Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp13476273ybl; Sun, 29 Dec 2019 12:49:48 -0800 (PST) X-Google-Smtp-Source: APXvYqxRWpn118DANfle2LTt7yiig49UtOZQLCmh16hLwaQm1cH0FAQ1wHL4l8vVQMMch91hjNQ+ X-Received: by 2002:a05:6830:2111:: with SMTP id i17mr65882259otc.24.1577652588144; Sun, 29 Dec 2019 12:49:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577652588; cv=none; d=google.com; s=arc-20160816; b=EgUG3pcvTODf1j1omRW/ZhGGBWAr6ltjNgC29/l4tLwq3qnzVTg//UYFO9O5BCan6K kNxMgOSqBaIySRY0E46Gxbh3xnCUjRT7V8KlBiv9ZwkCOq4RvvRK3h11IhNdEwXw5CWk v91132x3Dx8ysuam/C76zq6tUeZinbuaoVJ7311iehCqHOe2LyVtxn/NMu7SEcsysWzQ kPcfdpNU0+DB8201OjC8O1vvW53JZdjQZdKz7YvzpT+a2j46HDPFGdnlzDIZ5DktoKPN /3bPe/FuYJGDQPaxydzstQq/a/iTX4fGry5gGPodD0NP+oZjoJyG6y20piZsx9iLu8Wk JlJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=X5S7dM3YqWZnQvDdkAx/uxHqwlaHpM1YqqCAfqqFNlc=; b=W/Kk7SSwbLl9SnLxla+y8u1VPEY/z2T3NZnznyekavqNwQY5hjqACoLfLU/WEiId+/ G0Zirz5w/HjpzWOiJK4I7iO9d7XYiSj9taIaTeFprpFXJhe0kL/F70HI2LF9onaDMD1B JmGm3B640NHtn5/+jtHBUAzo1VORxZbjIYwyc43R7zWkdUCZ4CmsFWH9qPmAFp6DykaU f/KPTeF2ffVmM0xzsZRSe0uK3QvX9lfLNg3KPNcRqq3ibnxCPkJayNRPh68+b2lacYsw GV5QxJ3sCYwcwxwx94fF6M48t0gNSmkLpTMFjq6DwI5I9PsK+U11xGjvZ09kBK0uVPEW zZ9A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0hx68a1L; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p22si7207181otr.265.2019.12.29.12.49.37; Sun, 29 Dec 2019 12:49:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0hx68a1L; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733076AbfL2R43 (ORCPT + 99 others); Sun, 29 Dec 2019 12:56:29 -0500 Received: from mail.kernel.org ([198.145.29.99]:45972 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733064AbfL2R4Z (ORCPT ); Sun, 29 Dec 2019 12:56:25 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 20DC8222C3; Sun, 29 Dec 2019 17:56:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1577642184; bh=hrFbxjNhvsrrvY+oqXEKDGCsS2EywNEgduk9cGEsG8w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0hx68a1LIJlTCYXWoek7YHUelWYsa6DQROmxeXu9BtHwOKxYMiACKl7NwDqtKBdOs cBBPAuOPU2MgragYSoedXbeDBxPCnRY5/r7qiJWSwwDzv3q5vPa1Lt2LtabCf++mNx yEvpokpkm4JYV2Y7RyoT2IgFEQ4sNFkOPqIm9brQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jiri Benc , Daniel Borkmann , Willem de Bruijn , Sasha Levin Subject: [PATCH 5.4 324/434] selftests, bpf: Fix test_tc_tunnel hanging Date: Sun, 29 Dec 2019 18:26:17 +0100 Message-Id: <20191229172723.491154593@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191229172702.393141737@linuxfoundation.org> References: <20191229172702.393141737@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jiri Benc [ Upstream commit 3b054b7133b4ad93671c82e8d6185258e3f1a7a5 ] When run_kselftests.sh is run, it hangs after test_tc_tunnel.sh. The reason is test_tc_tunnel.sh ensures the server ('nc -l') is run all the time, starting it again every time it is expected to terminate. The exception is the final client_connect: the server is not started anymore, which ensures no process is kept running after the test is finished. For a sit test, though, the script is terminated prematurely without the final client_connect and the 'nc' process keeps running. This in turn causes the run_one function in kselftest/runner.sh to hang forever, waiting for the runaway process to finish. Ensure a remaining server is terminated on cleanup. Fixes: f6ad6accaa99 ("selftests/bpf: expand test_tc_tunnel with SIT encap") Signed-off-by: Jiri Benc Signed-off-by: Daniel Borkmann Acked-by: Willem de Bruijn Link: https://lore.kernel.org/bpf/60919291657a9ee89c708d8aababc28ebe1420be.1573821780.git.jbenc@redhat.com Signed-off-by: Sasha Levin --- tools/testing/selftests/bpf/test_tc_tunnel.sh | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/tools/testing/selftests/bpf/test_tc_tunnel.sh b/tools/testing/selftests/bpf/test_tc_tunnel.sh index ff0d31d38061..7c76b841b17b 100755 --- a/tools/testing/selftests/bpf/test_tc_tunnel.sh +++ b/tools/testing/selftests/bpf/test_tc_tunnel.sh @@ -62,6 +62,10 @@ cleanup() { if [[ -f "${infile}" ]]; then rm "${infile}" fi + + if [[ -n $server_pid ]]; then + kill $server_pid 2> /dev/null + fi } server_listen() { @@ -77,6 +81,7 @@ client_connect() { verify_data() { wait "${server_pid}" + server_pid= # sha1sum returns two fields [sha1] [filepath] # convert to bash array and access first elem insum=($(sha1sum ${infile})) -- 2.20.1