Received: by 2002:ab2:60d1:0:b0:1f7:5705:b850 with SMTP id i17csp1413561lqm; Thu, 2 May 2024 14:11:13 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXhkcG6Pb6kmPNnxFnC3y+DthBd44mrpFczRlRgAdVyoFp16wQvIkvQe/S8WQXpmL7EPoiiLB1vomdUVmVXPlTbH0qHcwPt+E5ODYRLpA== X-Google-Smtp-Source: AGHT+IEs9IvEuUmcWiXvcgi2AhkPjWmceW8ofzKVs2ZtIrdE+Eu8y4n2akjs2LFvXxwXdUFU8t8C X-Received: by 2002:a17:906:110c:b0:a59:719d:2735 with SMTP id h12-20020a170906110c00b00a59719d2735mr361050eja.64.1714684273424; Thu, 02 May 2024 14:11:13 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714684273; cv=pass; d=google.com; s=arc-20160816; b=BiyLU+7y+syol6Wb16QxUbXtGDT3GS1NrKLrO8+40qbtGzDQHnB/FtuyvDO4NF1j/2 9ZpZ/pipaYQwPFBSrZn3gq7/caG8dwvNN+eK/gn1QgFPwC/Gt8H6x8H6Z+6oH+YUexlW jRut+VnZPdOWvihf0eI+2xbqgwSig2EVugMyrk9Uwjtj+pdVvDOz80rNGrczqN4TaKJq kE6YW9ZIkGJ5sM3mXctySrfpXJqyVx/hnnIIKZdf40HDDRhXlwK6sz8S9RNsAwz25IbN kfPWe3i7mycx0OxRSP/myN9Eop1JEk0VdPmZZwch8I86Eq2cvrGFWqCldBWEaOMB0u5M ScpA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=qUaBkUAIUfEOsrTNN0nj6E8u1UAXfLkV2JehaODEV84=; fh=Xv8vsRY1NXL+T1KrRTbY6br3ySvwj5ozCgvxkAtZGgs=; b=bkGcwWFlXY48PPcKylfrCLcabWdi0bX/IvFZ8MCJt1ct5FjGvnzF8v4siKQ82ZlD6z Ol8id/DEF/JUG/kALWQ5udU2wdALDcYiLXcfOHqMUOLqIDGf/SanEJ0ctHVVB5j/a6G9 o6pKJQ1u95H7eFlDEOZCt6R9R/O0/SiuSU/+x0bFc6jlWfKNcgd9fv2mxjPU/qJAfn1u SiEQI/l/6/ixqQunF6sPpXl7PBHNxJSjCwIRdubkT6I1A/hz7Aaqkric4QN4p06kkK2W MLoiAAejd9ItiMHnM1XBAFSLlh2T5TBUldbAiUYIcSeizsWIQV+kFWP7zY3Xhb188bvJ Otpg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@digikod.net header.s=20191114 header.b="d3yrHP/w"; arc=pass (i=1 spf=pass spfdomain=digikod.net dkim=pass dkdomain=digikod.net); spf=pass (google.com: domain of linux-kernel+bounces-166917-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-166917-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id p6-20020a17090653c600b00a556d10a90asi799567ejo.343.2024.05.02.14.11.13 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 14:11:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-166917-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@digikod.net header.s=20191114 header.b="d3yrHP/w"; arc=pass (i=1 spf=pass spfdomain=digikod.net dkim=pass dkdomain=digikod.net); spf=pass (google.com: domain of linux-kernel+bounces-166917-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-166917-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 2D1E81F229E4 for ; Thu, 2 May 2024 21:11:13 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id B12E21C230D; Thu, 2 May 2024 21:09:54 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=digikod.net header.i=@digikod.net header.b="d3yrHP/w" Received: from smtp-bc0e.mail.infomaniak.ch (smtp-bc0e.mail.infomaniak.ch [45.157.188.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A9BDC1BF6DD for ; Thu, 2 May 2024 21:09:51 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=45.157.188.14 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714684193; cv=none; b=aB2DQWC4V+wndHxiSiNRw4ZmajHhxjel+Mx+OsNK844VuSYDlx+HdCDK5x2XRlkJHgLDCfoycBGiGlVAFQguvA+dO6qzC/A1O/S+zd5ec5ncImOOr+diETA/QRhKXMgZ79bAKf7RB9a0Poc7caH6EMeaBceUMpe7FOflGZYubJQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714684193; c=relaxed/simple; bh=XnNvbVOvU4F5weoM+nSBWGkMjO8ZUXv5u56jNpFRhMc=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=UdcK8BbBEpeGmGlK5vn8b0kL0zsHcK9zYWTgzJgOkfS2j003DtB+weQdB7QkYhCHyF58yn9xM/Fx6Z+FF6GKBaFngPMWzMdANXCDTws+DD3OtMuVz9mXGnXUuh/MG0efMcyFonJlDUYgS5NivdHSBW7tIfuJuhPHLkkHdZGtKt8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=digikod.net; spf=pass smtp.mailfrom=digikod.net; dkim=pass (1024-bit key) header.d=digikod.net