From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AC4C21D79BB; Sun, 24 Nov 2024 12:41:41 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732452101; cv=none; b=QbUbp5DRYFv4wz5sczMtMXRgHJjzlV+F7OQ0cfwlNcDr/bn+TUuCS8J+O64fn8x1/t7pJe5PPwI0KlSBRw0xmbyV9ckKvacpjiBHP/Ml+Kzg3ZkwEjp4sZw+KScKy9JBsklM055TC/9RdYMfGGxZG06HAb/yqyj8ezD/6l71vLA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1732452101; c=relaxed/simple; bh=dStXZbOZ68pcA4OHVXBepn0T/jxDTGEotO0Yx2wAYpY=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=rNnmj16TCoItZP+TVdVpE0+8Jgda85ZrHPpI7KmQtQGtFYUMu9ctXmU34E7gQj3JYZJhk3rvwoCuLEOwh84i4/h1d9ePmDRXUCC5Si7k6VxQTSwx6TDBwuFJZaiNy+/Vjxkj+fVghw5Zef2p8lmFvGF3qJISsGVW5Xl/Kl5oZ7s= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=HwN0E9DE; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="HwN0E9DE" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8F906C4CECC; Sun, 24 Nov 2024 12:41:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1732452101; bh=dStXZbOZ68pcA4OHVXBepn0T/jxDTGEotO0Yx2wAYpY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HwN0E9DEmZCKeREnvGXJsZWRyV3xbZ0F1jMyJFHWjLxFmdHOXpkDhH93uVFmSwOPt aq05rowdwa7MJSAuDqcuNS4r3logfcF+cP9cGH5iEB28zHxsoZSDVLU/OvsR8qSvgT PnpA3bZRPyXnCGpguAms7Kb0V+TBOqyNEljxUBQpDGEUSlnm36JlHEdWvNxSoZgo6Z IsfUxsFHUUY4IV7tbGiViiL0/P5Uuk4JDrETWRB1ukqxDH4U/JKtv/oyrScHQ/fVOl Aj5n3ShN/4L8ZGnteuJ7wAjSUlSTx6nIRi+U93gFvBoTE5FR/k0q0nFCyfB86bl+n0 LK7nsPiO8U5Ag== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Mark Brown , Catalin Marinas , Sasha Levin , will@kernel.org, shuah@kernel.org, linux-arm-kernel@lists.infradead.org, linux-kselftest@vger.kernel.org Subject: [PATCH AUTOSEL 6.1 7/7] kselftest/arm64: Don't leak pipe fds in pac.exec_sign_all() Date: Sun, 24 Nov 2024 07:41:18 -0500 Message-ID: <20241124124126.3336691-7-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20241124124126.3336691-1-sashal@kernel.org> References: <20241124124126.3336691-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore X-stable-base: Linux 6.1.119 Content-Transfer-Encoding: 8bit From: Mark Brown [ Upstream commit 27141b690547da5650a420f26ec369ba142a9ebb ] The PAC exec_sign_all() test spawns some child processes, creating pipes to be stdin and stdout for the child. It cleans up most of the file descriptors that are created as part of this but neglects to clean up the parent end of the child stdin and stdout. Add the missing close() calls. Signed-off-by: Mark Brown Link: https://lore.kernel.org/r/20241111-arm64-pac-test-collisions-v1-1-171875f37e44@kernel.org Signed-off-by: Catalin Marinas Signed-off-by: Sasha Levin --- tools/testing/selftests/arm64/pauth/pac.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/tools/testing/selftests/arm64/pauth/pac.c b/tools/testing/selftests/arm64/pauth/pac.c index b743daa772f55..5a07b3958fbf2 100644 --- a/tools/testing/selftests/arm64/pauth/pac.c +++ b/tools/testing/selftests/arm64/pauth/pac.c @@ -182,6 +182,9 @@ int exec_sign_all(struct signatures *signed_vals, size_t val) return -1; } + close(new_stdin[1]); + close(new_stdout[0]); + return 0; } -- 2.43.0