From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 11004C83F1B for ; Mon, 14 Jul 2025 13:29:01 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id A77A16B0093; Mon, 14 Jul 2025 09:29:00 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id A4EC06B0096; Mon, 14 Jul 2025 09:29:00 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 98B966B0099; Mon, 14 Jul 2025 09:29:00 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id 88D186B0093 for ; Mon, 14 Jul 2025 09:29:00 -0400 (EDT) Received: from smtpin18.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id 457A51A01AB for ; Mon, 14 Jul 2025 13:29:00 +0000 (UTC) X-FDA: 83662950840.18.EDAEBCD Received: from tor.source.kernel.org (tor.source.kernel.org [172.105.4.254]) by imf20.hostedemail.com (Postfix) with ESMTP id A39C51C000F for ; Mon, 14 Jul 2025 13:28:58 +0000 (UTC) Authentication-Results: imf20.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=IunKLAIg; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf20.hostedemail.com: domain of broonie@kernel.org designates 172.105.4.254 as permitted sender) smtp.mailfrom=broonie@kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1752499738; a=rsa-sha256; cv=none; b=2S1VepGixTvZD3OT/12ObEic2snypxvN/6wO9P0ZEjsTvIws/eCkEgNWeQY+7FLxfdv9yN I35/duBwfxJPQYb/OyEwE4tZoOcDPOyrIxoMmg2eqeYfhpRMD/1mE4Y5qA9Ek3NzLf/ykm eakblHt87FvHPjl4Fu4aL9kIHxrwvmw= ARC-Authentication-Results: i=1; imf20.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=IunKLAIg; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf20.hostedemail.com: domain of broonie@kernel.org designates 172.105.4.254 as permitted sender) smtp.mailfrom=broonie@kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1752499738; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=WqYSDobXJQuV87oD8N7to07oIznlWc3ljbATP4cJAsQ=; b=qZQpgpdlotdznOJ8F1E7pRJbW0Ufy9s37labW4bnRi/ROSfOQx7JgixQRvI3oq7rA4xa0H e0iqJOJ1buP4t2RotEHaB54SR16rnQXtZ0yi80/7n9vOvEB1z4jAOmk2j4yr+XiEv9I5hT pkC2Cy3Ms3d0iCeVii0xXjZVVKxye9g= Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by tor.source.kernel.org (Postfix) with ESMTP id C7D7E6141F; Mon, 14 Jul 2025 13:28:57 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E0F77C4CEED; Mon, 14 Jul 2025 13:28:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1752499737; bh=dQMp3Ed76Brn4mr71z5eM3y/S6u63AAUedcvy/zDi3E=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=IunKLAIg8iMZbN3FKxL2b3ZdHLbEZqaIE+Dyb3UZsS8Dyezsp8GvkEIWImkMhXfbt sL7u9bSB/epaFtcq+6H1EN/F6Kzcg1EriH2YTtPniEozPit0shElP5L4IfpFc0JVy4 wesAbksMb+tn8t4BzXZ16E7/lMKhl3rdSkN2ofnevj+CFe8ojgWIOySI6P2mAbv1Hs TIWgYgsoFkr4NPKu00fBybgivOMdUOJ3OPGD4QqQqilihSaeAP9XMwlmQCJHwm/0KC lSWXzTvYRDnaq1DpOBKlfzLKUtOGGUfSMHJ8fgSDoiX/RxvKwvKfG04WxU/4azP4ss dUrSZL3YYxCKw== Date: Mon, 14 Jul 2025 14:28:50 +0100 From: Mark Brown To: wang lian Cc: Andrew Morton , David Hildenbrand , SeongJae Park , Lorenzo Stoakes , Zi Yan , linux-kernel@vger.kernel.org, Christian Brauner , Jann Horn , Liam Howlett , Shuah Khan , Vlastimil Babka , gkwang , p1ucky0923 , ryncsn , "zijing . zhang" , linux-kselftest@vger.kernel.org, linux-mm@kvack.org Subject: Re: [PATCH v5] selftests/mm: add process_madvise() tests Message-ID: References: <20250714122533.3135-1-lianux.mm@gmail.