From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from picard.linux.it (picard.linux.it [213.254.12.146]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 6404FCF6497 for ; Mon, 30 Sep 2024 11:52:54 +0000 (UTC) Received: from picard.linux.it (localhost [IPv6:::1]) by picard.linux.it (Postfix) with ESMTP id ACB623C56A7 for ; Mon, 30 Sep 2024 13:52:52 +0200 (CEST) Received: from in-2.smtp.seeweb.it (in-2.smtp.seeweb.it [217.194.8.2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1)) (No client certificate requested) by picard.linux.it (Postfix) with ESMTPS id E02593C5661 for ; Mon, 30 Sep 2024 13:52:35 +0200 (CEST) Authentication-Results: in-2.smtp.seeweb.it; spf=pass (sender SPF authorized) smtp.mailfrom=suse.cz (client-ip=195.135.223.130; helo=smtp-out1.suse.de; envelope-from=chrubis@suse.cz; receiver=lists.linux.it) Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.223.130]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by in-2.smtp.seeweb.it (Postfix) with ESMTPS id A3DC5601490 for ; Mon, 30 Sep 2024 13:52:34 +0200 (CEST) Received: from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 7DC1A21A3C; Mon, 30 Sep 2024 11:52:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1727697153; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type; bh=/pnUAT53WPuScqS8657hEzD2/NsbLFYs+1LRgOYBBt0=; b=zFHgkkMOImtP8l/21m9DAB8/l4GSPmhKWShwEgOZDLDMyrxVtZkbTDfLH4IF6Sh8TnMIkJ ugmhzDyK1w1lwlfq4R6j+MBHW9tqKAdxpnjphEQOIa8OXOgzJkyhUczUT7sB/IMyoc9Zkn pgbTJlD75BB+dC+thJFdf/R03+Du4ag= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1727697153; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type; bh=/pnUAT53WPuScqS8657hEzD2/NsbLFYs+1LRgOYBBt0=; b=MuSKSdL3tZaWWb3Lb8q7aFppyOl2H5PJk08iywjeCx8KsMTvJx32nVKX68GNiGP61Hzo/I 8qqbOUjJTIOz+IAQ== Authentication-Results: smtp-out1.suse.de; dkim=pass header.d=suse.cz header.s=susede2_rsa header.b=zFHgkkMO; dkim=pass header.d=suse.cz header.s=susede2_ed25519 header.b=MuSKSdL3 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1727697153; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type; bh=/pnUAT53WPuScqS8657hEzD2/NsbLFYs+1LRgOYBBt0=; b=zFHgkkMOImtP8l/21m9DAB8/l4GSPmhKWShwEgOZDLDMyrxVtZkbTDfLH4IF6Sh8TnMIkJ ugmhzDyK1w1lwlfq4R6j+MBHW9tqKAdxpnjphEQOIa8OXOgzJkyhUczUT7sB/IMyoc9Zkn pgbTJlD75BB+dC+thJFdf/R03+Du4ag= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1727697153; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type; bh=/pnUAT53WPuScqS8657hEzD2/NsbLFYs+1LRgOYBBt0=; b=MuSKSdL3tZaWWb3Lb8q7aFppyOl2H5PJk08iywjeCx8KsMTvJx32nVKX68GNiGP61Hzo/I 8qqbOUjJTIOz+IAQ== Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id 6729613A8B; Mon, 30 Sep 2024 11:52:33 +0000 (UTC) Received: from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167]) by imap1.dmz-prg2.suse.org with ESMTPSA id 4rNuGAGR+mb+WwAAD6G6ig (envelope-from ); Mon, 30 Sep 2024 11:52:33 +0000 Date: Mon, 30 Sep 2024 13:51:32 +0200 From: Cyril Hrubis To: ltp@lists.linux.it, linux-kernel@vger.kernel.org, libc-alpha@sourceware.org Message-ID: MIME-Version: 1.0 Content-Disposition: inline X-Rspamd-Queue-Id: 7DC1A21A3C X-Spamd-Result: default: False [-4.51 / 50.00]; BAYES_HAM(-3.00)[100.00%]; NEURAL_HAM_LONG(-1.00)[-1.000]; R_DKIM_ALLOW(-0.20)[suse.cz:s=susede2_rsa,suse.cz:s=susede2_ed25519]; NEURAL_HAM_SHORT(-0.20)[-1.000]; MIME_GOOD(-0.10)[text/plain]; MX_GOOD(-0.01)[]; ARC_NA(0.00)[]; DKIM_SIGNED(0.00)[suse.cz:s=susede2_rsa,suse.cz:s=susede2_ed25519]; TO_MATCH_ENVRCPT_ALL(0.00)[]; FUZZY_BLOCKED(0.00)[rspamd.com]; FROM_HAS_DN(0.00)[]; DKIM_TRACE(0.00)[suse.cz:+]; MIME_TRACE(0.00)[0:+]; RCVD_COUNT_TWO(0.00)[2]; FROM_EQ_ENVFROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; TO_DN_NONE(0.00)[]; MISSING_XM_UA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCPT_COUNT_FIVE(0.00)[6] X-Rspamd-Server: rspamd2.dmz-prg2.suse.org X-Rspamd-Action: no action X-Virus-Scanned: clamav-milter 1.0.3 at in-2.smtp.seeweb.it X-Virus-Status: Clean Subject: [LTP] [ANNOUNCE] The Linux Test Project has been released for SEPTEMBER 2024 X-BeenThere: ltp@lists.linux.it X-Mailman-Version: 2.1.29 Precedence: list List-Id: Linux Test Project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: lwn@lwn.net, akpm@linux-foundation.org, torvalds@linux-foundation.org Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: ltp-bounces+ltp=archiver.kernel.org@lists.linux.it Sender: "ltp" Good news everyone, the Linux Test Project test suite stable release for *September 2024* has been released. Since the last release 266 patches by 47 authors were merged. Patch review is what most of the projects struggle with and LTP is no different. If you can spare some effort helping with the patch review is more than welcomed. NOTABLE CHANGES =============== * New tests - chown09 regression test for 5d1f903f75a8 ("attr: block mode changes of symlinks") - request_key06 Negative tests for request_key() syscall - signalfd02 Negative tests for signalfd() syscall - mseal02 Negative tests for mseal() syscall - hugeshmget06 A hugepage shm test - landlock07 Landlock Houdini reproducer aka CVE-2024-42318 - getcpu02 Negative tests for getcpu() syscall - landlock06 Tests for LANDLOCK_ACCESS_FS_IOCTL_DEV - landlock05 Tests for LONDLOCK_ACCESS_FS_REFER - landlock04 Tests that syscalls are enabled/disable accordingly to the ruleset - landlock03 Negative tests for landlock_restrict_self() syscall - landlock02 Negative tests for landlock_add_rule() syscall - landlock01 Negative tests for landlock_create_ruleset() syscall - mseal01 Tests that memory is protected from being changed after it's sealed - fchmodat2_02 Negative tests for fchmodat2() - fchmodat2_01 Tests for AT_SYMLINK_NOFOLLOW for fchmodat2() - cachestat04 Checks that cachestat() syscall either reports EBADF or zeroed statistics on all kinds of unsupported fds - cachestat03 Negative tests for cachestat() syscall - cachestat02 Basic cachestat tests with fd pointing to shared memory - cachestat01 Basic cachestat tests for regular files - shutdown01 Basic shutdown tests - shutdown02 Negative tests for shutdown() sycall * The symlink01 mess is being split into separate testcases - open15 A test that open() syscall works correctly with symlinks - lstat03 A basic lstat() test. - rename15 Tests that rename works correctly with symlinks - chmod08 Tests that chmod() works correctly with symlinks * Increased coverage - readdir and getdents tests were enabled to run on all supported filesystems after we found that bcachefs had sublty broken implementation - gedent02 Adds more negative tests - timer_settime01 Now checks for premature timer expiration as well - pkey01 Now includes tests for PKEY_DISABLE_EXECUTE - request_key01 Added more negative tests - acct02 Added more negative tests - prctl04 has been renamed to seccomp01 and now covers also the seccomp() syscall along with the older prctl(PR_SET_SECCOMP) calls - msync04 now uses direct I/O to verify that data have been written to disk * Rewritten tests - fork05 was rewritten and correctly reports TCONF on non