diff options
author | Kevin F. Quinn <kevquinn@gentoo.org> | 2007-02-09 22:01:58 +0000 |
---|---|---|
committer | Kevin F. Quinn <kevquinn@gentoo.org> | 2007-02-09 22:01:58 +0000 |
commit | 4d5632dcbb08efb6093245c708072b02a2fc02c5 (patch) | |
tree | 7571f3d4dd2f91a54626ceea610c673ca5ca8c04 | |
parent | Add x86 results; format tabstop=8 for web viewiing. (diff) | |
download | kevquinn-4d5632dcbb08efb6093245c708072b02a2fc02c5.tar.gz kevquinn-4d5632dcbb08efb6093245c708072b02a2fc02c5.tar.bz2 kevquinn-4d5632dcbb08efb6093245c708072b02a2fc02c5.zip |
Looks like those x86-hardened-kernel-only issues are related to GRsecurity
svn path=/; revision=175
-rw-r--r-- | hardened/toolchain/branches/pieworld/pieworld.README | 50 |
1 files changed, 28 insertions, 22 deletions
diff --git a/hardened/toolchain/branches/pieworld/pieworld.README b/hardened/toolchain/branches/pieworld/pieworld.README index cb2f639..ec4f36c 100644 --- a/hardened/toolchain/branches/pieworld/pieworld.README +++ b/hardened/toolchain/branches/pieworld/pieworld.README @@ -150,28 +150,31 @@ dlfcn/default XX- X.. .X- .X. .X. (? dladdr returns empty string) posix/globtest --- -.. .-X .-. .-. (? x86_64-only) posix/annexc XXX X.. .XX .X. .X. (expected) io/ftwtest --- -.. .-X .-. .-. (? x86_64-only) -nptl/tst-mutex5 --X -.. .-- .-. .-. (? x86-only) -nptl/tst-mutexpi4 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-mutexpi5 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-mutexpi5a X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-mutexpi6 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-mutexpi9 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-cond10 --X -.. .-- .-. .-. (? x86-only) -nptl/tst-robust1 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-robust2 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-robust3 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-robust4 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-robust5 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-robust6 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-robust7 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-robust8 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-robustpi1 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-robustpi2 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-robustpi3 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-robustpi4 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-robustpi5 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-robustpi6 X-- -.. .-- .-. .-. (? x86-only) -nptl/tst-robustpi7 X-- -.. .-- .-. .-. (? x86-only) +nptl/tst-mutex5 --X -.. .-- .-. .-. (? vanilla x86-only; not always) +nptl/tst-mutexpi4 X-- -.. .-- .-. .-. (? hardened x86-only) + hmm - fails if child gets PTHREAD_BARRIER_SERIAL_THREAD from the barrier; inserting a sleep() + to encourage a different barrier sequence demonstrates this. + note it must be something to do with the inherited priority stuff; tst-mutex4 passes... +nptl/tst-mutexpi5 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-mutexpi5a X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-mutexpi6 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-mutexpi9 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-cond10 --X -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robust1 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robust2 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robust3 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robust4 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robust5 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robust6 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robust7 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robust8 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robustpi1 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robustpi2 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robustpi3 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robustpi4 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robustpi5 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robustpi6 X-- -.. .-- .-. .-. (? hardened x86-only) +nptl/tst-robustpi7 X-- -.. .-- .-. .-. (? hardened x86-only) nptl/tst-tls2 X-- -.. .X- .-. .-. (local-exec TLS?) nptl/tst-cancel1 XXX -.. .XX .-. .-. (expected on x86/x86_64) nptl/tst-cancelx4 XX- -.. .-- .-. .-. (? x86-only) @@ -218,6 +221,9 @@ tst-cancel1 fails on x86/amd64 because support is not in gcc-4.1.1 - gcc-4.2 wil Things to work out: 1) Why all those mutex/robust (barrier) checks fail on x86 with a hardened kernel (only!) + Got it! Blae GRsecurity :/ With PaX disabled, the test reports for tst-mutexpi4: + tst-mutexpi4: pthread_mutex_lock.c:287: __pthread_mutex_lock: Assertion `robust || (oldval & 0x40000000) == 0' failed. + 2) Why x86 passes elf/tst-tls{1,2}-static when all other arches fail it 3) What's different about x86_64 that it fails a whole bunch that are ok for other arches 4) Failures marked (?) |