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="au4xLk1UCIU5PYUe" Content-Disposition: inline In-Reply-To: <20250714122533.3135-1-lianux.mm@gmail.com> X-Cookie: Non-sequiturs make me eat lampshades. X-Rspamd-Server: rspam12 X-Rspamd-Queue-Id: A39C51C000F X-Stat-Signature: u61jtmuwxjop13eqy4py9ghujr4cmzpu X-Rspam-User: X-HE-Tag: 1752499738-78180 X-HE-Meta: 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 fUW/Ooml Zb7CAEX5hC6rHblJ/38xP9HOVXqZnjY9rKlS48drh79jB9r5n4kkMjeYSisv+jZtPoWOPcQBFMrwyg6qAcLlZ5HmhPgVLxc+/xAuU2VkXa5ykgaDaCdQr29GvBWTkZKXAqww7KR5rVsms4g6X2SFnwI2R+EW0Gfw//KeUrLik8mUfngfyre47bTPwF3l6tj6EcnUpLay1bzXhFInsACdslGwLg76fc+raZAMUPntPNl5qtNJdU2dmZqejrl6zVGl1eQEfbnE1ZnEZW6aiWJU5jwT70QtTceRfPYl1GhkRNkOyzR48qizDBrbiXteN/JnRYeP0/O0sP/TDWy8UzTxA4tZyEys/Lk3ocax+yOsowFVIW8gzx5VpfjbUyWlE6tRqeGwnnZ0JfvbND0JqeJ8ndscEkdouEjR16Js+7JJJa9kgzoJIZPRHctK31A== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: --au4xLk1UCIU5PYUe Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Mon, Jul 14, 2025 at 08:25:33PM +0800, wang lian wrote: > +TEST_F(process_madvise, remote_collapse) > +{ > + self->child_pid = fork(); > + ASSERT_NE(self->child_pid, -1); > + ret = read(pipe_info[0], &info, sizeof(info)); > + if (ret <= 0) { > + waitpid(self->child_pid, NULL, 0); > + SKIP(return, "Failed to read child info from pipe.\n"); > + } > + ASSERT_EQ(ret, sizeof(info)); > +cleanup: > + /* Cleanup */ > + kill(self->child_pid, SIGKILL); > + waitpid(self->child_pid, NULL, 0); > + if (pidfd >= 0) > + close(pidfd); The cleanup here won't get run if we skip or assert, skipping will return immediately (you could replace the return with a 'goto cleanup') and the asserts will exit the test immediately. This will mean we leak the child. This isn't an issue for things that are memory mapped or tracked with file descriptors, the harness will for a new child for each test so anything that's cleaned up with the process will be handled, but that doesn't apply to child processes. I think doing the child setup in a fixture should DTRT but I haven't gone through in full detail to verify that this is the case. --au4xLk1UCIU5PYUe Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAABCgAdFiEEreZoqmdXGLWf4p/qJNaLcl1Uh9AFAmh1BhEACgkQJNaLcl1U h9D2gAf/XSHWkSHMfUatmFAnzIj+OI5FkqqF4LaylDlMsdeIRdjoxGNkquKk27ws 7xolTAbdeaxz0Dzne04hHvAGc8lzxEMfxYfWzwKuFZpdCOszT3nXnRdGH8BcWvGI BLMibYwQbRW55TX5BSE4+hdBXuZA+R40l8trfIzpCj+gel3nGWWiMUnTChxqVICX UxZXi0SNC0vSRJgtMn5/1vfMInhp6WfxIJ6QXnP314lCY8RZFDJThGE3VLe6Qi6n HjSqHN4NhmDDI2j9AzHnCW4z4GWXs8QQpse0NVABakTiHOPoOA63x59PvLjrkoio 9JDT+pMy8w7RP9UpxFUoEJNewRIiuQ== =Cplh -----END PGP SIGNATURE----- --au4xLk1UCIU5PYUe--