All of lore.kernel.org
 help / color / mirror / Atom feed
From: David Howells <dhowells@redhat.com>
To: Serge Hallyn <serge.hallyn@canonical.com>
Cc: dhowells@redhat.com, eparis@redhat.com,
	linux-security-module@vger.kernel.org, selinux@tycho.nsa.gov,
	Oleg Nesterov <oleg@redhat.com>
Subject: Re: [PATCH 0/9] Open loaders and interpreters with new creds during exec
Date: Wed, 04 May 2011 13:12:26 +0100	[thread overview]
Message-ID: <2560.1304511146@redhat.com> (raw)
In-Reply-To: <20110428200218.GB9186@hallyn.com>

Serge Hallyn <serge.hallyn@canonical.com> wrote:

> Have you run LTP

Okay...  I've now run LTP with the patched (1st May) and unpatched (4th May)
kernel (attached is the diff between the logs).

Note that I forgot to load all the modules for the unpatched test, so that may
affect things.

I added fork13 to the skipfile for the second test as it doesn't seem to test
anything relevant to the matter at hand, but takes hours to complete.

Some tests failed with the patches removed but succeeded with the patches
applied, so I think I need to rerun LTP against the patched kernel with no
modules loaded for consistency.

So:

 (*) fstatfs02 and fstatfs02_64 failed in the unpatched kernel.

 (*) sched_getaffinity01 and proc01 failed in the patched kernel.

 (*) su01 failed in both kernels, but differently.

 (*) fork13 takes ages so is now skipped.

 (*) pidns05 appears to be a broken test.

David
---
--- results/LTP_RUN_ON-2011_May_01-12h_13m_07s.log	2011-05-02 20:10:58.000000000 +0100
+++ results/LTP_RUN_ON-2011_May_04-00h_50m_25s.log	2011-05-04 10:45:58.000000000 +0100
@@ -1,4 +1,4 @@
-Test Start Time: Sun May  1 12:13:07 2011
+Test Start Time: Wed May  4 00:50:27 2011
 -----------------------------------------
 Testcase                       Result     Exit Value
 --------                       ------     ----------
@@ -226,7 +226,6 @@
 fork09                         PASS       0    
 fork10                         PASS       0    
 fork11                         PASS       0    
-fork13                         PASS       0    
 fpathconf01                    PASS       0    
 fstat01                        PASS       0    
 fstat01_64                     PASS       0    
@@ -242,8 +241,8 @@
 fstatat01_64                   PASS       0    
 fstatfs01                      PASS       0    
 fstatfs01_64                   PASS       0    
-fstatfs02                      PASS       0    
-fstatfs02_64                   PASS       0    
+fstatfs02                      FAIL       1    
+fstatfs02_64                   FAIL       1    
 fsync01                        PASS       0    
 fsync02                        PASS       0    
 fsync03                        PASS       0    
@@ -639,7 +638,7 @@
 sched_setscheduler01           PASS       0    
 sched_setscheduler02           PASS       0    
 sched_yield01                  PASS       0    
-sched_getaffinity01            FAIL       1    
+sched_getaffinity01            PASS       0    
 select01                       PASS       0    
 select02                       PASS       0    
 select03                       PASS       0    
@@ -1025,7 +1024,7 @@
 lftest01                       PASS       0    
 writetest01                    PASS       0    
 fs_di                          PASS       0    
-proc01                         FAIL       2    
+proc01                         PASS       0    
 fs_racer                       PASS       0    
 quota_remount_test01           FAIL       2    
 fs_perms01                     PASS       0    
@@ -1204,7 +1203,7 @@
 Cap_bounds                     PASS       0    
 FCNTL_LOCKTESTS                PASS       0    
 Connectors                     PASS       0    
-su01                           FAIL       126  
+su01                           FAIL       1    
 cron02                         PASS       0    
 cron_deny01                    PASS       0    
 cron_allow01                   PASS       0    
@@ -1273,7 +1272,7 @@
 ht_interrupt                   PASS       0    
 
 -----------------------------------------------
-Total Tests: 1272
+Total Tests: 1271
 Total Failures: 51
 Kernel Version: 2.6.39-rc5-fsdevel+
 Machine Architecture: x86_64

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  parent reply	other threads:[~2011-05-04 12:12 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-04-21 14:30 [PATCH 0/9] Open loaders and interpreters with new creds during exec David Howells
2011-04-21 14:30 ` [PATCH 1/9] TOMOYO: Fix tomoyo_dentry_open() to use the right creds David Howells
2011-04-21 14:30 ` [PATCH 2/9] TOMOYO: Derive the new domain for an exec'd process in tomoyo_bprm_set_creds() David Howells
2011-04-21 14:30 ` [PATCH 3/9] LSM: Permit commit_creds() to take a const pointer David Howells
2011-04-21 14:30 ` [PATCH 4/9] LSM: Make the linux_binfmt creds pointer const and pass creds to bprm_set_creds David Howells
2011-04-21 14:30 ` [PATCH 5/9] LSM: Install the new credentials earlier in the exec procedure David Howells
2011-04-21 14:31 ` [PATCH 6/9] LSM: Pass linux_binprm pointer to kernel_read() so creds are available David Howells
2011-04-21 14:31 ` [PATCH 7/9] LSM: Allow an LSM to indicate that it wants bprm->file reopening with new creds David Howells
2011-04-21 14:31 ` [PATCH 8/9] LSM: Pass linux_binprm pointer to open_exec() so creds are available David Howells
     [not found]   ` <201104220225.p3M2PjJR020777@www262.sakura.ne.jp>
2011-04-28 15:27     ` David Howells
2011-04-21 14:31 ` [PATCH 9/9] LSM: Use derived creds for accessing an executable's interpreter and binary loader David Howells
2011-04-21 16:12 ` [PATCH 0/9] Open loaders and interpreters with new creds during exec Stephen Smalley
2011-04-21 16:30   ` Daniel J Walsh
2011-04-21 17:32 ` Casey Schaufler
2011-04-21 18:13   ` David Howells
2011-04-21 18:53 ` David Howells
     [not found] ` <20110428200218.GB9186@hallyn.com>
2011-04-30 10:48   ` David Howells
2011-05-02 13:28     ` Stephen Smalley
2011-05-04 12:12   ` David Howells [this message]
2011-05-04 13:15     ` David Howells
     [not found]     ` <20110504144558.GC917@mail.hallyn.com>
2011-05-04 16:27       ` David Howells

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2560.1304511146@redhat.com \
    --to=dhowells@redhat.com \
    --cc=eparis@redhat.com \
    --cc=linux-security-module@vger.kernel.org \
    --cc=oleg@redhat.com \
    --cc=selinux@tycho.nsa.gov \
    --cc=serge.hallyn@canonical.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.