path: root/src/osmo_gsm_tester/
diff options
authorPau Espin Pedrol <>2019-04-03 17:53:54 +0200
committerPau Espin Pedrol <>2019-04-03 17:53:57 +0200
commite159cd206d11073e4ca46d34ba15e106357fb044 (patch)
treec1c0dadaa65e8e496b06c39089c2b275f2f49358 /src/osmo_gsm_tester/
parent17a4ed9029421bde84042d8e37d78a9ca043ca26 (diff)
process: Prevent NetNSProcess alive forever after SIGKILL
NetNSProcess are run in the following process tree: osmo-gsm-tester -> sudo -> bash ( -> tcpdump. Lots of scripts with tcpdump child process were spotted in prod setup of osmo-gsm-tester. Apparently that happens because sometimes tcpdump doesn't get killed in time with SIGTERM and SIGINT, and as a result SIGKILL is sent by osmo-gsm-tester as usual termination procedure. When SIGKILL is sent, the parent sudo process is instantly killed without possibility to forward the signal to its children, leaving the bash script and tcpdump alive. In order to fix it, catch SIGKILL for this process class and send instead SIGUSR1. Then, modify the script under sudo to handle SIGUSR1 as if it was a SIGKILL towards its children to make sure child process in the netns terminates. Change-Id: I2bf389c47bbbd75f46af413e7ba897be5be386e1
Diffstat (limited to 'src/osmo_gsm_tester/')
1 files changed, 5 insertions, 0 deletions
diff --git a/src/osmo_gsm_tester/ b/src/osmo_gsm_tester/
index 7ecb67e..441d4ea 100644
--- a/src/osmo_gsm_tester/
+++ b/src/osmo_gsm_tester/
@@ -363,6 +363,11 @@ class NetNSProcess(Process):
# HACK: Since we run under sudo, only way to kill root-owned process is to kill as root...
# This function is overwritten from Process.
def send_signal(self, sig):
+ if sig == signal.SIGKILL:
+ # if we kill sudo, its children (bash running NETNS_EXEC_BIN +
+ # tcpdump under it) are kept alive. Let's instead tell the script to
+ # kill tcpdump:
+ sig = signal.SIGUSR1
kill_cmd = ('kill', '-%d' % int(sig), str(
run_local_netns_sync(self.run_dir,"-kill"+str(sig), self.netns, kill_cmd)