Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp5272336rdb; Wed, 13 Dec 2023 04:18:17 -0800 (PST) X-Google-Smtp-Source: AGHT+IFQNvT0KbV3vTzcaig3AllaZvwVaCfH47y13ZLUqTJr1kr8j/PY+y84BXOVD08vXSXf1clc X-Received: by 2002:a05:6a20:914b:b0:18f:ef63:467b with SMTP id x11-20020a056a20914b00b0018fef63467bmr4322285pzc.38.1702469897447; Wed, 13 Dec 2023 04:18:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702469897; cv=none; d=google.com; s=arc-20160816; b=rdqBqcK+CpGFxR56DNW10Kl9I+zBDOiUzD9aPUFhjB3mh75dcR4rN+pr9ZtkJnVzRU 9cdntOpwzoJoUbuMdve3KCvUBtCkXPep3bXspBOjw7m3N9RAwNY3yvwg+VJci+qmrhvw 4fq0yNWTyUE/4cRTH0puIVSJge3Fa3cXwqo18oDYM6jEvrBLsfwN0LTEkz9XoJILGWoK IdNBwhjvYe/RUJYyuJhzwkWdbjmveRZ1b7zGozXEPfudVGAD5w74hjZv120IEZ7/RLhX 6HtSMF+odgRBS7hPREFG4we6LCw7ht4UF0gRNHqk9tMMGD4noQQlbBrlJJoxRBvl4wvK BIsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=PZdslggO5WNQDG8rfrb83fLmrNp0QtBGkC4TRn8Rj30=; fh=FB7KYWIH57nz2uerhvu482xmXI+2HY6ADdf4sLYXq3k=; b=D7hiQS3TVpzvHwAGv6NqxQM4+wmXYUbaW6OYHsvEdU8rnUCU6jfCEPovQBMuVXUkIX mDRNiXiPk/IwHPKPunxs5h4X9z105u/kUhvLok1ZbW5QH/r/PRv3HM7xbkrUHE8+rFOm HGL/fS0kvyam3to0QRhbXg8bimIddGQiHVXf2DJa5iaooCGogSOYexc/OA+SJVN7o6U9 Tf65uhDqxUE7VhTnB64se7INhrpwv6vhYN8SxvMuIXso1SCP7RL8xamh1T4qoCYE3Xqw +CL8UamNIXAjq+d2/83EuGtavF0uaZgCYq2T39ujlyI0ZdLGxESh8QImgkTuRbxZyowL aCcw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=AnwXJIqH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id p5-20020a17090a4f0500b0028ac61f561fsi2299946pjh.186.2023.12.13.04.18.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Dec 2023 04:18:17 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=AnwXJIqH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 085F3806B54E; Wed, 13 Dec 2023 04:18:16 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1377507AbjLMMSC (ORCPT + 99 others); Wed, 13 Dec 2023 07:18:02 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35498 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233316AbjLMMSB (ORCPT ); Wed, 13 Dec 2023 07:18:01 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5515AF2 for ; Wed, 13 Dec 2023 04:18:08 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B81F1C433C8; Wed, 13 Dec 2023 12:18:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1702469888; bh=fOi26p1uWxnqpvwuqGwXpnv62gezURvfN1QJ75LNswM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=AnwXJIqH4fCdac/GM8uGsKkXH5rlvQ7LiX5pZhrfsZ8C/JpJFSxcUzvISxvfa8DM0 BfWjylNwolszu4Qg2m29OKpVydAqtd5GsS3xLX4hzcut94iNBqN4jYw1Nzy+5HZOcZ Kog93MndP4PC3NGIEi+9KxXdcb4Yy2YNljHEDo1Fh//JacBp7Ly75ihx9XFd5G1r2x 3FmqpFdEuGwNA/1f6avfR1Gm1huDFzU879oG7fFwqNZ95bpa9mXXO6F03q+jskimhw Gs9JNfL6is5fN4Ry3TGnxa0NvgxUyI2FuqYZzUhFryz2gdwwnSk/NuTFCmQBGfCqsv 4xZFpk69q2WcQ== Date: Wed, 13 Dec 2023 13:18:03 +0100 From: Christian Brauner To: kernel test robot Cc: Tycho Andersen , oe-lkp@lists.linux.dev, lkp@intel.com, linux-kernel@vger.kernel.org, Oleg Nesterov , "Eric W . Biederman" , linux-api@vger.kernel.org, Tycho Andersen Subject: Re: [PATCH v2 1/3] pidfd: allow pidfd_open() on non-thread-group leaders Message-ID: <20231213-famos-chillen-41adc67ac0ef@brauner> References: <20231207170946.130823-1-tycho@tycho.pizza> <202312111516.26dc3fd5-oliver.sang@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <202312111516.26dc3fd5-oliver.sang@intel.com> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Wed, 13 Dec 2023 04:18:16 -0800 (PST) On Mon, Dec 11, 2023 at 03:28:09PM +0800, kernel test robot wrote: > > > Hello, > > kernel test robot noticed "kernel-selftests.pidfd.pidfd_test.fail" on: > > commit: e6d9be676d2c1fa8332c63c4382b8d3227fca991 ("[PATCH v2 1/3] pidfd: allow pidfd_open() on non-thread-group leaders") > url: https://github.com/intel-lab-lkp/linux/commits/Tycho-Andersen/selftests-pidfd-add-non-thread-group-leader-tests/20231208-011135 > patch link: https://lore.kernel.org/all/20231207170946.130823-1-tycho@tycho.pizza/ > patch subject: [PATCH v2 1/3] pidfd: allow pidfd_open() on non-thread-group leaders > > in testcase: kernel-selftests > version: kernel-selftests-x86_64-60acb023-1_20230329 > with following parameters: > > group: pidfd > > > > compiler: gcc-12 > test machine: 36 threads 1 sockets Intel(R) Core(TM) i9-10980XE CPU @ 3.00GHz (Cascade Lake) with 32G memory > > (please refer to attached dmesg/kmsg for entire log/backtrace) > > > > If you fix the issue in a separate patch/commit (i.e. not just a new version of > the same patch/commit), kindly add following tags > | Reported-by: kernel test robot > | Closes: https://lore.kernel.org/oe-lkp/202312111516.26dc3fd5-oliver.sang@intel.com > > > besides, we also observed kernel-selftests.pidfd.pidfd_poll_test.fail on this > commit, but clean on parent: > > bee0e7762ad2c602 e6d9be676d2c1fa8332c63c4382 > ---------------- --------------------------- > fail:runs %reproduction fail:runs > | | | > :6 100% 6:6 kernel-selftests.pidfd.pidfd_poll_test.fail > :6 100% 6:6 kernel-selftests.pidfd.pidfd_test.fail > > > > TAP version 13 > 1..7 > # timeout set to 300 > # selftests: pidfd: pidfd_test > # TAP version 13 > # 1..8 > # # Parent: pid: 2191 > # # Parent: Waiting for Child (2192) to complete. > # # Child (pidfd): starting. pid 2192 tid 2192 > # # Child Thread: starting. pid 2192 tid 2193 ; and sleeping > # # Child Thread: doing exec of sleep > # Bail out! pidfd_poll check for premature notification on child thread exec test: Unexpected epoll_wait result (c=0, events=0) (errno 0) So it seems that this broke multi-threaded exit notifications.