* Tests a slave mount: slave mount is like a shared mount except that
  mount and umount events only propagate towards it

Signed-off-by: Matus Marhefka <mmarh...@redhat.com>
---
 runtest/containers                              |   1 +
 testcases/kernel/containers/.gitignore          |   1 +
 testcases/kernel/containers/mountns/mountns03.c | 179 ++++++++++++++++++++++++
 3 files changed, 181 insertions(+)
 create mode 100644 testcases/kernel/containers/mountns/mountns03.c

diff --git a/runtest/containers b/runtest/containers
index 56977c0..3653c9c 100644
--- a/runtest/containers
+++ b/runtest/containers
@@ -58,3 +58,4 @@ utstest_clone_5 utstest clone 5
 
 mountns01 mountns01
 mountns02 mountns02
+mountns03 mountns03
diff --git a/testcases/kernel/containers/.gitignore 
b/testcases/kernel/containers/.gitignore
index f175296..5b96cb9 100644
--- a/testcases/kernel/containers/.gitignore
+++ b/testcases/kernel/containers/.gitignore
@@ -1,3 +1,4 @@
 /check_for_unshare
 mountns/mountns01
 mountns/mountns02
+mountns/mountns03
diff --git a/testcases/kernel/containers/mountns/mountns03.c 
b/testcases/kernel/containers/mountns/mountns03.c
new file mode 100644
index 0000000..eb64581
--- /dev/null
+++ b/testcases/kernel/containers/mountns/mountns03.c
@@ -0,0 +1,179 @@
+/* Copyright (c) 2014 Red Hat, Inc.
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of version 2 the GNU General Public License as
+ * published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program.  If not, see <http://www.gnu.org/licenses/>.
+ ***********************************************************************
+ * File: mountns03.c
+ *
+ * Tests a slave mount: slave mount is like a shared mount except that
+ * mount and umount events only propagate towards it.
+ *
+ * Description:
+ * 1. Creates directories "A", "B" and files "A/A", "B/B"
+ * 2. Unshares mount namespace and makes it private (so mounts/umounts
+ *    have no effect on a real system)
+ * 3. Bind mounts directory "A" to itself
+ * 4. Makes directory "A" shared
+ * 5. Clones a new child process with CLONE_NEWNS flag and makes "A"
+ *    a slave mount
+ * 6. There are two testcases (where X is parent namespace and Y child
+ *    namespace):
+ *    1)
+ *     X: bind mounts "B" to "A"
+ *     Y: must see the file "A/B"
+ *     X: umounts "A"
+ *    2)
+ *     Y: bind mounts "B" to "A"
+ *     X: must see only the "A/A" and must not see "A/B" (as slave
+ *        mount does not forward propagation)
+ *     Y: umounts "A"
+ ***********************************************************************/
+
+#define _GNU_SOURCE
+#include <sys/wait.h>
+#include <sys/mount.h>
+#include <stdio.h>
+#include <unistd.h>
+#include <errno.h>
+#include "test.h"
+#include "usctest.h"
+#include "libclone.h"
+#include "safe_macros.h"
+#include "safe_file_ops.h"
+#include "mountns_helper.h"
+
+
+char *TCID     = "mountns03";
+int TST_TOTAL  = 2;
+
+
+#if defined(MS_SHARED) && defined(MS_PRIVATE) \
+    && defined(MS_REC) && defined(MS_SLAVE)
+
+int child_func(void *arg)
+{
+       int ret = 0;
+
+       /* makes mount DIRA a slave of DIRA (all slave mounts have
+        * a master mount which is a shared mount) */
+       if (mount("none", DIRA, "none", MS_SLAVE, NULL) == -1) {
+               perror("mount");
+               return 1;
+       }
+
+       TST_CHECKPOINT_SIGNAL_PARENT(&checkpoint1);
+       TST_CHECKPOINT_CHILD_WAIT(&checkpoint2);
+
