From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8162630E0FC; Fri, 9 Jan 2026 12:28:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1767961728; cv=none; b=DrJGQ2E3xYaaJjbeS1VEMjC+gBW+/5BwOuWqiY9TuHO8Kqe5kueINpXBqM+9tISgk7Gq9K7E0DcbgXlmwRyRXEHscnHXbm20kW1nrXhyPF3jBGGoGefNQiIoTrB/C/xFptMlpNofoL55TH8ts/WTcVILg9iL0kP6xEnoAJN80Xo= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1767961728; c=relaxed/simple; bh=nf2u0WLdXoaxFtZTBjVlkZZDXesN54794uX3lcxeNB4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=UjtlvOd2EI2sCqWQQEeW1Vw+qTbxZBTgtoOBkTImU/rSMxb7Wfuywt6GRieovNlvgZMs6JfPxPGFRfWC2tn7adB2OPXtY1dw1jWHYWua6Dy379oRvbz0E1xA+EKUwFXUkzITUqBWZw/vYGgYJo/SmQyycfFs6wZTDzuI+WFVrzw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=wti8N+gt; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="wti8N+gt" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0BA99C4CEF1; Fri, 9 Jan 2026 12:28:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1767961728; bh=nf2u0WLdXoaxFtZTBjVlkZZDXesN54794uX3lcxeNB4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wti8N+gtP1C4RRv/Q9LJcpu2rmyXeaY3W++zJduPZjZWECmZtVMW2V57uLRdyzIL0 Bdxnk8WpJvJHWcOqnPr0WxtFhsoYWFW+1E32NHMjr3T48E6TJPkim9BLzT4mNIkAwr UcsKjk3oeiFw6grl2c5eFyEJlc1nnmv2mMJfql48= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Alexei Starovoitov , Andrii Nakryiko , Eduard Zingerman , Sasha Levin Subject: [PATCH 6.1 116/634] selftests/bpf: Fix failure paths in send_signal test Date: Fri, 9 Jan 2026 12:36:34 +0100 Message-ID: <20260109112121.798376868@linuxfoundation.org> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20260109112117.407257400@linuxfoundation.org> References: <20260109112117.407257400@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.1-stable review patch. If anyone has any objections, please let me know. ------------------ From: Alexei Starovoitov [ Upstream commit c13339039891dbdfa6c1972f0483bd07f610b776 ] When test_send_signal_kern__open_and_load() fails parent closes the pipe which cases ASSERT_EQ(read(pipe_p2c...)) to fail, but child continues and enters infinite loop, while parent is stuck in wait(NULL). Other error paths have similar issue, so kill the child before waiting on it. The bug was discovered while compiling all of selftests with -O1 instead of -O2 which caused progs/test_send_signal_kern.c to fail to load. Fixes: ab8b7f0cb358 ("tools/bpf: Add self tests for bpf_send_signal_thread()") Signed-off-by: Alexei Starovoitov Signed-off-by: Andrii Nakryiko Acked-by: Eduard Zingerman Link: https://lore.kernel.org/bpf/20251113171153.2583-1-alexei.starovoitov@gmail.com Signed-off-by: Sasha Levin --- tools/testing/selftests/bpf/prog_tests/send_signal.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/tools/testing/selftests/bpf/prog_tests/send_signal.c b/tools/testing/selftests/bpf/prog_tests/send_signal.c index 210b806351bcf..08cc9b06feceb 100644 --- a/tools/testing/selftests/bpf/prog_tests/send_signal.c +++ b/tools/testing/selftests/bpf/prog_tests/send_signal.c @@ -141,6 +141,11 @@ static void test_send_signal_common(struct perf_event_attr *attr, skel_open_load_failure: close(pipe_c2p[0]); close(pipe_p2c[1]); + /* + * Child is either about to exit cleanly or stuck in case of errors. + * Nudge it to exit. + */ + kill(pid, SIGKILL); wait(NULL); } -- 2.51.0