diff options
| author | Randy MacLeod <Randy.MacLeod@windriver.com> | 2019-06-16 11:48:16 -0400 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2019-06-30 22:34:23 +0100 |
| commit | 852f90451d8a963d7c160bfd49e89ada1aa74ffc (patch) | |
| tree | aeb18fca40119cb802bf2bb2449baddc92473ef6 | |
| parent | 3ee2004f36e36a4ec5dc3f9d75f1bd0198a48ff3 (diff) | |
| download | poky-852f90451d8a963d7c160bfd49e89ada1aa74ffc.tar.gz | |
ptest-runner: enable child procs as session leader
When running the run-execscript bash ptest as a user rather than root, a warning:
bash: cannot set terminal process group (16036): Inappropriate ioctl for device
bash: no job control in this shell
contaminates the bash log files causing the test to fail. This happens only
when run under ptest-runner and not when interactively testing!
The changes made to fix this include:
1. Get the process group id (pgid) before forking,
2. Set the pgid in both the parent and child to avoid a race,
3. Find, open and set permission on the child tty, and
4. Allow the child to attach to controlling tty.
(From OE-Core rev: 25121d92f1a4cd70223038e09a719fec94355ee6)
Signed-off-by: Randy MacLeod <Randy.MacLeod@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
| -rw-r--r-- | meta/recipes-support/ptest-runner/ptest-runner/0004-utils-ensure-child-can-be-session-leader.patch | 212 | ||||
| -rw-r--r-- | meta/recipes-support/ptest-runner/ptest-runner_2.3.1.bb | 4 |
2 files changed, 215 insertions, 1 deletions
diff --git a/meta/recipes-support/ptest-runner/ptest-runner/0004-utils-ensure-child-can-be-session-leader.patch b/meta/recipes-support/ptest-runner/ptest-runner/0004-utils-ensure-child-can-be-session-leader.patch new file mode 100644 index 0000000000..13b4cbc7fb --- /dev/null +++ b/meta/recipes-support/ptest-runner/ptest-runner/0004-utils-ensure-child-can-be-session-leader.patch | |||
| @@ -0,0 +1,212 @@ | |||
| 1 | From 79698d3205dedba887e0d2492de945d3079de029 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Randy MacLeod <Randy.MacLeod@windriver.com> | ||
| 3 | Date: Thu, 6 Jun 2019 17:03:50 -0400 | ||
| 4 | Subject: [PATCH] utils: ensure child can be session leader | ||
| 5 | |||
| 6 | When running the run-execscript bash ptest as a user rather than root, a warning: | ||
| 7 | bash: cannot set terminal process group (16036): Inappropriate ioctl for device | ||
| 8 | bash: no job control in this shell | ||
| 9 | contaminates the bash log files causing the test to fail. This happens only | ||
| 10 | when run under ptest-runner and not when interactively testing! | ||
| 11 | |||
| 12 | The changes made to fix this include: | ||
| 13 | 1. Get the process group id (pgid) before forking, | ||
| 14 | 2. Set the pgid in both the parent and child to avoid a race, | ||
| 15 | 3. Find, open and set permission on the child tty, and | ||
| 16 | 4. Allow the child to attach to controlling tty. | ||
