Received: by 2002:ab2:6a05:0:b0:1f8:1780:a4ed with SMTP id w5csp1170993lqo; Sat, 11 May 2024 10:15:41 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCW/rXSzkeRLwWxVlvLxip+Utx5bm+qLl7zlimm9yOHNOnyPpgopDIeXmbO2D28NTfvYPS98wEVYj2tB1T/W6pTetAkKn4aFpTX/bS4auA== X-Google-Smtp-Source: AGHT+IGG+Fo/doT8i0TZ8KF9GgIz7yfcmlVfeyZ+u+CZ9WzDoJgJtT+KA0zPpY1o/SRSpnBtVCgW X-Received: by 2002:a05:6214:2dc8:b0:6a0:d291:a349 with SMTP id 6a1803df08f44-6a168250713mr70564956d6.54.1715447740734; Sat, 11 May 2024 10:15:40 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1715447740; cv=pass; d=google.com; s=arc-20160816; b=Qg6lSl3apKSQI6hOUqLWqzkiOzxlhznUo3gzd1davekC9dqRiMjhpjU3Ea5e+P/9if lL9Aa5SHSXyagKiT+yMadoXpnmjxrSnteThaGYtr8pmoUSeHRE4Dtfa7e6jjWTY8b12c KgRggnTi/WbVPLzsXBkFZcdJ4ZWp0dDv5O/r8d3mJb4KnOa+e4BqzVZ2R0JWrpy7E6c/ ONQ0ouOFOB/trs/DXVXXprh2/FsRFJ1WJLpUp3SuepuW+ZxwqxD3vubVxKjffqE2pZ97 o/rZrknFsGwzctwswXv2xKVTv++8s/IsgE8d29MakNRgyFiRpP8nWwYDt0rl4YzoomgV G8uQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=AhX78OfDbhvNohV5s96n3dHIuZwZXD9GikV+VwHjPBk=; fh=h2xHIZSGiUwuZyladnT9pE6uX086qy42ByZk41PjzSs=; b=qXZi4YvJ4R1lwa1F3DgQkd2MON+W8dId65vLGo8m8RU1pZxV8wRdns8vhQSFhKcbXZ Hh8QtFaPEJkCcIfE4UMNVqhRmOoIAbrRb4TMHArQRNfRL2tbx1PxJljEU8aHdH7RFUZd RmtWQM1fNgWLlpI3t11JewYOJfpQwrXIjvZZsvyLuLRqfhb6Qkw6uTJToQoPvasU3O59 q2q2QqDlSHLJBP9cuRmEbUlyj/NbdT2aRqegHngRerS2u8Soi7vKT5rrJpMR0nL/fAqr mns9igFcQNgVU/EYShuZ/dtZzuR6fRxFekYshMyqT4Z1DWSe8aanEyezVTy7eA1W2OV1 M8+Q==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@digikod.net header.s=20191114 header.b=N0dHxiYm; arc=pass (i=1 spf=pass spfdomain=digikod.net dkim=pass dkdomain=digikod.net); spf=pass (google.com: domain of linux-kernel+bounces-176654-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-176654-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id 6a1803df08f44-6a15f1d6e71si61198586d6.80.2024.05.11.10.15.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 11 May 2024 10:15:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-176654-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@digikod.net header.s=20191114 header.b=N0dHxiYm; arc=pass (i=1 spf=pass spfdomain=digikod.net dkim=pass dkdomain=digikod.net); spf=pass (google.com: domain of linux-kernel+bounces-176654-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-176654-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 769FC1C20BA7 for ; Sat, 11 May 2024 17:15:40 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 372E4208D7; Sat, 11 May 2024 17:15:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=digikod.net header.i=@digikod.net header.b="N0dHxiYm" Received: from smtp-bc0e.mail.infomaniak.ch (smtp-bc0e.mail.infomaniak.ch [45.157.188.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A69CD1B960; Sat, 11 May 2024 17:14:59 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=45.157.188.14 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715447704; cv=none; b=Z1eIEyRGMqv0Z+mD6K2hHBoaO19WPtMHYR/VirtFHO8HfL3FWkzyU20AzgjgkOEmjuCy4iEWlg0rLaY9FkCIT06FXiNHeJcMpWTZh0IrLBdFZLM8hO0scXM6l8ASeFmoXGH61PczL6rodMPwK4JDxdyGaM7JYCZEIEyAaIZuXHU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715447704; c=relaxed/simple; bh=+tQTqpBZCO71TI+xI+ycJvxEwQZ2ovGc4EulihGFtA4=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version:Content-Type; b=EEnRLHdmtcKiWLYY/h+7m25p4NXyl9CzmN0drRzPzxO3DQ3wEafrLabngauep2U6OXlCc4eQZWCF2T2EZCE5Zq9xYygEMUQQd3spnl5e/cP6knayhNrMBN+bvyVVapv+FARShPjGeGmkoXj5GaUwrQCk+GSqCqmRUKxn/Jj7hNU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=digikod.net; spf=pass smtp.mailfrom=digikod.net; dkim=pass (1024-bit key) header.d=digikod.net header.i=@digikod.net header.b=N0dHxiYm; arc=none smtp.client-ip=45.157.188.14 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=digikod.net Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=digikod.net Received: from smtp-4-0000.mail.infomaniak.ch (smtp-4-0000.mail.infomaniak.ch [10.7.10.107]) by smtp-3-3000.mail.infomaniak.ch (Postfix) with ESMTPS id 4VcC6g06BzzZwN; Sat, 11 May 2024 19:14:51 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=digikod.net; s=20191114; t=1715447690; bh=AhX78OfDbhvNohV5s96n3dHIuZwZXD9GikV+VwHjPBk=; h=From:To:Cc:Subject:Date:From; b=N0dHxiYmx8vVCys6IRVXrYH2dIepVwv2/zMpcy+tQzcVlIsHRbh/USCROwlSJ6UnD 4Bh6tkCOOX2dNo9htOlBc63EMhcAuI3Z6Rn7RFHEGt3VmFLvAIIxtqFD4XL9Sa5r4m ZOAauyRkkzriLHck1Jl9r4HjGL+PSbfDZBHJ9mi4= Received: from unknown by smtp-4-0000.mail.infomaniak.ch (Postfix) with ESMTPA id 4VcC6c3FkrzRFZ; Sat, 11 May 2024 19:14:48 +0200 (CEST) From: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= To: Christian Brauner , Greg Kroah-Hartman , Jakub Kicinski , Kees Cook , Linus Torvalds , Mark Brown , Sasha Levin , Sean Christopherson , Shengyu Li , Shuah Khan , Shuah Khan Cc: =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= , Bagas Sanjaya , Brendan Higgins , David Gow , "David S . Miller" , Florian Fainelli , =?UTF-8?q?G=C3=BCnther=20Noack?