1f08c3bdfSopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 2f08c3bdfSopenharmony_ci/* 3f08c3bdfSopenharmony_ci * Copyright (c) International Business Machines Corp., 2009 4f08c3bdfSopenharmony_ci * Copyright (c) Serge Hallyn <serue@us.ibm.com> 5f08c3bdfSopenharmony_ci * Copyright (C) 2023 SUSE LLC Andrea Cervesato <andrea.cervesato@suse.com> 6f08c3bdfSopenharmony_ci */ 7f08c3bdfSopenharmony_ci 8f08c3bdfSopenharmony_ci/*\ 9f08c3bdfSopenharmony_ci * [Description] 10f08c3bdfSopenharmony_ci * 11f08c3bdfSopenharmony_ci * Test mqueuefs from an isolated/forked process namespace. 12f08c3bdfSopenharmony_ci * 13f08c3bdfSopenharmony_ci * [Algorithm] 14f08c3bdfSopenharmony_ci * 15f08c3bdfSopenharmony_ci * Inside new IPC namespace: 16f08c3bdfSopenharmony_ci * 17f08c3bdfSopenharmony_ci * - mq_open() /MQ1 18f08c3bdfSopenharmony_ci * - mount mqueue inside the temporary folder 19f08c3bdfSopenharmony_ci * - check for /MQ1 existance 20f08c3bdfSopenharmony_ci * - creat() /MQ2 inside the temporary folder 21f08c3bdfSopenharmony_ci * - umount 22f08c3bdfSopenharmony_ci * - mount mqueue inside the temporary folder 23f08c3bdfSopenharmony_ci * - check /MQ1 existance 24f08c3bdfSopenharmony_ci * - check /MQ2 existance 25f08c3bdfSopenharmony_ci * - umount 26f08c3bdfSopenharmony_ci */ 27f08c3bdfSopenharmony_ci 28f08c3bdfSopenharmony_ci#include "tst_test.h" 29f08c3bdfSopenharmony_ci#include "lapi/sched.h" 30f08c3bdfSopenharmony_ci#include "tst_safe_posix_ipc.h" 31f08c3bdfSopenharmony_ci#include "tst_safe_stdio.h" 32f08c3bdfSopenharmony_ci#include "tst_safe_macros.h" 33f08c3bdfSopenharmony_ci 34f08c3bdfSopenharmony_ci#define CHECK_MQ_OPEN_RET(x) ((x) >= 0 || ((x) == -1 && errno != EMFILE)) 35f08c3bdfSopenharmony_ci 36f08c3bdfSopenharmony_ci#define DEVDIR "ltp_mqueue" 37f08c3bdfSopenharmony_ci#define MQNAME1 "/MQ1" 38f08c3bdfSopenharmony_ci#define MQNAME2 "/MQ2" 39f08c3bdfSopenharmony_ci#define MQUEUE1 DEVDIR MQNAME1 40f08c3bdfSopenharmony_ci#define MQUEUE2 DEVDIR MQNAME2 41f08c3bdfSopenharmony_ci 42f08c3bdfSopenharmony_cistatic char *str_op; 43f08c3bdfSopenharmony_ci 44f08c3bdfSopenharmony_cistatic void check_mqueue(void) 45f08c3bdfSopenharmony_ci{ 46f08c3bdfSopenharmony_ci int rc; 47f08c3bdfSopenharmony_ci mqd_t mqd; 48f08c3bdfSopenharmony_ci 49f08c3bdfSopenharmony_ci tst_res(TINFO, "Creating %s mqueue from within child process", MQNAME1); 50f08c3bdfSopenharmony_ci 51f08c3bdfSopenharmony_ci mqd = TST_RETRY_FUNC( 52f08c3bdfSopenharmony_ci mq_open(MQNAME1, O_RDWR | O_CREAT | O_EXCL, 0777, NULL), 53f08c3bdfSopenharmony_ci CHECK_MQ_OPEN_RET); 54f08c3bdfSopenharmony_ci if (mqd == -1) 55f08c3bdfSopenharmony_ci tst_brk(TBROK | TERRNO, "mq_open failed"); 56f08c3bdfSopenharmony_ci 57f08c3bdfSopenharmony_ci SAFE_MQ_CLOSE(mqd); 58f08c3bdfSopenharmony_ci 59f08c3bdfSopenharmony_ci tst_res(TINFO, "Mount %s from within child process", DEVDIR); 60f08c3bdfSopenharmony_ci 61f08c3bdfSopenharmony_ci SAFE_MOUNT("mqueue", DEVDIR, "mqueue", 0, NULL); 62f08c3bdfSopenharmony_ci 63f08c3bdfSopenharmony_ci if (access(MQUEUE1, F_OK)) 64f08c3bdfSopenharmony_ci tst_res(TFAIL, MQUEUE1 " does not exist at first mount"); 65f08c3bdfSopenharmony_ci else 66f08c3bdfSopenharmony_ci tst_res(TPASS, MQUEUE1 " exists at first mount"); 67f08c3bdfSopenharmony_ci 68f08c3bdfSopenharmony_ci tst_res(TINFO, "Creating %s from within child process", MQUEUE2); 69f08c3bdfSopenharmony_ci 70f08c3bdfSopenharmony_ci rc = SAFE_CREAT(MQUEUE2, 0755); 71f08c3bdfSopenharmony_ci SAFE_CLOSE(rc); 72f08c3bdfSopenharmony_ci 73f08c3bdfSopenharmony_ci tst_res(TINFO, "Mount %s from within child process a second time", DEVDIR); 74f08c3bdfSopenharmony_ci 75f08c3bdfSopenharmony_ci