* Tests that a separate network namespace can only communicate over the devices it sees
Signed-off-by: Matus Marhefka <mmarh...@redhat.com> --- runtest/containers | 1 + testcases/kernel/containers/netns/.gitignore | 1 + testcases/kernel/containers/netns/Makefile | 3 +- .../kernel/containers/netns/netns_interfaces.c | 205 +++++++++++++++++++++ 4 files changed, 209 insertions(+), 1 deletion(-) create mode 100644 testcases/kernel/containers/netns/netns_interfaces.c diff --git a/runtest/containers b/runtest/containers index 7d01a44..01ed4cc 100644 --- a/runtest/containers +++ b/runtest/containers @@ -29,6 +29,7 @@ netns_crtchild_delchild netns_crtchild_delchild netns_par_chld_ipv6 netns_par_chld_ipv6 netns_par_chld_ftp netns_par_chld_ftp.sh netns_netlink netns_netlink +netns_interfaces netns_interfaces shmnstest_none shmnstest none shmnstest_clone shmnstest clone diff --git a/testcases/kernel/containers/netns/.gitignore b/testcases/kernel/containers/netns/.gitignore index 65f96be..a134677 100644 --- a/testcases/kernel/containers/netns/.gitignore +++ b/testcases/kernel/containers/netns/.gitignore @@ -6,3 +6,4 @@ /netns_sysfsview /netns_two_children_ns /netns_netlink +/netns_interfaces diff --git a/testcases/kernel/containers/netns/Makefile b/testcases/kernel/containers/netns/Makefile index eea0d88..cc8827f 100644 --- a/testcases/kernel/containers/netns/Makefile +++ b/testcases/kernel/containers/netns/Makefile @@ -31,7 +31,8 @@ LDLIBS += -lclone MAKE_TARGETS := netns_create_container netns_crtchild \ netns_crtchild_delchild netns_par_chld_ftp \ netns_par_chld_ipv6 netns_sysfsview \ - netns_two_children_ns netns_netlink + netns_two_children_ns netns_netlink \ + netns_interfaces $(MAKE_TARGETS): %: common.o %.o diff --git a/testcases/kernel/containers/netns/netns_interfaces.c b/testcases/kernel/containers/netns/netns_interfaces.c new file mode 100644 index 0000000..b4b7834 --- /dev/null +++ b/testcases/kernel/containers/netns/netns_interfaces.c @@ -0,0 +1,205 @@ +/* Copyright (c) 2014 Red Hat, Inc. + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of version 2 the GNU General Public License as + * published by the Free Software Foundation. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + *********************************************************************** + * File: netns_interfaces.c + * + * Tests that a separate network namespace can only communicate over + * the devices it sees. There are three test cases: + * 1. communication over paired veth (virtual ethernet) devices + * from two different network namespaces (each namespace has + * one device) should work + * 2. communication over the lo (localhost) device in a separate + * network namespace should work + * 3. communication over a device which a separate network namespace + * does not see should not work + */ + +#define _GNU_SOURCE +#include <sys/wait.h> +#include <stdio.h> +#include <stdlib.h> +#include <errno.h> +#include "usctest.h" +#include "test.h" +#include "safe_macros.h" +#include "netns_helper.h" + + +/* by convention a named network namespace is an object + * at /var/run/netns/NAME that can be opened. (man 8 ip-netns) */ +#define NETNS "/var/run/netns" +char *TCID = "netns_sendintf"; +int TST_TOTAL = 3; +int pipefd[2]; + + +static void cleanup(void) +{ + close(pipefd[0]); + close(pipefd[1]); + + /* removes veth0 device (which also removes paired veth1 device) */ + if (WEXITSTATUS(system("ip link delete veth0"))) + perror("system"); + /* removes the network namespace myns */ + if (WEXITSTATUS(system("ip netns del myns"))) + perror("system"); +} + +static void setup(void) +{ + tst_require_root(NULL); + check_netns(); +} + +int child_func(void) +{ + int status, fd; + char c; + + fd = open(NETNS"/myns", O_RDONLY); + if (fd == -1) { + perror("open"); + return 1; + } + + /* associates child