Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753458AbdHUC7x (ORCPT ); Sun, 20 Aug 2017 22:59:53 -0400 Received: from mail-sn1nam01on0058.outbound.protection.outlook.com ([104.47.32.58]:43762 "EHLO NAM01-SN1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753414AbdHUC7v (ORCPT ); Sun, 20 Aug 2017 22:59:51 -0400 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=paul.elder@pitt.edu; From: Paul Elder To: shuahkh@osg.samsung.com, shuah@kernel.org, gregkh@linuxfoundation.org, alicef@gentoo.org, alice.ferrazzi@gmail.com Cc: Paul Elder , linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v2] kselftest: exec: make exec test output conform to TAP13 Date: Sun, 20 Aug 2017 21:59:24 -0500 Message-Id: <20170821025924.25524-1-paul.elder@pitt.edu> X-Mailer: git-send-email 2.11.0 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [173.19.201.238] X-ClientProxiedBy: DM5PR15CA0035.namprd15.prod.outlook.com (10.174.245.149) To CO2PR04MB2167.namprd04.prod.outlook.com (10.166.93.149) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 345adeb1-680e-4aba-9d5d-08d4e840adaf X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254152)(300000503095)(300135400095)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095);SRVR:CO2PR04MB2167; X-Microsoft-Exchange-Diagnostics: 1;CO2PR04MB2167;3:FiRFJ7vBAGjur6CEcojC2wDWP7FpRZtAvv5xryH+F0gIElIIWP+wLs2ZJWFO/8Wj2LcgZHmU2ogCHIwhRqdTdPYSQanE9Vv5qikdSHioKvCEqotbdwQPBHxuJK+tOCAkUEKcNagxMXzKQiaJpYfvxfldYPw8wp2WQTdX1DZQx1om6xaFliU4f8yxK9Wr4HkHQcS2cpkhLLRn3uNQ1NIDPeRX33J0I4bg4/kqMlJfShlc5FasZlxxIiVyX96aP4WW;25:GlozS5HQVFRToPWeHMXEvDLwNUp8vXvYr9/YGbcZ/VR0wPdPfvkF6M5FjextBzfvEClU0GvjUpdpPsIn8MDCgdVuSXeGiIwrV/D97IQzDPZsDLdRvCxYH5gxFLpv+HJsD4t3vuQ3+Z9YGXFAOpZDsrVweoqyT73t5+yFxPBiorgoI4/ivWYF54x5gbVVHK1dZBF5d8K2hTuBMd60reNXcM9SpEtNbuxEmmKJb58Ripgr/LHYXkfVkGSVCH5Nuj4CxADGD3pf3a7EQ31eaQhWjlc+zwnCbRDf5CthvAXmkFKVn7hG+Kmb73j2VbOmgBQ97mC5Fv1YqkfEMmoUt+Z2Hg==;31:c1K0Vp6olPg9nOU7TcCA+oONspvUjA7NtommHyG4tj+nlYPh4yhahE9sbG6s+Kt80o4lsp6IIV8GhD5nRk8tcsnsXdcyBwZDt3jQmWxk5f4kfTlMfn1rfc6KyznTH8rWNMy9QoNM2HO/3S/4KggbLh7RP8/spQb28bAdVQetWwj5d8eR/J4MAZV3c/w9FaQ7HEVYQ/78xYshABt3baF9ksyqp51ozJdXgivAJ6gZpPE= X-MS-TrafficTypeDiagnostic: CO2PR04MB2167: X-Microsoft-Exchange-Diagnostics: 1;CO2PR04MB2167;20:Ll6x3RokIszxl4skRzKbpy4kZz6mveLYEXkbtVUdentjsYt1Gb5ubI7aT5JakwFJLQgrO8/o9h0gZIewIK9QfITKzaFJZwVNd8GVGBBAedU365OrVxfE3xqKlM0Utcx3B7dXycX7BbPplywb5AQXnX+DCYLjBnmp1zIx27b5ufTDlkmWJqzZLyRU256RibnrdrE1SSlZD4CIV/nTUPF4cth3/ZaEWDS04JQgJBcYSmmevYeTrzjCX7LNWlzbO6piK8UM+RMFTrT8EUFGDCVhOwHq2vkdJfAU8kCyFPQvvuJYbyHs4cwD6tTMOEIPCEGr7nkbKJFbLrp+UE3zXGMzZd85Pfqs4QF+fncK6zRwbd7y2yQOa7YdzkcSKrLtcxbEU2DQqdaBG9pWtfrJ6P8rijuyB2fDfrkYtQijsVbIjXghWqsHhccuyxyQOGcZF8kFMi8YhTU+EZRnW50N1gQRZR8W6j/aDh/yQNc5ay4y3M14yDQ9bgcagodMx/R74HrL;4:RWsn/GVKBc3nT7sKk8JpNwis0ndBQ1E2UOwjEgInr+COD+JfKRnlJ6ytwB4VNFhUMFrP6pSCWWkscUIImnqn0vyz9fhfnMYT30WRJbb6ZVx9M01mTzwFPlv27oT3kz+fLDlTlXCyDmp0a0RVMrX1sNXD6SvRenI7c5o42gaA6nUODWe/Wga+7aD9zw8uwQhwbfhuG2ohJUjwtkycpvC6r3hiNk3Hqnvubfg2seQ3u9CjYOWxLZwvZXSn7bMK1vyqmbygvgzh0D6NeO6vOQ3V1k7wUwgX2SO2c7HnRgrh5zY= X-Exchange-Antispam-Report-Test: UriScan:(55037057525728); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(93006095)(93001095)(100000703101)(100105400095)(10201501046)(3002001)(6041248)(20161123560025)(20161123558100)(20161123564025)(20161123555025)(201703131423075)(201702281529075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:CO2PR04MB2167;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:CO2PR04MB2167; X-Forefront-PRVS: 040655413E X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(4630300001)(7370300001)(6009001)(39860400002)(199003)(189002)(2906002)(75432002)(6666003)(47776003)(88552002)(53936002)(97736004)(4326008)(5003940100001)(48376002)(50466002)(66066001)(7350300001)(42186005)(101416001)(53416004)(50226002)(5660300001)(50986999)(6506006)(105586002)(189998001)(69596002)(68736007)(110136004)(106356001)(33646002)(6512007)(8676002)(305945005)(6486002)(36756003)(3846002)(7736002)(6116002)(25786009)(478600001)(81156014)(81166006)(86362001)(1076002)(403724002);DIR:OUT;SFP:1101;SCL:1;SRVR:CO2PR04MB2167;H:garnet.amanokami.net;FPR:;SPF:None;PTR:InfoNoRecords;A:1;MX:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1;CO2PR04MB2167;23:RPfH70bJGZzyThuvOM1VxX6xcYM25yxABu+/90fh4?= =?us-ascii?Q?PFzKThgyok/H7nvnnU+7DdirmWf8NOTnyyULAI1+wjUZ+Ipnl0OF5HxLoDZr?= =?us-ascii?Q?NEiBgwxVd5/9S6RWveoo/5eigpn2viWG68FtPg+0gjQ5RZxCgiJXeCxxfwz5?= =?us-ascii?Q?V1dk9R57HMbw1nZil/tD/4BgawzcAjPZsDHaRGGoK/KnVN0MCM7W2ZLUrbyM?= =?us-ascii?Q?RvTqw4/ocTsiq9p8TSx/Bl5Gwl36aTt8uRyB3OCBa3XoiG2bYz5q31gF3CaV?= =?us-ascii?Q?tZtVs5B0LdLh4p5jCiBGGHtLFLCvyC8jNQ0nm41LuuSvQHwVBzKvWPSD6YQl?= =?us-ascii?Q?Ry/G+2cm61k+enNCxGSgXamHZBJog7LK3Ex9z/otHKXVr9efC6z6u5JjuW0f?= =?us-ascii?Q?oJc389CqBqH4DFBb9LoEwGTDZke+RkMWiID7ZBLtfkdc4llsXJA0n8EAs5U9?= =?us-ascii?Q?XOXNdJMfVj6GtnqJHlHWPtvOoS8CyU6D6cOKgOyZ6pIcABqSUTSSDYiVuAbj?= =?us-ascii?Q?NwQ3eUlzqfjcJEoJdNQ4TLb11BX0rVf+LYWc8hTfDaD5IF5b5/L0CK6SVwAJ?= =?us-ascii?Q?WQApASBI/fYKSA1p5TtEk73qm4RLQsDcFtRPC3fd1jhmSpxrbbW8Fo7TdDWy?= =?us-ascii?Q?VYosgK79vdapEgJXu5UJ3WnSrWRZiiyPCiUae5U4cTfHrco/x0fQjj6Rsqzk?= =?us-ascii?Q?d3LAHetXUjz8fjlWrFeOOaSg5LRdKbgHLqxvFPKm67O3zP+8Dtfh8b5O85Tn?= =?us-ascii?Q?2doWH6gOkbC61Nob8zpw93ToftWbTki9LKcDNei4bpEV0RLdxLctvatMIAUZ?= =?us-ascii?Q?E1SPe8B3EaQzXq/J/wfBhJLB8WwF9hN0RISP4JxIHCxxLW3XRF+cC/0OtBMU?= =?us-ascii?Q?WoS0XVb/zLyRLhpB957mXI2DbqKtmXi8504SWMA8uDbFkNv69D05/DOP0Wn7?= =?us-ascii?Q?kD+Q6rgdesCtn1IoqQ5r6hi9MCj0dGy8rj5Syxui99kxqGy7fsbzNzYdW4C9?= =?us-ascii?Q?RVrt6bCoknIFrHj2TggoDQUD0yQj6y90TfPgCSnj+Pe4Ja9jdT7CoyfGOyhZ?