diff mbox series

[v2] setpriority01: Skip only PRIO_USER when unable to add test user

Message ID 20190307233154.12873-1-saravanak@google.com
State Superseded
Headers show
Series [v2] setpriority01: Skip only PRIO_USER when unable to add test user | expand

Commit Message

Saravana Kannan March 7, 2019, 11:31 p.m. UTC
We don't need to skip all the tests just because we are unable to add
a test user. Not having a test user only affects PRIO_USER test case.
So just skip that one and continue running the rest of the tests when
useradd is not available.

If useradd is present and it still fails, then consider it an error in
the test preparation phase.

This also allows this test case to be built and run on Android.

Signed-off-by: Saravana Kannan <saravanak@google.com>
---

v1:
- Skip only PRIO_USER test when unable to add user for any reason.

v2:
- Skip only PRIO_USER test when useradd isn't present
- Fail entire test with TBROK for all other cases where user can't be added

I still think v1 is the right approach. But if you want TCONF for only
for cases like Android where useradd itself isn't present, then v2 would
be the right patch.

 .../kernel/syscalls/setpriority/Makefile      |  5 ----
 .../syscalls/setpriority/setpriority01.c      | 29 +++++++++++++------
 2 files changed, 20 insertions(+), 14 deletions(-)

Comments

Petr Vorel March 19, 2019, 8:32 a.m. UTC | #1
Hi Saravana,

> We don't need to skip all the tests just because we are unable to add
> a test user. Not having a test user only affects PRIO_USER test case.
> So just skip that one and continue running the rest of the tests when
> useradd is not available.

> If useradd is present and it still fails, then consider it an error in
> the test preparation phase.

> This also allows this test case to be built and run on Android.

> Signed-off-by: Saravana Kannan <saravanak@google.com>
Reviewed-by: Petr Vorel <pvorel@suse.cz>

...
> v2:
> - Skip only PRIO_USER test when useradd isn't present
> - Fail entire test with TBROK for all other cases where user can't be added

> I still think v1 is the right approach. But if you want TCONF for only
> for cases like Android where useradd itself isn't present, then v2 would
> be the right patch.
Agree with it, but waiting for Cyril approval to merge it.

Kind regards,
Petr
Cyril Hrubis March 19, 2019, 10:03 a.m. UTC | #2
Hi!
> > v2:
> > - Skip only PRIO_USER test when useradd isn't present
> > - Fail entire test with TBROK for all other cases where user can't be added
> 
> > I still think v1 is the right approach. But if you want TCONF for only
> > for cases like Android where useradd itself isn't present, then v2 would
> > be the right patch.
> Agree with it, but waiting for Cyril approval to merge it.

As far as I can tell this patch still removes the read-only rootfs check
introduced in:

commit 8cab24427ec4584389cd0462eb87bd9d43261861
Author: the_hoang0709@yahoo.com <the_hoang0709@yahoo.com>
Date:   Sun Apr 9 15:38:05 2017 +0700

    setpriority01: Fix failure on read-only machine

    Return 32 if /etc/passwd is read-only.
    Fixes: #137
    See also: #88
Petr Vorel March 19, 2019, 10:28 a.m. UTC | #3
Hi Cyril,

> > > I still think v1 is the right approach. But if you want TCONF for only
> > > for cases like Android where useradd itself isn't present, then v2 would
> > > be the right patch.
> > Agree with it, but waiting for Cyril approval to merge it.

> As far as I can tell this patch still removes the read-only rootfs check
> introduced in:
Good catch, eaccess check should stay in.
I'll put it back again and push, ok?

Kind regards,
Petr

> commit 8cab24427ec4584389cd0462eb87bd9d43261861
> Author: the_hoang0709@yahoo.com <the_hoang0709@yahoo.com>
> Date:   Sun Apr 9 15:38:05 2017 +0700

>     setpriority01: Fix failure on read-only machine

>     Return 32 if /etc/passwd is read-only.
>     Fixes: #137
>     See also: #88
Cyril Hrubis March 19, 2019, 10:31 a.m. UTC | #4
Hi!
> > > > I still think v1 is the right approach. But if you want TCONF for only
> > > > for cases like Android where useradd itself isn't present, then v2 would
> > > > be the right patch.
> > > Agree with it, but waiting for Cyril approval to merge it.
> 
> > As far as I can tell this patch still removes the read-only rootfs check
> > introduced in:
> Good catch, eaccess check should stay in.
> I'll put it back again and push, ok?