with the namespace referred by fd (myns) */ + if (setns(fd, 0) == -1) { + perror("setns"); + return 1; + } + + /* setup for veth1 device */ + if (WEXITSTATUS(system("ip address add 192.168.0.2/24 dev veth1"))) { + perror("system"); + return 1; + } + if (WEXITSTATUS(system("ip link set dev veth1 up"))) { + perror("system"); + return 1; + } + + /* waits for parent to confirm that veth0 device setup is done */ + if (read(pipefd[0], &c, 1) == -1) { + perror("read"); + return 1; + } + + /* ping veth0 address through veth1 device */ + if (WEXITSTATUS( + system("ping -q -c 2 -I veth1 192.168.0.1 &>/dev/null"))) + return 1; + + return 0; +} + +static void test(void) +{ + pid_t pid; + int status, ret = 0; + + /* creates a pipe for synchronization between parent and child */ + SAFE_PIPE(cleanup, pipefd); + + /* unshares a network and a mount namespace */ + if (unshare(CLONE_NEWNET|CLONE_NEWNS) == -1) + tst_brkm(TBROK | TERRNO, cleanup, "unshare failed"); + + + /* TEST CASE #1 */ + /* creates a pair of virtual ethernet devices */ + if (WEXITSTATUS(system("ip link add veth0 type veth peer name veth1"))) + tst_brkm(TBROK | TERRNO, cleanup, "system failed"); + /* creates a new network namespace "myns" (man 8 ip-netns) */ + if (WEXITSTATUS(system("ip netns add myns"))) + tst_brkm(TBROK | TERRNO, cleanup, "system failed"); + /* adds device veth1 to myns namespace */ + if (WEXITSTATUS(system("ip link set veth1 netns myns"))) + tst_brkm(TBROK | TERRNO, cleanup, "system failed"); + + + pid = fork(); + if (pid < 0) { /* error */ + tst_brkm(TBROK | TERRNO, cleanup, "fork failed"); + } + if (pid == 0) { /* child */ + _exit(child_func()); + } + + /* parent */ + /* setup for veth0 device */ + if (WEXITSTATUS(system("ip address add 192.168.0.1/24 dev veth0"))) + tst_brkm(TBROK | TERRNO, cleanup, "system failed"); + if (WEXITSTATUS(system("ip link set dev veth0 up"))) + tst_brkm(TBROK | TERRNO, cleanup, "system failed"); + + /* allow child to continue */ + SAFE_WRITE(cleanup, 0, pipefd[1], "0", 1); + + /* ping veth1 address through veth0 device */ + ret = system("ping -q -c 2 -I veth0 192.168.0.2 &>/dev/null"); + if (WEXITSTATUS(ret)) + tst_resm(TFAIL, "communication over veth devices fail"); + + SAFE_WAITPID(cleanup, pid, &status, 0); + if (WIFEXITED(status) && WEXITSTATUS(status)) { + if (WEXITSTATUS(ret) == 0) { + tst_resm(TFAIL, "communication over veth devices fail"); + ret = status; + } + } + + if (WEXITSTATUS(ret) == 0) + tst_resm(TPASS, "communication over veth devices pass"); + + + /* TEST CASE #2 */ + /* enable lo device */ + if (WEXITSTATUS(system("ip link set dev lo up"))) + tst_brkm(TBROK | TERRNO, cleanup, "system failed"); + /* ping localhost */ + if (WEXITSTATUS(system("ping -q -c 2 -I lo 127.0.0.1 &>/dev/null"))) + tst_resm(TFAIL, "communication over lo device fail"); + else + tst_resm(TPASS, "communication over lo device pass"); + + + /* TEST CASE #3 */ + /* ping over a device which this separate network namespace + * does not see - this should not work */ + if (WEXITSTATUS( + system("ping -q -c 2 -I veth1 192.168.0.1 &>/dev/null"))) + tst_resm(TPASS, "communication over non-existent device pass"); + else + tst_resm(TFAIL, "communication over non-existent device fail"); +} + +int main(int argc, char *argv[]) +{ + const char *msg; + int lc; + + msg = parse_opts(argc, argv, NULL, NULL); + if (msg != NULL) + tst_brkm(TBROK, NULL, "OPTION PARSING ERROR - %s", msg); + + setup(); + + for (lc = 0; TEST_LOOPING(lc); lc++) { + test(); + cleanup(); + } + + tst_exit(); +} -- 1.8.3.1 ------------------------------------------------------------------------------ Slashdot TV. Video for Nerds. Stuff that matters. http://tv.slashdot.org/ _______________________________________________ Ltp-list mailing list Ltp-list@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ltp-list