1vN/DKwEMX+79mfx01b8Oi//aKcZgi+yaGWy9DmAwvkfFsdJ HWJQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c20-20020a631c14000000b0054fe3c820dcsi11301227pgc.102.2023.06.29.17.10.24; Thu, 29 Jun 2023 17:10:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231653AbjF3AA4 (ORCPT <rfc822;ivan.orlov0322@gmail.com> + 99 others); Thu, 29 Jun 2023 20:00:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44728 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229727AbjF3AAz (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Thu, 29 Jun 2023 20:00:55 -0400 Received: from bg4.exmail.qq.com (bg4.exmail.qq.com [43.154.54.12]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9B0252972; Thu, 29 Jun 2023 17:00:53 -0700 (PDT) X-QQ-mid: bizesmtp70t1688083243tc6q58s1 Received: from linux-lab-host.localdomain ( [119.123.131.49]) by bizesmtp.qq.com (ESMTP) with id ; Fri, 30 Jun 2023 08:00:43 +0800 (CST) X-QQ-SSF: 01200000000000D0W000000A0000000 X-QQ-FEAT: CR3LFp2JE4kswbijyT8FSHr/m5Ro1TRCzo0a8RfheEUvcf/BVZGX2KLlH6E/+ ShX8DywmRJ9ILMpomwp/MCmci/hDinkPesyIEF8m1z95RH4xr+UNw7Yg9ulHwl3Jt/BEuwK wY3rSTi9866Fog1s2TtL6YySRzzpuWzkghoVs58pDr48HYz2G6BLHsnKSvBnuCK3bNxBdn5 ljA/Au8aGriHhAlDjLeRl6iTzcX0CoK1GI0ozDFMjE4Q9SztOGzJOUw96JOZtXYGlaITQxc bkb+eW2apV54E40wx7aRPpITa7SqGh7wpSvibt119O/MtmCGbqN99YMlET+fYnYEA1R1AQI cSxavE7nLz/r3EOrqvur7xG9QFph5o5xFoNwERFkEopWHVlaymMKulc5hiamQ== X-QQ-GoodBg: 0 X-BIZMAIL-ID: 14245471600300813277 From: Zhangjin Wu <falcon@tinylab.org> To: thomas@t-8ch.de, w@1wt.eu Cc: falcon@tinylab.org, arnd@arndb.de, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org Subject: [PATCH v2 13/15] selftests/nolibc: rename chroot_exe to chroot_tmpfile Date: Fri, 30 Jun 2023 08:00:28 +0800 Message-Id: <a38a6057866b597e5f931de550f2a6f24404ecdf.1688078605.git.falcon@tinylab.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <cover.1688078604.git.falcon@tinylab.org> References: <cover.1688078604.git.falcon@tinylab.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-QQ-SENDSIZE: 520 Feedback-ID: bizesmtp:tinylab.org:qybglogicsvrgz:qybglogicsvrgz5a-1 X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,RCVD_IN_MSPIKE_H5, RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1770084204363049459?= X-GMAIL-MSGID: =?utf-8?q?1770084204363049459?= |
Series |
allow run with minimal kernel config
|
|
Commit Message
Zhangjin Wu
June 30, 2023, midnight UTC
For CONFIG_PROC_FS=n, let's use tmpfs and create a tmp file for
chroot_exe test.
Since chroot_exe is mainly testing the not directory case (ENOTDIR), so,
rename it to chroot_tmpfile may be better.
Signed-off-by: Zhangjin Wu <falcon@tinylab.org>
---
tools/testing/selftests/nolibc/nolibc-test.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
Comments
On 2023-06-30 08:00:28+0800, Zhangjin Wu wrote: > For CONFIG_PROC_FS=n, let's use tmpfs and create a tmp file for > chroot_exe test. > > Since chroot_exe is mainly testing the not directory case (ENOTDIR), so, > rename it to chroot_tmpfile may be better. > > Signed-off-by: Zhangjin Wu <falcon@tinylab.org> > --- > tools/testing/selftests/nolibc/nolibc-test.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/tools/testing/selftests/nolibc/nolibc-test.c b/tools/testing/selftests/nolibc/nolibc-test.c > index 1002e0267515..2e9eaa7efa6e 100644 > --- a/tools/testing/selftests/nolibc/nolibc-test.c > +++ b/tools/testing/selftests/nolibc/nolibc-test.c > @@ -682,6 +682,8 @@ int run_syscall(int min, int max) > int ret = 0; > void *p1, *p2; > int has_gettid = 1; > + const char *tmpfile = get_tmpfile("/tmp/dummy"); > + int has_tmpfile = tmpfile != NULL; > > /* <proc> indicates whether or not /proc is mounted */ > proc = stat("/proc", &stat_buf) == 0; > @@ -720,7 +722,7 @@ int run_syscall(int min, int max) > CASE_TEST(chown_self); EXPECT_SYSER(proc, chown("/proc/self", 0, 0), -1, EPERM); break; > CASE_TEST(chroot_root); EXPECT_SYSZR(euid0, chroot("/")); break; > CASE_TEST(chroot_blah); EXPECT_SYSER(1, chroot("/proc/self/blah"), -1, ENOENT); break; > - CASE_TEST(chroot_exe); EXPECT_SYSER(proc, chroot("/proc/self/exe"), -1, ENOTDIR); break; > + CASE_TEST(chroot_tmpfile); EXPECT_SYSER(has_tmpfile, chroot(tmpfile), -1, ENOTDIR); break; get_tempfile() looks really weird. Given that the nolibc implementation of chroot() is the most trivial imaginable in my opinion we can keep the current "chroot_exe" that is using procfs. > CASE_TEST(close_m1); EXPECT_SYSER(1, close(-1), -1, EBADF); break; > CASE_TEST(close_dup); EXPECT_SYSZR(1, close(dup(0))); break; > CASE_TEST(dup_0); tmp = dup(0); EXPECT_SYSNE(1, tmp, -1); close(tmp); break; > -- > 2.25.1 >
