Received: by 2002:a89:288:0:b0:1f7:eeee:6653 with SMTP id j8csp19029lqh; Mon, 6 May 2024 09:56:09 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUvecmolfEbAVyWtKFGC1FJF590ovSKUh8i7t1WpFDSuQ1AHYNiYeI+Y6SBjXhISEKjq6UnfKxW6hcbXa71+nnfnDT93nB5IpRgYJGNPw== X-Google-Smtp-Source: AGHT+IEQmnXWnOMQK1cN4KaCGLUIS/ng1lOrKpu3Uq5C+wwoVXGaX34V20N4AGtaIiciZfoUvrje X-Received: by 2002:a05:620a:244a:b0:792:93ec:52ce with SMTP id h10-20020a05620a244a00b0079293ec52cemr6690969qkn.3.1715014569698; Mon, 06 May 2024 09:56:09 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1715014569; cv=pass; d=google.com; s=arc-20160816; b=B4z3YoswssBCfya5XEk7p7i+TV99eUPEoTJTeSO4mP+mP1NpYbk76xFdQxEaLhQTh0 Zd5K74WmQeJQj8XppjHYyJaTRU+/4NiZTV4YFWjSMk1C0Md/442dQl9qh2VJsjUmJVkN KHCrZeJkNB0fXLKQNPvlJ4HWGnihdqM55gUH/Xq2EmSsSNWpNsVaziLIfNGWXO3+la0o /LBq8eBvHo5P35+WWlKp4wTqu8ywPbUWFTA1Cr5DYH+985+krZG493UN/v2vXycS8jyc CGj3vcHwWXIiiPxPiCn95MTlcHCvi7SEqm0p6845S9957wP6DUrFf7GhW55Mcu5cw8lo ruNA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=FNwP5NP2hzf0guG4BlgFOQE7tAsrTREBgnGR5DpoklY=; fh=h2xHIZSGiUwuZyladnT9pE6uX086qy42ByZk41PjzSs=; b=Jqyt9u4ORrS/Rk0keNW1Q3hhyFcowjyy+GKerEnjDuLT+3BUMbdb3gck+OjZXyDgn1 litpt+CLuV4WkVorcQeenl47A7W2VQJLzbxdUL0AKU4NbsV0ESCo6WY92fOUI2acbVlI 2dyyMnEqrANxmpxtP8q3d7pXYfz1fEJcMc+n0QE3IZsHk7YBAVjR2dGmmYBKS9gc88y8 0l0w2FFrwtSOb05OwsFU5ilNEtq1khK13Ox/tY7xgFcw2dVMFKjqoOGoH+6UqBzeLUca VpgDSWOMBvlSsbLiIkdTFgXx80Ih2OGJwTzf6lGt8Okp4/+mQDhufCwMBgoapMAWaCue JrfA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@digikod.net header.s=20191114 header.b=0MfOT0xP; arc=pass (i=1 spf=pass spfdomain=digikod.net dkim=pass dkdomain=digikod.net); spf=pass (google.com: domain of linux-kernel+bounces-170198-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-170198-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id pe3-20020a05620a850300b0078d678da2bcsi7245479qkn.770.2024.05.06.09.56.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 06 May 2024 09:56:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-170198-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@digikod.net header.s=20191114 header.b=0MfOT0xP; arc=pass (i=1 spf=pass spfdomain=digikod.net dkim=pass dkdomain=digikod.net); spf=pass (google.com: domain of linux-kernel+bounces-170198-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-170198-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 5D9581C21276 for ; Mon, 6 May 2024 16:56:09 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 8720F1586F1; Mon, 6 May 2024 16:55:34 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=digikod.net header.i=@digikod.net header.b="0MfOT0xP" Received: from smtp-8fae.mail.infomaniak.ch (smtp-8fae.mail.infomaniak.ch [83.166.143.174]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E1BE6156F57 for ; Mon, 6 May 2024 16:55:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=83.166.143.174 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715014533; cv=none; b=kRPd/mGHNfhMddTjr8ba5wePyNnFLVrbzHic96RkfsTbK3OiyFfd1udPWfuzBEoaf6ZLq0s6L0N9WXrwNG5g7QD6jJpVG1eJs5wqdKeSuqG2gb1cc634z9TtuiWzP+wAdIbPEa4Havo1dRUg/f5+Uya7Et0gKXcZJ/fpLOFkHuw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715014533; c=relaxed/simple; bh=8WXJkdX/4/+veG9WAOzi1ndePP+YpIaIGvCclyQG1xU=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version:Content-Type; b=i/yovNJGY7hf2xpbfBVMT3KIxqjcPibiHRL0b8nRU4qT6kYJXXvVr4RMqgGWwhXKhzneVblp+QhUoFsYdSfvnie5W/+r6dkYIsNYIKmJD6QV1qfrZcV13EBYg3r2KNJS9s8rYMcye43t99Ty2OPkJoSTqoou2ZsQcquBP8NZqlk= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=digikod.net; spf=pass smtp.mailfrom=digikod.net; dkim=pass (1024-bit key) header.d=digikod.net header.i=@digikod.net header.b=0MfOT0xP; arc=none smtp.client-ip=83.166.143.174 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=digikod.net Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=digikod.net Received: from smtp-3-0000.mail.infomaniak.ch (smtp-3-0000.mail.infomaniak.ch [10.4.36.107]) by smtp-3-3000.mail.infomaniak.ch (Postfix) with ESMTPS id 4VY6wW2787z1mB; Mon, 6 May 2024 18:55:23 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=digikod.net; s=20191114; t=1715014523; bh=8WXJkdX/4/+veG9WAOzi1ndePP+YpIaIGvCclyQG1xU=; h=From:To:Cc:Subject:Date:From; b=0MfOT0xP98tgT/5+SomnDxdohs2Y48SX45KtTePd76eDIu/sF5BDBxYo1KlzWAllj