blob: d71c544c6cf86ea7371e2f2a439cb4b6a7d96a45 [file] [log] [blame]
Dylan Reid837c74a2016-01-22 17:25:21 -08001/* Copyright 2016 The Chromium OS Authors. All rights reserved.
2 * Use of this source code is governed by a BSD-style license that can be
3 * found in the LICENSE file.
4 */
5
6#define _GNU_SOURCE /* For asprintf */
7
8#include <errno.h>
9#include <signal.h>
10#include <sys/mount.h>
11#include <sys/stat.h>
12#include <sys/types.h>
13#include <unistd.h>
14
15#include "test_harness.h"
16
17#include "container_cgroup.h"
18#include "libcontainer.h"
19
20static const pid_t INIT_TEST_PID = 5555;
Chinyue Chen4f3fd682016-07-01 14:11:42 +080021static const int TEST_CPU_SHARES = 200;
22static const int TEST_CPU_QUOTA = 20000;
23static const int TEST_CPU_PERIOD = 50000;
Dylan Reid837c74a2016-01-22 17:25:21 -080024
25struct mount_args {
26 char *source;
27 char *target;
28 char *filesystemtype;
29 unsigned long mountflags;
30 const void *data;
31};
32static struct mount_args mount_call_args[5];
33static int mount_called;
34
35struct mknod_args {
36 char *pathname;
37 mode_t mode;
38 dev_t dev;
39};
40static struct mknod_args mknod_call_args;
Chinyue Chen03c54ae2016-06-29 12:29:10 +080041static dev_t stat_rdev_ret;
Dylan Reid837c74a2016-01-22 17:25:21 -080042
43static int kill_called;
44static int kill_sig;
45static const char *minijail_alt_syscall_table;
46static int minijail_ipc_called;
47static int minijail_vfs_called;
48static int minijail_net_called;
49static int minijail_pids_called;
50static int minijail_run_as_init_called;
51static int minijail_user_called;
52static int minijail_wait_called;
53static int minijail_reset_signal_mask_called;
54static int mount_ret;
55static char *mkdtemp_root;
56
57/* global mock cgroup. */
Dylan Reid355d5e42016-04-29 16:53:31 -070058#define MAX_ADD_DEVICE_CALLS 2
Dylan Reid837c74a2016-01-22 17:25:21 -080059struct mock_cgroup {
60 struct container_cgroup cg;
61 int freeze_ret;
62 int thaw_ret;
63 int deny_all_devs_ret;
64 int add_device_ret;
Chinyue Chenfac909e2016-06-24 14:17:42 +080065 int set_cpu_ret;
Dylan Reid837c74a2016-01-22 17:25:21 -080066
67 int init_called_count;
68 int deny_all_devs_called_count;
69
Dylan Reid355d5e42016-04-29 16:53:31 -070070 int add_dev_major[MAX_ADD_DEVICE_CALLS];
71 int add_dev_minor[MAX_ADD_DEVICE_CALLS];
72 int add_dev_read[MAX_ADD_DEVICE_CALLS];
73 int add_dev_write[MAX_ADD_DEVICE_CALLS];
74 int add_dev_modify[MAX_ADD_DEVICE_CALLS];
75 char add_dev_type[MAX_ADD_DEVICE_CALLS];
76 int add_dev_called_count;
Chinyue Chenfac909e2016-06-24 14:17:42 +080077
78 int set_cpu_shares_count;
79 int set_cpu_quota_count;
80 int set_cpu_period_count;
81 int set_cpu_rt_runtime_count;
82 int set_cpu_rt_period_count;
Dylan Reid837c74a2016-01-22 17:25:21 -080083};
84
85static struct mock_cgroup gmcg;
86
87static int mock_freeze(const struct container_cgroup *cg)
88{
89 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
90 return mcg->freeze_ret;
91}
92
93static int mock_thaw(const struct container_cgroup *cg)
94{
95 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