i386 hardware - fcnt14 a file locking test was rewriten to generate subtests at runtime - sched_starvation now autocallibrates expected runtime based on CPU speed - sched_footbal was rewritten and is now executed as part of the sched runtest file * The test library now supports specifying mkfs and mount options per a filesystem * Bunch of checks for kernels older than 4.4 were removed from the tests since the currently minimal kernel version LTP supports is 4.4 * We have a new shell test library that: - makes shell code seamlessly interoperable with C - reuses most of the C test library - makes use shared memory to report test results - there are currently no tests using this library, we will start rewriting existing tests after the release * 3 testcases were converted to the new test library + The usual amount of fixes and cleanups REMOVED SCRIPTS AND FILES ========================= - Removed old and outdated man pages. - Removed ltpmenu an legacy script that was unmaintained for a decade. NOTABLE CHANGES IN NETWORK TESTS ================================ brought to you by Petr Vorel - nfsstat02.sh new test for per-NS NFS client statistics (checks that /proc/net/rpc/nfs exists in nested network namespaces) - nfsstat01.sh read client stats from netns rhost (fix for kernel 6.9, backported up to 5.10 so far) - nfs02.sh Added subtest for O_DIRECT KIRK ==== - Kirk has been update to 1.4 - Kirk can now be installed from pypi DOWNLOAD AND LINKS ================== The latest version of the test-suite contains 3000+ tests for the Linux and can be downloaded at: https://github.com/linux-test-project/ltp/releases/tag/20240930 The project pages as well as GIT repository are hosted on GitHub: https://github.com/linux-test-project/ltp If you ever wondered how to write a LTP testcase, don't miss our developer documentation at: https://linux-test-project.readthedocs.io/en/latest/developers/test_case_tutorial.html And our library API documentation at: https://linux-test-project.readthedocs.io/en/latest/developers/api_c_tests.html Patches, new tests, bugs, comments or questions should go to to our mailing list at ltp@lists.linux.it. CREDITS ======= Many thanks to the people contributing to this release: git shortlog -s -e -n 20240129.. 233 Petr Vorel 74 Andrea Cervesato 39 Martin Doucha 36 Li Wang 25 Cyril Hrubis 25 Yang Xu 22 Xinjian Ma (Fujitsu) 21 Wei Gao 15 Andrea Manzini 6 Avinesh Kumar 6 Edward Liaw 6 John Stultz 4 Hui Min Mina Chou 4 Jan Stancek 3 Andreas Schwab 3 Xiao Yang 3 lufei 2 Dennis Brendel 2 Jiwei Sun 2 Po-Hsu Lin 1 Ajay Kaher 1 Amir Goldstein 1 Chen Haonan 1 Chuck Lever 1 Detlef Riekenberg via ltp 1 Filippo Storniolo 1 Haifeng Xu 1 Jingyi Song 1 Khem Raj 1 Kuan-Ying Lee 1 Li Xiaosong 1 Madadi Vineeth Reddy 1 Mete Durlu 1 Murphy Zhou 1 Nirjhar Roy 1 Remi Peuvergne 1 Sachin P Bappalige 1 Samasth Norway Ananda 1 Sebastian Chlad 1 Sergey Ulanov via ltp 1 Shiyang Ruan 1 Shizhao Chen 1 Wenjie Xu 1 Xiangyu Chen 1 Yiwei Lin 1 Zizhi Wo 1 yangfeng And also thanks to patch reviewers: git log 20240129.. | grep -Ei '(reviewed|acked)-by:' | sed 's/.*by: //' | sort | uniq -c | sort -n -r 212 Petr Vorel 181 Cyril Hrubis 108 Li Wang 39 Avinesh Kumar 28 Andrea Cervesato 16 Martin Doucha 10 Jan Stancek 6 Jan Kara 4 Wei Gao 4 Richard Palethorpe 3 Marius Kittler 3 Amir Goldstein 2 Adrian Huang 1 Vlastimil Babka 1 Po-Hsu Lin 1 Matt Bobrowski 1 Kent Overstreet 1 Joerg Vehlow -- Cyril Hrubis chrubis@suse.cz -- Mailing list info: https://lists.linux.it/listinfo/ltp