VZvfowjev+0Qi4Rti++4R5OWWPOYuR9uYGNjS+ImJWD5G8IxYV/fO5Iesvmf7ryDOz pfzUgeUa11sfMKskRv2imMnwElLPv+GpB1QsXeuw= Received: from unknown by smtp-3-0000.mail.infomaniak.ch (Postfix) with ESMTPA id 4VY6wS6ZFYz3pZ; Mon, 6 May 2024 18:55:20 +0200 (CEST) From: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= To: Christian Brauner , Greg Kroah-Hartman , Jakub Kicinski , Kees Cook , Linus Torvalds , Mark Brown , Sasha Levin , Sean Christopherson , Shengyu Li , Shuah Khan , Shuah Khan Cc: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= , Bagas Sanjaya , Brendan Higgins , David Gow , "David S . Miller" , Florian Fainelli , =?UTF-8?q?G=C3=BCnther=20Noack?= , Jon Hunter , Ron Economos , Ronald Warsow , Stephen Rothwell , Will Drewry , kernel test robot , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, netdev@vger.kernel.org, stable@vger.kernel.org Subject: [PATCH v6 00/10] Fix Kselftest's vfork() side effects Date: Mon, 6 May 2024 18:55:08 +0200 Message-ID: <20240506165518.474504-1-mic@digikod.net> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Infomaniak-Routing: alpha Hi, This sixth series just update the last patch description. Shuah, I think this should be in -next really soon to make sure everything works fine for the v6.9 release, which is not currently the case. I cannot test against all kselftests though. I would prefer to let you handle this, but I guess you're not able to do so and I'll push it on my branch without reply from you. Even if I push it on my branch, please push it on yours too as soon as you see this and I'll remove it from mine. Mark, Jakub, could you please test this series? As reported by Kernel Test Robot [1] and Sean Christopherson [2], some tests fail since v6.9-rc1 . This is due to the use of vfork() which introduced some side effects. Similarly, while making it more generic, a previous commit made some Landlock file system tests flaky, and subject to the host's file system mount configuration. This series fixes all these side effects by replacing vfork() with clone3() and CLONE_VFORK, which is cleaner (no arbitrary shared memory) and makes the Kselftest framework more robust. I tried different approaches and I found this one to be the cleaner and less invasive for current test cases. I successfully ran the following tests (using TEST_F and fork/clone/clone3, and KVM_ONE_VCPU_TEST) with this series: - kvm:fix_hypercall_test - kvm:sync_regs_test - kvm:userspace_msr_exit_test - kvm:vmx_pmu_caps_test - landlock:fs_test - landlock:net_test - landlock:ptrace_test - move_mount_set_group:move_mount_set_group_test - net/af_unix:scm_pidfd - perf_events:remove_on_exec - pidfd:pidfd_getfd_test - pidfd:pidfd_setns_test - seccomp:seccomp_bpf - user_events:abi_test [1] https://lore.kernel.org/oe-lkp/202403291015.1fcfa957-oliver.sang@intel.com [2] https://lore.kernel.org/r/ZjPelW6-AbtYvslu@google.com Previous versions: v1: https://lore.kernel.org/r/20240426172252.1862930-1-mic@digikod.net v2: https://lore.kernel.org/r/20240429130931.2394118-1-mic@digikod.net v3: https://lore.kernel.org/r/20240429191911.2552580-1-mic@digikod.net v4: https://lore.kernel.org/r/20240502210926.145539-1-mic@digikod.net v5: https://lore.kernel.org/r/20240503105820.300927-1-mic@digikod.net Regards, Mickaël Salaün (10): selftests/pidfd: Fix config for pidfd_setns_test selftests/landlock: Fix FS tests when run on a private mount point selftests/harness: Fix fixture teardown selftests/harness: Fix interleaved scheduling leading to race conditions selftests/landlock: Do not allocate memory in fixture data selftests/harness: Constify fixture variants selftests/pidfd: Fix wrong expectation selftests/harness: Share _metadata between forked processes selftests/harness: Fix vfork() side effects selftests/harness: Handle TEST_F()'s explicit exit codes tools/testing/selftests/kselftest_harness.h | 122 +++++++++++++----- tools/testing/selftests/landlock/fs_test.c | 83 +++++++----- tools/testing/selftests/pidfd/config | 2 + .../selftests/pidfd/pidfd_setns_test.c | 2 +- 4 files changed, 143 insertions(+), 66 deletions(-) base-commit: e67572cd2204894179d89bd7b984072f19313b03 -- 2.45.0