lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230709092947.GF9321@1wt.eu>
Date:   Sun, 9 Jul 2023 11:29:47 +0200
From:   Willy Tarreau <w@....eu>
To:     Zhangjin Wu <falcon@...ylab.org>
Cc:     linux@...ssschuh.net, arnd@...db.de, linux-fsdevel@...r.kernel.org,
        linux-kernel@...r.kernel.org, linux-kselftest@...r.kernel.org,
        shuah@...nel.org
Subject: Re: [PATCH 0/2] proc: proc_setattr for /proc/$PID/net

Hi,

On Fri, Jun 30, 2023 at 10:06:09PM +0800, Zhangjin Wu wrote:
> Hi, Thomas
> 
> Just applied your patchset on v6.4, and then:
> 
>   - revert the 1st patch: 'selftests/nolibc: drop test chmod_net' manually
> 
>   - do the 'run' test of nolibc on arm/vexpress-a9
> 
> The 'chmod_net' test of tools/testing/selftests/nolibc/nolibc-test.c
> really failed as expected (and therefore, should be removed):
> 
>     11 chdir_root = 0                                                [OK]
>     12 chdir_dot = 0                                                 [OK]
>     13 chdir_blah = -1 ENOENT                                        [OK]
>     14 chmod_net = -1 EPERM                                         [FAIL]
>     15 chmod_self = -1 EPERM                                         [OK]
>     16 chmod_tmpdir = 0                                              [OK]
>     17 chown_self = -1 EPERM                                         [OK]
> 
> So, If this test result is enough for this patch, here is my:
> 
> Tested-by: Zhangjin Wu <falcon@...ylab.org>

Now queued, thanks!
Willy

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