Received: by 10.192.165.148 with SMTP id m20csp436798imm; Fri, 4 May 2018 12:43:08 -0700 (PDT) X-Google-Smtp-Source: AB8JxZq46kUwI1uBhVC4X4DOZe3FNuvRhmnpwTUr3ig7YlIMef1ypRIVTkccXPN0EixVSKTOZooN X-Received: by 2002:a17:902:7149:: with SMTP id u9-v6mr28832807plm.356.1525462988485; Fri, 04 May 2018 12:43:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525462988; cv=none; d=google.com; s=arc-20160816; b=yd2EgMLbulFf1cV+ceX3ThFzkdItNLjZO1uoLGNruOj2+450TxZ1Z9AtYxC20TSlxl ZaKF/kfn5rN6Op9sZGGqFpnSw/5SPgp1Hj5EMtULsKXHt1KiZ9UUj4szjAsAEhRSs15/ etQZEoGFr3b1R2PbU6E2NBxvOimHyXYko/vX/cS6DlW9CNXMdDwZ7N4fzc57OH8QGU1z ujaQ8TRRUfaQEWJoDTjAMfzJX90rTVjHoPWtLMu/AgYEz0vrIeozL4dK+ulffKKy7Py+ KSsn+RFytsmL0Rp8Ztfb46P8PEtlNnY/WhCxJmBlpDPFaCIv3AY1/VSIngx44eWB+AlE a22A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=OM1d0pWOO+kqiyd7r49JEo8yc7HBzHgHGIPy5G8Vqow=; b=jppKc23kXjmXwUnsxG7ShHAZzY8Tf7E9zU4HifZlGwjKzyjHx+XM51sFsxkggUVcx3 d4PdylGXGrIFCXiAWol1vJnBBVHX9x7LXqWdpOLV3nzI/aI2LInoUC4J/zUR4SJiCmD0 NkI0XTuXYb9bVwEDivqPYORRB4EXOpTJTbsHL4lOqkFEXYRWMaMJ29mHRpuu7+H3DaXI Vg10eOW9Q48nzoydTWX5VVP7dqrrzbjR3y7X+Xeu8B1YB1cnvcRuszTRHmTLYhTuficN TlfXceigY0ugzW27AttCfcv7GBHDt3+tLNrrQYDK7E1eg0gBmLBfIGPln06EWeIFY2af rMcw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t8si16723141pfl.344.2018.05.04.12.42.41; Fri, 04 May 2018 12:43:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751822AbeEDTm3 (ORCPT + 99 others); Fri, 4 May 2018 15:42:29 -0400 Received: from mailout.easymail.ca ([64.68.200.34]:34146 "EHLO mailout.easymail.ca" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751527AbeEDTm1 (ORCPT ); Fri, 4 May 2018 15:42:27 -0400 Received: from localhost (localhost [127.0.0.1]) by mailout.easymail.ca (Postfix) with ESMTP id 0140BC083A; Fri, 4 May 2018 19:42:27 +0000 (UTC) Received: from mailout.easymail.ca ([127.0.0.1]) by localhost (emo01-pco.easydns.vpn [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N4_fAdWM3Omt; Fri, 4 May 2018 19:42:26 +0000 (UTC) Received: from [192.168.1.87] (c-24-9-64-241.hsd1.co.comcast.net [24.9.64.241]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailout.easymail.ca (Postfix) with ESMTPSA id BD1FCC0697; Fri, 4 May 2018 19:42:21 +0000 (UTC) Subject: Re: [PATCH 1/2] selftests/filesystems: devpts_pts included wrong header To: Christian Brauner , Anders Roxell Cc: Linux Kernel Mailing List , linux-kselftest@vger.kernel.org References: <20180418075256.300-1-anders.roxell@linaro.org> From: Shuah Khan Message-ID: <0631ea78-dc18-639c-8658-cdb810c6b4f3@kernel.org> Date: Fri, 4 May 2018 13:42:20 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/02/2018 08:05 AM, Christian Brauner wrote: > On Wed, Apr 18, 2018 at 09:52:55AM +0200, Anders Roxell wrote: >> We were picking up the wrong header should use asm/ioctls.h form the kernel >> and not the header from the system (sys/ioctl.h). In the current code we >> added the correct include and we added the kernel headers path to the CFLAGS. >> >> Fixes: ce290a19609d ("selftests: add devpts selftests") >> Signed-off-by: Anders Roxell >> --- > > Acked-by: Christian Brauner > > Patch looks good to me. > > I'm going to look into the ioctl() error. > > Thanks! > Christian > >> >> Hi, >> >> I've been running devpts_pts on a mainline kernel (4.16+git0+60cc43fc88) and > > > >> the verify_invalid_ptmx_bind_mount() test failes with this failure: >> >> root@intel-core2-32:~# ./devpts_pts >> Failed to perform TIOCGPTPEER ioctl >> >> However, I'm still confused why I'm not able to get the test to pass. Strace >> showes that -ENOENT return in the TIOCGPTPEER implementation in the >> kernel. I think the -ENOENT gets returned from this path >> devpts_mntget()->devpts_ptmx_path->path_pts(). >> >> See the strace issue below: >> root@intel-core2-32:~# strace ./devpts_pts >> execve("./devpts_pts", ["./devpts_pts"], [/* 17 vars */]) = 0 >> brk(NULL) = 0x5634e0092000 >> mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f459d338000 >> access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory) >> open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3 >> fstat(3, {st_mode=S_IFREG|0644, st_size=16726, ...