blob: c90d8d285874e6d148cac0d4236a4dcd0966698d [file] [log] [blame]
Dylan Reid837c74a2016-01-22 17:25:21 -08001/* Copyright 2016 The Chromium OS Authors. All rights reserved.
2 * Use of this source code is governed by a BSD-style license that can be
3 * found in the LICENSE file.
4 */
5
6#define _GNU_SOURCE /* For asprintf */
7
8#include <errno.h>
9#include <signal.h>
10#include <sys/mount.h>
11#include <sys/stat.h>
12#include <sys/types.h>
13#include <unistd.h>
14
15#include "test_harness.h"
16
17#include "container_cgroup.h"
18#include "libcontainer.h"
19
20static const pid_t INIT_TEST_PID = 5555;
Chinyue Chen4f3fd682016-07-01 14:11:42 +080021static const int TEST_CPU_SHARES = 200;
22static const int TEST_CPU_QUOTA = 20000;
23static const int TEST_CPU_PERIOD = 50000;
Dylan Reid837c74a2016-01-22 17:25:21 -080024
25struct mount_args {
26 char *source;
27 char *target;
28 char *filesystemtype;
29 unsigned long mountflags;
30 const void *data;
31};
32static struct mount_args mount_call_args[5];
33static int mount_called;
34
35struct mknod_args {
36 char *pathname;
37 mode_t mode;
38 dev_t dev;
39};
40static struct mknod_args mknod_call_args;
Chinyue Chen03c54ae2016-06-29 12:29:10 +080041static dev_t stat_rdev_ret;
Dylan Reid837c74a2016-01-22 17:25:21 -080042
43static int kill_called;
44static int kill_sig;
45static const char *minijail_alt_syscall_table;
46static int minijail_ipc_called;
47static int minijail_vfs_called;
48static int minijail_net_called;
49static int minijail_pids_called;
50static int minijail_run_as_init_called;
51static int minijail_user_called;
52static int minijail_wait_called;
53static int minijail_reset_signal_mask_called;
54static int mount_ret;
55static char *mkdtemp_root;
56
57/* global mock cgroup. */
Dylan Reid355d5e42016-04-29 16:53:31 -070058#define MAX_ADD_DEVICE_CALLS 2
Dylan Reid837c74a2016-01-22 17:25:21 -080059struct mock_cgroup {
60 struct container_cgroup cg;
61 int freeze_ret;
62 int thaw_ret;
63 int deny_all_devs_ret;
64 int add_device_ret;
Chinyue Chenfac909e2016-06-24 14:17:42 +080065 int set_cpu_ret;
Dylan Reid837c74a2016-01-22 17:25:21 -080066
67 int init_called_count;
68 int deny_all_devs_called_count;
69
Dylan Reid355d5e42016-04-29 16:53:31 -070070 int add_dev_major[MAX_ADD_DEVICE_CALLS];
71 int add_dev_minor[MAX_ADD_DEVICE_CALLS];
72 int add_dev_read[MAX_ADD_DEVICE_CALLS];
73 int add_dev_write[MAX_ADD_DEVICE_CALLS];
74 int add_dev_modify[MAX_ADD_DEVICE_CALLS];
75 char add_dev_type[MAX_ADD_DEVICE_CALLS];
76 int add_dev_called_count;
Chinyue Chenfac909e2016-06-24 14:17:42 +080077
78 int set_cpu_shares_count;
79 int set_cpu_quota_count;
80 int set_cpu_period_count;
81 int set_cpu_rt_runtime_count;
82 int set_cpu_rt_period_count;
Dylan Reid837c74a2016-01-22 17:25:21 -080083};
84
85static struct mock_cgroup gmcg;
86
87static int mock_freeze(const struct container_cgroup *cg)
88{
89 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
90 return mcg->freeze_ret;
91}
92
93static int mock_thaw(const struct container_cgroup *cg)
94{
95 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
96 return mcg->thaw_ret;
97}
98
99static int mock_deny_all_devices(const struct container_cgroup *cg)
100{
101 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
102 ++mcg->deny_all_devs_called_count;
103 return mcg->deny_all_devs_ret;
104}
105
106static int mock_add_device(const struct container_cgroup *cg, int major,
107 int minor, int read, int write, int modify,
108 char type)
109{
110 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
Dylan Reid355d5e42016-04-29 16:53:31 -0700111
112 if (mcg->add_dev_called_count >= MAX_ADD_DEVICE_CALLS)
113 return mcg->add_device_ret;
114 mcg->add_dev_major[mcg->add_dev_called_count] = major;
115 mcg->add_dev_minor[mcg->add_dev_called_count] = minor;
116 mcg->add_dev_read[mcg->add_dev_called_count] = read;
117 mcg->add_dev_write[mcg->add_dev_called_count] = write;
118 mcg->add_dev_modify[mcg->add_dev_called_count] = modify;
119 mcg->add_dev_type[mcg->add_dev_called_count] = type;
120 mcg->add_dev_called_count++;
Dylan Reid837c74a2016-01-22 17:25:21 -0800121 return mcg->add_device_ret;
122}
123
Chinyue Chenfac909e2016-06-24 14:17:42 +0800124static int mock_set_cpu_shares(const struct container_cgroup *cg, int shares)
125{
126 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
127 mcg->set_cpu_shares_count++;
128 return mcg->set_cpu_ret;
129}
130
131static int mock_set_cpu_quota(const struct container_cgroup *cg, int quota)
132{
133 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
134 mcg->set_cpu_quota_count++;
135 return mcg->set_cpu_ret;
136}
137
138static int mock_set_cpu_period(const struct container_cgroup *cg, int period)
139{
140 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
141 mcg->set_cpu_period_count++;
142 return mcg->set_cpu_ret;
143}
144
145static int mock_set_cpu_rt_runtime(const struct container_cgroup *cg, int rt_runtime)
146{
147 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
148 mcg->set_cpu_rt_runtime_count++;
149 return mcg->set_cpu_ret;
150}
151
152static int mock_set_cpu_rt_period(const struct container_cgroup *cg, int rt_period)
153{
154 struct mock_cgroup *mcg = (struct mock_cgroup *)cg;
155 mcg->set_cpu_rt_period_count++;
156 return mcg->set_cpu_ret;
157}
158
Dylan Reid837c74a2016-01-22 17:25:21 -0800159struct container_cgroup *container_cgroup_new(const char *name,
Keshav Santhanam998fd7d2016-07-12 13:33:00 -0700160 const char *cgroup_root,
Dylan Reida9966422016-07-21 10:11:34 -0700161 const char *cgroup_parent,
Dmitry Torokhov14eef722016-09-27 16:40:37 -0700162 uid_t uid, gid_t gid)
Dylan Reid837c74a2016-01-22 17:25:21 -0800163{
164 gmcg.cg.name = strdup(name);
165 return &gmcg.cg;
166}
167
168void container_cgroup_destroy(struct container_cgroup *c)
169{
170 free(c->name);
171}
172
Keshav Santhanam0e4c3282016-07-14 10:25:16 -0700173TEST(premounted_runfs)
174{
175 char premounted_runfs[] = "/tmp/cgtest_run/root";
176 struct container_config *config = container_config_create();
177 ASSERT_NE(NULL, config);
178
179 container_config_premounted_runfs(config, premounted_runfs);
180 const char *result = container_config_get_premounted_runfs(config);
181 ASSERT_EQ(0, strcmp(result, premounted_runfs));
182
183 container_config_destroy(config);
184}
185
186TEST(pid_file_path)
187{
188 char pid_file_path[] = "/tmp/cgtest_run/root/container.pid";
