|
|
152484 |
From 68199fe69a2c46e498bc7e9528d54922deecc553 Mon Sep 17 00:00:00 2001
|
|
|
4295f9 |
From: =?UTF-8?q?Zbigniew=20J=C4=99drzejewski-Szmek?= <zbyszek@in.waw.pl>
|
|
|
4295f9 |
Date: Mon, 14 Sep 2020 17:58:03 +0200
|
|
|
4295f9 |
Subject: [PATCH] test-mountpointutil-util: do not assert in test_mnt_id()
|
|
|
4295f9 |
|
|
|
4295f9 |
https://bugzilla.redhat.com/show_bug.cgi?id=1803070
|
|
|
4295f9 |
|
|
|
4295f9 |
I *think* this a kernel bug: the mnt_id as listed in /proc/self/mountinfo is different
|
|
|
4295f9 |
than the one we get from /proc/self/fdinfo/. This only matters when both statx and
|
|
|
4295f9 |
name_to_handle_at are unavailable and we hit the fallback path that goes through fdinfo:
|
|
|
4295f9 |
|
|
|
4295f9 |
(gdb) !uname -r
|
|
|
4295f9 |
5.6.19-200.fc31.ppc64le
|
|
|
4295f9 |
|
|
|
4295f9 |
(gdb) !cat /proc/self/mountinfo
|
|
|
4295f9 |
697 664 253:0 /var/lib/mock/fedora-31-ppc64le/root / rw,relatime shared:298 master:1 - xfs /dev/mapper/fedora_rh--power--vm14-root rw,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota
|
|
|
4295f9 |
698 697 253:0 /var/cache/mock/fedora-31-ppc64le/yum_cache /var/cache/yum rw,relatime shared:299 master:1 - xfs /dev/mapper/fedora_rh--power--vm14-root rw,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota
|
|
|
4295f9 |
699 697 253:0 /var/cache/mock/fedora-31-ppc64le/dnf_cache /var/cache/dnf rw,relatime shared:300 master:1 - xfs /dev/mapper/fedora_rh--power--vm14-root rw,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota
|
|
|
4295f9 |
700 697 0:32 /mock-selinux-plugin.7me9bfpi /proc/filesystems rw,nosuid,nodev shared:301 master:18 - tmpfs tmpfs rw,seclabel <==========================================================
|
|
|
4295f9 |
701 697 0:41 / /sys ro,nosuid,nodev,noexec,relatime shared:302 - sysfs sysfs ro,seclabel
|
|
|
4295f9 |
702 701 0:21 / /sys/fs/selinux ro,nosuid,nodev,noexec,relatime shared:306 master:8 - selinuxfs selinuxfs rw
|
|
|
4295f9 |
703 697 0:42 / /dev rw,nosuid shared:303 - tmpfs tmpfs rw,seclabel,mode=755
|
|
|
4295f9 |
704 703 0:43 / /dev/shm rw,nosuid,nodev shared:304 - tmpfs tmpfs rw,seclabel
|
|
|
4295f9 |
705 703 0:45 / /dev/pts rw,nosuid,noexec,relatime shared:307 - devpts devpts rw,seclabel,gid=5,mode=620,ptmxmode=666
|
|
|
4295f9 |
706 703 0:6 /btrfs-control /dev/btrfs-control rw,nosuid shared:308 master:9 - devtmpfs devtmpfs rw,seclabel,size=4107840k,nr_inodes=64185,mode=755
|
|
|
4295f9 |
707 703 0:6 /loop-control /dev/loop-control rw,nosuid shared:309 master:9 - devtmpfs devtmpfs rw,seclabel,size=4107840k,nr_inodes=64185,mode=755
|
|
|
4295f9 |
708 703 0:6 /loop0 /dev/loop0 rw,nosuid shared:310 master:9 - devtmpfs devtmpfs rw,seclabel,size=4107840k,nr_inodes=64185,mode=755
|
|
|
4295f9 |
709 703 0:6 /loop1 /dev/loop1 rw,nosuid shared:311 master:9 - devtmpfs devtmpfs rw,seclabel,size=4107840k,nr_inodes=64185,mode=755
|
|
|
4295f9 |
710 703 0:6 /loop10 /dev/loop10 rw,nosuid shared:312 master:9 - devtmpfs devtmpfs rw,seclabel,size=4107840k,nr_inodes=64185,mode=755
|
|
|
4295f9 |
