Received: by 2002:ab2:60d1:0:b0:1f7:5705:b850 with SMTP id i17csp1695285lqm; Fri, 3 May 2024 03:58:56 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWDaf8/wyFZUfPB3bwup9z0tzrbwxI/u74JKtK3nVPzI60b02zh8eLso2zyiriqos5lOeRrtxje9r8+D3eRFvgtP4EJmpVSPdDauKGLag== X-Google-Smtp-Source: AGHT+IFAqWQ7brgOBXmEwSqmtgdhbV9/o70ADueI7FXiJsixo3eeTPg78eIAeg9A2xfQolzxEzuc X-Received: by 2002:a17:906:face:b0:a55:bfe7:3e62 with SMTP id lu14-20020a170906face00b00a55bfe73e62mr1225450ejb.11.1714733936433; Fri, 03 May 2024 03:58:56 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714733936; cv=pass; d=google.com; s=arc-20160816; b=q3MRsR3reKhWeUGy9Go4Vv9emeYpLo7AnWXsPv4uoQbk8d3fymjSYc7d+0X2g35ant aiCHP9mpf30ZmRvnesvzBRRtXB8V09AJlHpSPuCnWgbaFjkscANMY/G7BIPO6Pl5Bonw khfQKj3gTKQyBH8pjbnUcjwL94KCIr+CNDUYdxaUEdCzqdkDAcYaPt47S//THE6g5YPC Fpc0UKepx53XGmBIeRpvHoLJLDpHzKxX2w5a5GeM1c2gkhFI+m5ZvVRzMcBuf2XUOBTd ywtlX2kQk/TO0ay5xFzW/a2aL0o9/ggqx570q5Ze8ANhmi8MOSrXDWXbKx3mirREEnUI x1IA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=uR4/qGxSOTVMbtGRpISXi8OnEg4z3wNdHLLL8JN4wV0=; fh=siSkyeuTkzLUvvmYOCEsHOQyZbylO5CVG0oIjh590fE=; b=sBR3Uj8E3Z30yo8Mshe93Qp4UWawg/OhEhI8G7QZSphylWNyGOjjCuDk6Va/KZ8+ey 7DD5hrLuX7h/6nWWYbyO/gKBQxd9irA48JjWrmf9nZhvNr6S9GsJuM+bqoE/PLOYLrPn ECEhHk9vJD7rukdr85DAhM0tfHhlZAKZgheSUVj/XNbYAYBYakUiNWaAP4vj0ZcSR0O8 gEf8A+67EkqMFho98JmaZbV9Y6HOu386DAxOHZYkw0T8PluFK7wbHAodjjM1SIOOB4Vt 6t2gDvSCbnFXWdDjG8/ILumwPJcNQUyzdDzBBPgVJ3oYbEywMe4rReQXMZib4DKZJtSg CNgw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@digikod.net header.s=20191114 header.b=ViuqFlyT; arc=pass (i=1 spf=pass spfdomain=digikod.net dkim=pass dkdomain=digikod.net); spf=pass (google.com: domain of linux-kernel+bounces-167548-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-167548-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id z10-20020a170906074a00b00a521fe7778esi1433824ejb.141.2024.05.03.03.58.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 03 May 2024 03:58:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-167548-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@digikod.net header.s=20191114 header.b=ViuqFlyT; arc=pass (i=1 spf=pass spfdomain=digikod.net dkim=pass dkdomain=digikod.net); spf=pass (google.com: domain of linux-kernel+bounces-167548-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-167548-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id F3CBC1F21635 for ; Fri, 3 May 2024 10:58:55 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9DB8115251A; Fri, 3 May 2024 10:58:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=digikod.net header.i=@digikod.net header.b="ViuqFlyT" Received: from smtp-190b.mail.infomaniak.ch (smtp-190b.mail.infomaniak.ch [185.125.25.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 304861514D5; Fri, 3 May 2024 10:58:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=185.125.25.11 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714733916; cv=none; b=krDegRzwg+QW4Whx+ezg4DBu5evzGB8UgRA7itg3BBMqGDe3i0LkJ0w+jweLSGhSdVwDd4sHEmrgefIuyNc7OTbMl1JhUMHNToQIdGwGI8GKLqsXYlMJ46+F1/3hWj4gyqyI9DKEQXT7lDN/aJEgdg2VeOnkK4wXxwj8BRjSACA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714733916; c=relaxed/simple; bh=fdS7g9OZWSVyYiFzvx5Vjx/iMPNyksye/pOut54QdLw=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version:Content-Type; b=gnw2guh2CRxLH7cB9tVyb7XJbe+x0tW6S2nZ3xiXVYVMYJ3z48oXIqaK7OSJlehq01XgV2mtN044f7oZ50Faom7MlhEhOzKIDdDUmzMoBNJzu8klL9M9NoLN/budAcIILxfu3ypUJmxTIxtkDTyJxjKQXn/qu68VIjZsi1oVlcI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=digikod.net; spf=pass smtp.mailfrom=digikod.net; dkim=pass (1024-bit key) header.d=digikod.net header.i=@digikod.net header.b=ViuqFlyT; arc=none smtp.client-ip=185.125.25.11 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=digikod.net Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=digikod.net