lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Wed, 8 Mar 2023 12:34:51 +0100
From:   Tobias Klauser <tklauser@...tanz.ch>
To:     Christian Brauner <brauner@...nel.org>,
        Shuah Khan <shuah@...nel.org>
Cc:     Andrew Morton <akpm@...ux-foundation.org>,
        Andrei Vagin <avagin@...il.com>,
        Dmitry Safonov <dima@...sta.com>,
        linux-kselftest@...r.kernel.org, Andrey Vagin <avagin@...nvz.org>,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH 2/2] selftests/clone3: test clone3 with CLONE_NEWTIME

On 2023-03-08 at 11:53:20 +0100, Tobias Klauser <tklauser@...tanz.ch> wrote:
> Verify that clone3 can be called successfully with CLONE_NEWTIME in
> flags.

Appologies, I somehow messed up the recepient list in this patch leading
to it not being sent to LKML. Please let me know in case you want me to
send it again.

> Cc: Andrey Vagin <avagin@...nvz.org>
> Cc: Christian Brauner <brauner@...nel.org>
> Cc: Shuah Khan <shuah@...nel.org>
> Signed-off-by: Tobias Klauser <tklauser@...tanz.ch>
> ---
>  tools/testing/selftests/clone3/clone3.c | 3 +++
>  1 file changed, 3 insertions(+)
> 
> diff --git a/tools/testing/selftests/clone3/clone3.c b/tools/testing/selftests/clone3/clone3.c
> index cd4582129c7d..4fce46afe6db 100644
> --- a/tools/testing/selftests/clone3/clone3.c
> +++ b/tools/testing/selftests/clone3/clone3.c
> @@ -195,5 +195,8 @@ int main(int argc, char *argv[])
>  	test_clone3(CLONE_NEWPID, getpagesize() + 8, -E2BIG,
>  			CLONE3_ARGS_NO_TEST);
>  
> +	/* Do a clone3() in a new time namespace */
> +	test_clone3(CLONE_NEWTIME, 0, 0, CLONE3_ARGS_NO_TEST);
> +
>  	return !ksft_get_fail_cnt() ? ksft_exit_pass() : ksft_exit_fail();
>  }
> -- 
> 2.39.1
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