Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp3021965ybl; Sun, 11 Aug 2019 13:36:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqyXz5GaaZv95VCZsjG9X2XsDD5ZLdjvaFRIrRuMSTk2wxazTjIsmABQ3YmQel39F6BD9xOJ X-Received: by 2002:a65:5202:: with SMTP id o2mr26085794pgp.29.1565555769547; Sun, 11 Aug 2019 13:36:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565555769; cv=none; d=google.com; s=arc-20160816; b=hug/HNtm7Fr7ABgUj/5PpOFjSQ/OiqqWQpU1D+py5akkFHHr5ATVJjC02A6AiyYdoO Nci93imQoCrnWWymiewcYhGLqLf26zOig+vNf+MTkzUEQZRxfOGkE/VbwPFq00ndM/J2 j2yIvOtM4CgukhwHpc5miqT34NLj0s47B+qHTX1sa6vtdDrfC1jqXvtaloSJNjdAIn6U Q2dTBn0e4WEpbkRtdRSfFusHy+HMJGwM2lQ49MrPYYY2wbPIxsv5hijsoxAHZkEmufOc 5ghgFibaUkLUNazbEOn51D5FkKEKB1r9MOhu6Vvmn6toPkykfNltOCBXuXXvq7POC92q V2aA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=pdaLyFZy5DnAJ7x7qK504jfYuGhv0Y3e8v1Gw6NNQkQ=; b=0E+XhXXGnpG2WZz3rrbIgQ91V6a+sXa34j4fjDWzePgRX9oEriyW+q/i49tLmcnhdH o8OCB4nltNunsF053Goff2JZOoazg/UDARtycu68xEF/FZsc6ucooKX2hb4gSXABio2k in+xsphX8VXSatb1hLt67y4nPCRyi+2mB06IRcPuJQqtkkMoBCV6FcXkdFeN8FZpqkoK UmO7usNkMDUAKVtE7bmdqTBHu+/SswGT9Ohq+JlKC24zl600CwtHzVcwc0wAUvAJH6zB j2Z3zXEEEMg/q4u2YFX+sVHEH0BJgcenGVvJbWc5BaSIsUJ6T/KXJFrdCtr50eDFt4OC pxKg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r14si47157760pli.257.2019.08.11.13.35.53; Sun, 11 Aug 2019 13:36:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726578AbfHKUdn (ORCPT + 99 others); Sun, 11 Aug 2019 16:33:43 -0400 Received: from mx1.redhat.com ([209.132.183.28]:60672 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726296AbfHKUdm (ORCPT ); Sun, 11 Aug 2019 16:33:42 -0400 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 630B4796E9; Sun, 11 Aug 2019 20:33:42 +0000 (UTC) Received: from dcbz.redhat.com (ovpn-116-85.ams2.redhat.com [10.36.116.85]) by smtp.corp.redhat.com (Postfix) with ESMTP id 65CFC19C78; Sun, 11 Aug 2019 20:33:39 +0000 (UTC) From: Adrian Reber To: Christian Brauner , Eric Biederman , Pavel Emelianov , Jann Horn , Oleg Nesterov , Dmitry Safonov <0x7f454c46@gmail.com> Cc: linux-kernel@vger.kernel.org, Andrei Vagin , Mike Rapoport , Radostin Stoyanov , Adrian Reber Subject: [PATCH v5 2/2] selftests: add tests for clone3() Date: Sun, 11 Aug 2019 22:33:27 +0200 Message-Id: <20190811203327.5385-2-areber@redhat.com> In-Reply-To: <20190811203327.5385-1-areber@redhat.com> References: <20190811203327.5385-1-areber@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Sun, 11 Aug 2019 20:33:42 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This tests clone3() with and without set_tid to see if all desired PIDs are working as expected. The test tries to clone3() with a set_tid of -1, 1, pid_max, a PID which is already in use and an unused PID. The same tests are also running in PID namespace. Signed-off-by: Adrian Reber --- tools/testing/selftests/clone3/.gitignore | 2 + tools/testing/selftests/clone3/Makefile | 11 ++ tools/testing/selftests/clone3/clone3.c | 141 +++++++++++++++ .../testing/selftests/clone3/clone3_set_tid.c | 161 ++++++++++++++++++ 4 files changed, 315 insertions(+) create mode 100644 tools/testing/selftests/clone3/.gitignore create mode 100644 tools/testing/selftests/clone3/Makefile create mode 100644 tools/testing/selftests/clone3/clone3.c create mode 100644 tools/testing/selftests/clone3/clone3_set_tid.c diff --git a/tools/testing/selftests/clone3/.gitignore b/tools/testing/selftests/clone3/.gitignore new file mode 100644 index 000000000000..c63c64a78ddf --- /dev/null +++ b/tools/testing/selftests/clone3/.gitignore @@ -0,0 +1,2 @@ +clone3_set_tid +clone3 diff --git a/tools/testing/selftests/clone3/Makefile b/tools/testing/selftests/clone3/Makefile new file mode 100644 index 000000000000..4efcf45b995b --- /dev/null +++ b/tools/testing/selftests/clone3/Makefile @@ -0,0 +1,11 @@ +# SPDX-License-Identifier: GPL-2.0 +uname_M := $(shell uname -m 2>/dev/null || echo not) +ARCH ?