711 703 0:6 /loop11 /dev/loop11 rw,nosuid shared:313 master:9 - devtmpfs devtmpfs rw,seclabel,size=4107840k,nr_inodes=64185,mode=755
|
|
|
4295f9 |
712 703 0:6 /loop2 /dev/loop2 rw,nosuid shared:314 master:9 - devtmpfs devtmpfs rw,seclabel,size=4107840k,nr_inodes=64185,mode=755
|
|
|
4295f9 |
713 703 0:6 /loop3 /dev/loop3 rw,nosuid shared:315 master:9 - devtmpfs devtmpfs rw,seclabel,size=4107840k,nr_inodes=64185,mode=755
|
|
|
4295f9 |
714 703 0:6 /loop4 /dev/loop4 rw,nosuid shared:316 master:9 - devtmpfs devtmpfs rw,seclabel,size=4107840k,nr_inodes=64185,mode=755
|
|
|
4295f9 |
715 703 0:6 /loop5 /dev/loop5 rw,nosuid shared:317 master:9 - devtmpfs devtmpfs rw,seclabel,size=4107840k,nr_inodes=64185,mode=755
|
|
|
4295f9 |
716 703 0:6 /loop6 /dev/loop6 rw,nosuid shared:318 master:9 - devtmpfs devtmpfs rw,seclabel,size=4107840k,nr_inodes=64185,mode=755
|
|
|
4295f9 |
717 703 0:6 /loop7 /dev/loop7 rw,nosuid shared:319 master:9 - devtmpfs devtmpfs rw,seclabel,size=4107840k,nr_inodes=64185,mode=755
|
|
|
4295f9 |
718 703 0:6 /loop8 /dev/loop8 rw,nosuid shared:320 master:9 - devtmpfs devtmpfs rw,seclabel,size=4107840k,nr_inodes=64185,mode=755
|
|
|
4295f9 |
719 703 0:6 /loop9 /dev/loop9 rw,nosuid shared:321 master:9 - devtmpfs devtmpfs rw,seclabel,size=4107840k,nr_inodes=64185,mode=755
|
|
|
4295f9 |
720 697 0:44 / /run rw,nosuid,nodev shared:305 - tmpfs tmpfs rw,seclabel,mode=755
|
|
|
4295f9 |
721 720 0:25 /systemd/nspawn/propagate/9cc8a155d0244558b273f773d2b92142 /run/systemd/nspawn/incoming ro master:12 - tmpfs tmpfs rw,seclabel,mode=755
|
|
|
4295f9 |
722 697 0:32 /mock-resolv.dvml91hp /etc/resolv.conf rw,nosuid,nodev shared:322 master:18 - tmpfs tmpfs rw,seclabel
|
|
|
4295f9 |
725 697 0:47 / /proc rw,nosuid,nodev,noexec,relatime shared:323 - proc proc rw
|
|
|
4295f9 |
603 725 0:47 /sys /proc/sys ro,nosuid,nodev,noexec,relatime shared:323 - proc proc rw
|
|
|
4295f9 |
604 725 0:44 /systemd/inaccessible/reg /proc/kallsyms ro,nosuid,nodev,noexec shared:305 - tmpfs tmpfs rw,seclabel,mode=755
|
|
|
4295f9 |
605 725 0:44 /systemd/inaccessible/reg /proc/kcore ro,nosuid,nodev,noexec shared:305 - tmpfs tmpfs rw,seclabel,mode=755
|
|
|
4295f9 |
606 725 0:44 /systemd/inaccessible/reg /proc/keys ro,nosuid,nodev,noexec shared:305 - tmpfs tmpfs rw,seclabel,mode=755
|
|
|
4295f9 |
607 725 0:44 /systemd/inaccessible/reg /proc/sysrq-trigger ro,nosuid,nodev,noexec shared:305 - tmpfs tmpfs rw,seclabel,mode=755
|
|
|
4295f9 |
608 725 0:44 /systemd/inaccessible/reg /proc/timer_list ro,nosuid,nodev,noexec shared:305 - tmpfs tmpfs rw,seclabel,mode=755
|
|
|
4295f9 |
609 725 0:47 /bus /proc/bus ro,nosuid,nodev,noexec,relatime shared:323 - proc proc rw
|
|
|
4295f9 |
610 725 0:47 /fs /proc/fs ro,nosuid,nodev,noexec,relatime shared:323 - proc proc rw
|
|
|
4295f9 |
611 725 0:47 /irq /proc/irq ro,nosuid,nodev,noexec,relatime shared:323 - proc proc rw
|
|
|
4295f9 |
612 725 0:47 /scsi /proc/scsi ro,nosuid,nodev,noexec,relatime shared:323 - proc proc rw
|
|
|
4295f9 |
