summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorKevin F. Quinn <kevquinn@gentoo.org>2007-02-09 22:01:58 +0000
committerKevin F. Quinn <kevquinn@gentoo.org>2007-02-09 22:01:58 +0000
commit4d5632dcbb08efb6093245c708072b02a2fc02c5 (patch)
tree7571f3d4dd2f91a54626ceea610c673ca5ca8c04
parentAdd x86 results; format tabstop=8 for web viewiing. (diff)
downloadkevquinn-4d5632dcbb08efb6093245c708072b02a2fc02c5.tar.gz
kevquinn-4d5632dcbb08efb6093245c708072b02a2fc02c5.tar.bz2
kevquinn-4d5632dcbb08efb6093245c708072b02a2fc02c5.zip
Looks like those x86-hardened-kernel-only issues are related to GRsecurity
svn path=/; revision=175
-rw-r--r--hardened/toolchain/branches/pieworld/pieworld.README50
1 files changed, 28 insertions, 22 deletions
diff --git a/hardened/toolchain/branches/pieworld/pieworld.README b/hardened/toolchain/branches/pieworld/pieworld.README
index cb2f639..ec4f36c 100644
--- a/hardened/toolchain/branches/pieworld/pieworld.README
+++ b/hardened/toolchain/branches/pieworld/pieworld.README
@@ -150,28 +150,31 @@ dlfcn/default XX- X.. .X- .X. .X. (? dladdr returns empty string)
posix/globtest --- -.. .-X .-. .-. (? x86_64-only)
posix/annexc XXX X.. .XX .X. .X. (expected)
io/ftwtest --- -.. .-X .-. .-. (? x86_64-only)
-nptl/tst-mutex5 --X -.. .-- .-. .-. (? x86-only)
-nptl/tst-mutexpi4 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-mutexpi5 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-mutexpi5a X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-mutexpi6 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-mutexpi9 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-cond10 --X -.. .-- .-. .-. (? x86-only)
-nptl/tst-robust1 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-robust2 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-robust3 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-robust4 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-robust5 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-robust6 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-robust7 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-robust8 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-robustpi1 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-robustpi2 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-robustpi3 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-robustpi4 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-robustpi5 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-robustpi6 X-- -.. .-- .-. .-. (? x86-only)
-nptl/tst-robustpi7 X-- -.. .-- .-. .-. (? x86-only)
+nptl/tst-mutex5 --X -.. .-- .-. .-. (? vanilla x86-only; not always)
+nptl/tst-mutexpi4 X-- -.. .-- .-. .-. (? hardened x86-only)
+ hmm - fails if child gets PTHREAD_BARRIER_SERIAL_THREAD from the barrier; inserting a sleep()
+ to encourage a different barrier sequence demonstrates this.
+ note it must be something to do with the inherited priority stuff; tst-mutex4 passes...
+nptl/tst-mutexpi5 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-mutexpi5a X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-mutexpi6 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-mutexpi9 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-cond10 --X -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robust1 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robust2 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robust3 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robust4 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robust5 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robust6 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robust7 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robust8 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robustpi1 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robustpi2 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robustpi3 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robustpi4 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robustpi5 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robustpi6 X-- -.. .-- .-. .-. (? hardened x86-only)
+nptl/tst-robustpi7 X-- -.. .-- .-. .-. (? hardened x86-only)
nptl/tst-tls2 X-- -.. .X- .-. .-. (local-exec TLS?)
nptl/tst-cancel1 XXX -.. .XX .-. .-. (expected on x86/x86_64)
nptl/tst-cancelx4 XX- -.. .-- .-. .-. (? x86-only)
@@ -218,6 +221,9 @@ tst-cancel1 fails on x86/amd64 because support is not in gcc-4.1.1 - gcc-4.2 wil
Things to work out:
1) Why all those mutex/robust (barrier) checks fail on x86 with a hardened kernel (only!)
+ Got it! Blae GRsecurity :/ With PaX disabled, the test reports for tst-mutexpi4:
+ tst-mutexpi4: pthread_mutex_lock.c:287: __pthread_mutex_lock: Assertion `robust || (oldval & 0x40000000) == 0' failed.
+
2) Why x86 passes elf/tst-tls{1,2}-static when all other arches fail it
3) What's different about x86_64 that it fails a whole bunch that are ok for other arches
4) Failures marked (?)