Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753558AbdFVRJn (ORCPT ); Thu, 22 Jun 2017 13:09:43 -0400 Received: from resqmta-po-02v.sys.comcast.net ([96.114.154.161]:43986 "EHLO resqmta-po-02v.sys.comcast.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752392AbdFVRJl (ORCPT ); Thu, 22 Jun 2017 13:09:41 -0400 Reply-To: shuah@kernel.org Subject: Re: seccomp ptrace selftest failures with 4.4-stable [Was: Re: LTS testing with latest kselftests - some failures] To: Kees Cook , Sumit Semwal Cc: Andy Lutomirski , Brian Norris , "Luis R. Rodriguez" , Greg Kroah-Hartman , LKML , "# 3.4.x" , linux-kselftest@vger.kernel.org, Shuah Khan , Shuah Khan References: From: Shuah Khan Message-ID: <334e6a92-2d41-c9e1-c807-19e493f1af83@kernel.org> Date: Thu, 22 Jun 2017 11:09:38 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.1.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-CMAE-Envelope: MS4wfKSFGo31B3PdudRqK+x/9uNylnB0cbXPJqrnQyVpec3XIuQnkRuhhJoRu1F60u983qK14HwDz6x2cc8kHBINzylDPcrQ/HR07qVoSGXE3HyekfYZfjaK 14mpUj3JdsMdidmodamzV1goL0EiHKK6dDTOhfVymeYITcbM7Pn8ML8iQRxoSwzvrw4dgxdaEj5VEsba66m5DI+D3xbbCajwwiwndoZWDvycXAoWMhSW1FiI IgXJCEeE3efDIIplu1SjS3Mw1lB8kWgAhP7TKWIpfkEQ1Kr6UbG0mF/YWTmg+JZrmKEUbJvHbuIDdjrdEE+doYnDU7nC7izW7Yfmf8dGX2vX57/TOzIh2+3b 7HC9bryYtqxB99+l0WDJDzCyAXZYWSsCSd19GurS86uGL3lSRjaZ4V7zmXxgGlvgNJXyvo4g6hihXXjoMQWf1mq1dDC0A/7xUBCM4jHWNNaaOdbT646NpdyT v14iPCYc9yMLiKU2cL75JJkb/Yn2UCfFZk+sufjP6WNUJAWBxu1h68Qx3L8= Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1645 Lines: 36 On 06/22/2017 10:53 AM, Kees Cook wrote: > On Thu, Jun 22, 2017 at 9:18 AM, Sumit Semwal wrote: >> Hi Kees, Andy, >> >> On 15 June 2017 at 23:26, Sumit Semwal wrote: >>> 3. 'seccomp ptrace hole closure' patches got added in 4.7 [3] - >>> feature and test together. >>> - This one also seems like a security hole being closed, and the >>> 'feature' could be a candidate for stable backports, but Arnd tried >>> that, and it was quite non-trivial. So perhaps we'll need some help >>> from the subsystem developers here. >> >> Could you please help us sort this out? Our goal is to help Greg with >> testing stable kernels, and currently the seccomp tests fail due to >> missing feature (seccomp ptrace hole closure) getting tested via >> latest kselftest. >> >> If you feel the feature isn't a stable candidate, then could you >> please help make the test degrade gracefully in its absence? > > I don't really want to have that change be a backport -- it's quite > invasive across multiple architectures. > > I would say just add a kernel version check to the test. This is > probably not the only selftest that will need such things. :) Adding release checks to selftests is going to problematic for maintenance. Tests should fail gracefully if feature isn't supported in older kernels. Several tests do that now and please find a way to check for dependencies and feature availability and fail the test gracefully. If there is a test that can't do that for some reason, we can discuss it, but as a general rule, I don't want to see kselftest patches that check release. thanks, -- Shuah