| 17 | |||
| 18 | Also add '-lutil' to Makefile. This lib is from libc and provides openpty. | ||
| 19 | |||
| 20 | Upstream-Status: Submitted [yocto@yoctoproject.org] | ||
| 21 | |||
| 22 | Signed-off-by: Sakib Sajal <sakib.sajal@windriver.com> | ||
| 23 | Signed-off-by: Randy MacLeod <Randy.MacLeod@windriver.com> | ||
| 24 | --- | ||
| 25 | Makefile | 2 +- | ||
| 26 | utils.c | 102 +++++++++++++++++++++++++++++++++++++++++++++++++------ | ||
| 27 | 2 files changed, 92 insertions(+), 12 deletions(-) | ||
| 28 | |||
| 29 | diff --git a/Makefile b/Makefile | ||
| 30 | index 1bde7be..439eb79 100644 | ||
| 31 | --- a/Makefile | ||
| 32 | +++ b/Makefile | ||
| 33 | @@ -29,7 +29,7 @@ TEST_DATA=$(shell echo `pwd`/tests/data) | ||
| 34 | all: $(SOURCES) $(EXECUTABLE) | ||
| 35 | |||
| 36 | $(EXECUTABLE): $(OBJECTS) | ||
| 37 | - $(CC) $(LDFLAGS) $(OBJECTS) -o $@ | ||
| 38 | + $(CC) $(LDFLAGS) $(OBJECTS) -lutil -o $@ | ||
| 39 | |||
| 40 | tests: $(TEST_SOURCES) $(TEST_EXECUTABLE) | ||
| 41 | |||
| 42 | diff --git a/utils.c b/utils.c | ||
| 43 | index ad737c2..f11ce39 100644 | ||
| 44 | --- a/utils.c | ||
| 45 | +++ b/utils.c | ||
| 46 | @@ -1,5 +1,6 @@ | ||
| 47 | /** | ||
| 48 | * Copyright (c) 2016 Intel Corporation | ||
| 49 | + * Copyright (C) 2019 Wind River Systems, Inc. | ||
| 50 | * | ||
| 51 | * This program is free software; you can redistribute it and/or | ||
| 52 | * modify it under the terms of the GNU General Public License | ||
| 53 | @@ -22,23 +23,27 @@ | ||
| 54 | */ | ||
| 55 | |||
| 56 | #define _GNU_SOURCE | ||
| 57 | + | ||
| 58 | #include <stdio.h> | ||
| 59 | |||
| 60 | +#include <dirent.h> | ||
| 61 | +#include <errno.h> | ||
| 62 | +#include <fcntl.h> | ||
| 63 | +#include <grp.h> | ||
| 64 | #include <libgen.h> | ||
| 65 | -#include <signal.h> | ||
| 66 | #include <poll.h> | ||
| 67 | -#include <fcntl.h> | ||
| 68 | +#include <pty.h> | ||
| 69 | +#include <signal.h> | ||
| 70 | +#include <stdlib.h> | ||
| 71 | +#include <string.h> | ||
| 72 | #include <time.h> | ||
| 73 | -#include <dirent.h> | ||
| 74 | +#include <unistd.h> | ||
| 75 | + | ||
| 76 | +#include <sys/ioctl.h> | ||
| 77 | #include <sys/resource.h> | ||
| 78 | +#include <sys/stat.h> | ||
| 79 | #include <sys/types.h> | ||
| 80 | #include <sys/wait.h> | ||
| 81 | -#include <sys/stat.h> | ||
| 82 | -#include <unistd.h> | ||
| 83 | -#include <string.h> | ||
| 84 | -#include <stdlib.h> | ||
| 85 | - | ||
| 86 | -#include <errno.h> | ||
| 87 | |||
| 88 | #include "ptest_list.h" | ||
| 89 | #include "utils.h" | ||
| 90 | @@ -346,6 +351,53 @@ wait_child(const char *ptest_dir, const char *run_ptest, pid_t pid, | ||
| 91 | return status; | ||
| 92 | } | ||
| 93 | |||
| 94 | +/* Returns an integer file descriptor. | ||
| 95 | + * If it returns < 0, an error has occurred. | ||
