Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp4030337pxb; Mon, 27 Sep 2021 07:59:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxJu1QKfX3oFKv3WLZIKpzgy9GYFCbn4cHmv7Lds0z1NDpAF4G/99N6lI+pAmbixxNMxEOv X-Received: by 2002:a17:90a:1c6:: with SMTP id 6mr431792pjd.194.1632754751065; Mon, 27 Sep 2021 07:59:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632754751; cv=none; d=google.com; s=arc-20160816; b=X9EmCip7W7lPDisYXpeo3HIRO69YKT/BMzUbZ3U9x3t7BqSQv+PK83Hb10PyGWgy+Z UQ/0CriZuRuXFRIh0Nllk2d5pWb/uB/DuPpZ3TUMcd1c/piHKue8cwIK6U/A9HmBizfh R9CewwC20ikcvjBvnz9XDL53AVVWmGfpUrc6jRuy+nObPGz0vDdCUmxOsfCDUc2WlCZ3 RihMhu8vvYqAN4/5oG8vXBTc1rmnEhCj2ZXA9iayIbWvzvbePos38o3JokG2LICze+hm zgsDrWuCTnY41SZ45SrZcRwQc4xX36hli/ipUmsgvvI4yckcwNdWWK83wyRCAWuEhuHw UWXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date:dkim-signature:dkim-signature; bh=NN5woYX1HSxN42OI/5IS/aTJL7XrsVlCfC35yzZdz8A=; b=tI8jEZdLQzlZD/5dEc11qfBzzDEiDkydBf96gBjeoxuCJKtPq3zPENLHqETZvKM5rX ek1ja4Bhk3dRcjpySeNuVKZosA3C1h/y4tQasnxlGA7jC14MAGzd4s1EoXmrNNlmu4I7 7icON4nIfU5Q1ndaG5HhfuToodLnToEXO2sVYPDgreGtirCCZYViQh86wQJGPiy9PLtF GTezKTwpLYwdY1LmgJxoGB993hMt2CeRwVFN0E9YnhX0hOFNTWoDGfDH/9j6vlncVP7g 17keJkbkEfIMLJIi4U/+jqPAZJ3ldjSlzu+iviUrlD7WLd4fOo9GQxJLLBKWKuQoGE3t YkIQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=vrILWlRF; dkim=neutral (no key) header.i=@suse.cz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id pf11si2183411pjb.30.2021.09.27.07.58.58; Mon, 27 Sep 2021 07:59:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=vrILWlRF; dkim=neutral (no key) header.i=@suse.cz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234904AbhI0O7e (ORCPT + 99 others); Mon, 27 Sep 2021 10:59:34 -0400 Received: from smtp-out2.suse.de ([195.135.220.29]:53442 "EHLO smtp-out2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234833AbhI0O7d (ORCPT ); Mon, 27 Sep 2021 10:59:33 -0400 Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 6F9BF1FEC5; Mon, 27 Sep 2021 14:57:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1632754674; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type; bh=NN5woYX1HSxN42OI/5IS/aTJL7XrsVlCfC35yzZdz8A=; b=vrILWlRFP6/4w9MWTvfLyqk1JnFfHlSYYeFeWVzsasoHbfNTfW9VECoFy0K5vSrsuF3ZCE mWr+1dHWbZZloopO5UDS+d8ZZjbQeFDhUNsHxQdh6Wqd3FplLKi/8OuHyN+IIiL2mR96ip ML/NDJD5H+A67yAP+Kqdb3oWckb23n0= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1632754674; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type; bh=NN5woYX1HSxN42OI/5IS/aTJL7XrsVlCfC35yzZdz8A=; b=tabYx24JiFVBdZ0hk72BXSVmlnWZNX5Ji+R32xNDbJH4M3hclu2QYrhgVsqOJlu7Nt+FEk htQ5ppJSAGqSiOCg== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 549D514007; Mon, 27 Sep 2021 14:57:54 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id TFwtE/LbUWGnSgAAMHmgww (envelope-from ); Mon, 27 Sep 2021 14:57:54 +0000 Date: Mon, 27 Sep 2021 16:58:29 +0200 From: Cyril Hrubis To: ltp@lists.linux.it, linux-kernel@vger.kernel.org, libc-alpha@sourceware.org Cc: lwn@lwn.net, akpm@linux-foundation.org, torvalds@linux-foundation.org Subject: [ANNOUNCE] The Linux Test Project has been released for SEPTEMBER 2021 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Good news everyone, the Linux Test Project test suite stable release for *September 2021* has been released. Since the last release 483 patches by 40 authors were merged. This is a record breaking release by the number of patches as well as by the amount of newly implemented functionality. Many thanks to all contributors! And even more thanks to the reviewers! Patch review is what most of the projects struggle with and LTP is no different. If you can spare some effort helping with the patch review is more than welcomed. NOTABLE CHANGES =============== * New tests - epoll_ctl05 checks for ELOOP error for