[LTP] [PATCH] unshare03: using soft limit of NOFILE
Petr Vorel
pvorel@suse.cz
Fri Mar 28 09:50:20 CET 2025
Hi lufei, Al,
> Hi Petr,
> Yes, kselftest tools/testing/selftests/core/unshare_test.c failed as
> well, dup2 failed:
> ```
> unshare_test.c:60:unshare_EMFILE:Expected dup2(2, nr_open + 64) (-1) >= 0 (0)
> ```
Thanks for info. Maybe also sending a patch to kselftest?
Kind regards,
Petr
PS: lufei, please keep Cc to keep other informed.
> Thanks for reply.
> Best regards.
> On Thu, Mar 27, 2025 at 11:33:36AM +0100, Petr Vorel wrote:
> > Hi lufei, Al,
> > @Al, you're the author of the original test unshare_test.c [1] in kselftest.
> > This is a patch to LTP test unshare03.c, which is based on your test.
> > > I think it's safer to set NOFILE increasing from soft limit than from
> > > hard limit.
> > > Hard limit may lead to dup2 ENOMEM error which bring the result to
> > > TBROK on little memory machine. (e.g. 2GB memory in my situation, hard
> > > limit in /proc/sys/fs/nr_open come out to be 1073741816)
> > IMHO lowering number to ~ half (in my case) by using rlimit.rlim_max instead of
> > /proc/sys/fs/nr_open should not affect the functionality of the test, right?
> > Or am I missing something obvious?
> > @lufei I guess kselftest tools/testing/selftests/core/unshare_test.c would fail
> > for you as well, right?
> > Kind regards,
> > Petr
> > [1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=611fbeb44a777e5ab54ab3127ec85f72147911d8
> > > Signed-off-by: lufei <lufei@uniontech.com>
> > > ---
> > > testcases/kernel/syscalls/unshare/unshare03.c | 14 ++++++--------
> > > 1 file changed, 6 insertions(+), 8 deletions(-)
> > > diff --git a/testcases/kernel/syscalls/unshare/unshare03.c b/testcases/kernel/syscalls/unshare/unshare03.c
> > > index 7c5e71c4e..bb568264c 100644
> > > --- a/testcases/kernel/syscalls/unshare/unshare03.c
> > > +++ b/testcases/kernel/syscalls/unshare/unshare03.c
> > > @@ -24,7 +24,7 @@
> > > static void run(void)
> > > {
> > > - int nr_open;
> > > + int rlim_max;
> > > int nr_limit;
> > > struct rlimit rlimit;
> > > struct tst_clone_args args = {
> > > @@ -32,14 +32,12 @@ static void run(void)
> > > .exit_signal = SIGCHLD,
> > > };
> > > - SAFE_FILE_SCANF(FS_NR_OPEN, "%d", &nr_open);
> > > - tst_res(TDEBUG, "Maximum number of file descriptors: %d", nr_open);
> > > + SAFE_GETRLIMIT(RLIMIT_NOFILE, &rlimit);
> > > + rlim_max = rlimit.rlim_max;
> > > - nr_limit = nr_open + NR_OPEN_LIMIT;
> > > + nr_limit = rlim_max + NR_OPEN_LIMIT;
> > > SAFE_FILE_PRINTF(FS_NR_OPEN, "%d", nr_limit);
> > > - SAFE_GETRLIMIT(RLIMIT_NOFILE, &rlimit);
> > > -
> > > rlimit.rlim_cur = nr_limit;
> > > rlimit.rlim_max = nr_limit;
> > > @@ -47,10 +45,10 @@ static void run(void)
> > > tst_res(TDEBUG, "Set new maximum number of file descriptors to : %d",
> > > nr_limit);
> > > - SAFE_DUP2(2, nr_open + NR_OPEN_DUP);
> > > + SAFE_DUP2(2, rlim_max + NR_OPEN_DUP);
> > > if (!SAFE_CLONE(&args)) {
> > > - SAFE_FILE_PRINTF(FS_NR_OPEN, "%d", nr_open);
> > > + SAFE_FILE_PRINTF(FS_NR_OPEN, "%d", rlim_max);
> > > TST_EXP_FAIL(unshare(CLONE_FILES), EMFILE);
> > > exit(0);
> > > }
More information about the ltp
mailing list