96 return mcg->thaw_ret;
97}
98
99static int mock_deny_all_devices(const struct container_cgroup *cg)
100{
101 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
102 ++mcg->deny_all_devs_called_count;
103 return mcg->deny_all_devs_ret;
104}
105
106static int mock_add_device(const struct container_cgroup *cg, int major,
107 int minor, int read, int write, int modify,
108 char type)
109{
110 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
Dylan Reid355d5e42016-04-29 16:53:31 -0700111
112 if (mcg->add_dev_called_count >= MAX_ADD_DEVICE_CALLS)
113 return mcg->add_device_ret;
114 mcg->add_dev_major[mcg->add_dev_called_count] = major;
115 mcg->add_dev_minor[mcg->add_dev_called_count] = minor;
116 mcg->add_dev_read[mcg->add_dev_called_count] = read;
117 mcg->add_dev_write[mcg->add_dev_called_count] = write;
118 mcg->add_dev_modify[mcg->add_dev_called_count] = modify;
119 mcg->add_dev_type[mcg->add_dev_called_count] = type;
120 mcg->add_dev_called_count++;
Dylan Reid837c74a2016-01-22 17:25:21 -0800121 return mcg->add_device_ret;
122}
123
Chinyue Chenfac909e2016-06-24 14:17:42 +0800124static int mock_set_cpu_shares(const struct container_cgroup *cg, int shares)
125{
126 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
127 mcg->set_cpu_shares_count++;
128 return mcg->set_cpu_ret;
129}
130
131static int mock_set_cpu_quota(const struct container_cgroup *cg, int quota)
132{
133 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
134 mcg->set_cpu_quota_count++;
135 return mcg->set_cpu_ret;
136}
137
138static int mock_set_cpu_period(const struct container_cgroup *cg, int period)
139{
140 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
141 mcg->set_cpu_period_count++;
142 return mcg->set_cpu_ret;
143}
144
145static int mock_set_cpu_rt_runtime(const struct container_cgroup *cg, int rt_runtime)
146{
147 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
148 mcg->set_cpu_rt_runtime_count++;
149 return mcg->set_cpu_ret;
150}
151
152static int mock_set_cpu_rt_period(const struct container_cgroup *cg, int rt_period)
153{
154 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
155 mcg->set_cpu_rt_period_count++;
156 return mcg->set_cpu_ret;
157}
158
Dylan Reid837c74a2016-01-22 17:25:21 -0800159struct container_cgroup *container_cgroup_new(const char *name,
Keshav Santhanam998fd7d2016-07-12 13:33:00 -0700160 const char *cgroup_root,
Dylan Reida9966422016-07-21 10:11:34 -0700161 const char *cgroup_parent,
Dmitry Torokhov14eef722016-09-27 16:40:37 -0700162 uid_t uid, gid_t gid)
Dylan Reid837c74a2016-01-22 17:25:21 -0800163{
164 gmcg.cg.name = strdup(name);
165 return &gmcg.cg;
166}
167
168void container_cgroup_destroy(struct container_cgroup *c)
169{
170 free(c->name);
171}
172
Keshav Santhanam0e4c3282016-07-14 10:25:16 -0700173TEST(premounted_runfs)
174{
175 char premounted_runfs[] = "/tmp/cgtest_run/root";
176 struct container_config *config = container_config_create();
177 ASSERT_NE(NULL, config);
178
179 container_config_premounted_runfs(config, premounted_runfs);
