All of lore.kernel.org
 help / color / mirror / Atom feed
* [LTP] [PATCH 1/2] containers: added mountns/mountns03.c
@ 2014-08-26  9:59 Matus Marhefka
  2014-08-26  9:59 ` [LTP] [PATCH 2/2] containers: added mountns/mountns04.c Matus Marhefka
                   ` (2 more replies)
  0 siblings, 3 replies; 17+ messages in thread
From: Matus Marhefka @ 2014-08-26  9:59 UTC (permalink / raw)
  To: ltp-list

* Tests a slave mount: slave mount is like a shared mount except that
  mount and umount events only propagate towards it

Signed-off-by: Matus Marhefka <mmarhefk@redhat.com>
---
 runtest/containers                              |   1 +
 testcases/kernel/containers/.gitignore          |   1 +
 testcases/kernel/containers/mountns/mountns03.c | 241 ++++++++++++++++++++++++
 3 files changed, 243 insertions(+)
 create mode 100644 testcases/kernel/containers/mountns/mountns03.c

diff --git a/runtest/containers b/runtest/containers
index 56977c0..3653c9c 100644
--- a/runtest/containers
+++ b/runtest/containers
@@ -58,3 +58,4 @@ utstest_clone_5 utstest clone 5
 
 mountns01 mountns01
 mountns02 mountns02
+mountns03 mountns03
diff --git a/testcases/kernel/containers/.gitignore b/testcases/kernel/containers/.gitignore
index f175296..5b96cb9 100644
--- a/testcases/kernel/containers/.gitignore
+++ b/testcases/kernel/containers/.gitignore
@@ -1,3 +1,4 @@
 /check_for_unshare
 mountns/mountns01
 mountns/mountns02
+mountns/mountns03
diff --git a/testcases/kernel/containers/mountns/mountns03.c b/testcases/kernel/containers/mountns/mountns03.c
new file mode 100644
index 0000000..330d83e
--- /dev/null
+++ b/testcases/kernel/containers/mountns/mountns03.c
@@ -0,0 +1,241 @@
+/* Copyright (c) 2014 Red Hat, Inc.
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of version 2 the GNU General Public License as
+ * published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program.  If not, see <http://www.gnu.org/licenses/>.
+ ***********************************************************************
+ * File: mountns03.c
+ *
+ * Tests a slave mount: slave mount is like a shared mount except that
+ * mount and umount events only propagate towards it.
+ * Description:
+ * 1. Creates directories "A", "B", "C", "D" and files "A/A", "B/B"
+ *    "C/C", "D/D"
+ * 2. Unshares mount namespace and makes it private (so mounts/umounts
+ *    have no effect on a real system)
+ * 3. Bind mounts directory "A" to "A" and "B" to "B"
+ * 4. Makes both directories ("A" and "B") shared
+ * 5. Clones a new child process with CLONE_NEWNS flag - the new child
+ *    then:
+ *    a) bind mounts directory "A" to directory "B"
+ *    b) makes mount "B" a slave of "A"
+ *    c) bind mounts directory "C" to "A"
+ *    d) checks that mount in c) propagated also to direcoty "B" (as "B"
+ *       is a slave of "A"):
+ *       - if it does, test #1 passes
+ *       - if it doesn't, test #1 fails
+ *    e) bind mounts direcory "D" to "B"
+ *    f) waits for parent approval to terminate
+ * 6. Parent checks if directory "A" doesn't contain the file "D"
+ *    (as slave mount ("B") doesn't forward propagation (to "A")):
+ *    - if it doesn't, test #2 passes
+ *    - if it does, test #2 fails
+ * 7. Parent allows child to terminate
+ ***********************************************************************/
+
+#define _GNU_SOURCE
+#include <sys/wait.h>
+#include <sys/mount.h>
+#include <stdio.h>
+#include <unistd.h>
+#include <errno.h>
+#include "test.h"
+#include "usctest.h"
+#include "libclone.h"
+#include "safe_macros.h"
+#include "safe_file_ops.h"
+#include "mountns_helper.h"
+
+
+#define DIRA "A"
+#define DIRB "B"
+#define DIRC "C"
+#define DIRD "D"
+char *TCID	= "mountns03";
+int TST_TOTAL	= 2;
+int pipefd1[2];
+int pipefd2[2];
+
+
+static void cleanup(void)
+{
+	close(pipefd1[0]);
+	close(pipefd1[1]);
+	close(pipefd2[0]);
+	close(pipefd2[1]);
+	umount(DIRA);
+	umount(DIRB);
+	tst_rmdir();
+}
+
+static void setup(void)
+{
+	tst_require_root(NULL);
+	check_newns();	/* from mountns_helper.h */
+
+	/* checks if following mountflags are defined */
+	#if !defined(MS_SHARED) || !defined(MS_PRIVATE) \
