From: David Howells <dhowells@redhat.com>
To: Serge Hallyn <serge.hallyn@canonical.com>
Cc: dhowells@redhat.com, eparis@redhat.com,
linux-security-module@vger.kernel.org, selinux@tycho.nsa.gov,
Oleg Nesterov <oleg@redhat.com>
Subject: Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec
Date: Wed, 04 May 2011 14:15:10 +0100 [thread overview]
Message-ID: <17835.1304514910@redhat.com> (raw)
In-Reply-To: <2560.1304511146@redhat.com>
David Howells <dhowells@redhat.com> wrote:
> So:
I reran these tests by hand.
> (*) fstatfs02 and fstatfs02_64 failed in the unpatched kernel.
Works when I run the test manually under the unpatched kernel. Looking back at
the saved stdout, I see:
fstatfs02 2 TFAIL : unexpected error - 38 : Function not implemented - expected 14
so it may have been run on a filesystem that doesn't support this, but I'm not
sure what.
> (*) sched_getaffinity01
Works fine now with no modules loaded in the patched kernel. Not sure what
the problem was.
> and proc01 failed in the patched kernel.
I remember now... I killed this during the original run since it seemed to be
endlessly redoing:
read(10, "\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0\6\0\0\0\0\0\0\0\6"..., 1024) = 1024
reading /proc/pid/task/tid/pagemap, but it can actually complete if left alone;
it just takes ages - it has one 64-bit entry per potential PTE[*] in a
process's VM space - and on a 64-bit machine that's a *lot* (~140 quadrillion
entries?).
> (*) su01 failed in both kernels, but differently.
Ah, yes. su01 failed in the original run with 126 because the "expect"
program wasn't installed. I install the rpm as soon as I saw it. I should've
restarted, I suppose.
Now it fails with exit 1 under both kernels because the su01_s1 expect script
reports:
YOU NEED TO SET ENVIROMENT VARIABLE PASSWD.
so that test is faulty.
David
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2011-05-04 13:15 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-04-21 14:30 [PATCH 0/9] Open loaders and interpreters with new creds during exec David Howells
2011-04-21 14:30 ` [PATCH 1/9] TOMOYO: Fix tomoyo_dentry_open() to use the right creds David Howells
2011-04-21 14:30 ` [PATCH 2/9] TOMOYO: Derive the new domain for an exec'd process in tomoyo_bprm_set_creds() David Howells
2011-04-21 14:30 ` [PATCH 3/9] LSM: Permit commit_creds() to take a const pointer David Howells
2011-04-21 14:30 ` [PATCH 4/9] LSM: Make the linux_binfmt creds pointer const and pass creds to bprm_set_creds David Howells
2011-04-21 14:30 ` [PATCH 5/9] LSM: Install the new credentials earlier in the exec procedure David Howells
2011-04-21 14:31 ` [PATCH 6/9] LSM: Pass linux_binprm pointer to kernel_read() so creds are available David Howells
2011-04-21 14:31 ` [PATCH 7/9] LSM: Allow an LSM to indicate that it wants bprm->file reopening with new creds David Howells
2011-04-21 14:31 ` [PATCH 8/9] LSM: Pass linux_binprm pointer to open_exec() so creds are available David Howells
[not found] ` <201104220225.p3M2PjJR020777@www262.sakura.ne.jp>
2011-04-28 15:27 ` David Howells
2011-04-21 14:31 ` [PATCH 9/9] LSM: Use derived creds for accessing an executable's interpreter and binary loader David Howells
2011-04-21 16:12 ` [PATCH 0/9] Open loaders and interpreters with new creds during exec Stephen Smalley
2011-04-21 16:30 ` Daniel J Walsh
2011-04-21 17:32 ` Casey Schaufler
2011-04-21 18:13 ` David Howells
2011-04-21 18:53 ` David Howells
[not found] ` <20110428200218.GB9186@hallyn.com>
2011-04-30 10:48 ` David Howells
2011-05-02 13:28 ` Stephen Smalley
2011-05-04 12:12 ` David Howells
2011-05-04 13:15 ` David Howells [this message]
[not found] ` <20110504144558.GC917@mail.hallyn.com>
2011-05-04 16:27 ` David Howells
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=17835.1304514910@redhat.com \
--to=dhowells@redhat.com \
--cc=eparis@redhat.com \
--cc=linux-security-module@vger.kernel.org \
--cc=oleg@redhat.com \
--cc=selinux@tycho.nsa.gov \
--cc=serge.hallyn@canonical.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.