180 const char *result = container_config_get_premounted_runfs(config);
181 ASSERT_EQ(0, strcmp(result, premounted_runfs));
182
183 container_config_destroy(config);
184}
185
186TEST(pid_file_path)
187{
188 char pid_file_path[] = "/tmp/cgtest_run/root/container.pid";
189 struct container_config *config = container_config_create();
190 ASSERT_NE(NULL, config);
191
192 container_config_pid_file(config, pid_file_path);
193 const char *result = container_config_get_pid_file(config);
194 ASSERT_EQ(0, strcmp(result, pid_file_path));
195
196 container_config_destroy(config);
197}
198
Dylan Reid837c74a2016-01-22 17:25:21 -0800199/* Start of tests. */
200FIXTURE(container_test) {
201 struct container_config *config;
202 struct container *container;
203 int mount_flags;
204 char *rootfs;
205};
206
207FIXTURE_SETUP(container_test)
208{
209 char temp_template[] = "/tmp/cgtestXXXXXX";
210 char rundir_template[] = "/tmp/cgtest_runXXXXXX";
211 char *rundir;
212 char path[256];
Dylan Reid17fd53f2016-11-18 19:14:41 -0800213 const char *pargs[] = {
Dylan Reid837c74a2016-01-22 17:25:21 -0800214 "/sbin/init",
215 };
216
217 memset(&mount_call_args, 0, sizeof(mount_call_args));
218 mount_called = 0;
219 memset(&mknod_call_args, 0, sizeof(mknod_call_args));
220 mkdtemp_root = NULL;
221
222 memset(&gmcg, 0, sizeof(gmcg));
223 static const struct cgroup_ops cgops = {
224 .freeze = mock_freeze,
225 .thaw = mock_thaw,
226 .deny_all_devices = mock_deny_all_devices,
227 .add_device = mock_add_device,
Chinyue Chenfac909e2016-06-24 14:17:42 +0800228 .set_cpu_shares = mock_set_cpu_shares,
229 .set_cpu_quota = mock_set_cpu_quota,
230 .set_cpu_period = mock_set_cpu_period,
231 .set_cpu_rt_runtime = mock_set_cpu_rt_runtime,
232 .set_cpu_rt_period = mock_set_cpu_rt_period,
Dylan Reid837c74a2016-01-22 17:25:21 -0800233 };
234 gmcg.cg.ops = &cgops;
235
236 self->rootfs = strdup(mkdtemp(temp_template));
237
238 kill_called = 0;
239 minijail_alt_syscall_table = NULL;
240 minijail_ipc_called = 0;
241 minijail_vfs_called = 0;
242 minijail_net_called = 0;
243 minijail_pids_called = 0;
244 minijail_run_as_init_called = 0;
245 minijail_user_called = 0;
246 minijail_wait_called = 0;
247 minijail_reset_signal_mask_called = 0;
248 mount_ret = 0;
Chinyue Chen03c54ae2016-06-29 12:29:10 +0800249 stat_rdev_ret = makedev(2, 3);
Dylan Reid837c74a2016-01-22 17:25:21 -0800250
251 snprintf(path, sizeof(path), "%s/dev", self->rootfs);
252 //mkdir(path, S_IRWXU | S_IRWXG);
253
254 self->mount_flags = MS_NOSUID | MS_NODEV | MS_NOEXEC;
255
256 self->config = container_config_create();
257 container_config_rootfs(self->config, self->rootfs);
258 container_config_program_argv(self->config, pargs, 1);
259 container_config_alt_syscall_table(self->config, "testsyscalltable");
260 container_config_add_mount(self->config,
261 "testtmpfs",
262 "tmpfs",
263 "/tmp",
264 "tmpfs",
265 NULL,
266 self->mount_flags,
Mike Frysinger412dbd22017-01-06 01:50:34 -0500267 0,
Dylan Reid837c74a2016-01-22 17:25:21 -0800268 1000,
269 1000,
270 0x666,
271 0,
272 1);
273 container_config_add_device(self->config,
