lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20081230134248.GA30124@lst.de>
Date:	Tue, 30 Dec 2008 14:42:48 +0100
From:	Christoph Hellwig <hch@....de>
To:	dhowells@...hat.com
Cc:	linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org
Subject: access(2) regressions in current mainline

Since the merge of the current git tree into the xfs tree I see a
regression in XFSQA 088:

088	 - output mismatch (see 088.out.bad)
--- 088.out	2008-12-30 12:01:09.000000000 +0000
+++ 088.out.bad	2008-12-30 13:37:24.000000000 +0000
@@ -1,9 +1,9 @@
 QA output created by 088
 access(TEST_DIR/t_access, 0) returns 0
-access(TEST_DIR/t_access, R_OK) returns 0
-access(TEST_DIR/t_access, W_OK) returns 0
+access(TEST_DIR/t_access, R_OK) returns -1
+access(TEST_DIR/t_access, W_OK) returns -1
 access(TEST_DIR/t_access, X_OK) returns -1
-access(TEST_DIR/t_access, R_OK | W_OK) returns 0
+access(TEST_DIR/t_access, R_OK | W_OK) returns -1
 access(TEST_DIR/t_access, R_OK | X_OK) returns -1
 access(TEST_DIR/t_access, W_OK | X_OK) returns -1
 access(TEST_DIR/t_access, R_OK | W_OK | X_OK) returns -1

Given that XFS uses bog-standard generic_permission and the creds merge
just happened I'd look for the cause there.  The source for the xfs
testcase is here:

	http://oss.sgi.com/cgi-bin/gitweb.cgi?p=xfs-cmds/.git;a=blob;f=xfstests/088;h=726ad009fd10cfde8c223f931e0994f596bcdc26;hb=HEAD

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