Hi, Thomas > On 2023-06-30 08:00:28+0800, Zhangjin Wu wrote: > > For CONFIG_PROC_FS=n, let's use tmpfs and create a tmp file for > > chroot_exe test. > > > > Since chroot_exe is mainly testing the not directory case (ENOTDIR), so, > > rename it to chroot_tmpfile may be better. > > > > Signed-off-by: Zhangjin Wu <falcon@tinylab.org> > > --- > > tools/testing/selftests/nolibc/nolibc-test.c | 4 +++- > > 1 file changed, 3 insertions(+), 1 deletion(-) > > > > diff --git a/tools/testing/selftests/nolibc/nolibc-test.c b/tools/testing/selftests/nolibc/nolibc-test.c > > index 1002e0267515..2e9eaa7efa6e 100644 > > --- a/tools/testing/selftests/nolibc/nolibc-test.c > > +++ b/tools/testing/selftests/nolibc/nolibc-test.c > > @@ -682,6 +682,8 @@ int run_syscall(int min, int max) > > int ret = 0; > > void *p1, *p2; > > int has_gettid = 1; > > + const char *tmpfile = get_tmpfile("/tmp/dummy"); > > + int has_tmpfile = tmpfile != NULL; > > > > /* <proc> indicates whether or not /proc is mounted */ > > proc = stat("/proc", &stat_buf) == 0; > > @@ -720,7 +722,7 @@ int run_syscall(int min, int max) > > CASE_TEST(chown_self); EXPECT_SYSER(proc, chown("/proc/self", 0, 0), -1, EPERM); break; > > CASE_TEST(chroot_root); EXPECT_SYSZR(euid0, chroot("/")); break; > > CASE_TEST(chroot_blah); EXPECT_SYSER(1, chroot("/proc/self/blah"), -1, ENOENT); break; > > - CASE_TEST(chroot_exe); EXPECT_SYSER(proc, chroot("/proc/self/exe"), -1, ENOTDIR); break; > > + CASE_TEST(chroot_tmpfile); EXPECT_SYSER(has_tmpfile, chroot(tmpfile), -1, ENOTDIR); break; > > get_tempfile() looks really weird. Yes, it is, it has been used in another patch, but now, only has one user, let's remove it. > Given that the nolibc implementation of chroot() is the most trivial > imaginable in my opinion we can keep the current "chroot_exe" that is > using procfs. > Just did some new tests, what about this one? - CASE_TEST(chroot_exe); EXPECT_SYSER(proc, chroot("/proc/self/exe"), -1, ENOTDIR); break; + CASE_TEST(chroot_exe); EXPECT_SYSER2(1, chroot(proc ? "/proc/self/exe" : "/init"), -1, ENOENT, ENOTDIR); break; "/init" added for !procfs, and ENOENT added for !/init ;-) And for the chmod_tmpfile, it is changed to chmod_tmpdir like this: CASE_TEST(chmod_tmpdir); mkdir("/tmp/blah", 0755); EXPECT_SYSZR(1, chmod("/tmp/blah", 0555)); rmdir("/tmp/blah"); break; Not sure if it is possible to use a syscall to return the file path from the fd without /proc/self/fd/<N>, if so, we could use the open(, O_TMPFILE...) method to get a random tmpfile, just like the mktemp command does, will run strace on it ;-) Thanks, Zhangjin > > CASE_TEST(close_m1); EXPECT_SYSER(1, close(-1), -1, EBADF); break; > > CASE_TEST(close_dup); EXPECT_SYSZR(1, close(dup(0))); break; > > CASE_TEST(dup_0); tmp = dup(0); EXPECT_SYSNE(1, tmp, -1); close(tmp); break; > > -- > > 2.25.1 > >
diff --git a/tools/testing/selftests/nolibc/nolibc-test.c b/tools/testing/selftests/nolibc/nolibc-test.c index 1002e0267515..2e9eaa7efa6e 100644 --- a/tools/testing/selftests/nolibc/nolibc-test.c +++ b/tools/testing/selftests/nolibc/nolibc-test.c @@ -682,6 +682,8 @@ int run_syscall(int min, int max) int ret = 0; void *p1, *p2; int has_gettid = 1; + const char *tmpfile = get_tmpfile("/tmp/dummy"); + int has_tmpfile = tmpfile != NULL; /* <proc> indicates whether or not /proc is mounted */ proc = stat("/proc", &stat_buf) == 0; @@ -720,7 +722,7 @@ int run_syscall(int min, int max) CASE_TEST(chown_self); EXPECT_SYSER(proc, chown("/proc/self", 0, 0), -1, EPERM); break; CASE_TEST(chroot_root); EXPECT_SYSZR(euid0, chroot("/")); break; CASE_TEST(chroot_blah); EXPECT_SYSER(1, chroot("/proc/self/blah"), -1, ENOENT); break; - CASE_TEST(chroot_exe); EXPECT_SYSER(proc, chroot("/proc/self/exe"), -1, ENOTDIR); break; + CASE_TEST(chroot_tmpfile); EXPECT_SYSER(has_tmpfile, chroot(tmpfile), -1, ENOTDIR); break; CASE_TEST(close_m1); EXPECT_SYSER(1, close(-1), -1, EBADF); break; CASE_TEST(close_dup); EXPECT_SYSZR(1, close(dup(0))); break; CASE_TEST(dup_0); tmp = dup(0); EXPECT_SYSNE(1, tmp, -1); close(tmp); break;