274 'c',
275 "/dev/foo",
276 S_IRWXU | S_IRWXG,
277 245,
278 2,
Dylan Reid355d5e42016-04-29 16:53:31 -0700279 0,
280 1000,
281 1001,
282 1,
283 1,
284 0);
285 /* test dynamic minor on /dev/null */
286 container_config_add_device(self->config,
287 'c',
288 "/dev/null",
289 S_IRWXU | S_IRWXG,
290 1,
291 -1,
292 1,
Dylan Reid837c74a2016-01-22 17:25:21 -0800293 1000,
294 1001,
295 1,
296 1,
297 0);
298
Chinyue Chen4f3fd682016-07-01 14:11:42 +0800299 container_config_set_cpu_shares(self->config, TEST_CPU_SHARES);
300 container_config_set_cpu_cfs_params(
301 self->config, TEST_CPU_QUOTA, TEST_CPU_PERIOD);
Chinyue Chenfac909e2016-06-24 14:17:42 +0800302 /* Invalid params, so this won't be applied. */
303 container_config_set_cpu_rt_params(self->config, 20000, 20000);
304
Dylan Reid837c74a2016-01-22 17:25:21 -0800305 rundir = mkdtemp(rundir_template);
Dylan Reide040c6b2016-05-02 18:49:02 -0700306 self->container = container_new("containerUT", rundir);
Dylan Reid837c74a2016-01-22 17:25:21 -0800307 ASSERT_NE(NULL, self->container);
308}
309
310FIXTURE_TEARDOWN(container_test)
311{
312 char path[256];
313 int i;
314
315 container_destroy(self->container);
316 snprintf(path, sizeof(path), "rm -rf %s", self->rootfs);
317 EXPECT_EQ(0, system(path));
318 free(self->rootfs);
319
320 for (i = 0; i < mount_called; i++) {
321 free(mount_call_args[i].source);
322 free(mount_call_args[i].target);
323 free(mount_call_args[i].filesystemtype);
324 }
325 free(mknod_call_args.pathname);
326 free(mkdtemp_root);
327}
328
329TEST_F(container_test, test_mount_tmp_start)
330{
331 char *path;
332
Dylan Reide040c6b2016-05-02 18:49:02 -0700333 EXPECT_EQ(0, container_start(self->container, self->config));
Dylan Reid837c74a2016-01-22 17:25:21 -0800334 EXPECT_EQ(2, mount_called);
335 EXPECT_EQ(0, strcmp(mount_call_args[1].source, "tmpfs"));
336 EXPECT_LT(0, asprintf(&path, "%s/root/tmp", mkdtemp_root));
337 EXPECT_EQ(0, strcmp(mount_call_args[1].target, path));
338 free(path);
339 EXPECT_EQ(0, strcmp(mount_call_args[1].filesystemtype,
340 "tmpfs"));
341 EXPECT_EQ(mount_call_args[1].mountflags, self->mount_flags);
342 EXPECT_EQ(mount_call_args[1].data, NULL);
343
344 EXPECT_EQ(1, minijail_ipc_called);
345 EXPECT_EQ(1, minijail_vfs_called);
346 EXPECT_EQ(1, minijail_net_called);
347 EXPECT_EQ(1, minijail_pids_called);
348 EXPECT_EQ(1, minijail_user_called);
349 EXPECT_EQ(1, minijail_run_as_init_called);
350 EXPECT_EQ(1, gmcg.deny_all_devs_called_count);
351
Dylan Reid355d5e42016-04-29 16:53:31 -0700352 EXPECT_EQ(245, gmcg.add_dev_major[0]);
353 EXPECT_EQ(2, gmcg.add_dev_minor[0]);
354 EXPECT_EQ(1, gmcg.add_dev_read[0]);
355 EXPECT_EQ(1, gmcg.add_dev_write[0]);
356 EXPECT_EQ(0, gmcg.add_dev_modify[0]);
357 EXPECT_EQ('c', gmcg.add_dev_type[0]);
358
359 EXPECT_EQ(1, gmcg.add_dev_major[1]);
360 EXPECT_EQ(3, gmcg.add_dev_minor[1]);
361 EXPECT_EQ(1, gmcg.add_dev_read[1]);
362 EXPECT_EQ(1, gmcg.add_dev_write[1]);
363 EXPECT_EQ(0, gmcg.add_dev_modify[1]);
364 EXPECT_EQ('c', gmcg.add_dev_type[1]);
Dylan Reid837c74a2016-01-22 17:25:21 -0800365
