functional test for setns(2) - reassociate thread with a namespace

Signed-off-by: Jan Stancek <[email protected]>
---
 runtest/syscalls                          |    1 +
 testcases/kernel/syscalls/.gitignore      |    1 +
 testcases/kernel/syscalls/setns/setns02.c |  231 +++++++++++++++++++++++++++++
 3 files changed, 233 insertions(+), 0 deletions(-)
 create mode 100644 testcases/kernel/syscalls/setns/setns02.c

diff --git a/runtest/syscalls b/runtest/syscalls
index a881479..c70bcbd 100644
--- a/runtest/syscalls
+++ b/runtest/syscalls
@@ -963,6 +963,7 @@ setitimer02 setitimer02
 setitimer03 setitimer03
 
 setns01 setns01
+setns02 setns02
 
 setpgid01 setpgid01
 setpgid02 setpgid02
diff --git a/testcases/kernel/syscalls/.gitignore 
b/testcases/kernel/syscalls/.gitignore
index d3bf8b7..90b521e 100644
--- a/testcases/kernel/syscalls/.gitignore
+++ b/testcases/kernel/syscalls/.gitignore
@@ -764,6 +764,7 @@
 /setitimer/setitimer02
 /setitimer/setitimer03
 /setns/setns01
+/setns/setns02
 /setpgid/setpgid01
 /setpgid/setpgid02
 /setpgid/setpgid03
diff --git a/testcases/kernel/syscalls/setns/setns02.c 
b/testcases/kernel/syscalls/setns/setns02.c
new file mode 100644
index 0000000..fa8ea74
--- /dev/null
+++ b/testcases/kernel/syscalls/setns/setns02.c
@@ -0,0 +1,231 @@
+/*
+ * Copyright (C) 2013 Linux Test Project, Inc.
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of version 2 of the GNU General Public
+ * License as published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it would be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
+ *
+ * Further, this software is distributed without any warranty that it
+ * is free of the rightful claim of any third person regarding
+ * infringement or the like.  Any license provided herein, whether
+ * implied or otherwise, applies only to this software file.  Patent
+ * licenses, if any, provided herein do not apply to combinations of
+ * this program with other software, or any other product whatsoever.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write the Free Software
+ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
+ * 02110-1301, USA.
+ */
+/*
+ * functional test for setns(2) - reassociate thread with a namespace
+ * 1. create child with CLONE_NEWUTS, set different hostname in child,
+ *    set namespace back to parent ns and check that hostname has changed
+ * 2. create child with CLONE_NEWIPC, set up shared memory in parent
+ *    and verify that child can't shmat it, then set namespace
+ *    back to parent one and verify that child is able to do shmat
+ */
+#define _GNU_SOURCE
+#include <sys/ipc.h>
+#include <sys/shm.h>
+#include <sys/stat.h>
+#include <sys/syscall.h>
+#include <sys/types.h>
+#include <sys/utsname.h>
+#include <sys/wait.h>
+#include <errno.h>
+#include <sched.h>
+#include <string.h>
+#include "config.h"
+#include "test.h"
+#include "usctest.h"
+#include "linux_syscall_numbers.h"
+#include "safe_macros.h"
+
+#define CHILD_STACK_SIZE (1024*1024)
+#define CP "(child) "
+char *TCID = "setns02";
+
+#if defined(__NR_setns) && defined(CLONE_NEWIPC) && defined(CLONE_NEWUTS)
+#include "setns.h"
+
+static char *dummy_hostname = "setns_dummy_uts";
+static int ns_ipc_fd;
+static int ns_uts_fd;
+static key_t ipc_key;
+static int shmid;
+
+static void setup(void);
+static void cleanup(void);
+
+static int do_child_newuts(void *arg)
+{
+       struct utsname uts, uts_parent;
+       int ns_flag = *(int *)arg;
+
+       if (uname(&uts_parent) == -1)
+               tst_resm(TFAIL|TERRNO, CP"uname");
+       tst_resm(TINFO, CP"hostnane (inherited from parent): %s",
+               uts_parent.nodename);
+
+       if (sethostname(dummy_hostname, strlen(dummy_hostname)) == -1)
+               tst_resm(TFAIL|TERRNO, CP"sethostname");
+       if (uname(&uts) == -1)
+               tst_resm(TFAIL|TERRNO, CP"uname");
+
+       tst_resm(TINFO, CP"hostname changed to: %s", uts.nodename);
+       if (strcmp(uts_parent.nodename, uts.nodename) == 0) {
+               tst_resm(TFAIL, CP"expected hostname to be different");
+               return 1;
+       } else {
+               tst_resm(TPASS, CP"hostname is different in parent/child");
+       }
+
+       tst_resm(TINFO, CP"attemping to switch ns back to parent ns");
+       if (syscall(__NR_setns, ns_uts_fd, ns_flag) == -1) {
+               tst_resm(TFAIL|TERRNO, CP"setns");
+               return 2;
+       }
+       if (uname(&uts) == -1)
+               tst_resm(TFAIL|TERRNO, CP"uname");
+
+       tst_resm(TINFO, CP"hostname: %s", uts.nodename);
+       if (strcmp(uts_parent.nodename, uts.nodename) != 0) {