}) = 0 >> mmap(NULL, 16726, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f459d333000 >> close(3) = 0 >> open("/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3 >> read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\260\3\2\0\0\0\0\0"..., 832) = 832 >> fstat(3, {st_mode=S_IFREG|0755, st_size=1681056, ...}) = 0 >> mmap(NULL, 3787168, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f459cd7b000 >> mprotect(0x7f459cf0f000, 2093056, PROT_NONE) = 0 >> mmap(0x7f459d10e000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x193000) = 0x7f459d10e000 >> mmap(0x7f459d114000, 14752, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f459d114000 >> close(3) = 0 >> mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f459d331000 >> arch_prctl(ARCH_SET_FS, 0x7f459d331700) = 0 >> mprotect(0x7f459d10e000, 16384, PROT_READ) = 0 >> mprotect(0x5634debe3000, 4096, PROT_READ) = 0 >> mprotect(0x7f459d33a000, 4096, PROT_READ) = 0 >> munmap(0x7f459d333000, 16726) = 0 >> ioctl(0, TCGETS, {B38400 opost isig icanon echo ...}) = 0 >> unshare(CLONE_NEWNS) = 0 >> mount("", "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0 >> mount("/dev/pts/ptmx", "/dev/ptmx", NULL, MS_BIND, NULL) = 0 >> open("/dev/ptmx", O_RDWR|O_NOCTTY|O_CLOEXEC) = 3 >> ioctl(3, TIOCSPTLCK, [0]) = 0 >> ioctl(3, _IOC(0, 0x54, 0x41, 0x00), 0x80102) = 4 >> clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7f459d3319d0) = 4377 >> wait4(4377, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 4377 >> --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=4377, si_uid=0, si_status=0, si_utime=0, si_stime=0} --- >> close(3) = 0 >> close(4) = 0 >> getpid() = 4376 >> open("/tmp/devpts_ptmx_Z6aEvy", O_RDWR|O_CREAT|O_EXCL, 0600) = 3 >> mount("/dev/pts/ptmx", "/tmp/devpts_ptmx_Z6aEvy", NULL, MS_BIND, NULL) = 0 >> close(3) = 0 >> open("/tmp/devpts_ptmx_Z6aEvy", O_RDWR|O_NOCTTY|O_CLOEXEC) = 3 >> ioctl(3, TIOCSPTLCK, [0]) = 0 >> ioctl(3, _IOC(0, 0x54, 0x41, 0x00), 0x80102) = -1 ENOENT (No such file or directory) >> write(2, "Failed to perform TIOCGPTPEER io"..., 36Failed to perform TIOCGPTPEER ioctl >> ) = 36 >> close(3) = 0 >> umount2("/dev/pts", 0) = 0 >> umount2("/dev/ptmx", 0) = 0 >> mkdir("/tmp/devpts_fs_w22bR6", 0700) = 0 >> mount("devpts", "/tmp/devpts_fs_w22bR6", "devpts", MS_NOSUID|MS_NOEXEC, "newinstance,ptmxmode=0666,mode=0"...) = 0 >> open("/tmp/devpts_fs_w22bR6/ptmx", O_RDWR|O_NOCTTY|O_CLOEXEC) = 3 >> ioctl(3, TIOCSPTLCK, [0]) = 0 >> ioctl(3, _IOC(0, 0x54, 0x41, 0x00), 0x80102) = 4 >> clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7f459d3319d0) = 4378 >> wait4(4378, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 4378 >> --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=4378, si_uid=0, si_status=0, si_utime=0, si_stime=0} --- >> close(3) = 0 >> close(4) = 0 >> unlink("/tmp/devpts_fs_w22bR6") = -1 EISDIR (Is a directory) >> exit_group(0) = ? >> +++ exited with 0 +++ >> root@intel-core2-32:~# >> >> tools/testing/selftests/filesystems/Makefile | 1 + >> tools/testing/selftests/filesystems/devpts_pts.c | 2 +- >> 2 files changed, 2 insertions(+), 1 deletion(-) >> >> diff --git a/tools/testing/selftests/filesystems/Makefile b/tools/testing/selftests/filesystems/Makefile >> index 4e6d09fb166f..427a401aae5c 100644 >> --- a/tools/testing/selftests/filesystems/Makefile >> +++ b/tools/testing/selftests/filesystems/Makefile >> @@ -1,5 +1,6 @@ >> # SPDX-License-Identifier: GPL-2.0 >> TEST_PROGS := dnotify_test devpts_pts >> +CFLAGS += -I../../../../usr/include/ >> all: $(TEST_PROGS) >> >> include ../lib.mk >> diff --git a/tools/testing/selftests/filesystems/devpts_pts.c b/tools/testing/selftests/filesystems/devpts_pts.c >> index b9055e974289..79420b9d00c7 100644 >> --- a/tools/testing/selftests/filesystems/devpts_pts.c >> +++ b/tools/testing/selftests/filesystems/devpts_pts.c >> @@ -8,7 +8,7 @@ >> #include >> #include >> #include >> -#include >> +#include >> #include >> #include >> >> -- >> 2.11.0 >> > Thanks. I will queue this up for 4.18-rc1 -- Shuah