Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751808AbdF0Pal (ORCPT ); Tue, 27 Jun 2017 11:30:41 -0400 Received: from out3-smtp.messagingengine.com ([66.111.4.27]:49945 "EHLO out3-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753195AbdF0PQB (ORCPT ); Tue, 27 Jun 2017 11:16:01 -0400 X-ME-Sender: X-Sasl-enc: 4NTjbgwxYe9nekVfCsgKglfLxcq5HHhmhcgQl40DZjDk 1498576559 Date: Tue, 27 Jun 2017 17:16:00 +0200 From: Greg KH To: Naresh Kamboju Cc: luto@kernel.org, keescook@chromium.org, Shuah Khan , linux-kselftest@vger.kernel.org, "linux-kernel@vger.kernel.org" Subject: Re: selftests/capabilities: test FAIL on linux mainline and linux-next and PASS on linux-4.4.70+ Message-ID: <20170627151600.GB11756@kroah.com> References: <20170627151359.GA11756@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170627151359.GA11756@kroah.com> User-Agent: Mutt/1.8.3 (2017-05-23) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2469 Lines: 67 On Tue, Jun 27, 2017 at 05:13:59PM +0200, Greg KH wrote: > On Tue, Jun 27, 2017 at 02:10:32PM +0530, Naresh Kamboju wrote: > > selftest capabilities test failed on linux mainline and linux-next and > > PASS on linux-4.4.70+ > > Odd. Any chance you can use 'git bisect' to track down the offending > commit? > > Does this also fail on x86 or any other platform you have available? > Let me go try this on my laptop... Ok, Linus's current tree (4.12.0-rc7+) also fails on this. I'm guessing it's failing, it's hard to understand the output. If only we had TAP output for this test :) [RUN] +++ Tests with uid == 0 +++ [NOTE] Using global UIDs for tests [RUN] Root => ep [OK] Capabilities after execve were correct [OK] Child succeeded [OK] Check cap_ambient manipulation rules [OK] PR_CAP_AMBIENT_RAISE failed on non-inheritable cap [OK] PR_CAP_AMBIENT_RAISE failed on non-permitted cap [OK] PR_CAP_AMBIENT_RAISE worked [OK] Basic manipulation appears to work [RUN] Root +i => eip [OK] Capabilities after execve were correct [OK] Child succeeded [RUN] UID 0 +ia => eipa [OK] Capabilities after execve were correct [OK] Child succeeded [RUN] Root +ia, suidroot => eipa [OK] Capabilities after execve were correct [OK] Child succeeded [RUN] Root +ia, suidnonroot => ip [FAIL] Wrong effective state (AT_SECURE is not set) [FAIL] Child failed [RUN] Root +ia, sgidroot => eipa [OK] Capabilities after execve were correct [OK] Child succeeded [RUN] Root, gid != 0, +ia, sgidroot => eip [FAIL] Wrong ambient state (AT_SECURE is not set) [FAIL] Child failed [RUN] Root +ia, sgidnonroot => eip [FAIL] Wrong ambient state (AT_SECURE is not set) [FAIL] Child failed [FAIL] Child failed [RUN] +++ Tests with uid != 0 +++ [NOTE] Using global UIDs for tests [RUN] Non-root => no caps [OK] Capabilities after execve were correct [OK] Child succeeded [OK] Check cap_ambient manipulation rules [OK] PR_CAP_AMBIENT_RAISE failed on non-inheritable cap [OK] PR_CAP_AMBIENT_RAISE failed on non-permitted cap [OK] PR_CAP_AMBIENT_RAISE worked [OK] Basic manipulation appears to work [RUN] Non-root +i => i [OK] Capabilities after execve were correct [OK] Child succeeded [RUN] UID 1 +ia => eipa [OK] Capabilities after execve were correct [OK] Child succeeded [RUN] Non-root +ia, sgidnonroot => i [FAIL] Wrong effective state (AT_SECURE is not set) [FAIL] Child failed