= $(shell echo $(uname_M) | sed -e s/i.86/i386/) + +CFLAGS += -I../../../../usr/include/ + +ifeq ($(ARCH),x86_64) + TEST_GEN_PROGS := clone3 clone3_set_tid +endif + +include ../lib.mk diff --git a/tools/testing/selftests/clone3/clone3.c b/tools/testing/selftests/clone3/clone3.c new file mode 100644 index 000000000000..55a6915566b8 --- /dev/null +++ b/tools/testing/selftests/clone3/clone3.c @@ -0,0 +1,141 @@ +// SPDX-License-Identifier: GPL-2.0 + +/* Based on Christian Brauner's clone3() example */ + +#define _GNU_SOURCE +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include "../kselftest.h" + +static pid_t raw_clone(struct clone_args *args) +{ + return syscall(__NR_clone3, args, sizeof(struct clone_args)); +} + +static int call_clone3(int flags) +{ + struct clone_args args = {0}; + pid_t ppid = -1; + pid_t pid = -1; + int status; + + args.flags = flags; + args.exit_signal = SIGCHLD; + + pid = raw_clone(&args); + if (pid < 0) { + ksft_print_msg("%s - Failed to create new process\n", + strerror(errno)); + return -errno; + } + + if (pid == 0) { + ksft_print_msg("I am the child, my PID is %d\n", getpid()); + _exit(EXIT_SUCCESS); + } + + ppid = getpid(); + ksft_print_msg("I am the parent (%d). My child's pid is %d\n", + ppid, pid); + + (void)wait(&status); + if (WEXITSTATUS(status)) + return WEXITSTATUS(status); + + return 0; +} + +static int test_clone3(int flags, int expected) +{ + int ret; + + ksft_print_msg("[%d] Trying clone3() with flags 0x%x\n", + getpid(), flags); + ret = call_clone3(flags); + ksft_print_msg("[%d] clone3() with flags says :%d expected %d\n", + getpid(), ret, expected); + if (ret != expected) + ksft_exit_fail_msg( + "[%d] Result (%d) is different than expected (%d)\n", + getpid(), ret, expected); + ksft_test_result_pass("[%d] Result (%d) matches expectation (%d)\n", + getpid(), ret, expected); + return 0; +} +int main(int argc, char *argv[]) +{ + int ret = -1; + pid_t pid; + + ksft_print_header(); + ksft_set_plan(3); + + /* Just a simple clone3() should return 0.*/ + if (test_clone3(0, 0)) + goto on_error; + /* Do a clone3() in a new PID NS.*/ + if (test_clone3(CLONE_NEWPID, 0)) + goto on_error; + ksft_print_msg("First unshare\n"); + if (unshare(CLONE_NEWPID)) + goto on_error; + /* + * Before clone3()ing in a new PID NS with + * CLONE_NEWPID a fork() is necessary. + */ + if (test_clone3(CLONE_NEWPID, -EINVAL)) + goto on_error; + pid = fork(); + if (pid < 0) { + ksft_print_msg("First fork() failed\n"); + goto on_error; + } + if (pid > 0) { + (void)wait(NULL); + goto parent_out; + } + ksft_set_plan(6); + if (test_clone3(CLONE_NEWPID, 0)) + goto on_error; + if (test_clone3(0, 0)) + goto on_error; + ksft_print_msg("Second unshare\n"); + if (unshare(CLONE_NEWPID)) + goto on_error; + /* + * Before clone3()ing in a new PID NS with + * CLONE_NEWPID a fork() is necessary. + */ + if (test_clone3(CLONE_NEWPID, -EINVAL)) + goto on_error; + pid = fork(); + if (pid < 0) { + ksft_print_msg("Second fork() failed\n"); + goto on_error; + } + if (pid > 0) { + (void)wait(NULL); + goto parent_out; + } + ksft_set_plan(8); + if (test_clone3(CLONE_NEWPID, 0)) + goto on_error; + if (test_clone3(0, 0)) + goto on_error; + +parent_out: + ret = 0; +on_error: + + return !ret ? ksft_exit_pass() : ksft_exit_fail(); +} diff --git a/tools/testing/selftests/clone3/clone3_set_tid.c b/tools/testing/selftests/clone3/clone3_set_tid.c new file mode 100644 index 000000000000..f5012e84dcb3 --- /dev/null +++ b/tools/testing/selftests/clone3/clone3_set_tid.c @@ -0,0 +1,161 @@ +// SPDX-License-Identifier: GPL-2.0 + +/* Based on Christian Brauner's clone3() example */ + +#define _GNU_SOURCE +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include "../kselftest.h" + +static pid_t raw_clone(struct clone_args *args) +{ + return syscall(__NR_clone3, args, sizeof(struct clone_args)); +} + +static int call_clone3_set_tid(int set_tid, int flags) +{ + struct clone_args args = {0}; + pid_t ppid = -1; + pid_t pid = -1; + int status; + + args.flags = flags; + args.exit_signal = SIGCHLD; + args.set_tid = set_tid; + + pid = raw_clone(&args); + if (pid < 0) { + ksft_print_msg("%s - Failed to create new process\n", + strerror(errno)); + return -errno; + } + + if (pid == 0) { + ksft_print_msg("I am the child, my PID is %d (expected %d)\n", + getpid(), set_tid); + if (set_tid != getpid()) + _exit(EXIT_FAILURE); + _exit(EXIT_SUCCESS); + } + + ppid = getpid(); + ksft_print_msg("I am the parent (%d). My child's pid is %d\n", + ppid, pid); + + (void)wait(&status); + if (WEXITSTATUS(status)) + return WEXITSTATUS(status); + + return 0; +} + +static int test_clone3_set_tid(int set_tid, int flags, int expected) +{ + int ret; + + ksft_print_msg( + "[%d] Trying clone3() with CLONE_SET_TID to %d and 0x%x\n", + getpid(), set_tid, flags); + ret = call_clone3_set_tid(set_tid, flags); + ksft_print_msg( + "[%d] clone3() with CLONE_SET_TID %d says :%d - expected %d\n", + getpid(), set_tid, ret, expected); + if (ret != expected) + ksft_exit_fail_msg( + "[%d] Result (%d) is different than expected (%d)\n", + getpid(), ret, expected); + ksft_test_result_pass("[%d] Result (%d) matches expectation (%d)\n", + getpid(), ret, expected); + return 0; +} +int main(int argc, char *argv[]) +{ + FILE *f; + int pid_max = 0; + pid_t pid; + pid_t ns_pid; + int ret = -1; + + ksft_print_header(); + ksft_set_plan(13); + + f = fopen("/proc/sys/kernel/pid_max", "r"); + if (f == NULL) + ksft_exit_fail_msg( + "%s - Could not open /proc/sys/kernel/pid_max\n", + strerror(errno)); + fscanf(f, "%d", &pid_max); + fclose(f); + ksft_print_msg("/proc/sys/kernel/pid_max %d\n", pid_max); + + /* First try with an invalid PID */ + if (test_clone3_set_tid(-1, 0, -EINVAL)) + goto on_error; + if (test_clone3_set_tid(-1, CLONE_NEWPID, -EINVAL)) + goto on_error; + /* Then with PID 1 */ + if (test_clone3_set_tid(1, 0, -EEXIST)) + goto on_error; + /* PID 1 should not fail in a PID namespace */ + if (test_clone3_set_tid(1, CLONE_NEWPID, 0)) + goto on_error; + /* pid_max should fail everywhere */ + if (test_clone3_set_tid(pid_max, 0, -EINVAL)) + goto on_error; + if (test_clone3_set_tid(pid_max, CLONE_NEWPID, -EINVAL)) + goto on_error; + /* Find the current active PID */ + pid = fork(); + if (pid == 0) { + ksft_print_msg("Child has PID %d\n", getpid()); + sleep(1); + _exit(EXIT_SUCCESS); + } + /* Try to create a process with that PID should fail */ + if (test_clone3_set_tid(pid, 0, -EEXIST)) + goto on_error; + (void)wait(NULL); + /* After the child has finished, try again with the same PID */ + if (test_clone3_set_tid(pid, 0, 0)) + goto on_error; + /* This should fail as there is no PID 1 in that namespace */ + if (test_clone3_set_tid(pid, CLONE_NEWPID, -EINVAL)) + goto on_error; + unshare(CLONE_NEWPID); + if (test_clone3_set_tid(10, 0, -EINVAL)) + goto on_error; + /* Let's create a PID 1 */ + ns_pid = fork(); + if (ns_pid == 0) { + ksft_print_msg("Child in PID namespace has PID %d\n", getpid()); + sleep(1); + _exit(EXIT_SUCCESS); + } + /* + * Now, after the unshare() it should be possible to create a process + * with another ID than 1 in the PID namespace. + */ + if (test_clone3_set_tid(2, 0, 0)) + goto on_error; + /* Use a different PID in this namespace. */ + if (test_clone3_set_tid(2222, 0, 0)) + goto on_error; + if (test_clone3_set_tid(1, 0, -EEXIST)) + goto on_error; + (void)wait(NULL); + + ret = 0; +on_error: + + return !ret ? ksft_exit_pass() : ksft_exit_fail(); +} -- 2.21.0