* Tests a private mount: private mount does not forward or receive
  propagation.

Signed-off-by: Matus Marhefka <mmarh...@redhat.com>
---
 runtest/containers                              |   1 +
 testcases/kernel/containers/mountns/mountns02.c | 190 ++++++++++++++++++++++++
 2 files changed, 191 insertions(+)
 create mode 100644 testcases/kernel/containers/mountns/mountns02.c

diff --git a/runtest/containers b/runtest/containers
index bf50ae4..ab16bc0 100644
--- a/runtest/containers
+++ b/runtest/containers
@@ -15,5 +15,6 @@ pidns30 pidns30
 pidns31 pidns31
 
 mountns01 mountns01
+mountns02 mountns02
 
 Containers     container_test.sh
diff --git a/testcases/kernel/containers/mountns/mountns02.c 
b/testcases/kernel/containers/mountns/mountns02.c
new file mode 100644
index 0000000..8a677b7
--- /dev/null
+++ b/testcases/kernel/containers/mountns/mountns02.c
@@ -0,0 +1,190 @@
+/* Copyright (c) 2014 Red Hat, Inc.
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of version 2 the GNU General Public License as
+ * published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program.  If not, see <http://www.gnu.org/licenses/>.
+ ***********************************************************************
+ * File: mountns02.c
+ *
+ * Tests a private mount: private mount does not forward or receive
+ * propagation.
+ * Description:
+ * 1. Creates directories "A", "B" and files "A/A", "B/B"
+ * 2. Unshares mount namespace and makes it private (so mounts/umounts
+ *    have no effect on a real system)
+ * 3. Bind mounts directory "A" to "A" and "B" to "B"
+ * 4. Makes both directories ("A" and "B") shared
+ * 5. Clones a new child process with CLONE_NEWNS flag - the new child
+ *    then mounts directory "A" as private and bind mounts directory
+ *    "B" to "A" (now child must wait for parent to make check - wait
+ *    is needed because mount ns in child stops exist as soon as child
+ *    terminates)
+ * 6. Parent checks if directory "A" doesn't contain the file "B"
+ *    (changes in child should not be visible in parent as mount in child
+ *    was private):
+ *    - if it doesn't, test passes
+ *    - if it does, test fails
+ * 7. Parent allows child to terminate
+ ***********************************************************************/
+
+#define _GNU_SOURCE
+#include <sys/wait.h>
+#include <sys/mount.h>
+#include <stdio.h>
+#include <unistd.h>
+#include <errno.h>
+#include "test.h"
+#include "usctest.h"
+#include "libclone.h"
+#include "safe_macros.h"
+#include "safe_file_ops.h"
+#include "mountns_helper.h"
+
+
+#define DIRA "A"
+#define DIRB "B"
+char *TCID     = "mountns02";
+int TST_TOTAL  = 1;
+int pipefd1[2];
+int pipefd2[2];
+
+
+static void cleanup(void)
+{
+       close(pipefd1[0]);
+       close(pipefd1[1]);
+       close(pipefd2[0]);
+       close(pipefd2[1]);
+       umount(DIRA);
+       umount(DIRA);
+       umount(DIRB);
+       tst_rmdir();
+}
+
+static void setup(void)
+{
+       tst_require_root(NULL);
+       check_newns();  /* from mountns_helper.h */
+       tst_tmpdir();
+       SAFE_MKDIR(cleanup, DIRA, 0777);
+       SAFE_MKDIR(cleanup, DIRB, 0777);
+       SAFE_TOUCH(cleanup, DIRA"/A", 0, NULL);
+       SAFE_TOUCH(cleanup, DIRB"/B", 0, NULL);
+}
+
+int child_func(void *arg)
+{
+       char buf;
+
+       /* makes DIRA private */
+       if (mount("none", DIRA, "none", MS_PRIVATE, NULL) == -1) {
+               perror("mount");
