From: David Howells <dhowells@redhat.com>
To: Serge Hallyn <serge.hallyn@canonical.com>
Cc: dhowells@redhat.com, eparis@redhat.com,
linux-security-module@vger.kernel.org, selinux@tycho.nsa.gov,
Oleg Nesterov <oleg@redhat.com>
Subject: Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec
Date: Wed, 04 May 2011 13:12:26 +0100 [thread overview]
Message-ID: <2560.1304511146@redhat.com> (raw)
In-Reply-To: <20110428200218.GB9186@hallyn.com>
Serge Hallyn <serge.hallyn@canonical.com> wrote:
> Have you run LTP
Okay... I've now run LTP with the patched (1st May) and unpatched (4th May)
kernel (attached is the diff between the logs).
Note that I forgot to load all the modules for the unpatched test, so that may
affect things.
I added fork13 to the skipfile for the second test as it doesn't seem to test
anything relevant to the matter at hand, but takes hours to complete.
Some tests failed with the patches removed but succeeded with the patches
applied, so I think I need to rerun LTP against the patched kernel with no
modules loaded for consistency.
So:
(*) fstatfs02 and fstatfs02_64 failed in the unpatched kernel.
(*) sched_getaffinity01 and proc01 failed in the patched kernel.
(*) su01 failed in both kernels, but differently.
(*) fork13 takes ages so is now skipped.
(*) pidns05 appears to be a broken test.
David
---
--- results/LTP_RUN_ON-2011_May_01-12h_13m_07s.log 2011-05-02 20:10:58.000000000 +0100
+++ results/LTP_RUN_ON-2011_May_04-00h_50m_25s.log 2011-05-04 10:45:58.000000000 +0100
@@ -1,4 +1,4 @@
-Test Start Time: Sun May 1 12:13:07 2011
+Test Start Time: Wed May 4 00:50:27 2011
-----------------------------------------
Testcase Result Exit Value
-------- ------ ----------
@@ -226,7 +226,6 @@
fork09 PASS 0
fork10 PASS 0
fork11 PASS 0
-fork13 PASS 0
fpathconf01 PASS 0
fstat01 PASS 0
fstat01_64 PASS 0
@@ -242,8 +241,8 @@
fstatat01_64 PASS 0
fstatfs01 PASS 0
fstatfs01_64 PASS 0
-fstatfs02 PASS 0
-fstatfs02_64 PASS 0
+fstatfs02 FAIL 1
+fstatfs02_64 FAIL 1
fsync01 PASS 0
fsync02 PASS 0
fsync03 PASS 0
@@ -639,7 +638,7 @@
sched_setscheduler01 PASS 0
sched_setscheduler02 PASS 0
sched_yield01 PASS 0
-sched_getaffinity01 FAIL 1
+sched_getaffinity01 PASS 0
select01 PASS 0
select02 PASS 0
select03 PASS 0
@@ -1025,7 +1024,7 @@
lftest01 PASS 0
writetest01 PASS 0
fs_di PASS 0
-proc01 FAIL 2
+proc01 PASS 0
fs_racer PASS 0
quota_remount_test01 FAIL 2
fs_perms01 PASS 0
@@ -1204,7 +1203,7 @@
Cap_bounds PASS 0
FCNTL_LOCKTESTS PASS 0
Connectors PASS 0
-su01 FAIL 126
+su01 FAIL 1
cron02 PASS 0
cron_deny01 PASS 0
cron_allow01 PASS 0
@@ -1273,7 +1272,7 @@
ht_interrupt PASS 0
-----------------------------------------------
-Total Tests: 1272
+Total Tests: 1271
Total Failures: 51
Kernel Version: 2.6.39-rc5-fsdevel+
Machine Architecture: x86_64
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
next prev parent reply other threads:[~2011-05-04 12:12 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-04-21 14:30 [PATCH 0/9] Open loaders and interpreters with new creds during exec David Howells
2011-04-21 14:30 ` [PATCH 1/9] TOMOYO: Fix tomoyo_dentry_open() to use the right creds David Howells
2011-04-21 14:30 ` [PATCH 2/9] TOMOYO: Derive the new domain for an exec'd process in tomoyo_bprm_set_creds() David Howells
2011-04-21 14:30 ` [PATCH 3/9] LSM: Permit commit_creds() to take a const pointer David Howells
2011-04-21 14:30 ` [PATCH 4/9] LSM: Make the linux_binfmt creds pointer const and pass creds to bprm_set_creds David Howells
2011-04-21 14:30 ` [PATCH 5/9] LSM: Install the new credentials earlier in the exec procedure David Howells
2011-04-21 14:31 ` [PATCH 6/9] LSM: Pass linux_binprm pointer to kernel_read() so creds are available David Howells
2011-04-21 14:31 ` [PATCH 7/9] LSM: Allow an LSM to indicate that it wants bprm->file reopening with new creds David Howells
2011-04-21 14:31 ` [PATCH 8/9] LSM: Pass linux_binprm pointer to open_exec() so creds are available David Howells
[not found] ` <201104220225.p3M2PjJR020777@www262.sakura.ne.jp>
2011-04-28 15:27 ` David Howells
2011-04-21 14:31 ` [PATCH 9/9] LSM: Use derived creds for accessing an executable's interpreter and binary loader David Howells
2011-04-21 16:12 ` [PATCH 0/9] Open loaders and interpreters with new creds during exec Stephen Smalley
2011-04-21 16:30 ` Daniel J Walsh
2011-04-21 17:32 ` Casey Schaufler
2011-04-21 18:13 ` David Howells
2011-04-21 18:53 ` David Howells
[not found] ` <20110428200218.GB9186@hallyn.com>
2011-04-30 10:48 ` David Howells
2011-05-02 13:28 ` Stephen Smalley
2011-05-04 12:12 ` David Howells [this message]
2011-05-04 13:15 ` David Howells
[not found] ` <20110504144558.GC917@mail.hallyn.com>
2011-05-04 16:27 ` David Howells
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2560.1304511146@redhat.com \
--to=dhowells@redhat.com \
--cc=eparis@redhat.com \
--cc=linux-security-module@vger.kernel.org \
--cc=oleg@redhat.com \
--cc=selinux@tycho.nsa.gov \
--cc=serge.hallyn@canonical.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.