[LTP] [PATCH v5] unshare03.c: Add test coverage for dup_fd() failure handling in unshare_fd()

Andrea Cervesato andrea.cervesato@suse.com
Thu Mar 6 09:23:00 CET 2025


Hi!

Pushed with a small edit to define limits on top. Commit title was a bit 
too long, so I changed it.

Reviewed-by: Andrea Cervesato <andrea.cervesato@suse.com>

diff --git a/testcases/kernel/syscalls/unshare/unshare03.c 
b/testcases/kernel/syscalls/unshare/unshare03.c
index 7298cdebe..7c5e71c4e 100644
--- a/testcases/kernel/syscalls/unshare/unshare03.c
+++ b/testcases/kernel/syscalls/unshare/unshare03.c
@@ -17,12 +17,15 @@
  #include "lapi/sched.h"

  #define FS_NR_OPEN "/proc/sys/fs/nr_open"
+#define NR_OPEN_LIMIT 1024
+#define NR_OPEN_DUP 64

  #ifdef HAVE_UNSHARE

  static void run(void)
  {
      int nr_open;
+    int nr_limit;
      struct rlimit rlimit;
      struct tst_clone_args args = {
          .flags = CLONE_FILES,
@@ -32,18 +35,19 @@ static void run(void)
      SAFE_FILE_SCANF(FS_NR_OPEN, "%d", &nr_open);
      tst_res(TDEBUG, "Maximum number of file descriptors: %d", nr_open);

-    SAFE_FILE_PRINTF(FS_NR_OPEN, "%d", nr_open + 1024);
+    nr_limit = nr_open + NR_OPEN_LIMIT;
+    SAFE_FILE_PRINTF(FS_NR_OPEN, "%d", nr_limit);

      SAFE_GETRLIMIT(RLIMIT_NOFILE, &rlimit);

-    rlimit.rlim_cur = nr_open + 1024;
-    rlimit.rlim_max = nr_open + 1024;
+    rlimit.rlim_cur = nr_limit;
+    rlimit.rlim_max = nr_limit;

      SAFE_SETRLIMIT(RLIMIT_NOFILE, &rlimit);
      tst_res(TDEBUG, "Set new maximum number of file descriptors to : %d",
-        nr_open + 1024);
+        nr_limit);

-    SAFE_DUP2(2, nr_open + 64);
+    SAFE_DUP2(2, nr_open + NR_OPEN_DUP);

      if (!SAFE_CLONE(&args)) {
          SAFE_FILE_PRINTF(FS_NR_OPEN, "%d", nr_open);

Andrea

On 3/6/25 03:22, Wei Gao via ltp wrote:
> Add a test case based on kernel self-test unshare_test.c to check that
> the kernel handles the EMFILE error when a parent process changes file
> descriptor limits and the child process tries to unshare (CLONE_FILES).
>
> Signed-off-by: Wei Gao <wegao@suse.com>
> ---
>   runtest/syscalls                              |  1 +
>   testcases/kernel/syscalls/unshare/.gitignore  |  1 +
>   testcases/kernel/syscalls/unshare/unshare03.c | 74 +++++++++++++++++++
>   3 files changed, 76 insertions(+)
>   create mode 100644 testcases/kernel/syscalls/unshare/unshare03.c
>
> diff --git a/runtest/syscalls b/runtest/syscalls
> index ded035ee8..10800c1a3 100644
> --- a/runtest/syscalls
> +++ b/runtest/syscalls
> @@ -1715,6 +1715,7 @@ unlinkat01 unlinkat01
>   
>   unshare01 unshare01
>   unshare02 unshare02
> +unshare03 unshare03
>   
>   #
>   # These tests require an unmounted block device
> diff --git a/testcases/kernel/syscalls/unshare/.gitignore b/testcases/kernel/syscalls/unshare/.gitignore
> index 855ffd055..e5b5c261d 100644
> --- a/testcases/kernel/syscalls/unshare/.gitignore
> +++ b/testcases/kernel/syscalls/unshare/.gitignore
> @@ -1,2 +1,3 @@
>   /unshare01
>   /unshare02
> +/unshare03
> diff --git a/testcases/kernel/syscalls/unshare/unshare03.c b/testcases/kernel/syscalls/unshare/unshare03.c
> new file mode 100644
> index 000000000..7298cdebe
> --- /dev/null
> +++ b/testcases/kernel/syscalls/unshare/unshare03.c
> @@ -0,0 +1,74 @@
> +// SPDX-License-Identifier: GPL-2.0-or-later
> +/*
> + * Copyright (c) 2024 Al Viro <viro@zeniv.linux.org.uk>
> + * Copyright (C) 2024 Wei Gao <wegao@suse.com>
> + */
> +
> +/*\
> + * This test case based on kernel self-test unshare_test.c to check that
> + * the kernel handles the EMFILE error when a parent process changes file
> + * descriptor limits and the child process tries to unshare (CLONE_FILES).
> + */
> +
> +#define _GNU_SOURCE
> +
> +#include "tst_test.h"
> +#include "config.h"
> +#include "lapi/sched.h"
> +
> +#define FS_NR_OPEN "/proc/sys/fs/nr_open"
> +
> +#ifdef HAVE_UNSHARE
> +
> +static void run(void)
> +{
> +	int nr_open;
> +	struct rlimit rlimit;
> +	struct tst_clone_args args = {
> +		.flags = CLONE_FILES,
> +		.exit_signal = SIGCHLD,
> +	};
> +
> +	SAFE_FILE_SCANF(FS_NR_OPEN, "%d", &nr_open);
> +	tst_res(TDEBUG, "Maximum number of file descriptors: %d", nr_open);
> +
> +	SAFE_FILE_PRINTF(FS_NR_OPEN, "%d", nr_open + 1024);
> +
> +	SAFE_GETRLIMIT(RLIMIT_NOFILE, &rlimit);
> +
> +	rlimit.rlim_cur = nr_open + 1024;
> +	rlimit.rlim_max = nr_open + 1024;
> +
> +	SAFE_SETRLIMIT(RLIMIT_NOFILE, &rlimit);
> +	tst_res(TDEBUG, "Set new maximum number of file descriptors to : %d",
> +		nr_open + 1024);
> +
> +	SAFE_DUP2(2, nr_open + 64);
> +
> +	if (!SAFE_CLONE(&args)) {
> +		SAFE_FILE_PRINTF(FS_NR_OPEN, "%d", nr_open);
> +		TST_EXP_FAIL(unshare(CLONE_FILES), EMFILE);
> +		exit(0);
> +	}
> +
> +}
> +
> +static void setup(void)
> +{
> +	clone3_supported_by_kernel();
> +}
> +
> +static struct tst_test test = {
> +	.forks_child = 1,
> +	.needs_root = 1,
> +	.test_all = run,
> +	.setup = setup,
> +	.save_restore = (const struct tst_path_val[]) {
> +		{FS_NR_OPEN, NULL, TST_SR_TCONF},
> +		{}
> +	},
> +};
> +
> +#else
> +TST_TEST_TCONF("unshare syscall is undefined.");
> +#endif


More information about the ltp mailing list