From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-oa1-x2e.google.com (mail-oa1-x2e.google.com [IPv6:2001:4860:4864:20::2e]) by sourceware.org (Postfix) with ESMTPS id ED13E388300F for ; Mon, 5 Jun 2023 17:12:00 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org ED13E388300F Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=linaro.org Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=linaro.org Received: by mail-oa1-x2e.google.com with SMTP id 586e51a60fabf-19a427d7b57so2818176fac.2 for ; Mon, 05 Jun 2023 10:12:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1685985120; x=1688577120; h=content-transfer-encoding:in-reply-to:organization:from:references :to:content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=uZebkEJNpMm8cLG9ZPGpjWs9jLPvjlpV5BZVxcMXyAs=; b=XC35R26wakyV2wJANrdLl/JB7aPbK1neyQ91DkmVYP9YXbjV+/eRVueezwxK/PYhm7 PdWKZwlpEuFumo61vzp3Odk9ABXj5ejof/3B/OFIOHyHop/1SUSQ+5pefLb1OmsJqZDk MWddLmNjyAOx+1cebTnnx3KiDFaROPHovY1DKar8gtA334YOIG7Z5hOEQX0wEd9FgL7r vjTJuJuqPDWDmCL8mReAZZjmQglQKgYeK9g6k68MTJMCZlXcvMwZ58YUGuoY4maHC7Zw FczTtsi6Ope6E3r0ARMQwdX8nAQtymkw5N2CxADZebrz7koDgavRO56/pOpMK3pnJQ/0 SxVQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685985120; x=1688577120; h=content-transfer-encoding:in-reply-to:organization:from:references :to:content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=uZebkEJNpMm8cLG9ZPGpjWs9jLPvjlpV5BZVxcMXyAs=; b=UQztTTVMauZTj2H4BJL7m2RhWmt7maPmXSCFyMHKTLwkY9bUeRIMWKIaNWkqtZ0EbJ ggnIucgKV29Ld6DbQqu8PzDbKm7AXdVdK5hpDeycULvAoTPHDWhjN5V5IgnnwrklWhyt wUYUMuNIIMV6mQLJeuUoMcpVPccw54NsnMEm+rNOBKzZpnkRCdRRR8KxfGUPlA19XNYY 9MIyw/DBZSVElWmd8BGBkYdl/aIjoPpIC2GiYoc9XnF9Dp+5eFAK9x9UDTZbZDfybv6n bBQqVwCjASxS86AfDQEC2EIjp9jyvF+nGIJ3ArWCdPwXsJWQ8uDdU148CVvv5zOrCfat KCgA== X-Gm-Message-State: AC+VfDwtF1ZtkBb+JJzsj+Po0WGtpEnCJDIq/rKSOfgOP9i33xjZ3tsi FcG0FPqPH/cJSZLedYU8vZcNo3iUDPqS5V7dmlysqQ== X-Google-Smtp-Source: ACHHUZ4WIv1T52ro3V2mCm/Ujls4u8ot1SU+Lq9S1NKYdJ+cPYRr5uQRsc5dbcaZSnPh4nm0mGYXrg== X-Received: by 2002:a05:6871:3d6:b0:19d:a4bf:dbb5 with SMTP id a22-20020a05687103d600b0019da4bfdbb5mr271770oag.24.1685985120212; Mon, 05 Jun 2023 10:12:00 -0700 (PDT) Received: from ?IPV6:2804:1b3:a7c1:fe49:680c:a97a:ffe6:9a8f? ([2804:1b3:a7c1:fe49:680c:a97a:ffe6:9a8f]) by smtp.gmail.com with ESMTPSA id g2-20020a056870c38200b001968dd2e1fesm3841617oao.3.2023.06.05.10.11.58 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 05 Jun 2023 10:11:58 -0700 (PDT) Message-ID: <2537138c-7ac5-2406-398a-0c9a776b556c@linaro.org> Date: Mon, 5 Jun 2023 14:11:56 -0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.11.2 Subject: Re: [PATCH] linux: Split tst-ttyname Content-Language: en-US To: Carlos O'Donell , libc-alpha@sourceware.org References: <20230601174432.456518-1-adhemerval.zanella@linaro.org> From: Adhemerval Zanella Netto Organization: Linaro In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.8 required=5.0 tests=BAYES_00,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_NONE,RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS,TXREP,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: On 02/06/23 23:11, Carlos O'Donell wrote: > On 6/1/23 13:44, Adhemerval Zanella via Libc-alpha wrote: >> The tst-ttyname may fail in container environments while trying to >> mount the procfs after the unshare (test do_in_chroot_2). It is not >> clear why exaclty kernel returns EPERM in this case, the container >> does have CAP_SYS_CHROOT, SELinux/AppArmor is disabled, and there is >> no seccomp filter. > > I was seeing this also in our Fedora Rawhide CI/CD weekly integration. > > It is not a kernel issue IMO, but a system issue since I was using systemd-nspawn. > > Are you using systemd-nspawn? > > Zbignew just bisected this for me here: > https://bugzilla.redhat.com/show_bug.cgi?id=2210335 > https://github.com/systemd/systemd/commit/57c10a5650f6bb7180f3bec31a3f24239a81be39 I am running using a docker ubuntu container with CAP_SYS_ADMIN (for test-container) enable some tests, so there is no direct usage of systemd-nspawn. Although the bug does seems related, the current namespace does contain the /proc mount and I tried to change the test to mount the procfs after support_become_root (and before the support_enter_mount_namespace in child process); but at least on my environment it continues to fail with EPERM. In any case, I think splitting the test does seems an improvement since it split the test with one that uses and another that does not. I will rename the test as Florian asked and send a newer version.