= =?us-ascii?Q?j5AAQaLBam8M0fbCThvQ0J5FTl8nAPxviEeWypV82TkfdHu1KpDQcWAjs81u?= =?us-ascii?Q?lnXxRVOpmSsce5PpaFu/TA2ctvfAj+9QQjkgs3oWNzF8nUzzjt2wQ=3D=3D?= X-Microsoft-Exchange-Diagnostics: 1;CO2PR04MB2167;6:/T8fxp40lndXlCMuXFYXK7DCs75XNa5K6s8im+deD1lc9HnMVxsM+687dxPtp21sE6brVSVxZCwfWyqWwaqFm5sYNlcxWigbHND5Bad0BRZneZNiTlI3ioVQvah93ALusF38tH/GHZQg7bGq/Ip/TSFMnk87HZrV5eaS9HFPgs4I+WYHmOwpaQuIxLFyKr0nJ+NBnIVQ0hjRO/5cvYvXPtGoTlJkDXmqmfvwxLu4cEC4Q5kae3rVIilstzEcNJq7dgJuuMDu12hbNeFz7xltnpaMS9ZviHllz5YfNdb0ARmzGgDvFr84gF+v9UtMMZNO6h11TJG7o4a0q937YY2oaw==;5:K6lZGJQ6TR0mV2Fa4pE0c6VRtlrcWmyMSH2X4b+xoYf43sEBeyAx1ETIyUhEjqcPVWyMxA4pSjJHwdxFD8FnQWs9+1zONj6kPImizZkMMa5zo21rHT/71ZLUWCU5tiX8vlH2a5/5pDw8xWi8JL9fDg==;24:EYE05aD8WXf407CNLW6fkWqIk5P7IU/mYpR9yaqZvUfzOnH5nt5P5hArLqS9YYJtZLI+vSlkHofQU3VALYwDS/PanP4S8y5o5t8qqqKCTs8=;7:Yqbi7wjKCIWisIrZth2vwOfBk+KgaSdapRbMxp3uBWFdCevvC2iYwGYmn/12wksl1a4yUX3kzQEaweiZTnyuw53ky4kkg6GagfTYfTN/bAgfRWsFk5MmGwVQ6nzSgrVc49RDol7mE3Ea/i+gFQgu8p/klMHgfuv7A1RztSXoE6aj8+3MQUrowKhTrpKN7BiN+cd6mgT9LPQkDc/rWPmblBQYnzdHDEifp0/wqjKFM+Y= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: pitt.edu X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Aug 2017 02:59:44.7632 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR04MB2167 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 13231 Lines: 340 Convert exec test output to TAP13 format, using the ksft framework. Signed-off-by: Paul Elder --- Changes from v1: Fixed a couple coding style errors and changed a forgotten printf() to ksft_print_msg() tools/testing/selftests/exec/execveat.c | 151 ++++++++++++++++++-------------- 1 file changed, 83 insertions(+), 68 deletions(-) diff --git a/tools/testing/selftests/exec/execveat.c b/tools/testing/selftests/exec/execveat.c index 8d5d1d2ee7c1..de28050019d3 100644 --- a/tools/testing/selftests/exec/execveat.c +++ b/tools/testing/selftests/exec/execveat.c @@ -20,6 +20,8 @@ #include #include +#include "../kselftest.h" + static char longpath[2 * PATH_MAX] = ""; static char *envp[] = { "IN_TEST=yes", NULL, NULL }; static char *argv[] = { "execveat", "99", NULL }; @@ -41,23 +43,27 @@ static int _check_execveat_fail(int fd, const char *path, int flags, int expected_errno, const char *errno_str) { int rc; + char msg[512]; + + snprintf(msg, sizeof(msg), "Check failure of execveat(%d, '%s', %d) with %s...\n", + fd, path?:"(null)", flags, errno_str); errno = 0; - printf("Check failure of execveat(%d, '%s', %d) with %s... ", - fd, path?:"(null)", flags, errno_str); rc = execveat_(fd, path, argv, envp, flags); if (rc > 0) { - printf("[FAIL] (unexpected success from execveat(2))\n"); + ksft_test_result_fail(msg); + ksft_print_msg("unexpected success from execveat(2)\n"); return 1; } if (errno != expected_errno) { - printf("[FAIL] (expected errno %d (%s) not %d (%s)\n", + ksft_test_result_fail(msg); + ksft_print_msg("expected errno %d (%s) not %d (%s)\n", expected_errno, strerror(expected_errno), errno, strerror(errno)); return 1; } - printf("[OK]\n"); + ksft_test_result_pass(msg); return 0; } @@ -68,43 +74,48 @@ static int check_execveat_invoked_rc(int fd, const char *path, int flags, int rc; pid_t child; int pathlen = path ? strlen(path) : 0; + char msg[512]; if (pathlen > 40) - printf("Check success of execveat(%d, '%.20s...%s', %d)... ", + snprintf(msg, sizeof(msg), "Check success of execveat(%d, '%.20s...%s', %d)...\n", fd, path, (path + pathlen - 20), flags); else - printf("Check success of execveat(%d, '%s', %d)... ", + snprintf(msg, sizeof(msg), "Check success of execveat(%d, '%s', %d)...\n", fd, path?:"(null)", flags); child = fork(); if (child < 0) { - printf("[FAIL] (fork() failed)\n"); + ksft_test_result_fail(msg); + ksft_print_msg("fork() failed\n"); return 1; } if (child == 0) { /* Child: do execveat(). */ rc = execveat_(fd, path, argv, envp, flags); - printf("[FAIL]: execveat() failed, rc=%d errno=%d (%s)\n", + ksft_exit_fail_msg("execveat() failed, rc=%d errno=%d (%s)\n", rc, errno, strerror(errno)); exit(1); /* should not reach here */ } /* Parent: wait for & check child's exit status. */ rc = waitpid(child, &status, 0); if (rc != child) { - printf("[FAIL] (waitpid(%d,...) returned %d)\n", child, rc); + ksft_test_result_fail(msg); + ksft_print_msg("waitpid(%d,...) returned %d\n", child, rc); return 1; } if (!WIFEXITED(status)) { - printf("[FAIL] (child %d did not exit cleanly, status=%08x)\n", + ksft_test_result_fail(msg); + ksft_print_msg("child %d did not exit cleanly, status=%08x\n", child, status); return 1; } if ((WEXITSTATUS(status) != expected_rc) && (WEXITSTATUS(status) != expected_rc2)) { - printf("[FAIL] (child %d exited with %d not %d nor %d)\n", + ksft_test_result_fail(msg); + ksft_print_msg("child %d exited with %d not %d nor %d\n", child, WEXITSTATUS(status), expected_rc, expected_rc2); return 1; } - printf("[OK]\n"); + ksft_test_result_pass(msg); return 0; } @@ -127,7 +138,7 @@ static int open_or_die(const char *filename, int flags) int fd = open(filename, flags); if (fd < 0) { - printf("Failed to open '%s'; " + ksft_exit_fail_msg("Failed to open '%s'; " "check prerequisites are available\n", filename); exit(1); } @@ -180,11 +191,11 @@ static int check_execveat_pathmax(int dot_dfd, const char *src, int is_script) */ fd = open(longpath, O_RDONLY); if (fd > 0) { - printf("Invoke copy of '%s' via filename of length %zu:\n", + ksft_print_msg("Invoke copy of '%s' via filename of length %zu:\n", src, strlen(longpath)); fail += check_execveat(fd, "", AT_EMPTY_PATH); } else { - printf("Failed to open length %zu filename, errno=%d (%s)\n", + ksft_print_msg("Failed to open length %zu filename, errno=%d (%s)\n", strlen(longpath), errno, strerror(errno)); fail++; } @@ -234,11 +245,13 @@ static int run_tests(void) int fd_cloexec = open_or_die("execveat", O_RDONLY|O_CLOEXEC); int fd_script_cloexec = open_or_die("script", O_RDONLY|O_CLOEXEC); + ksft_print_header(); + /* Check if we have execveat at all, and bail early if not */ errno = 0; execveat_(-1, NULL, NULL, NULL, 0); if (errno == ENOSYS) { - printf("[FAIL] ENOSYS calling execveat - no kernel support?\n"); + ksft_print_msg("[FAIL] ENOSYS calling execveat - no kernel support?\n"); return 1; } @@ -247,115 +260,115 @@ static int run_tests(void) /* Normal executable file: */ /* dfd + path */ - fail += check_execveat(subdir_dfd, "../execveat", 0); - fail += check_execveat(dot_dfd, "execveat", 0); - fail += check_execveat(dot_dfd_path, "execveat", 0); + check_execveat(subdir_dfd, "../execveat", 0); + check_execveat(dot_dfd, "execveat", 0); + check_execveat(dot_dfd_path, "execveat", 0); /* absolute path */ - fail += check_execveat(AT_FDCWD, fullname, 0); + check_execveat(AT_FDCWD, fullname, 0); /* absolute path with nonsense dfd */ - fail += check_execveat(99, fullname, 0); + check_execveat(99, fullname, 0); /* fd + no path */ - fail += check_execveat(fd, "", AT_EMPTY_PATH); + check_execveat(fd, "", AT_EMPTY_PATH); /* O_CLOEXEC fd + no path */ - fail += check_execveat(fd_cloexec, "", AT_EMPTY_PATH); + check_execveat(fd_cloexec, "", AT_EMPTY_PATH); /* O_PATH fd */ - fail += check_execveat(fd_path, "", AT_EMPTY_PATH); + check_execveat(fd_path, "", AT_EMPTY_PATH); /* Mess with executable file that's already open: */ /* fd + no path to a file that's been renamed */ rename("execveat.ephemeral", "execveat.moved"); - fail += check_execveat(fd_ephemeral, "", AT_EMPTY_PATH); + check_execveat(fd_ephemeral, "", AT_EMPTY_PATH); /* fd + no path to a file that's been deleted */ unlink("execveat.moved"); /* remove the file now fd open */ - fail += check_execveat(fd_ephemeral, "", AT_EMPTY_PATH); + check_execveat(fd_ephemeral, "", AT_EMPTY_PATH); /* Mess with executable file that's already open with O_PATH */ /* fd + no path to a file that's been deleted */ unlink("execveat.path.ephemeral"); - fail += check_execveat(fd_ephemeral_path, "", AT_EMPTY_PATH); + check_execveat(fd_ephemeral_path, "", AT_EMPTY_PATH); /* Invalid argument failures */ - fail += check_execveat_fail(fd, "", 0, ENOENT); - fail += check_execveat_fail(fd, NULL, AT_EMPTY_PATH, EFAULT); + check_execveat_fail(fd, "", 0, ENOENT); + check_execveat_fail(fd, NULL, AT_EMPTY_PATH, EFAULT); /* Symlink to executable file: */ /* dfd + path */ - fail += check_execveat(dot_dfd, "execveat.symlink", 0); - fail += check_execveat(dot_dfd_path, "execveat.symlink", 0); + check_execveat(dot_dfd, "execveat.symlink", 0); + check_execveat(dot_dfd_path, "execveat.symlink", 