+	    || !defined(MS_REC) || !defined(MS_SLAVE)
+		tst_brkm(TCONF, NULL, "needed mountflags are not defined");
+	#endif
+
+	tst_tmpdir();
+	SAFE_MKDIR(cleanup, DIRA, 0777);
+	SAFE_MKDIR(cleanup, DIRB, 0777);
+	SAFE_MKDIR(cleanup, DIRC, 0777);
+	SAFE_MKDIR(cleanup, DIRD, 0777);
+	SAFE_TOUCH(cleanup, DIRA"/A", 0, NULL);
+	SAFE_TOUCH(cleanup, DIRB"/B", 0, NULL);
+	SAFE_TOUCH(cleanup, DIRC"/C", 0, NULL);
+	SAFE_TOUCH(cleanup, DIRD"/D", 0, NULL);
+}
+
+int child_func(void *arg)
+{
+	char buf;
+
+	/* bind mounts DIRA to DIRB making contents of DIRA visible
+	 * in DIRB */
+	if (mount(DIRA, DIRB, "none", MS_BIND, NULL) == -1) {
+		perror("mount");
+		write(pipefd1[1], "1", 1);
+		return 1;
+	}
+
+	/* makes mount DIRB a slave of DIRA (all slave mounts have
+	 * a master mount which is a shared mount. */
+	if (mount("none", DIRB, "none", MS_SLAVE, NULL) == -1) {
+		perror("mount");
+		umount(DIRB);
+		write(pipefd1[1], "1", 1);
+		return 1;
+	}
+
+	/* bind mounts DIRC to DIRA making contents of DIRC visible
+	 * in DIRA */
+	if (mount(DIRC, DIRA, "none", MS_BIND, NULL) == -1) {
+		perror("mount");
+		umount(DIRB);
+		write(pipefd1[1], "1", 1);
+		return 1;
+	}
+
+	/* as DIRB is a slave of DIRA, previous mount (DIRC to DIRA)
+	 * should be also propageted into DIRB */
+	if (access(DIRB"/C", F_OK) != -1)
+		tst_resm(TPASS, "propagation to slave mount passed");
+	else
+		tst_resm(TFAIL, "propagation to slave mount failed");
+
+	/* bind mounts DIRD to DIRB making contents of DIRD visible
+	 * in DIRB (should not propagate to DIRA as DIRB is its slave) */
+	if (mount(DIRD, DIRB, "none", MS_BIND, NULL) == -1) {
+		perror("mount");
+		umount(DIRA);
+		umount(DIRB);
+		write(pipefd1[1], "1", 1);
+		return 1;
+	}
+
+	/* tells parent to stop waiting and continue */
+	write(pipefd1[1], "0", 1);
+
+	/* waits for parent approval to terminate */
+	read(pipefd2[0], &buf, 1);
+
+	umount(DIRB);
+	umount(DIRA);
+	umount(DIRB);
+	return 0;
+}
+
+static void test(void)
+{
+	int status, pass;
+	char buf;
+
+	/* creates a pipe for synchronization between parent and child */
+	SAFE_PIPE(cleanup, pipefd1);
+	SAFE_PIPE(cleanup, pipefd2);
+
+	/* unshares the mount ns */
+	if (unshare(CLONE_NEWNS) == -1)
+		tst_brkm(TBROK | TERRNO, cleanup, "unshare failed");
+	/* makes sure parent mounts/umounts have no effect on a real system */
+	SAFE_MOUNT(cleanup, "none", "/", "none", MS_REC|MS_PRIVATE, NULL);
+
+	/* bind mounts DIRA to itself */
+	SAFE_MOUNT(cleanup, DIRA, DIRA, "none", MS_BIND, NULL);
+	/* bind mounts DIRB to itself */
+	SAFE_MOUNT(cleanup, DIRB, DIRB, "none", MS_BIND, NULL);
+
+	/* makes mount DIRA shared */
+	SAFE_MOUNT(cleanup, "none", DIRA, "none", MS_SHARED, NULL);
+	/* makes mount DIRB shared */
+	SAFE_MOUNT(cleanup, "none", DIRB, "none", MS_SHARED, NULL);
+
+	if (do_clone_tests(CLONE_NEWNS, child_func, NULL, NULL, NULL) == -1)
+		tst_brkm(TBROK | TERRNO, cleanup, "clone failed");
+
+	/* waits for child bind mount */
+	SAFE_READ(cleanup, 0, pipefd1[0], &buf, 1);
+
+	/* checks that mount in slave (DIRB) doesn't propagate to shared
+	 * mount (DIRA) */
+	if (access(DIRA"/D", F_OK) == -1)
+		pass = 1;
+	else
+		pass = 0;
+
+	/* tells child to terminate (if no error occured in child) */
+	SAFE_WRITE(cleanup, 0, pipefd2[1], "0", 1);
+
+	SAFE_WAIT(cleanup, &status);
+
+	if (WIFEXITED(status) && WEXITSTATUS(status) != 0)
+		tst_brkm(TBROK, cleanup, "child failed");
+
+	if (WIFSIGNALED(status)) {
+		tst_resm(TFAIL, "child was killed with signal %s",
+			 tst_strsig(WTERMSIG(status)));
+		return;
+	}
+
+	close(pipefd1[0]);
+	close(pipefd1[1]);
+	close(pipefd2[0]);
+	close(pipefd2[1]);
+	umount(DIRA);
+	umount(DIRB);
+
+	if (pass)
+		tst_resm(TPASS, "propagation from slave mount passed");
+	else
+		tst_resm(TFAIL, "propagation form slave mount failed");
+}
+
+int main(int argc, char *argv[])
+{
+	const char *msg;
+	int lc;
+
+	msg = parse_opts(argc, argv, NULL, NULL);
+	if (msg != NULL)
+		tst_brkm(TBROK, NULL, "OPTION PARSING ERROR - %s", msg);
+
+	setup();
+
+	for (lc = 0; TEST_LOOPING(lc); lc++)
+		test();
+
+	cleanup();
+	tst_exit();
+}
-- 
1.8.3.1