circular loop of epolls - epoll_ctl04 checks for EINVAL when epoll nesting is too deep - epoll_ctl02 checks for EPERM when epoll is not supported for fd - epoll_create01 checks that epoll create returns a valid fd - epoll_create1_02 checks for EINVAL when epoll_create1() is passed invalid flags - epoll_pwait02 test if events are reported properly - epoll_pwait03 tests if epoll_pwait/epoll_pwait2 timeouts correctly - epoll_pwait04 adds tests for zero timeout and invalid timespec values - shmget05 test for /proc/sys/kernel/shm_next_id - shmget06 test when shm_next_id is already in use - io_getevents02 checks for EINVAL errors via libaio - io_cancel02 checks for EFAULT errors via libaio - io_submit03 checks for invalid input via syscall - io_submit02 checks if correct operation via syscall - io_setup02 checks for invalid inputs via syscall - io_destroy02 checks for invalid inputs via syscall - cfs_bandwidth01 a multi-level cgroup cpu controller test * New regression tests - creat09 privilege escalation using setgid directory aka CVE-2018-13405 - can_bcm01 race condition vulnerability in CAN BCM aka CVE-2021-3609 - setsockopt08 out-of-bounds write corrupting aka CVE-2021-22555 - perf_event_open03 kernel memory leak aka CVE-2020-25704 - squashfs01 regression test for broken sanity checks - set_mempolicy05 information leak aka CVE-2017-7616 - userns08 broken id mappings in nested namespaces CVE-2018-18955 - tc01.sh regression test for tc qdisc command - fanotify19 added regression test for: a8b98c808eab ("fanotify: fix permission model of unprivileged group") - kill13 INT_MIN negation reproducer aka CVE-2018-10124 - wait403 INT_MIN negation reproducer - vsock01 race condition reproducer aka CVE-2021-26708 - icmp_rate_limit01 DNS cache poisoning attack aka CVE-2020-25705 * Increased coverage - epoll_create02 checks for more EINVAL failures - epoll_ctl03 checks that the syscall works with all valid flags combinations - mbind01 more tests for MPOL_LOCAL - epoll_pwait01 adds test variants for epoll_pwait2() * 75 tests were rewritten to the new library * Removed tests - sched/stress as it was unmaintained and unused for years - stress_cd and stress_floppy since these scripts were broken and unmaintained for years - disktest as it was unmaintained and unused for years * The CI was moved from Travis to GitHub actions * 'make check' was introduced to the LTP build system - which is a tool for developers that runs various sanity checks on the source code - this includes: - checkpatch.pl, custom set of sparse rules for C - checkbashism.pl for shell - please make sure you run 'make check' or 'make check-testname' and fix the warnings before submitting patches * Subset of our library tests i.e. tests for the test library is now executed CI in github actions, this is ongoing effort to make sure that the test library used by the testcases is working as expected * The test library was fixed to print all messages to stderr * Testcases were fixed not to expect certain users and groups to be present on the system - some tests were expecting bin, daemon and similar groups and users to exist on the system - now LTP depends only on user 'nobody' and group 'nogroup' * New environment variable LTP_VIRT_OVERRIDE was added - this is meant as a quick workaround for cases where the test library cannot properly detect if system is virtualized or not - see https://github.com/linux-test-project/ltp/wiki/User-Guidelines * Fixed (again) timeouts in shell test library - turns out you cannot make timeouts in shell race-free so the timeout logic is now implemented in a small C helper binary * Finally after the years we are slowly making tests limits-aware - cgropup tests and a few others are now aware of pid limits imposed by