Message ID | 20230505145626.2537-1-mdoucha@suse.cz |
---|---|
State | Accepted |
Headers | show |
Series | [1/3] ipc/semget05: Fix .save_restore flags | expand |
Hi Martin, > The test can run without root privileges. Add TST_SR_SKIP_RO to ignore > read-only permissions on /proc/sys/kernel/sem. Very good catch, thanks! Reviewed-by: Petr Vorel <pvorel@suse.cz> Tested-by: Petr Vorel <pvorel@suse.cz> Kind regards, Petr
diff --git a/testcases/kernel/syscalls/ipc/semget/semget05.c b/testcases/kernel/syscalls/ipc/semget/semget05.c index 38b0fad3c..d6810c11b 100644 --- a/testcases/kernel/syscalls/ipc/semget/semget05.c +++ b/testcases/kernel/syscalls/ipc/semget/semget05.c @@ -73,7 +73,8 @@ static struct tst_test test = { .cleanup = cleanup, .test_all = verify_semget, .save_restore = (const struct tst_path_val[]){ - {"/proc/sys/kernel/sem", NULL, TST_SR_TCONF}, + {"/proc/sys/kernel/sem", NULL, + TST_SR_TCONF_MISSING | TST_SR_SKIP_RO}, {} } };
The test can run without root privileges. Add TST_SR_SKIP_RO to ignore read-only permissions on /proc/sys/kernel/sem. Signed-off-by: Martin Doucha <mdoucha@suse.cz> --- testcases/kernel/syscalls/ipc/semget/semget05.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)