|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Questions about the in-tree Flask policy
Hi Daniel
I'm working to get XSM tested in OSSTest. After hacking for some days
I've got to the point that I actually have test cases to run.
Our plan is to at least replicate three Debian smoke tests:
test-amd64-amd64-xl-xsm
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm
test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm
The -xsm suffix is to distinguish them from the normal non-xsm tests.
However I cannot get the in-tree policy to work with OSSTest. It's much
stricter than I had anticipated. Guest creation is OK, but it doesn't
seem to allow "xl save" to run.
In my test-amd64-amd64-xl-xsm run:
2014-09-17 15:05:39 Z executing ssh ... root@xxxxxxxxxxxxx xl save
debian.guest.osstest image
Saving to image new xl format (info 0x0/0x0/824)
xc: error: xc_alloc_hypercall_buffer: mmap failed (22 = Invalid argument):
Internal error
xc: error: Couldn't allocate to_send array: Internal error
libxl: error: libxl_dom.c:1673:libxl__xc_domain_save_done: saving domain:
domain responded to suspend request: Cannot allocate memory
Failed to save domain, resuming domain
libxl: error: libxl.c:475:libxl__domain_resume: xc_domain_resume failed for
domain 1: Permission denied
2014-09-17 15:05:40 Z command nonzero waitstatus 256: ssh -o
StrictHostKeyChecking=no -o BatchMode=yes -o ConnectTimeout=100 -o
ServerAliveInterval=100 -o PasswordAuthentication=no -o
ChallengeResponseAuthentication=no -o
UserKnownHostsFile=tmp/t.known_hosts_standalone.test-amd64-amd64-xl-xsm
root@xxxxxxxxxxxxx xl save debian.guest.osstest image
status 256 at Osstest/TestSupport.pm line 391.
+ rc=1
+ date -u +%Y-%m-%d %H:%M:%S Z exit status 1
2014-09-17 15:05:40 Z exit status 1
+ exit 1
The guest has seclabel='system_u:system_r:domU_t'.
In 'xl dmesg' there are some avc messages (removed duplicated ones):
(XEN) Cannot bind IRQ4 to dom0. In use by 'ns16550'.
(XEN) Cannot bind IRQ2 to dom0. In use by 'cascade'.
(XEN) avc: denied { cacheflush } for domid=0 target=1
scontext=system_u:system_r:dom0_t tcontext=system_u:system_r:domU_t
tclass=domain2
(XEN) avc: denied { stat } for domid=0 target=1
scontext=system_u:system_r:dom0_t tcontext=system_u:system_r:domU_t tclass=mmu
(XEN) avc: denied { getvcpucontext } for domid=0 target=1
scontext=system_u:system_r:dom0_t tcontext=system_u:system_r:domU_t
tclass=domain
(XEN) avc: denied { cacheflush } for domid=0 target=3
scontext=system_u:system_r:dom0_t tcontext=system_u:system_r:domU_t
tclass=domain2
I tried to look at the policy file(s), only to find out that there's a
bunch of files that have excessive amount of information. I'm certainly
not an XSM expert and have no intention to become one at the moment. :-)
So the question is, do you think we should trim down our test steps
until it passes or do you think we should provide a more permissive
policy? Of course if you have any other magic rune to make it work it
can you provide it to me?
From my point of view I would really like to avoid trimming down steps
in test cases.
If you're interested in what that test case is about, have a look at
http://www.chiark.greenend.org.uk/~xensrcts/logs/30294/
Each column in header is a test case; each row on the left is one test
step. You can look at "test-amd64-amd64-xl" for reference. Currently the
-xsm variant has the exact same steps.
If you need more information, please let me know.
Wei.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |