----- Original Message -----
> From: "Matus Marhefka" <mmarh...@redhat.com>
> To: ltp-list@lists.sourceforge.net
> Sent: Friday, 15 August, 2014 5:16:49 PM
> Subject: [LTP] [PATCH 3/3 v2] containers: added mountns/mountns02.c
> 
> * Tests a private mount: private mount does not forward or receive
>   propagation.
> 
> Signed-off-by: Matus Marhefka <mmarh...@redhat.com>
> ---
>  runtest/containers                              |   1 +
>  testcases/kernel/containers/mountns/mountns02.c | 190
>  ++++++++++++++++++++++++
>  2 files changed, 191 insertions(+)
>  create mode 100644 testcases/kernel/containers/mountns/mountns02.c
> 
> diff --git a/runtest/containers b/runtest/containers
> index bf50ae4..ab16bc0 100644
> --- a/runtest/containers
> +++ b/runtest/containers
> @@ -15,5 +15,6 @@ pidns30 pidns30
>  pidns31 pidns31
>  
>  mountns01 mountns01
> +mountns02 mountns02
>  
>  Containers   container_test.sh
> diff --git a/testcases/kernel/containers/mountns/mountns02.c
> b/testcases/kernel/containers/mountns/mountns02.c
> new file mode 100644
> index 0000000..8a677b7
> --- /dev/null
> +++ b/testcases/kernel/containers/mountns/mountns02.c
> @@ -0,0 +1,190 @@
> +/* Copyright (c) 2014 Red Hat, Inc.
> + *
> + * This program is free software: you can redistribute it and/or modify
> + * it under the terms of version 2 the GNU General Public License as
> + * published by the Free Software Foundation.
> + *
> + * This program is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> + * GNU General Public License for more details.
> + *
> + * You should have received a copy of the GNU General Public License
> + * along with this program.  If not, see <http://www.gnu.org/licenses/>.
> + ***********************************************************************
> + * File: mountns02.c
> + *
> + * Tests a private mount: private mount does not forward or receive
> + * propagation.
> + * Description:
> + * 1. Creates directories "A", "B" and files "A/A", "B/B"
> + * 2. Unshares mount namespace and makes it private (so mounts/umounts
> + *    have no effect on a real system)
> + * 3. Bind mounts directory "A" to "A" and "B" to "B"
> + * 4. Makes both directories ("A" and "B") shared
> + * 5. Clones a new child process with CLONE_NEWNS flag - the new child
> + *    then mounts directory "A" as private and bind mounts directory
> + *    "B" to "A" (now child must wait for parent to make check - wait
> + *    is needed because mount ns in child stops exist as soon as child
> + *    terminates)
> + * 6. Parent checks if directory "A" doesn't contain the file "B"
> + *    (changes in child should not be visible in parent as mount in child
> + *    was private):
> + *    - if it doesn't, test passes
> + *    - if it does, test fails
> + * 7. Parent allows child to terminate
> + ***********************************************************************/
> +
> +#define _GNU_SOURCE
> +#include <sys/wait.h>
> +#include <sys/mount.h>
> +#include <stdio.h>
> +#include <unistd.h>
> +#include <errno.h>
> +#include "test.h"
> +#include "usctest.h"
> +#include "libclone.h"
> +#include "safe_macros.h"
> +#include "safe_file_ops.h"
> +#include "mountns_helper.h"
> +
> +
> +#define DIRA "A"
> +#define DIRB "B"
> +char *TCID   = "mountns02";
> +int TST_TOTAL        = 1;
> +int pipefd1[2];
> +int pipefd2[2];
> +
> +
> +static void cleanup(void)
> +{
> +     close(pipefd1[0]);
> +     close(pipefd1[1]);
> +     close(pipefd2[0]);
> +     close(pipefd2[1]);
> +     umount(DIRA);
> +     umount(DIRA);
> +     umount(DIRB);
> +     tst_rmdir();

As in mountns01, try with -i 2:

# ./mountns02 -i 2
mountns02    1  TPASS  :  private mount passed
mountns02    2  TPASS  :  private mount passed
mountns02    0  TWARN  :  tst_tmpdir.c:206: tst_rmdir: rmobj(/tmp/mouY0X2xg) 
failed: remove(/tmp/mouY0X2xg/B) failed; errno=16: Device or resource busy