0); /* absolute path */ - fail += check_execveat(AT_FDCWD, fullname_symlink, 0); + check_execveat(AT_FDCWD, fullname_symlink, 0); /* fd + no path, even with AT_SYMLINK_NOFOLLOW (already followed) */ - fail += check_execveat(fd_symlink, "", AT_EMPTY_PATH); - fail += check_execveat(fd_symlink, "", + check_execveat(fd_symlink, "", AT_EMPTY_PATH); + check_execveat(fd_symlink, "", AT_EMPTY_PATH|AT_SYMLINK_NOFOLLOW); /* Symlink fails when AT_SYMLINK_NOFOLLOW set: */ /* dfd + path */ - fail += check_execveat_fail(dot_dfd, "execveat.symlink", + check_execveat_fail(dot_dfd, "execveat.symlink", AT_SYMLINK_NOFOLLOW, ELOOP); - fail += check_execveat_fail(dot_dfd_path, "execveat.symlink", + check_execveat_fail(dot_dfd_path, "execveat.symlink", AT_SYMLINK_NOFOLLOW, ELOOP); /* absolute path */ - fail += check_execveat_fail(AT_FDCWD, fullname_symlink, + check_execveat_fail(AT_FDCWD, fullname_symlink, AT_SYMLINK_NOFOLLOW, ELOOP); /* Shell script wrapping executable file: */ /* dfd + path */ - fail += check_execveat(subdir_dfd, "../script", 0); - fail += check_execveat(dot_dfd, "script", 0); - fail += check_execveat(dot_dfd_path, "script", 0); + check_execveat(subdir_dfd, "../script", 0); + check_execveat(dot_dfd, "script", 0); + check_execveat(dot_dfd_path, "script", 0); /* absolute path */ - fail += check_execveat(AT_FDCWD, fullname_script, 0); + check_execveat(AT_FDCWD, fullname_script, 0); /* fd + no path */ - fail += check_execveat(fd_script, "", AT_EMPTY_PATH); - fail += check_execveat(fd_script, "", + check_execveat(fd_script, "", AT_EMPTY_PATH); + check_execveat(fd_script, "", AT_EMPTY_PATH|AT_SYMLINK_NOFOLLOW); /* O_CLOEXEC fd fails for a script (as script file inaccessible) */ - fail += check_execveat_fail(fd_script_cloexec, "", AT_EMPTY_PATH, + check_execveat_fail(fd_script_cloexec, "", AT_EMPTY_PATH, ENOENT); - fail += check_execveat_fail(dot_dfd_cloexec, "script", 0, ENOENT); + check_execveat_fail(dot_dfd_cloexec, "script", 0, ENOENT); /* Mess with script file that's already open: */ /* fd + no path to a file that's been renamed */ rename("script.ephemeral", "script.moved"); - fail += check_execveat(fd_script_ephemeral, "", AT_EMPTY_PATH); + check_execveat(fd_script_ephemeral, "", AT_EMPTY_PATH); /* fd + no path to a file that's been deleted */ unlink("script.moved"); /* remove the file while fd open */ - fail += check_execveat(fd_script_ephemeral, "", AT_EMPTY_PATH); + check_execveat(fd_script_ephemeral, "", AT_EMPTY_PATH); /* Rename a subdirectory in the path: */ rename("subdir.ephemeral", "subdir.moved"); - fail += check_execveat(subdir_dfd_ephemeral, "../script", 0); - fail += check_execveat(subdir_dfd_ephemeral, "script", 0); + check_execveat(subdir_dfd_ephemeral, "../script", 0); + check_execveat(subdir_dfd_ephemeral, "script", 0); /* Remove