------------------------------------------------------------------------------
Slashdot TV.  
Video for Nerds.  Stuff that matters.
http://tv.slashdot.org/
_______________________________________________
Ltp-list mailing list
Ltp-list@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ltp-list

^ permalink raw reply related	[flat|nested] 17+ messages in thread

end of thread, other threads:[~2014-10-15 12:39 UTC | newest]

Thread overview: 17+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-08-26  9:59 [LTP] [PATCH 1/2] containers: added mountns/mountns03.c Matus Marhefka
2014-08-26  9:59 ` [LTP] [PATCH 2/2] containers: added mountns/mountns04.c Matus Marhefka
2014-08-29 13:47   ` [LTP] [PATCH 2/2 v2] " Matus Marhefka
2014-09-04 14:21     ` Jan Stancek
2014-10-02 13:47       ` Cyril Hrubis
     [not found]         ` <1080778288.46330076.1412258911538.JavaMail.zimbra@redhat.com>
2014-10-15 12:39           ` Cyril Hrubis
2014-09-24  8:14     ` chrubis
2014-10-02 12:29   ` [LTP] [PATCH 2/2 v3] " Matus Marhefka
2014-08-29 13:46 ` [LTP] [PATCH 1/2 v2] containers: added mountns/mountns03.c Matus Marhefka
2014-09-04 14:13   ` Jan Stancek
2014-09-11 15:09     ` Jiri Jaburek
2014-09-12 12:59       ` Jan Stancek
2014-09-12 13:41         ` Jiri Jaburek
2014-09-12 14:19           ` Jan Stancek
2014-09-24  7:56   ` chrubis
     [not found]     ` <273164774.30346037.1411649870605.JavaMail.zimbra@redhat.com>
     [not found]       ` <461070711.43439951.1411650253035.JavaMail.zimbra@redhat.com>
2014-09-29  8:14         ` chrubis
2014-10-02 12:28 ` [LTP] [PATCH 1/2 v3] " Matus Marhefka

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.