+               write(pipefd1[1], "1", 1);
+               return 1;
+       }
+
+       /* bind mounts DIRB to DIRA making contents of DIRB visible
+        * in DIRA (should apply only for child as DIRA is private) */
+        if (mount(DIRB, DIRA, "none", MS_BIND, NULL) == -1) {
+               perror("mount");
+               write(pipefd1[1], "1", 1);
+               return 1;
+       }
+
+       /* tells parent to stop waiting and continue */
+       write(pipefd1[1], "0", 1);
+
+       /* waits for parent approval to terminate */
+       read(pipefd2[0], &buf, 1);
+
+       return 0;
+}
+
+static void test(void)
+{
+       int status, pass;
+       char buf;
+
+       /* creates a pipe for synchronization between parent and child */
+       SAFE_PIPE(cleanup, pipefd1);
+       SAFE_PIPE(cleanup, pipefd2);
+
+       /* unshares the mount ns */
+       if (unshare(CLONE_NEWNS) == -1)
+               tst_brkm(TBROK | TERRNO, cleanup, "unshare failed");
+       /* makes sure parent mounts/umounts have no effect on a real system */
+       SAFE_MOUNT(cleanup, "none", "/", "none", MS_REC|MS_PRIVATE, NULL);
+
+       /* bind mounts DIRA to itself */
+       SAFE_MOUNT(cleanup, DIRA, DIRA, "none", MS_BIND, NULL);
+       /* bind mounts DIRB to itself */
+       SAFE_MOUNT(cleanup, DIRB, DIRB, "none", MS_BIND, NULL);
+
+       /* makes mount DIRA shared */
+       SAFE_MOUNT(cleanup, "none", DIRA, "none", MS_SHARED, NULL);
+       /* makes mount DIRB shared */
+       SAFE_MOUNT(cleanup, "none", DIRB, "none", MS_SHARED, NULL);
+
+
+       if (do_clone_tests(CLONE_NEWNS, child_func, NULL, NULL, NULL) == -1)
+               tst_brkm(TBROK | TERRNO, cleanup, "clone failed");
+
+       /* waits for child bind mount */
+       SAFE_READ(cleanup, 0, pipefd1[0], &buf, 1);
+       /* in case some mount failed in child */
+       if (buf == '1')
+               tst_brkm(TBROK, cleanup, "child failed");
+
+       /* as child made private mount from DIRA, parent should not
+        * see file "B" in DIRA; following checks if DIRA doesn't contain
+        * file "B" */
+       if (access(DIRA"/B", F_OK) == -1)
+               pass = 1;
+       else
+               pass = 0;
+
+       /* tells child to terminate */
+       SAFE_WRITE(cleanup, 0, pipefd2[1], "0", 1);
+
+       SAFE_WAIT(cleanup, &status);
+
+       if (WIFEXITED(status) && WEXITSTATUS(status) != 0)
+               tst_brkm(TBROK, cleanup, "child failed");
+
+       if (WIFSIGNALED(status)) {
+               tst_resm(TFAIL, "child was killed with signal %s",
+                        tst_strsig(WTERMSIG(status)));
+               return;
+       }
+
+       if (pass)
+               tst_resm(TPASS, "private mount passed");
+       else
+               tst_resm(TFAIL, "private mount failed");
+}
+
+int main(int argc, char *argv[])
+{
+       const char *msg;
+       int lc;
+
+       msg = parse_opts(argc, argv, NULL, NULL);
+       if (msg != NULL)
+               tst_brkm(TBROK, NULL, "OPTION PARSING ERROR - %s", msg);
+
+       setup();
+
+       for (lc = 0; TEST_LOOPING(lc); lc++)
+               test();
+
+       cleanup();
+       tst_exit();
+}
-- 
1.8.3.1


------------------------------------------------------------------------------
_______________________________________________
Ltp-list mailing list
Ltp-list@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ltp-list

Reply via email to