613 703 0:46 / /dev/mqueue rw,nosuid,nodev,noexec,relatime shared:324 - mqueue mqueue rw,seclabel
|
|
|
4295f9 |
614 701 0:26 / /sys/fs/cgroup rw,nosuid,nodev,noexec,relatime shared:325 - cgroup2 cgroup rw,seclabel,nsdelegate
|
|
|
4295f9 |
615 603 0:44 /.#proc-sys-kernel-random-boot-id4fbdce67af46d1c2//deleted /proc/sys/kernel/random/boot_id ro,nosuid,nodev,noexec shared:305 - tmpfs tmpfs rw,seclabel,mode=755
|
|
|
4295f9 |
616 725 0:44 /.#proc-sys-kernel-random-boot-id4fbdce67af46d1c2//deleted /proc/sys/kernel/random/boot_id rw,nosuid,nodev shared:305 - tmpfs tmpfs rw,seclabel,mode=755
|
|
|
4295f9 |
617 725 0:44 /.#proc-kmsg5b7a8bcfe6717139//deleted /proc/kmsg rw,nosuid,nodev shared:305 - tmpfs tmpfs rw,seclabel,mode=755
|
|
|
4295f9 |
|
|
|
4295f9 |
The test process does
|
|
|
4295f9 |
name_to_handle_at("/proc/filesystems") which returns -EOPNOTSUPP, and then
|
|
|
4295f9 |
openat(AT_FDCWD, "/proc/filesystems") which returns 4, and then
|
|
|
4295f9 |
read(open("/proc/self/fdinfo/4", ...)) which gives
|
|
|
4295f9 |
"pos:\t0\nflags:\t012100000\nmnt_id:\t725\n"
|
|
|
4295f9 |
|
|
|
4295f9 |
and the "725" is clearly inconsistent with "700" in /proc/self/mountinfo.
|
|
|
4295f9 |
|
|
|
4295f9 |
We could either drop the fallback path (and fail name_to_handle_at() is not
|
|
|
4295f9 |
avaliable) or ignore the error in the test. Not sure what is better. I think
|
|
|
4295f9 |
this issue only occurs sometimes and with older kernels, so probably continuing
|
|
|
4295f9 |
with the current flaky implementation is better than ripping out the fallback.
|
|
|
4295f9 |
|
|
|
4295f9 |
Another strace:
|
|
|
4295f9 |
writev(2</dev/pts/0>, [{iov_base="mnt ids of /proc/sys is 603", iov_len=27}, {iov_base="\n", iov_len=1}], 2mnt ids of /proc/sys is 603
|
|
|
4295f9 |
) = 28
|
|
|
4295f9 |
name_to_handle_at(AT_FDCWD, "/", {handle_bytes=128 => 12, handle_type=129, f_handle=0x52748401000000008b93e20d}, [697], 0) = 0
|
|
|
4295f9 |
writev(2</dev/pts/0>, [{iov_base="mnt ids of / is 697", iov_len=19}, {iov_base="\n", iov_len=1}], 2mnt ids of / is 697
|
|
|
4295f9 |
) = 20
|
|
|
4295f9 |
name_to_handle_at(AT_FDCWD, "/proc/kcore", {handle_bytes=128 => 12, handle_type=1, f_handle=0x92ddcfcd2e802d0100000000}, [605], 0) = 0
|
|
|
4295f9 |
writev(2</dev/pts/0>, [{iov_base="mnt ids of /proc/kcore is 605", iov_len=29}, {iov_base="\n", iov_len=1}], 2mnt ids of /proc/kcore is 605
|
|
|
4295f9 |
) = 30
|
|
|
4295f9 |
name_to_handle_at(AT_FDCWD, "/dev", {handle_bytes=128 => 12, handle_type=1, f_handle=0x8ae269160c802d0100000000}, [703], 0) = 0
|
|
|
4295f9 |
writev(2</dev/pts/0>, [{iov_base="mnt ids of /dev is 703", iov_len=22}, {iov_base="\n", iov_len=1}], 2mnt ids of /dev is 703
|
|
|
4295f9 |
) = 23
|
|
|
4295f9 |
name_to_handle_at(AT_FDCWD, "/proc/filesystems", {handle_bytes=128}, 0x7fffe36ddb84, 0) = -1 EOPNOTSUPP (Operation not supported)
|
|
|
4295f9 |
openat(AT_FDCWD, "/proc/filesystems", O_RDONLY|O_NOFOLLOW|O_CLOEXEC|O_PATH) = 4</proc/filesystems>
|
|
|
4295f9 |
openat(AT_FDCWD, "/proc/self/fdinfo/4", O_RDONLY|O_CLOEXEC) = 5</proc/20/fdinfo/4>