Chinyue Chen03c54ae2016-06-29 12:29:10 +0800366 EXPECT_LT(0, asprintf(&path, "%s/root/dev/null", mkdtemp_root));
367 EXPECT_EQ(0, strcmp(mknod_call_args.pathname, path));
368 free(path);
369 EXPECT_EQ(mknod_call_args.mode, S_IRWXU | S_IRWXG | S_IFCHR);
370 EXPECT_EQ(mknod_call_args.dev, makedev(1, 3));
371
Chinyue Chenfac909e2016-06-24 14:17:42 +0800372 EXPECT_EQ(1, gmcg.set_cpu_shares_count);
Chinyue Chen4f3fd682016-07-01 14:11:42 +0800373 EXPECT_EQ(TEST_CPU_SHARES,
374 container_config_get_cpu_shares(self->config));
Chinyue Chenfac909e2016-06-24 14:17:42 +0800375 EXPECT_EQ(1, gmcg.set_cpu_quota_count);
Chinyue Chen4f3fd682016-07-01 14:11:42 +0800376 EXPECT_EQ(TEST_CPU_QUOTA,
377 container_config_get_cpu_quota(self->config));
Chinyue Chenfac909e2016-06-24 14:17:42 +0800378 EXPECT_EQ(1, gmcg.set_cpu_period_count);
Chinyue Chen4f3fd682016-07-01 14:11:42 +0800379 EXPECT_EQ(TEST_CPU_PERIOD,
380 container_config_get_cpu_period(self->config));
Chinyue Chenfac909e2016-06-24 14:17:42 +0800381 EXPECT_EQ(0, gmcg.set_cpu_rt_runtime_count);
Chinyue Chen4f3fd682016-07-01 14:11:42 +0800382 EXPECT_EQ(0, container_config_get_cpu_rt_runtime(self->config));
Chinyue Chenfac909e2016-06-24 14:17:42 +0800383 EXPECT_EQ(0, gmcg.set_cpu_rt_period_count);
Chinyue Chen4f3fd682016-07-01 14:11:42 +0800384 EXPECT_EQ(0, container_config_get_cpu_rt_period(self->config));
Chinyue Chenfac909e2016-06-24 14:17:42 +0800385
Dylan Reid837c74a2016-01-22 17:25:21 -0800386 ASSERT_NE(NULL, minijail_alt_syscall_table);
387 EXPECT_EQ(0, strcmp(minijail_alt_syscall_table,
388 "testsyscalltable"));
389
390 EXPECT_EQ(0, container_wait(self->container));
391 EXPECT_EQ(1, minijail_wait_called);
392 EXPECT_EQ(1, minijail_reset_signal_mask_called);
393}
394
395TEST_F(container_test, test_kill_container)
396{
Dylan Reide040c6b2016-05-02 18:49:02 -0700397 EXPECT_EQ(0, container_start(self->container, self->config));
Dylan Reid837c74a2016-01-22 17:25:21 -0800398 EXPECT_EQ(0, container_kill(self->container));
399 EXPECT_EQ(1, kill_called);
400 EXPECT_EQ(SIGKILL, kill_sig);
401 EXPECT_EQ(1, minijail_wait_called);
402}
403
404/* libc stubs so the UT doesn't need root to call mount, etc. */
405int mount(const char *source, const char *target,
406 const char *filesystemtype, unsigned long mountflags,
407 const void *data)
408{
409 if (mount_called >= 5)
410 return 0;
411
412 mount_call_args[mount_called].source = strdup(source);
413 mount_call_args[mount_called].target = strdup(target);
414 mount_call_args[mount_called].filesystemtype = strdup(filesystemtype);
415 mount_call_args[mount_called].mountflags = mountflags;
416 mount_call_args[mount_called].data = data;
417 ++mount_called;
418 return 0;
419}
420
421int umount(const char *target)
422{
423 return 0;
424}
425
426int mknod(const char *pathname, mode_t mode, dev_t dev)
427{
428 mknod_call_args.pathname = strdup(pathname);
429 mknod_call_args.mode = mode;
430 mknod_call_args.dev = dev;
431 return 0;
432}
433
434int chown(const char *path, uid_t owner, gid_t group)
435{
436 return 0;
437};
438
439int kill(pid_t pid, int sig)
440{
441 ++kill_called;
442 kill_sig = sig;
443 return 0;
444}
445
446int stat(const char *path, struct stat *buf)
447{
Chinyue Chen03c54ae2016-06-29 12:29:10 +0800448 buf->st_rdev = stat_rdev_ret;
Dylan Reid837c74a2016-01-22 17:25:21 -0800449 return 0;
450}
451
452int chmod(const char *path, mode_t mode)
453{
454 return 0;
455}
456
457char *mkdtemp(char *template)
458{
459 mkdtemp_root = strdup(template);
460 return template;
461}
462
463int mkdir(const char *pathname, mode_t mode)
464{
465 return 0;
466}
467
468int rmdir(const char *pathname)
469{
470 return 0;
471}
472
473int unlink(const char *pathname)
474{
475 return 0;
476}
477
478/* Minijail stubs */
479struct minijail *minijail_new(void)
480{
Chinyue Chen03c54ae2016-06-29 12:29:10 +0800481 return (struct minijail *)0x55;
482}
483
484void minijail_destroy(struct minijail *j)
485{
Dylan Reid837c74a2016-01-22 17:25:21 -0800486}
487
488int minijail_mount(struct minijail *j, const char *src, const char *dest,
489 const char *type, unsigned long flags)
490{
491 return 0;
492}
493
494void minijail_namespace_vfs(struct minijail *j)
495{
496 ++minijail_vfs_called;
497}
498
499void minijail_namespace_ipc(struct minijail *j)
500{
501 ++minijail_ipc_called;
502}
503
504void minijail_namespace_net(struct minijail *j)
505{
506 ++minijail_net_called;
507}
508
509void minijail_namespace_pids(struct minijail *j)
510{
511 ++minijail_pids_called;
512}
513
514void minijail_namespace_user(struct minijail *j)
515{
516 ++minijail_user_called;
517}
518
519int minijail_uidmap(struct minijail *j, const char *uidmap)
520{
521 return 0;
522}
523
524int minijail_gidmap(struct minijail *j, const char *gidmap)
525{
526 return 0;
527}
528
529int minijail_enter_pivot_root(struct minijail *j, const char *dir)
530{
531 return 0;
532}
533
534void minijail_run_as_init(struct minijail *j)
535{
536 ++minijail_run_as_init_called;
537}
538
539int minijail_run_pid_pipes_no_preload(struct minijail *j, const char *filename,
540 char *const argv[], pid_t *pchild_pid,
541 int *pstdin_fd, int *pstdout_fd,
542 int *pstderr_fd)
543{
544 *pchild_pid = INIT_TEST_PID;
545 return 0;
546}
547
548int minijail_write_pid_file(struct minijail *j, const char *path)
549{
550 return 0;
551}
552
553int minijail_wait(struct minijail *j)
554{
555 ++minijail_wait_called;
556 return 0;
557}
558
559int minijail_use_alt_syscall(struct minijail *j, const char *table)
560{
561 minijail_alt_syscall_table = table;
562 return 0;
563}
564
Chinyue Chen03c54ae2016-06-29 12:29:10 +0800565int minijail_add_to_cgroup(struct minijail *j, const char *cg_path)
Dylan Reid837c74a2016-01-22 17:25:21 -0800566{
Chinyue Chen03c54ae2016-06-29 12:29:10 +0800567 return 0;
Dylan Reid837c74a2016-01-22 17:25:21 -0800568}
569
570void minijail_reset_signal_mask(struct minijail *j)
571{
572 ++minijail_reset_signal_mask_called;
573}
574
Chinyue Chen03c54ae2016-06-29 12:29:10 +0800575void minijail_skip_remount_private(struct minijail *j)
576{
577}
578
Dylan Reid837c74a2016-01-22 17:25:21 -0800579TEST_HARNESS_MAIN