| 96 | + * Otherwise, it has returned the slave pty file descriptor. | ||
| 97 | + * fp should be writable, likely stdout/err. | ||
| 98 | + */ | ||
| 99 | +static int | ||
| 100 | +setup_slave_pty(FILE *fp) { | ||
| 101 | + int pty_master = -1; | ||
| 102 | + int pty_slave = -1; | ||
| 103 | + char pty_name[256]; | ||
| 104 | + struct group *gptr; | ||
| 105 | + gid_t gid; | ||
| 106 | + int slave = -1; | ||
| 107 | + | ||
| 108 | + if (openpty(&pty_master, &pty_slave, pty_name, NULL, NULL) < 0) { | ||
| 109 | + fprintf(fp, "ERROR: openpty() failed with: %s.\n", strerror(errno)); | ||
| 110 | + return -1; | ||
| 111 | + } | ||
| 112 | + | ||
| 113 | + if ((gptr = getgrnam(pty_name)) != 0) { | ||
| 114 | + gid = gptr->gr_gid; | ||
| 115 | + } else { | ||
| 116 | + /* If the tty group does not exist, don't change the | ||
| 117 | + * group on the slave pty, only the owner | ||
| 118 | + */ | ||
| 119 | + gid = -1; | ||
| 120 | + } | ||
| 121 | + | ||
| 122 | + /* chown/chmod the corresponding pty, if possible. | ||
| 123 | + * This will only work if the process has root permissions. | ||
| 124 | + */ | ||
| 125 | + if (chown(pty_name, getuid(), gid) != 0) { | ||
| 126 | + fprintf(fp, "ERROR; chown() failed with: %s.\n", strerror(errno)); | ||
| 127 | + } | ||
| 128 | + | ||
| 129 | + /* Makes the slave read/writeable for the user. */ | ||
| 130 | + if (chmod(pty_name, S_IRUSR|S_IWUSR) != 0) { | ||
| 131 | + fprintf(fp, "ERROR: chmod() failed with: %s.\n", strerror(errno)); | ||
| 132 | + } | ||
| 133 | + | ||
| 134 | + if ((slave = open(pty_name, O_RDWR)) == -1) { | ||
| 135 | + fprintf(fp, "ERROR: open() failed with: %s.\n", strerror(errno)); | ||
| 136 | + } | ||
| 137 | + return (slave); | ||
| 138 | +} | ||
| 139 | + | ||
| 140 | + | ||
| 141 | int | ||
| 142 | run_ptests(struct ptest_list *head, const struct ptest_options opts, | ||
| 143 | const char *progname, FILE *fp, FILE *fp_stderr) | ||
| 144 | @@ -362,6 +414,8 @@ run_ptests(struct ptest_list *head, const struct ptest_options opts, | ||
| 145 | int timeouted; | ||
| 146 | time_t sttime, entime; | ||
| 147 | int duration; | ||
| 148 | + int slave; | ||
| 149 | + int pgid = -1; | ||
| 150 | |||
| 151 | if (opts.xml_filename) { | ||
| 152 | xh = xml_create(ptest_list_length(head), opts.xml_filename); | ||
| 153 | @@ -379,7 +433,6 @@ run_ptests(struct ptest_list *head, const struct ptest_options opts, | ||
| 154 | close(pipefd_stdout[1]); | ||
| 155 | break; | ||
| 156 | } | ||
| 157 | - | ||
| 158 | fprintf(fp, "START: %s\n", progname); | ||
| 159 | PTEST_LIST_ITERATE_START(head, p); | ||
| 160 | char *ptest_dir = strdup(p->run_ptest); | ||
| 161 | @@ -388,6 +441,13 @@ run_ptests(struct ptest_list *head, const struct ptest_options opts, | ||
| 162 | break; | ||
| 163 | } | ||
| 164 | dirname(ptest_dir); | ||
| 165 | + if (ioctl(0, TIOCNOTTY) == -1) { | ||
