Received: by 2002:ab2:5c0e:0:b0:1ef:a325:1205 with SMTP id i14csp250943lqk; Thu, 14 Mar 2024 01:54:33 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWQMJHG0ybJG0lVuCVbxs28EZaeukfkMkzehAoCeNTUnV6Nd0LvdOjxTf3TX9UfuiyCB8mDELsmpbbdzg0kCI15Kf4lX7UMXwJiLpbcFQ== X-Google-Smtp-Source: AGHT+IG1bNRwTFxxg6FBndK2q09kbVz0qG3KzDgcuZGIDRWFwEq/bLXCdqtP9KWMDFavuUVHUtxd X-Received: by 2002:aca:2219:0:b0:3c1:f571:f5b0 with SMTP id b25-20020aca2219000000b003c1f571f5b0mr40752oic.49.1710406473066; Thu, 14 Mar 2024 01:54:33 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1710406473; cv=pass; d=google.com; s=arc-20160816; b=IuzF80nGiyVX0NrBxGnR9e9CbPkfSW4XJoQV9w961zzd6MHuBPe5ggI39Wh4m+rGMb IX4+mA9iWy8VgnPKX/YEmEH92WlTesky/y0BNhF9B66YxeFRrG3VtzzeQAwt7AVMhm5W 2xomGf3HAqASNhlbeBuP8BbBCxc0EBYDM5QAaCbTb5NrJCLBYmvpVLuMqlMpDpUS7eTg QfB9+gqbj1M1pnXBWzfD85Ba2VyGYjKRzcsFRUVWDBHc6eOhdLMkQi7kQM7gY3m3BmUB p8W7DTDOm0/flYWcOKYte8MLN/ARJyV2U889b7u2zXwuYgjOrb6r41u/D8d/lsbi20yv v05w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:to :content-language:subject:cc:user-agent:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:date:message-id :dkim-signature; bh=7tQw2ERd9IuEhQNPrM+KrNK4Se7Ufikq8Ju0dETI9Bw=; fh=yk7We/4w4HlTEfIvKoQsTD4nkfGcUAOi6qczpCi42fo=; b=ZZnjL9Cdevo9PeZvXMruU36Jj6zs+umwbEAXgylj9KLaDnA+e7qPhg7CLLywSXl2z7 Fl5EWshNL9ERtLTag5zwMwBBxIkxKZZQB2R11kOddqTlsyK5QTu8heDYLLwvoTf51Dkf XYQwlxQ2QkmkhXS17Ljfr99YIMghVQthYH4mggOr7GEr939U46uFmaWhByKJ/RQXCGEv JJ4MFq6j/Op7UDOJgg+MN1AYkNDgytkAuIXXH8ITh8WPiAh3vMVWv31ES5TxSZvgweDP L/5IGFEX8mntvrdITBgZLO6VBX2j95U7pUTpsOqy5xd6ik/Uep3VJPVFnaoib8ASceVK Mrzg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@collabora.com header.s=mail header.b=kZVhG8GF; arc=pass (i=1 spf=pass spfdomain=collabora.com dkim=pass dkdomain=collabora.com dmarc=pass fromdomain=collabora.com); spf=pass (google.com: domain of linux-kernel+bounces-103012-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-103012-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=collabora.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id p24-20020a05620a22b800b0078828ea4568si1067779qkh.429.2024.03.14.01.54.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 14 Mar 2024 01:54:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-103012-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@collabora.com header.s=mail header.b=kZVhG8GF; arc=pass (i=1 spf=pass spfdomain=collabora.com dkim=pass dkdomain=collabora.com dmarc=pass fromdomain=collabora.com); spf=pass (google.com: domain of linux-kernel+bounces-103012-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-103012-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=collabora.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id C26B51C2154A for ; Thu, 14 Mar 2024 08:54:32 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 36DF36BB5E; Thu, 14 Mar 2024 08:54:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=collabora.com header.i=@collabora.com header.b="kZVhG8GF" Received: from madrid.collaboradmins.com (madrid.collaboradmins.com [46.235.227.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3977643ADD; Thu, 14 Mar 2024 08:54:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=46.235.227.194 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710406466; cv=none; b=TlZJBwbR9+zzxo9V64H3bc0kbveW0KdBQPV3j+yhYnsJTztwirXzCFOOZQxHGl+Gm8nxGzyzbDQEcAO5+cVsTWKar6TUucWm6E8wHyGBik9NW9oBPo2vE9ZcmslfL/UZtzpqRXuvx3s6pMl1HvaJlEfA5bydMcYJrJ3beXUQF3c= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710406466; c=relaxed/simple; bh=Hug4VpcwNwwqAOdVuGR3r5w2hzLyi1ZErcpgeoCjrpg=; h=Message-ID:Date:MIME-Version:Cc:Subject:To:References:From: In-Reply-To:Content-Type; b=fUl2A7YaQiDns87HUAseqBWL60d1SO2gYY7//Gsun6APKFSqTCfAFi1f7GZkfuAcgJJia1kauwPR6WYUJ7E/cK8ABfcYr8aW4ZcmPQbWCj1jRhr70MjlSOlvWqkjFPND1VezyxpQxMEJY1BJumC4Q5Qab8Q4LqEB7nHbi9k7p4A= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=collabora.com; spf=pass smtp.mailfrom=collabora.com; dkim=pass (2048-bit key) header.d=collabora.com header.i=@collabora.com header.b=kZVhG8GF; arc=none smtp.client-ip=46.235.227.194 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=collabora.