+       /* checks that shared mounts propagates to slave mount */
+       if (access(DIRA"/B", F_OK) == -1)
+               ret = 2;
+
+       TST_CHECKPOINT_SIGNAL_PARENT(&checkpoint1);
+       TST_CHECKPOINT_CHILD_WAIT(&checkpoint2);
+
+       /* bind mounts DIRB to DIRA making contents of DIRB visible
+        * in DIRA */
+       if (mount(DIRB, DIRA, "none", MS_BIND, NULL) == -1) {
+               perror("mount");
+               return 1;
+       }
+
+       TST_CHECKPOINT_SIGNAL_PARENT(&checkpoint1);
+       TST_CHECKPOINT_CHILD_WAIT(&checkpoint2);
+
+       umount(DIRA);
+       return ret;
+}
+
+static void test(void)
+{
+       int status;
+
+       /* unshares the mount ns */
+       if (unshare(CLONE_NEWNS) == -1)
+               tst_brkm(TBROK | TERRNO, cleanup, "unshare failed");
+       /* makes sure parent mounts/umounts have no effect on a real system */
+       SAFE_MOUNT(cleanup, "none", "/", "none", MS_REC|MS_PRIVATE, NULL);
+
+       /* bind mounts DIRA to itself */
+       SAFE_MOUNT(cleanup, DIRA, DIRA, "none", MS_BIND, NULL);
+
+       /* makes mount DIRA shared */
+       SAFE_MOUNT(cleanup, "none", DIRA, "none", MS_SHARED, NULL);
+
+       if (do_clone_tests(CLONE_NEWNS, child_func, NULL, NULL, NULL) == -1)
+               tst_brkm(TBROK | TERRNO, cleanup, "clone failed");
+
+       /* waits for child to make a slave mount */
+       TST_CHECKPOINT_PARENT_WAIT(cleanup, &checkpoint1);
+
+       /* bind mounts DIRB to DIRA making contents of DIRB visible
+        * in DIRA */
+       SAFE_MOUNT(cleanup, DIRB, DIRA, "none", MS_BIND, NULL);
+
+       TST_CHECKPOINT_SIGNAL_CHILD(cleanup, &checkpoint2);
+       TST_CHECKPOINT_PARENT_WAIT(cleanup, &checkpoint1);
+
+       SAFE_UMOUNT(cleanup, DIRA);
+
+       TST_CHECKPOINT_SIGNAL_CHILD(cleanup, &checkpoint2);
+       TST_CHECKPOINT_PARENT_WAIT(cleanup, &checkpoint1);
+
+       /* checks that slave mount doesn't propagate to shared mount */
+       if ((access(DIRA"/A", F_OK) == 0) && (access(DIRA"/B", F_OK) == -1))
+               tst_resm(TPASS, "propagation from slave mount passed");
+       else
+               tst_resm(TFAIL, "propagation form slave mount failed");
+
+       TST_CHECKPOINT_SIGNAL_CHILD(cleanup, &checkpoint2);
+
+
+       SAFE_WAIT(cleanup, &status);
+       if (WIFEXITED(status)) {
+               if (WEXITSTATUS(status) == 0)
+                       tst_resm(TPASS, "propagation to slave mount passed");
+               else
+                       tst_resm(TFAIL, "propagation to slave mount failed");
+       }
+       if (WIFSIGNALED(status)) {
+               tst_resm(TBROK, "child was killed with signal %s",
+                        tst_strsig(WTERMSIG(status)));
+               return;
+       }
+
+       SAFE_UMOUNT(cleanup, DIRA);
+}
+
+int main(int argc, char *argv[])
+{
+       const char *msg;
+       int lc;
+
+       msg = parse_opts(argc, argv, NULL, NULL);
+       if (msg != NULL)
+               tst_brkm(TBROK, NULL, "OPTION PARSING ERROR - %s", msg);
+
+       setup();
+
+       for (lc = 0; TEST_LOOPING(lc); lc++)
+               test();
+
+       cleanup();
+       tst_exit();
+}
+
+#else
+int main(void)
+{
+       tst_brkm(TCONF, NULL, "needed mountflags are not defined");
+}
+#endif
-- 
1.8.3.1


------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Ltp-list mailing list
Ltp-list@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ltp-list

Reply via email to