On 10/23/2018 01:23 PM, Breno Leitao wrote:
> Current core-pkey selftest fails if the test runs without privileges to
> write into the core pattern file (/proc/sys/kernel/core_pattern). This
> causes the test to fail and give the impression that the subsystem being
> tested is broken, when, in fact, the test is being executed without the
> proper privileges. This is the current error:
> 
>       test: core_pkey
>       tags: git_version:v4.19-3-g9e3363be9bce-dirty
>       Error writing to core_pattern file: Permission denied
>       failure: core_pkey
> 
> This patch simply skips this test if it runs without the proper privileges,
> avoiding this undesired failure.
> 
> CC: Thiago Jung Bauermann <bauer...@linux.ibm.com>
> Signed-off-by: Breno Leitao <lei...@debian.org>
> ---
>  tools/testing/selftests/powerpc/ptrace/core-pkey.c | 10 ++--------
>  1 file changed, 2 insertions(+), 8 deletions(-)
> 
> diff --git a/tools/testing/selftests/powerpc/ptrace/core-pkey.c 
> b/tools/testing/selftests/powerpc/ptrace/core-pkey.c
> index e23e2e199eb4..e07949120fc8 100644
> --- a/tools/testing/selftests/powerpc/ptrace/core-pkey.c
> +++ b/tools/testing/selftests/powerpc/ptrace/core-pkey.c
> @@ -352,17 +352,11 @@ static int write_core_pattern(const char *core_pattern)
>       FILE *f;
> 
>       f = fopen(core_pattern_file, "w");
> -     if (!f) {
> -             perror("Error writing to core_pattern file");
> -             return TEST_FAIL;
> -     }
> +     SKIP_IF(!f);
> 
>       ret = fwrite(core_pattern, 1, len, f);
>       fclose(f);
> -     if (ret != len) {
> -             perror("Error writing to core_pattern file");
> -             return TEST_FAIL;
> -     }
> +     SKIP_IF(ret != len);

If we don't have proper privileges we should fail on the open, right? So 
wouldn't we still want to fail on the write if something goes wrong?

-Tyrel

> 
>       return TEST_PASS;
>  }
> 

Reply via email to