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=collabora.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=collabora.com; s=mail; t=1710406462; bh=Hug4VpcwNwwqAOdVuGR3r5w2hzLyi1ZErcpgeoCjrpg=; h=Date:Cc:Subject:To:References:From:In-Reply-To:From; b=kZVhG8GFZYYC3OAzSAy08JnBI7ueSsyszQUf5fEmjQ2II8WGNRD/wgTbcyAhltdca MhX/nATboCzW2kCOzEjw200OyBhiHWNi28f+Fd+CF34xT/cGtMpvxqs/HpBWXPzb5Y qxiBfmUXTOs078rdLjOkbZ3cRZYX9bGtVSx5svoldhVQ6/3Bh0AL+rblWfyAAQpfWZ gPtW+AA3MdPR0h8MwGVzD7p2bORCWGQ2kq+cYRnrCemV5qYCWemsZpFJGCXNrrZZDO glDgKLSjJjuhnhYBKNjVFoCvbhaj+BZUq8o7TqrhP48UsGCGqdi4+LuVbzRJwLhi9p R8ea4uLifDcRw== Received: from [10.193.1.1] (broslavsky.collaboradmins.com [68.183.210.73]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: usama.anjum) by madrid.collaboradmins.com (Postfix) with ESMTPSA id A3105378105A; Thu, 14 Mar 2024 08:54:19 +0000 (UTC) Message-ID: <1dd87e89-2306-4669-844f-ffe9e56523b6@collabora.com> Date: Thu, 14 Mar 2024 13:54:50 +0500 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Cc: Muhammad Usama Anjum , Shuah Khan , Mark Brown , linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, linux-hardening@vger.kernel.org Subject: Re: [PATCH] selftests/exec: execveat: Improve debug reporting Content-Language: en-US To: Kees Cook , Eric Biederman References: <20240313185606.work.073-kees@kernel.org> From: Muhammad Usama Anjum In-Reply-To: <20240313185606.work.073-kees@kernel.org> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit On 3/13/24 11:56 PM, Kees Cook wrote: > Children processes were reporting their status, duplicating the > parent's. Remove that, and add some additional details about the test > execution. > > Signed-off-by: Kees Cook > --- > Cc: Eric Biederman > Cc: Shuah Khan > Cc: Mark Brown > Cc: Muhammad Usama Anjum > Cc: linux-mm@kvack.org > Cc: linux-kselftest@vger.kernel.org Reviewed-by: Muhammad Usama Anjum > --- > tools/testing/selftests/exec/execveat.c | 12 +++++++----- > 1 file changed, 7 insertions(+), 5 deletions(-) > > diff --git a/tools/testing/selftests/exec/execveat.c b/tools/testing/selftests/exec/execveat.c > index 0546ca24f2b2..6418ded40bdd 100644 > --- a/tools/testing/selftests/exec/execveat.c > +++ b/tools/testing/selftests/exec/execveat.c > @@ -98,10 +98,9 @@ static int check_execveat_invoked_rc(int fd, const char *path, int flags, > if (child == 0) { > /* Child: do execveat(). */ > rc = execveat_(fd, path, argv, envp, flags); > - ksft_print_msg("execveat() failed, rc=%d errno=%d (%s)\n", > + ksft_print_msg("child execveat() failed, rc=%d errno=%d (%s)\n", > rc, errno, strerror(errno)); > - ksft_test_result_fail("%s\n", test_name); > - exit(1); /* should not reach here */ > + exit(errno); > } > /* Parent: wait for & check child's exit status. */ > rc = waitpid(child, &status, 0); > @@ -226,11 +225,14 @@ static int check_execveat_pathmax(int root_dfd, const char *src, int is_script) > * "If the command name is found, but it is not an executable utility, > * the exit status shall be 126."), so allow either. > */ > - if (is_script) > + if (is_script) { > + ksft_print_msg("Invoke script via root_dfd and relative filename\n"); > fail += check_execveat_invoked_rc(root_dfd, longpath + 1, 0, > 127, 126); > - else > + } else { > + ksft_print_msg("Invoke exec via root_dfd and relative filename\n"); > fail += check_execveat(root_dfd, longpath + 1, 0); > + } > > return fail; > } -- BR, Muhammad Usama Anjum