| 166 | + fprintf(fp, "ERROR: Unable to detach from controlling tty, %s\n", strerror(errno)); | ||
| 167 | + } | ||
| 168 | + | ||
| 169 | + if ((pgid = getpgid(0)) == -1) { | ||
| 170 | + fprintf(fp, "ERROR: getpgid() failed, %s\n", strerror(errno)); | ||
| 171 | + } | ||
| 172 | |||
| 173 | child = fork(); | ||
| 174 | if (child == -1) { | ||
| 175 | @@ -395,13 +455,33 @@ run_ptests(struct ptest_list *head, const struct ptest_options opts, | ||
| 176 | rc = -1; | ||
| 177 | break; | ||
| 178 | } else if (child == 0) { | ||
| 179 | - setsid(); | ||
| 180 | + close(0); | ||
| 181 | + if ((slave = setup_slave_pty(fp)) < 0) { | ||
| 182 | + fprintf(fp, "ERROR: could not setup pty (%d).", slave); | ||
| 183 | + } | ||
| 184 | + if (setpgid(0,pgid) == -1) { | ||
| 185 | + fprintf(fp, "ERROR: setpgid() failed, %s\n", strerror(errno)); | ||
| 186 | + } | ||
| 187 | + | ||
| 188 | + if (setsid() == -1) { | ||
| 189 | + fprintf(fp, "ERROR: setsid() failed, %s\n", strerror(errno)); | ||
| 190 | + } | ||
| 191 | + | ||
| 192 | + if (ioctl(0, TIOCSCTTY, NULL) == -1) { | ||
| 193 | + fprintf(fp, "ERROR: Unable to attach to controlling tty, %s\n", strerror(errno)); | ||
| 194 | + } | ||
| 195 | + | ||
| 196 | run_child(p->run_ptest, pipefd_stdout[1], pipefd_stderr[1]); | ||
| 197 | + | ||
| 198 | } else { | ||
| 199 | int status; | ||
| 200 | int fds[2]; fds[0] = pipefd_stdout[0]; fds[1] = pipefd_stderr[0]; | ||
| 201 | FILE *fps[2]; fps[0] = fp; fps[1] = fp_stderr; | ||
| 202 | |||
| 203 | + if (setpgid(child, pgid) == -1) { | ||
| 204 | + fprintf(fp, "ERROR: setpgid() failed, %s\n", strerror(errno)); | ||
| 205 | + } | ||
| 206 | + | ||
| 207 | sttime = time(NULL); | ||
| 208 | fprintf(fp, "%s\n", get_stime(stime, GET_STIME_BUF_SIZE, sttime)); | ||
| 209 | fprintf(fp, "BEGIN: %s\n", ptest_dir); | ||
| 210 | -- | ||
| 211 | 2.17.0 | ||
| 212 | |||
diff --git a/meta/recipes-support/ptest-runner/ptest-runner_2.3.1.bb b/meta/recipes-support/ptest-runner/ptest-runner_2.3.1.bb index 0450e18e4e..dec60fcc9b 100644 --- a/meta/recipes-support/ptest-runner/ptest-runner_2.3.1.bb +++ b/meta/recipes-support/ptest-runner/ptest-runner_2.3.1.bb | |||
| @@ -13,7 +13,9 @@ PV = "2.3.1+git${SRCPV}" | |||
| 13 | SRC_URI = "git://git.yoctoproject.org/ptest-runner2 \ | 13 | SRC_URI = "git://git.yoctoproject.org/ptest-runner2 \ |
| 14 | file://0001-utils-Ensure-stdout-stderr-are-flushed.patch \ | 14 | file://0001-utils-Ensure-stdout-stderr-are-flushed.patch \ |
| 15 | file://0002-use-process-groups-when-spawning.patch \ | 15 | file://0002-use-process-groups-when-spawning.patch \ |
| 16 | file://0003-utils-Ensure-pipes-are-read-after-exit.patch" | 16 | file://0003-utils-Ensure-pipes-are-read-after-exit.patch \ |
| 17 | file://0004-utils-ensure-child-can-be-session-leader.patch \ | ||
| 18 | " | ||
| 17 | 19 | ||
| 18 | S = "${WORKDIR}/git" | 20 | S = "${WORKDIR}/git" |
| 19 | 21 | ||