the subdir and its contents */ unlink("subdir.moved/script"); unlink("subdir.moved"); /* Shell loads via deleted subdir OK because name starts with .. */ - fail += check_execveat(subdir_dfd_ephemeral, "../script", 0); - fail += check_execveat_fail(subdir_dfd_ephemeral, "script", 0, ENOENT); + check_execveat(subdir_dfd_ephemeral, "../script", 0); + check_execveat_fail(subdir_dfd_ephemeral, "script", 0, ENOENT); /* Flag values other than AT_SYMLINK_NOFOLLOW => EINVAL */ - fail += check_execveat_fail(dot_dfd, "execveat", 0xFFFF, EINVAL); + check_execveat_fail(dot_dfd, "execveat", 0xFFFF, EINVAL); /* Invalid path => ENOENT */ - fail += check_execveat_fail(dot_dfd, "no-such-file", 0, ENOENT); - fail += check_execveat_fail(dot_dfd_path, "no-such-file", 0, ENOENT); - fail += check_execveat_fail(AT_FDCWD, "no-such-file", 0, ENOENT); + check_execveat_fail(dot_dfd, "no-such-file", 0, ENOENT); + check_execveat_fail(dot_dfd_path, "no-such-file", 0, ENOENT); + check_execveat_fail(AT_FDCWD, "no-such-file", 0, ENOENT); /* Attempt to execute directory => EACCES */ fail += check_execveat_fail(dot_dfd, "", AT_EMPTY_PATH, EACCES); /* Attempt to execute non-executable => EACCES */ - fail += check_execveat_fail(dot_dfd, "Makefile", 0, EACCES); - fail += check_execveat_fail(fd_denatured, "", AT_EMPTY_PATH, EACCES); - fail += check_execveat_fail(fd_denatured_path, "", AT_EMPTY_PATH, + check_execveat_fail(dot_dfd, "Makefile", 0, EACCES); + check_execveat_fail(fd_denatured, "", AT_EMPTY_PATH, EACCES); + check_execveat_fail(fd_denatured_path, "", AT_EMPTY_PATH, EACCES); /* Attempt to execute nonsense FD => EBADF */ - fail += check_execveat_fail(99, "", AT_EMPTY_PATH, EBADF); - fail += check_execveat_fail(99, "execveat", 0, EBADF); + check_execveat_fail(99, "", AT_EMPTY_PATH, EBADF); + check_execveat_fail(99, "execveat", 0, EBADF); /* Attempt to execute relative to non-directory => ENOTDIR */ - fail += check_execveat_fail(fd, "execveat", 0, ENOTDIR); + check_execveat_fail(fd, "execveat", 0, ENOTDIR); - fail += check_execveat_pathmax(dot_dfd, "execveat", 0); - fail += check_execveat_pathmax(dot_dfd, "script", 1); - return fail; + check_execveat_pathmax(dot_dfd, "execveat", 0); + check_execveat_pathmax(dot_dfd, "script", 1); + return ksft_get_fail_cnt(); } static void prerequisites(void) @@ -393,7 +406,7 @@ int main(int argc, char **argv) /* Check expected environment transferred. */ if (!in_test || strcmp(in_test, "yes") != 0) { - printf("[FAIL] (no IN_TEST=yes in env)\n"); + ksft_print_msg("[FAIL] (no IN_TEST=yes in env)\n"); return 1; } @@ -405,8 +418,10 @@ int main(int argc, char **argv) if (verbose) envp[1] = "VERBOSE=1"; rc = run_tests(); - if (rc > 0) - printf("%d tests failed\n", rc); + if (rc) + ksft_exit_fail(); + else + ksft_exit_pass(); } return rc; } -- 2.11.0