> +}
> +
> +static void setup(void)
> +{
> +     tst_require_root(NULL);
> +     check_newns();  /* from mountns_helper.h */
> +     tst_tmpdir();
> +     SAFE_MKDIR(cleanup, DIRA, 0777);
> +     SAFE_MKDIR(cleanup, DIRB, 0777);
> +     SAFE_TOUCH(cleanup, DIRA"/A", 0, NULL);
> +     SAFE_TOUCH(cleanup, DIRB"/B", 0, NULL);
> +}
> +
> +int child_func(void *arg)
> +{
> +     char buf;
> +
> +     /* makes DIRA private */
> +     if (mount("none", DIRA, "none", MS_PRIVATE, NULL) == -1) {
> +             perror("mount");
> +             write(pipefd1[1], "1", 1);
> +             return 1;
> +     }
> +
> +     /* bind mounts DIRB to DIRA making contents of DIRB visible
> +      * in DIRA (should apply only for child as DIRA is private) */
> +        if (mount(DIRB, DIRA, "none", MS_BIND, NULL) == -1) {
> +             perror("mount");
> +             write(pipefd1[1], "1", 1);
> +             return 1;
> +     }
> +
> +     /* tells parent to stop waiting and continue */
> +     write(pipefd1[1], "0", 1);
> +
> +     /* waits for parent approval to terminate */
> +     read(pipefd2[0], &buf, 1);
> +
> +     return 0;
> +}
> +
> +static void test(void)
> +{
> +     int status, pass;
> +     char buf;
> +
> +     /* creates a pipe for synchronization between parent and child */
> +     SAFE_PIPE(cleanup, pipefd1);
> +     SAFE_PIPE(cleanup, pipefd2);
> +
> +     /* unshares the mount ns */
> +     if (unshare(CLONE_NEWNS) == -1)
> +             tst_brkm(TBROK | TERRNO, cleanup, "unshare failed");
> +     /* makes sure parent mounts/umounts have no effect on a real system */
> +     SAFE_MOUNT(cleanup, "none", "/", "none", MS_REC|MS_PRIVATE, NULL);
> +
> +     /* bind mounts DIRA to itself */
> +     SAFE_MOUNT(cleanup, DIRA, DIRA, "none", MS_BIND, NULL);
> +     /* bind mounts DIRB to itself */
> +     SAFE_MOUNT(cleanup, DIRB, DIRB, "none", MS_BIND, NULL);
> +
> +     /* makes mount DIRA shared */
> +     SAFE_MOUNT(cleanup, "none", DIRA, "none", MS_SHARED, NULL);
> +     /* makes mount DIRB shared */
> +     SAFE_MOUNT(cleanup, "none", DIRB, "none", MS_SHARED, NULL);
> +
> +
> +     if (do_clone_tests(CLONE_NEWNS, child_func, NULL, NULL, NULL) == -1)
> +             tst_brkm(TBROK | TERRNO, cleanup, "clone failed");
> +
> +     /* waits for child bind mount */
> +     SAFE_READ(cleanup, 0, pipefd1[0], &buf, 1);
> +     /* in case some mount failed in child */
> +     if (buf == '1')
> +             tst_brkm(TBROK, cleanup, "child failed");

Is this check needed if child returns same value via ret code,
which is checked few lines below in EXISTSTATUS?

Regards,
Jan

> +
> +     /* as child made private mount from DIRA, parent should not
> +      * see file "B" in DIRA; following checks if DIRA doesn't contain
> +      * file "B" */
> +     if (access(DIRA"/B", F_OK) == -1)
> +             pass = 1;
> +     else
> +             pass = 0;
> +
> +     /* tells child to terminate */
> +     SAFE_WRITE(cleanup, 0, pipefd2[1], "0", 1);
> +
> +     SAFE_WAIT(cleanup, &status);
> +
> +     if (WIFEXITED(status) && WEXITSTATUS(status) != 0)
> +             tst_brkm(TBROK, cleanup, "child failed");
> +
> +     if (WIFSIGNALED(status)) {
> +             tst_resm(TFAIL, "child was killed with signal %s",
> +                      tst_strsig(WTERMSIG(status)));
> +             return;
> +     }
> +
> +     if (pass)
> +             tst_resm(TPASS, "private mount passed");
> +     else
> +             tst_resm(TFAIL, "private mount failed");
> +}
> +
> +int main(int argc, char *argv[])
> +{
> +     const char *msg;
> +     int lc;
> +
> +     msg = parse_opts(argc, argv, NULL, NULL);
> +     if (msg != NULL)
> +             tst_brkm(TBROK, NULL, "OPTION PARSING ERROR - %s", msg);
> +
> +     setup();
> +
> +     for (lc = 0; TEST_LOOPING(lc); lc++)
> +             test();
> +
> +     cleanup();
> +     tst_exit();
> +}
> --
> 1.8.3.1
> 
> 
> ------------------------------------------------------------------------------
> _______________________________________________
> Ltp-list mailing list
> Ltp-list@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/ltp-list
> 

------------------------------------------------------------------------------
Slashdot TV.  
Video for Nerds.  Stuff that matters.
http://tv.slashdot.org/
_______________________________________________
Ltp-list mailing list
Ltp-list@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ltp-list

Reply via email to