Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id A8FE9C43219 for ; Wed, 12 Jan 2022 13:19:10 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1353549AbiALNTJ (ORCPT ); Wed, 12 Jan 2022 08:19:09 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59086 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1353531AbiALNSr (ORCPT ); Wed, 12 Jan 2022 08:18:47 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4D7FDC061757; Wed, 12 Jan 2022 05:18:46 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id EA71D6193B; Wed, 12 Jan 2022 13:18:45 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 76006C36AEF; Wed, 12 Jan 2022 13:18:41 +0000 (UTC) Date: Wed, 12 Jan 2022 14:18:37 +0100 From: Christian Brauner To: Naresh Kamboju Cc: open list , Linux-Next Mailing List , lkft-triage@lists.linaro.org, LTP List , linux-fsdevel@vger.kernel.org, regressions@lists.linux.dev, containers@lists.linux.dev, Alexey Gladkov , Sven Schnelle , "Eric W. Biederman" , Alexander Viro , Arnd Bergmann Subject: Re: [next]: LTP: getxattr05.c:97: TFAIL: unshare(CLONE_NEWUSER) failed: ENOSPC (28) Message-ID: <20220112131837.igsjkkttqskw4eix@wittgenstein> References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 12, 2022 at 05:15:37PM +0530, Naresh Kamboju wrote: > While testing LTP syscalls with Linux next 20220110 (and till date 20220112) > on x86_64, i386, arm and arm64 the following tests failed. > > tst_test.c:1365: TINFO: Timeout per run is 0h 15m 00s > getxattr05.c:87: TPASS: Got same data when acquiring the value of > system.posix_acl_access twice > getxattr05.c:97: TFAIL: unshare(CLONE_NEWUSER) failed: ENOSPC (28) > tst_test.c:391: TBROK: Invalid child (13545) exit value 1 > > fanotify17.c:176: TINFO: Test #1: Global groups limit in privileged user ns > fanotify17.c:155: TFAIL: unshare(CLONE_NEWUSER) failed: ENOSPC (28) > tst_test.c:391: TBROK: Invalid child (14739) exit value 1 > > sendto03.c:48: TBROK: unshare(268435456) failed: ENOSPC (28) > > setsockopt05.c:45: TBROK: unshare(268435456) failed: ENOSPC (28) > > strace output: > -------------- > [pid 481] wait4(-1, 0x7fff52f5ae8c, 0, NULL) = -1 ECHILD (No child processes) > [pid 481] clone(child_stack=NULL, > flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, > child_tidptr=0x7f3af0fa7a10) = 483 > strace: Process 483 attached > [pid 481] wait4(-1, > [pid 483] unshare(CLONE_NEWUSER) = -1 ENOSPC (No space left on device) This looks like another regression in the ucount code. Reverting the following commit fixes it and makes the getxattr05 test work again: commit 0315b634f933b0f12cfa82660322f6186c1aa0f4 Author: Alexey Gladkov Date: Fri Dec 17 15:48:23 2021 +0100 ucounts: Split rlimit and ucount values and max values Since the semantics of maximum rlimit values are different, it would be better not to mix ucount and rlimit values. This will prevent the error of using inc_count/dec_ucount for rlimit parameters. This patch also renames the functions to emphasize the lack of connection between rlimit and ucount. v2: - Fix the array-index-out-of-bounds that was found by the lkp project. Reported-by: kernel test robot Signed-off-by: Alexey Gladkov Link: https://lkml.kernel.org/r/73ea569042babda5cee2092423da85027ceb471f.1639752364.git.legion@kernel.org Signed-off-by: Eric W. Biederman The issue only surfaces if /proc/sys/user/max_user_namespaces is actually written to.