Received: from smtp-4-0001.mail.infomaniak.ch (smtp-4-0001.mail.infomaniak.ch [10.7.10.108]) by smtp-4-3000.mail.infomaniak.ch (Postfix) with ESMTPS id 4VW7870Cg8z3j0; Fri, 3 May 2024 12:58:31 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=digikod.net; s=20191114; t=1714733910; bh=fdS7g9OZWSVyYiFzvx5Vjx/iMPNyksye/pOut54QdLw=; h=From:To:Cc:Subject:Date:From; b=ViuqFlyT6F0/nXHVXXY4zPieTYIyYqudSQ5VPCUi1FOX7dhb3F8Wz0ckvP+mX6QjE boQ4yyv1n/KEau6gcg7J1BjEJR/Jm+ariUYom6vNO+T1gIXSxE4T8AnBAxi+vslLZI xqIh+ae8jpIikO37aptyiLwq2XU/AFzn+Ht8LIJs= Received: from unknown by smtp-4-0001.mail.infomaniak.ch (Postfix) with ESMTPA id 4VW7860V4rzYJW; Fri, 3 May 2024 12:58:30 +0200 (CEST) From: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= To: Christian Brauner , Jakub Kicinski , Kees Cook , Mark Brown , Sean Christopherson , Shengyu Li , Shuah Khan Cc: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= , "David S . Miller" , =?UTF-8?q?G=C3=BCnther=20Noack?= , Will Drewry , kernel test robot , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, netdev@vger.kernel.org Subject: [PATCH v5 00/10] Fix Kselftest's vfork() side effects Date: Fri, 3 May 2024 12:58:10 +0200 Message-ID: <20240503105820.300927-1-mic@digikod.net> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Infomaniak-Routing: alpha Hi, This fifth series fixes _metadata reset and fixes the last patch to handle code set with direct calls to _exit(). As reported by Kernel Test Robot [1], some pidfd tests fail. This is due to the use of vfork() which introduced some side effects. Similarly, while making it more generic, a previous commit made some Landlock file system tests flaky, and subject to the host's file system mount configuration. This series fixes all these side effects by replacing vfork() with clone3() and CLONE_VFORK, which is cleaner (no arbitrary shared memory) and makes the Kselftest framework more robust. I tried different approaches and I found this one to be the cleaner and less invasive for current test cases. I successfully ran the following tests (using TEST_F and fork/clone/clone3, and KVM_ONE_VCPU_TEST) with this series: - kvm:fix_hypercall_test - kvm:sync_regs_test - kvm:userspace_msr_exit_test - kvm:vmx_pmu_caps_test - landlock:fs_test - landlock:net_test - landlock:ptrace_test - move_mount_set_group:move_mount_set_group_test - net/af_unix:scm_pidfd - perf_events:remove_on_exec - pidfd:pidfd_getfd_test - pidfd:pidfd_setns_test - seccomp:seccomp_bpf - user_events:abi_test [1] https://lore.kernel.org/oe-lkp/202403291015.1fcfa957-oliver.sang@intel.com Previous versions: v1: https://lore.kernel.org/r/20240426172252.1862930-1-mic@digikod.net v2: https://lore.kernel.org/r/20240429130931.2394118-1-mic@digikod.net v3: https://lore.kernel.org/r/20240429191911.2552580-1-mic@digikod.net v4: https://lore.kernel.org/r/20240502210926.145539-1-mic@digikod.net Regards, Mickaël Salaün (10): selftests/pidfd: Fix config for pidfd_setns_test selftests/landlock: Fix FS tests when run on a private mount point selftests/harness: Fix fixture teardown selftests/harness: Fix interleaved scheduling leading to race conditions selftests/landlock: Do not allocate memory in fixture data selftests/harness: Constify fixture variants selftests/pidfd: Fix wrong expectation selftests/harness: Share _metadata between forked processes selftests/harness: Fix vfork() side effects selftests/harness: Handle TEST_F()'s explicit exit codes tools/testing/selftests/kselftest_harness.h | 122 +++++++++++++----- tools/testing/selftests/landlock/fs_test.c | 83 +++++++----- tools/testing/selftests/pidfd/config | 2 + .../selftests/pidfd/pidfd_setns_test.c | 2 +- 4 files changed, 143 insertions(+), 66 deletions(-) base-commit: e67572cd2204894179d89bd7b984072f19313b03 -- 2.45.0