+               tst_resm(TFAIL, CP"expected hostname to match parent");
+               return 3;
+       } else {
+               tst_resm(TPASS, CP"hostname now as expected");
+       }
+       return 0;
+}
+
+static int do_child_newipc(void *arg)
+{
+       void *p;
+       int ns_flag = *(int *)arg;
+
+       p = shmat(shmid, NULL, 0);
+       if (p == (void *) -1) {
+               tst_resm(TPASS|TERRNO, CP"shmat failed as expected");
+       } else {
+               tst_resm(TFAIL, CP"shmat unexpectedly suceeded");
+               shmdt(p);
+               return 1;
+       }
+
+       tst_resm(TINFO, CP"attemping to switch ns back to parent ns");
+       if (syscall(__NR_setns, ns_ipc_fd, ns_flag) == -1) {
+               tst_resm(TFAIL|TERRNO, CP"setns");
+               return 2;
+       }
+
+       p = shmat(shmid, NULL, 0);
+       if (p == (void *) -1) {
+               tst_resm(TFAIL|TERRNO, CP"shmat failed after setns");
+               return 3;
+       } else {
+               tst_resm(TPASS, CP"shmat suceeded");
+               shmdt(p);
+       }
+
+       return 0;
+}
+
+static void test_flag(int clone_flag, int ns_flag, int (*fn) (void *arg))
+{
+       void *child_stack;
+       int ret, status;
+
+       child_stack = malloc(CHILD_STACK_SIZE);
+       if (child_stack == NULL)
+               tst_brkm(TBROK, cleanup, "Cannot allocate stack for child");
+
+       tst_resm(TINFO, "creating child with clone_flag=0x%x, ns_flag=0x%x",
+               clone_flag, ns_flag);
+       ret = ltp_clone(SIGCHLD|clone_flag, fn, &ns_flag,
+               CHILD_STACK_SIZE, child_stack);
+       if (ret == -1)
+               tst_brkm(TBROK|TERRNO, cleanup, "ltp_clone");
+
+       if (waitpid(ret, &status, 0) == -1)
+               tst_brkm(TBROK|TERRNO, cleanup, "waitpid");
+       if (!WIFEXITED(status) || WEXITSTATUS(status) != 0)
+               tst_resm(TFAIL, "child returns %d", status);
+       else
+               tst_resm(TPASS, "child finished succesfully");
+       free(child_stack);
+}
+
+int main(int argc, char *argv[])
+{
+       int lc;
+       char *msg;
+
+       msg = parse_opts(argc, argv, NULL, NULL);
+       if (msg != NULL)
+               tst_brkm(TBROK, tst_exit, "OPTION PARSING ERROR - %s", msg);
+
+       setup();
+       for (lc = 0; TEST_LOOPING(lc); lc++) {
+               if (ns_uts_fd != -1) {
+                       tst_resm(TINFO, "test_newuts");
+                       test_flag(CLONE_NEWUTS, CLONE_NEWUTS, do_child_newuts);
+                       test_flag(CLONE_NEWUTS, 0, do_child_newuts);
+               }
+               if (ns_ipc_fd != -1) {
+                       tst_resm(TINFO, "test_newipc");
+                       test_flag(CLONE_NEWIPC, CLONE_NEWIPC, do_child_newipc);
+                       test_flag(CLONE_NEWIPC, 0, do_child_newipc);
+               }
+       }
+       cleanup();
+       tst_exit();
+}
+
+static void setup(void)
+{
+       char tmp[PATH_MAX];
+
+       tst_require_root(NULL);
+
+       /* runtime check if syscall is supported */
+       syscall(__NR_setns, -1, 0);
+
+       /* check if kernel has CONFIG_*_NS set and exports /proc entries */
+       ns_ipc_fd = get_ns_fd(getpid(), "ns/ipc");
+       ns_uts_fd = get_ns_fd(getpid(), "ns/uts");
+       if (ns_ipc_fd == -1 && ns_uts_fd == -1)
+               tst_brkm(TCONF, NULL, "your kernel has CONFIG_IPC_NS, "
+                       "CONFIG_UTS_NS or CONFIG_PROC disabled");
+
+       if (getcwd(tmp, PATH_MAX) == NULL)
+               tst_brkm(TBROK|TERRNO, NULL, "getcwd");
+       ipc_key = ftok(tmp, 65);
+       shmid = shmget(ipc_key, getpagesize(), IPC_CREAT | 0666);
+       if (shmid == -1)
+               tst_brkm(TBROK|TERRNO, NULL, "shmget");
+
+       TEST_PAUSE;
+}
+
+static void cleanup(void)
+{
+       if (ns_ipc_fd != -1)
+               close(ns_ipc_fd);
+       if (ns_uts_fd != -1)
+               close(ns_uts_fd);
+
+       shmctl(shmid, IPC_RMID, NULL);
+       TEST_CLEANUP;
+}
+#else
+int main(int argc, char *argv[])
+{
+       tst_brkm(TCONF, NULL, "__NR_setns, CLONE_NEWIPC or CLONE_NEWUTS "
+               " is not defined on your system.");
+}
+#endif
-- 
1.7.1


------------------------------------------------------------------------------
Free Next-Gen Firewall Hardware Offer
Buy your Sophos next-gen firewall before the end March 2013 
and get the hardware for free! Learn more.
http://p.sf.net/sfu/sophos-d2d-feb
_______________________________________________
Ltp-list mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ltp-list

Reply via email to