Or we can check the return value 1 from useradd and map it to TCONF as
suggested by Saravana.
Petr Vorel March 19, 2019, 11:28 a.m. UTC | #5
Hi,

> > > > > I still think v1 is the right approach. But if you want TCONF for only
> > > > > for cases like Android where useradd itself isn't present, then v2 would
> > > > > be the right patch.
> > > > Agree with it, but waiting for Cyril approval to merge it.

> > > As far as I can tell this patch still removes the read-only rootfs check
> > > introduced in:
> > Good catch, eaccess check should stay in.
> > I'll put it back again and push, ok?

> Or we can check the return value 1 from useradd and map it to TCONF as
> suggested by Saravana.
Probably. According to useradd sources, exit 1 (E_PW_UPDATE) also happen when
problems to lock /etc/passwd, which could theoretically on different
circumstance than read-only /, but I guess we can ignore it.

Or we could use statvfs to detect read-only / ("can't update password file" does
can be for different purposes), but I wouldn't bother and user return value 1.

Kind regards,
Petr

[1] https://github.com/shadow-maint/shadow/blob/master/src/useradd.c#L1626
Saravana Kannan March 19, 2019, 8:19 p.m. UTC | #6
The problem with using eaccess is that it doesn't build on Android as
eaccess isn't implemented.

I vote for mapping useradd exit code 1 to TCONF. Sure there are some very
unlikely cases where useradd might fail with 1 when the file system is
writable. Excluding that corner case if it means being able to run on a lot
of Android devices seems like a good compromise.

-Saravana


On Tue, Mar 19, 2019 at 4:28 AM Petr Vorel <pvorel@suse.cz> wrote:

> Hi,
>
> > > > > > I still think v1 is the right approach. But if you want TCONF
> for only
> > > > > > for cases like Android where useradd itself isn't present, then
> v2 would
> > > > > > be the right patch.
> > > > > Agree with it, but waiting for Cyril approval to merge it.
>
> > > > As far as I can tell this patch still removes the read-only rootfs
> check
> > > > introduced in:
> > > Good catch, eaccess check should stay in.
> > > I'll put it back again and push, ok?
>
> > Or we can check the return value 1 from useradd and map it to TCONF as
> > suggested by Saravana.
> Probably. According to useradd sources, exit 1 (E_PW_UPDATE) also happen
> when
> problems to lock /etc/passwd, which could theoretically on different
> circumstance than read-only /, but I guess we can ignore it.
>
> Or we could use statvfs to detect read-only / ("can't update password
> file" does
> can be for different purposes), but I wouldn't bother and user return
> value 1.
>
> Kind regards,
> Petr
>
> [1] https://github.com/shadow-maint/shadow/blob/master/src/useradd.c#L1626
>
> --
> You received this message because you are subscribed to the Google Groups
> "kernel-team" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to kernel-team+unsubscribe@android.com.
>
>
<div dir="ltr">The problem with using eaccess is that it doesn&#39;t build on Android as eaccess isn&#39;t implemented.<div><br></div><div>I vote for mapping useradd exit code 1 to TCONF. Sure there are some very unlikely cases where useradd might fail with 1 when the file system is writable. Excluding that corner case if it means being able to run on a lot of Android devices seems like a good compromise.</div><div><br></div><div>-Saravana</div><div><br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Tue, Mar 19, 2019 at 4:28 AM Petr Vorel &lt;<a href="mailto:pvorel@suse.cz">pvorel@suse.cz</a>&gt; wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hi,<br>
<br>
&gt; &gt; &gt; &gt; &gt; I still think v1 is the right approach. But if you want TCONF for only<br>
&gt; &gt; &gt; &gt; &gt; for cases like Android where useradd itself isn&#39;t present, then v2 would<br>
&gt; &gt; &gt; &gt; &gt; be the right patch.<br>
&gt; &gt; &gt; &gt; Agree with it, but waiting for Cyril approval to merge it.<br>
<br>
&gt; &gt; &gt; As far as I can tell this patch still removes the read-only rootfs check<br>
&gt; &gt; &gt; introduced in:<br>
&gt; &gt; Good catch, eaccess check should stay in.<br>
&gt; &gt; I&#39;ll put it back again and push, ok?<br>
<br>
&gt; Or we can check the return value 1 from useradd and map it to TCONF as<br>
&gt; suggested by Saravana.<br>
Probably. According to useradd sources, exit 1 (E_PW_UPDATE) also happen when<br>
problems to lock /etc/passwd, which could theoretically on different<br>
circumstance than read-only /, but I guess we can ignore it.<br>
<br>
Or we could use statvfs to detect read-only / (&quot;can&#39;t update password file&quot; does<br>
can be for different purposes), but I wouldn&#39;t bother and user return value 1.<br>
<br>
Kind regards,<br>
Petr<br>
<br>
[1] <a href="https://github.com/shadow-maint/shadow/blob/master/src/useradd.c#L1626" rel="noreferrer" target="_blank">https://github.com/shadow-maint/shadow/blob/master/src/useradd.c#L1626</a><br>
<br>
-- <br>
You received this message because you are subscribed to the Google Groups &quot;kernel-team&quot; group.<br>
To unsubscribe from this group and stop receiving emails from it, send an email to <a href="mailto:kernel-team%2Bunsubscribe@android.com" target="_blank">kernel-team+unsubscribe@android.com</a>.<br>
<br>
</blockquote></div>
diff mbox series