header.i=@digikod.net header.b=d3yrHP/w; arc=none smtp.client-ip=45.157.188.14 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=digikod.net Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=digikod.net Received: from smtp-4-0000.mail.infomaniak.ch (smtp-4-0000.mail.infomaniak.ch [10.7.10.107]) by smtp-3-3000.mail.infomaniak.ch (Postfix) with ESMTPS id 4VVmlr4SZfzNWZ; Thu, 2 May 2024 23:09:44 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=digikod.net; s=20191114; t=1714684184; bh=XnNvbVOvU4F5weoM+nSBWGkMjO8ZUXv5u56jNpFRhMc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=d3yrHP/wnJRvWQRF8X6PUw7IPQZ1t8RBIXhFFgPM8UV3YmBblpDz1z5rDAvo8nJnY ZsFdz98qt1c69Ewve/TFgGOp4tOkBMTFdW7rU4A3URJ3Sc+vyLMDTm7Gyru8WFuC2O 92CTfz59o0fAE9PTsZGjvVdeqsQf6V0h0kxYtcvk= Received: from unknown by smtp-4-0000.mail.infomaniak.ch (Postfix) with ESMTPA id 4VVmll0r8VzHKr; Thu, 2 May 2024 23:09:39 +0200 (CEST) From: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= To: Christian Brauner , Jakub Kicinski , Kees Cook , Mark Brown , Sean Christopherson , Shengyu Li , Shuah Khan Cc: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= , "David S . Miller" , =?UTF-8?q?G=C3=BCnther=20Noack?= , Will Drewry , kernel test robot , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org Subject: [PATCH v4 04/10] selftests/harness: Fix interleaved scheduling leading to race conditions Date: Thu, 2 May 2024 23:09:20 +0200 Message-ID: <20240502210926.145539-5-mic@digikod.net> In-Reply-To: <20240502210926.145539-1-mic@digikod.net> References: <20240502210926.145539-1-mic@digikod.net> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Infomaniak-Routing: alpha Fix a race condition when running several FIXTURE_TEARDOWN() managing the same resource. This fixes a race condition in the Landlock file system tests when creating or unmounting the same directory. Using clone3() with CLONE_VFORK guarantees that the child and grandchild test processes are sequentially scheduled. This is implemented with a new clone3_vfork() helper replacing the fork() call. This avoids triggering this error in __wait_for_test(): Test ended in some other way [127] Cc: Christian Brauner Cc: David S. Miller Cc: Günther Noack Cc: Jakub Kicinski Cc: Mark Brown Cc: Shuah Khan Cc: Will Drewry Fixes: 41cca0542d7c ("selftests/harness: Fix TEST_F()'s vfork handling") Reviewed-by: Kees Cook Signed-off-by: Mickaël Salaün Link: https://lore.kernel.org/r/20240502210926.145539-5-mic@digikod.net --- Changes since v2: * Replace __attribute__((__unused__)) with inline for clone3_vfork() (suggested by Kees and Jakub) --- tools/testing/selftests/kselftest_harness.h | 15 ++++++++++++++- 1 file changed, 14 insertions(+), 1 deletion(-) diff --git a/tools/testing/selftests/kselftest_harness.h b/tools/testing/selftests/kselftest_harness.h index 55699a762c45..9d7178a71c2c 100644 --- a/tools/testing/selftests/kselftest_harness.h +++ b/tools/testing/selftests/kselftest_harness.h @@ -66,6 +66,8 @@ #include #include #include +#include +#include #include "kselftest.h" @@ -80,6 +82,17 @@ # define TH_LOG_ENABLED 1 #endif +/* Wait for the child process to end but without sharing memory mapping. */ +static inline pid_t clone3_vfork(void) +{ + struct clone_args args = { + .flags = CLONE_VFORK, + .exit_signal = SIGCHLD, + }; + + return syscall(__NR_clone3, &args, sizeof(args)); +} + /** * TH_LOG() * @@ -1183,7 +1196,7 @@ void __run_test(struct __fixture_metadata *f, fflush(stdout); fflush(stderr); - t->pid = fork(); + t->pid = clone3_vfork(); if (t->pid < 0) { ksft_print_msg("ERROR SPAWNING TEST CHILD\n"); t->exit_code = KSFT_FAIL; -- 2.45.0