SAFE_UMOUNT(DEVDIR); 76f08c3bdfSopenharmony_ci SAFE_MOUNT("mqueue", DEVDIR, "mqueue", 0, NULL); 77f08c3bdfSopenharmony_ci 78f08c3bdfSopenharmony_ci if (access(MQUEUE1, F_OK)) 79f08c3bdfSopenharmony_ci tst_res(TFAIL, MQUEUE1 " does not exist at second mount"); 80f08c3bdfSopenharmony_ci else 81f08c3bdfSopenharmony_ci tst_res(TPASS, MQUEUE1 " exists at second mount"); 82f08c3bdfSopenharmony_ci 83f08c3bdfSopenharmony_ci if (access(MQUEUE2, F_OK)) 84f08c3bdfSopenharmony_ci tst_res(TFAIL, MQUEUE2 " does not exist at second mount"); 85f08c3bdfSopenharmony_ci else 86f08c3bdfSopenharmony_ci tst_res(TPASS, MQUEUE2 " exists at second mount"); 87f08c3bdfSopenharmony_ci 88f08c3bdfSopenharmony_ci SAFE_UMOUNT(DEVDIR); 89f08c3bdfSopenharmony_ci 90f08c3bdfSopenharmony_ci SAFE_MQ_UNLINK(MQNAME1); 91f08c3bdfSopenharmony_ci SAFE_MQ_UNLINK(MQNAME2); 92f08c3bdfSopenharmony_ci} 93f08c3bdfSopenharmony_ci 94f08c3bdfSopenharmony_cistatic void run(void) 95f08c3bdfSopenharmony_ci{ 96f08c3bdfSopenharmony_ci const struct tst_clone_args clone_args = { 97f08c3bdfSopenharmony_ci .flags = CLONE_NEWIPC, 98f08c3bdfSopenharmony_ci .exit_signal = SIGCHLD 99f08c3bdfSopenharmony_ci }; 100f08c3bdfSopenharmony_ci 101f08c3bdfSopenharmony_ci if (str_op && !strcmp(str_op, "clone")) { 102f08c3bdfSopenharmony_ci tst_res(TINFO, "Spawning isolated process"); 103f08c3bdfSopenharmony_ci 104f08c3bdfSopenharmony_ci if (!SAFE_CLONE(&clone_args)) { 105f08c3bdfSopenharmony_ci check_mqueue(); 106f08c3bdfSopenharmony_ci return; 107f08c3bdfSopenharmony_ci } 108f08c3bdfSopenharmony_ci } else if (str_op && !strcmp(str_op, "unshare")) { 109f08c3bdfSopenharmony_ci tst_res(TINFO, "Spawning unshared process"); 110f08c3bdfSopenharmony_ci 111f08c3bdfSopenharmony_ci if (!SAFE_FORK()) { 112f08c3bdfSopenharmony_ci SAFE_UNSHARE(CLONE_NEWIPC); 113f08c3bdfSopenharmony_ci check_mqueue(); 114f08c3bdfSopenharmony_ci return; 115f08c3bdfSopenharmony_ci } 116f08c3bdfSopenharmony_ci } 117f08c3bdfSopenharmony_ci} 118f08c3bdfSopenharmony_ci 119f08c3bdfSopenharmony_cistatic void setup(void) 120f08c3bdfSopenharmony_ci{ 121f08c3bdfSopenharmony_ci if (!str_op || (strcmp(str_op, "clone") && strcmp(str_op, "unshare"))) 122f08c3bdfSopenharmony_ci tst_brk(TCONF, "Please specify clone|unshare child isolation"); 123f08c3bdfSopenharmony_ci 124f08c3bdfSopenharmony_ci SAFE_MKDIR(DEVDIR, 0755); 125f08c3bdfSopenharmony_ci} 126f08c3bdfSopenharmony_ci 127f08c3bdfSopenharmony_cistatic void cleanup(void) 128f08c3bdfSopenharmony_ci{ 129f08c3bdfSopenharmony_ci if (!access(MQUEUE1, F_OK)) 130f08c3bdfSopenharmony_ci SAFE_MQ_UNLINK(MQNAME1); 131f08c3bdfSopenharmony_ci 132f08c3bdfSopenharmony_ci if (!access(MQUEUE2, F_OK)) 133f08c3bdfSopenharmony_ci SAFE_MQ_UNLINK(MQNAME2); 134f08c3bdfSopenharmony_ci 135f08c3bdfSopenharmony_ci if (tst_is_mounted(DEVDIR)) 136f08c3bdfSopenharmony_ci SAFE_UMOUNT(DEVDIR); 137f08c3bdfSopenharmony_ci} 138f08c3bdfSopenharmony_ci 139f08c3bdfSopenharmony_cistatic struct tst_test test = { 140f08c3bdfSopenharmony_ci .test_all = run, 141f08c3bdfSopenharmony_ci .setup = setup, 142f08c3bdfSopenharmony_ci .cleanup = cleanup, 143f08c3bdfSopenharmony_ci .needs_root = 1, 144f08c3bdfSopenharmony_ci .forks_child = 1, 145f08c3bdfSopenharmony_ci .needs_tmpdir = 1, 146f08c3bdfSopenharmony_ci .options = (struct tst_option[]) { 147f08c3bdfSopenharmony_ci { "m:", &str_op, "Child process isolation <clone|unshare>" }, 148f08c3bdfSopenharmony_ci {}, 149f08c3bdfSopenharmony_ci }, 150f08c3bdfSopenharmony_ci .needs_kconfigs = (const char *[]) { 151f08c3bdfSopenharmony_ci "CONFIG_USER_NS", 152f08c3bdfSopenharmony_ci NULL 153f08c3bdfSopenharmony_ci }, 154f08c3bdfSopenharmony_ci}; 155