the system - next step would be doing rough estimates on the number of processes we can run based on the free system memory * There is ongoing effort to fix LTP cgroup tests, this release includes many small fixes and improvements in the cgroup tests * The aarch64 system call table was fixed not to include 32bit only syscall numbers * The TST_EXP_*() macros were improved and a few bugs were fixed * The test library developer documentation and tutorials were reorganized and improved - https://github.com/linux-test-project/ltp/wiki/C-Test-API - https://github.com/linux-test-project/ltp/wiki/C-Test-Network-API - https://github.com/linux-test-project/ltp/wiki/Shell-Test-API + The more that the usual amount of fixes and cleanups WHAT IS IN THE QUEUE ==================== Next release will hopefully include runltp-ng which is new and improved LTP testrunner. The current runltp script will be maintained alongside with the new solution for some time but removed after a few releases. You are more than welcome to try it and make sure that it works for you before it becomes the official LTP testrunner. See: https://github.com/metan-ucw/runltp-ng NOTABLE CHANGES IN NETWORK TESTS ================================ brought to you by Petr Vorel * C network library - Added device management helpers - And documentation: https://github.com/linux-test-project/ltp/wiki/C-Test-Network-API * Shell network library - Allow to skip initialization with TST_NET_SKIP_VARIABLE_INIT=1 - Disable IPv6 Duplicate Address Detection on link-local addresses * Tests rewritten to the new library - getaddrinfo01 - ssh-stress * Removed tests - broken_ip-totlen + More busybox and general fixes DOWNLOAD AND LINKS ================== The latest version of the test-suite contains 3000+ tests for the Linux and can be downloaded at: https://github.com/linux-test-project/ltp/releases/tag/20210927 The project pages as well as GIT repository are hosted on GitHub: https://github.com/linux-test-project/ltp http://linux-test-project.github.io/ If you ever wondered how to write a LTP testcase, don't miss our developer documentation at: https://github.com/linux-test-project/ltp/wiki/Test-Writing-Guidelines https://github.com/linux-test-project/ltp/wiki/C-Test-API https://github.com/linux-test-project/ltp/wiki/C-Test-Network-API https://github.com/linux-test-project/ltp/wiki/Shell-Test-API https://github.com/linux-test-project/ltp/wiki/C-Test-Case-Tutorial https://github.com/linux-test-project/ltp/wiki/BuildSystem Patches, new tests, bugs, comments or questions should go to to our mailing list at ltp@lists.linux.it. CREDITS ======= Many thanks to the people contributing to this release: git shortlog -s -e -n 20210927.. 87 Petr Vorel 51 Xie Ziyao 51 Richard Palethorpe 50 Martin Doucha 30 Krzysztof Kozlowski 29 Cyril Hrubis 28 Alexey Kodanev 27 Yang Xu 20 Li Wang 18 zhanglianjie 17 Joerg Vehlow 12 Vinay Kumar 8 Xie Ziyao 7 sujiaxun 5 Bogdan Lezhepekov 5 Dai Shili 5 Jan Stancek 5 QI Fuli 4 Leo Liang 2 Alexander Egorenkov 2 Amir Goldstein 2 Shiyang Ruan 2 Thadeu Lima de Souza Cascardo 2 Zhao Gongyi 1 Alessio Balsini 1 Bogdan Lezhepekov via ltp 1 Cao jin 1 Egor Petrov 1 Ian May 1 John Stultz 1 Leo Yu-Chi Liang 1 Marius Hillenbrand 1 Naresh Kamboju 1 Radoslav Kolev 1 Wang Xin 1 Xiao Yang 1 Zou Wei 1 dongshijiang And also thanks to patch reviewers: git log 20210927.. | grep -Ei '(reviewed|acked)-by:' | sed 's/.*by: //' | sort | uniq -c | sort -n -r 289 Cyril Hrubis 113 Petr Vorel 75 Li Wang 25 Richard Palethorpe 16 Yang Xu 12 Alexey Kodanev 7 Jan Stancek 6 Richard Palethorpe 5 Xiao Yang 5 Martin Doucha 3 Joerg Vehlow 3 Enji Cooper 2 Krzysztof Kozlowski 1 Yang Xu 1 Stephen Kitt 1 Petr Vorel 1 Leo Yu-Chi Liang 1 Joerg Vehlow -- Cyril Hrubis chrubis@suse.cz