|
|
|
4295f9 |
fstat(5</proc/20/fdinfo/4>, {st_mode=S_IFREG|0400, st_size=0, ...}) = 0
|
|
|
4295f9 |
fstat(5</proc/20/fdinfo/4>, {st_mode=S_IFREG|0400, st_size=0, ...}) = 0
|
|
|
4295f9 |
read(5</proc/20/fdinfo/4>, "pos:\t0\nflags:\t012100000\nmnt_id:\t725\n", 2048) = 36
|
|
|
4295f9 |
read(5</proc/20/fdinfo/4>, "", 1024) = 0
|
|
|
4295f9 |
close(5</proc/20/fdinfo/4>) = 0
|
|
|
4295f9 |
close(4</proc/filesystems>) = 0
|
|
|
4295f9 |
writev(2</dev/pts/0>, [{iov_base="mnt ids of /proc/filesystems are 700, 725", iov_len=41}, {iov_base="\n", iov_len=1}], 2mnt ids of /proc/filesystems are 700, 725
|
|
|
4295f9 |
) = 42
|
|
|
4295f9 |
writev(2</dev/pts/0>, [{iov_base="the other path for mnt id 725 is /proc", iov_len=38}, {iov_base="\n", iov_len=1}], 2the other path for mnt id 725 is /proc
|
|
|
4295f9 |
) = 39
|
|
|
4295f9 |
writev(2</dev/pts/0>, [{iov_base="Assertion 'path_equal(p, t)' failed at src/test/test-mountpoint-util.c:94, function test_mnt_id(). Aborting.", iov_len=108}, {iov_base="\n", iov_len=1}], 2Assertion 'path_equal(p, t)' failed at src/test/test-mountpoint-util.c:94, function test_mnt_id(). Aborting.
|
|
|
4295f9 |
) = 109
|
|
|
4295f9 |
rt_sigprocmask(SIG_UNBLOCK, [ABRT], NULL, 8) = 0
|
|
|
4295f9 |
rt_sigprocmask(SIG_BLOCK, ~[RTMIN RT_1], [], 8) = 0
|
|
|
4295f9 |
getpid() = 20
|
|
|
4295f9 |
gettid() = 20
|
|
|
4295f9 |
tgkill(20, 20, SIGABRT) = 0
|
|
|
4295f9 |
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
|
|
|
4eda52 |
|
|
|
4eda52 |
RHEL notes: af918c4 should mitigate this issue, but in some build
|
|
|
4eda52 |
systems (Copr, brew, etc.) we don't have enough privileges to create a
|
|
|
4eda52 |
new mount namespace
|
|
|
4eda52 |
|
|
|
4eda52 |
Cherry-picked manually from https://github.com/systemd/systemd/pull/17050.
|
|
|
4eda52 |
|
|
|
4eda52 |
rhel-only
|
|
|
4eda52 |
Related: #2017035
|
|
|
4295f9 |
---
|
|
|
4295f9 |
src/test/test-mountpoint-util.c | 8 ++++++--
|
|
|
4295f9 |
1 file changed, 6 insertions(+), 2 deletions(-)
|
|
|
4295f9 |
|
|
|
4295f9 |
diff --git a/src/test/test-mountpoint-util.c b/src/test/test-mountpoint-util.c
|
|
|
152484 |
index d11edf502a..9515d8cf7b 100644
|
|
|
4295f9 |
--- a/src/test/test-mountpoint-util.c
|
|
|
4295f9 |
+++ b/src/test/test-mountpoint-util.c
|
|
|
152484 |
@@ -101,8 +101,12 @@ TEST(mnt_id) {
|
|
|
4295f9 |
/* The ids don't match? If so, then there are two mounts on the same path, let's check if
|
|
|
4295f9 |
* that's really the case */
|
|
|
4295f9 |
char *t = hashmap_get(h, INT_TO_PTR(mnt_id2));
|
|
|
4295f9 |
- log_debug("the other path for mnt id %i is %s\n", mnt_id2, t);
|
|
|
4295f9 |
- assert_se(path_equal(p, t));
|
|
|
4295f9 |
+ log_debug("Path for mnt id %i from /proc/self/mountinfo is %s\n", mnt_id2, t);
|
|
|
4295f9 |
+
|
|
|
4295f9 |
+ if (!path_equal(p, t))
|
|
|
4295f9 |
+ /* Apparent kernel bug in /proc/self/fdinfo */
|
|
|
4295f9 |
+ log_warning("Bad mount id given for %s: %d, should be %d",
|
|
|
4295f9 |
+ p, mnt_id2, mnt_id);
|
|
|
4295f9 |
}
|
|
|
4295f9 |
}
|
|
|
4295f9 |
|