Patch

diff --git a/testcases/kernel/syscalls/setpriority/Makefile b/testcases/kernel/syscalls/setpriority/Makefile
index 5d00984ea..7a1a87a28 100644
--- a/testcases/kernel/syscalls/setpriority/Makefile
+++ b/testcases/kernel/syscalls/setpriority/Makefile
@@ -19,9 +19,4 @@ 
 top_srcdir		?= ../../../..
 
 include $(top_srcdir)/include/mk/testcases.mk
-
-ifeq ($(ANDROID), 1)
-FILTER_OUT_MAKE_TARGETS	+= setpriority01
-endif
-
 include $(top_srcdir)/include/mk/generic_leaf_target.mk
diff --git a/testcases/kernel/syscalls/setpriority/setpriority01.c b/testcases/kernel/syscalls/setpriority/setpriority01.c
index 38b77b77f..92b1b4ef4 100644
--- a/testcases/kernel/syscalls/setpriority/setpriority01.c
+++ b/testcases/kernel/syscalls/setpriority/setpriority01.c
@@ -92,9 +92,16 @@  static void verify_setpriority(unsigned int n)
 {
 	struct tcase *tc = &tcases[n];
 
+	if (tc->which == PRIO_USER && !user_added) {
+		tst_res(TCONF, "setpriority(%s(%d), %d, -20..19) skipped - Can't add user",
+			str_which(tc->which), tc->which, *tc->who);
+		return;
+	}
+
 	pid = SAFE_FORK();
 	if (pid == 0) {
-		SAFE_SETUID(uid);
+		if (user_added)
+			SAFE_SETUID(uid);
 		SAFE_SETPGID(0, 0);
 
 		TST_CHECKPOINT_WAKE_AND_WAIT(0);
@@ -115,15 +122,19 @@  static void setup(void)
 {
 	const char *const cmd_useradd[] = {"useradd", username, NULL};
 	struct passwd *ltpuser;
+	int rc;
 
-	if (eaccess("/etc/passwd", W_OK))
-		tst_brk(TCONF, "/etc/passwd is not accessible");
-
-	tst_run_cmd(cmd_useradd, NULL, NULL, 0);
-	user_added = 1;
-
-	ltpuser = SAFE_GETPWNAM(username);
-	uid = ltpuser->pw_uid;
+	switch ((rc = tst_run_cmd(cmd_useradd, NULL, NULL, 1))) {
+	case 0:
+		user_added = 1;
+		ltpuser = SAFE_GETPWNAM(username);
+		uid = ltpuser->pw_uid;
+		return;
+	case 255:
+		return;
+	default:
+		tst_brk(TBROK, "Useradd failed (%d)", rc);
+	}
 }
 
 static void cleanup(void)