= , Jon Hunter , Ron Economos , Ronald Warsow , Stephen Rothwell , Will Drewry , kernel test robot , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, netdev@vger.kernel.org, stable@vger.kernel.org Subject: [PATCH v7 00/10] Fix Kselftest's vfork() side effects Date: Sat, 11 May 2024 19:14:35 +0200 Message-ID: <20240511171445.904356-1-mic@digikod.net> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Infomaniak-Routing: alpha Hi, This seven series fix an issue reported by kernel test robot [3]. Shuah, I (as well as Kees and Sean [4]) think this should be in -next really soon to make sure everything works fine for the v6.9 release, which is not currently the case. I cannot test against all kselftests though. I would prefer to let you handle this, but I guess you're not able to do so and I'll push it on my branch without reply from you. Even if I push it on my branch, please push it on yours too as soon as you see this and I'll remove it from mine. Mark, Jakub, could you please test this series? As reported by Kernel Test Robot [1] and Sean Christopherson [2], some tests fail since v6.9-rc1 . This is due to the use of vfork() which introduced some side effects. Similarly, while making it more generic, a previous commit made some Landlock file system tests flaky, and subject to the host's file system mount configuration. This series fixes all these side effects by replacing vfork() with clone3() and CLONE_VFORK, which is cleaner (no arbitrary shared memory) and makes the Kselftest framework more robust. I tried different approaches and I found this one to be the cleaner and less invasive for current test cases. I successfully ran the following tests (using TEST_F and fork/clone/clone3, and KVM_ONE_VCPU_TEST) with this series: - kvm:fix_hypercall_test - kvm:sync_regs_test - kvm:userspace_msr_exit_test - kvm:vmx_pmu_caps_test - landlock:fs_test - landlock:net_test - landlock:ptrace_test - move_mount_set_group:move_mount_set_group_test - net/af_unix:scm_pidfd - perf_events:remove_on_exec - pidfd:pidfd_getfd_test - pidfd:pidfd_setns_test - seccomp:seccomp_bpf - user_events:abi_test [1] https://lore.kernel.org/oe-lkp/202403291015.1fcfa957-oliver.sang@intel.com [2] https://lore.kernel.org/r/ZjPelW6-AbtYvslu@google.com [3] https://lore.kernel.org/r/202405100339.vfBe0t9C-lkp@intel.com [4] https://lore.kernel.org/r/202405061002.01D399877A@keescook Previous versions: v1: https://lore.kernel.org/r/20240426172252.1862930-1-mic@digikod.net v2: https://lore.kernel.org/r/20240429130931.2394118-1-mic@digikod.net v3: https://lore.kernel.org/r/20240429191911.2552580-1-mic@digikod.net v4: https://lore.kernel.org/r/20240502210926.145539-1-mic@digikod.net v5: https://lore.kernel.org/r/20240503105820.300927-1-mic@digikod.net v6: https://lore.kernel.org/r/20240506165518.474504-1-mic@digikod.net Regards, Mickaël Salaün (10): selftests/pidfd: Fix config for pidfd_setns_test selftests/landlock: Fix FS tests when run on a private mount point selftests/harness: Fix fixture teardown selftests/harness: Fix interleaved scheduling leading to race conditions selftests/landlock: Do not allocate memory in fixture data selftests/harness: Constify fixture variants selftests/pidfd: Fix wrong expectation selftests/harness: Share _metadata between forked processes selftests/harness: Fix vfork() side effects selftests/harness: Handle TEST_F()'s explicit exit codes tools/testing/selftests/kselftest_harness.h | 127 +++++++++++++----- tools/testing/selftests/landlock/fs_test.c | 83 +++++++----- tools/testing/selftests/pidfd/config | 2 + .../selftests/pidfd/pidfd_setns_test.c | 2 +- 4 files changed, 147 insertions(+), 67 deletions(-) base-commit: e67572cd2204894179d89bd7b984072f19313b03 -- 2.45.0