189 struct container_config *config = container_config_create();
190 ASSERT_NE(NULL, config);
191
192 container_config_pid_file(config, pid_file_path);
193 const char *result = container_config_get_pid_file(config);
194 ASSERT_EQ(0, strcmp(result, pid_file_path));
195
196 container_config_destroy(config);
197}
198
Dylan Reid837c74a2016-01-22 17:25:21 -0800199/* Start of tests. */
200FIXTURE(container_test) {
201 struct container_config *config;
202 struct container *container;
203 int mount_flags;
204 char *rootfs;
205};
206
207FIXTURE_SETUP(container_test)
208{
209 char temp_template[] = "/tmp/cgtestXXXXXX";
210 char rundir_template[] = "/tmp/cgtest_runXXXXXX";
211 char *rundir;
212 char path[256];
Dylan Reid17fd53f2016-11-18 19:14:41 -0800213 const char *pargs[] = {
Dylan Reid837c74a2016-01-22 17:25:21 -0800214 "/sbin/init",
215 };
216
217 memset(&mount_call_args, 0, sizeof(mount_call_args));
218 mount_called = 0;
219 memset(&mknod_call_args, 0, sizeof(mknod_call_args));
220 mkdtemp_root = NULL;
221
222 memset(&gmcg, 0, sizeof(gmcg));
223 static const struct cgroup_ops cgops = {
224 .freeze = mock_freeze,
225 .thaw = mock_thaw,
226 .deny_all_devices = mock_deny_all_devices,
227 .add_device = mock_add_device,
Chinyue Chenfac909e2016-06-24 14:17:42 +0800228 .set_cpu_shares = mock_set_cpu_shares,
229 .set_cpu_quota = mock_set_cpu_quota,
230 .set_cpu_period = mock_set_cpu_period,
231 .set_cpu_rt_runtime = mock_set_cpu_rt_runtime,
232 .set_cpu_rt_period = mock_set_cpu_rt_period,
Dylan Reid837c74a2016-01-22 17:25:21 -0800233 };
234 gmcg.cg.ops = &cgops;
235
236 self->rootfs = strdup(mkdtemp(temp_template));
237
238 kill_called = 0;
239 minijail_alt_syscall_table = NULL;
240 minijail_ipc_called = 0;
241 minijail_vfs_called = 0;
242 minijail_net_called = 0;
243 minijail_pids_called = 0;
244 minijail_run_as_init_called = 0;
245 minijail_user_called = 0;
246 minijail_wait_called = 0;
247 minijail_reset_signal_mask_called = 0;
248 mount_ret = 0;
Chinyue Chen03c54ae2016-06-29 12:29:10 +0800249 stat_rdev_ret = makedev(2, 3);
Dylan Reid837c74a2016-01-22 17:25:21 -0800250
251 snprintf(path, sizeof(path), "%s/dev", self->rootfs);
252 //mkdir(path, S_IRWXU | S_IRWXG);
253
254 self->mount_flags = MS_NOSUID | MS_NODEV | MS_NOEXEC;
255
256 self->config = container_config_create();
257 container_config_rootfs(self->config, self->rootfs);
258 container_config_program_argv(self->config, pargs, 1);
259 container_config_alt_syscall_table(self->config, "testsyscalltable");
260 container_config_add_mount(self->config,
261 "testtmpfs",
262 "tmpfs",
263 "/tmp",
264 "tmpfs",
265 NULL,
Mike Frysinger05e594e2017-01-10 02:11:08 -0500266 NULL,
Dylan Reid837c74a2016-01-22 17:25:21 -0800267 self->mount_flags,
Mike Frysinger412dbd22017-01-06 01:50:34 -0500268 0,
Dylan Reid837c74a2016-01-22 17:25:21 -0800269 1000,
270 1000,
271 0x666,
272 0,
273 1);
274 container_config_add_device(self->config,
275 'c',
276 "/dev/foo",
277 S_IRWXU | S_IRWXG,
278 245,
279 2,
Dylan Reid355d5e42016-04-29 16:53:31 -0700280 0,
281 1000,
282 1001,
283 1,
284 1,
285 0);
286 /* test dynamic minor on /dev/null */
287 container_config_add_device(self->config,
288 'c',
289 "/dev/null",
290 S_IRWXU | S_IRWXG,
291 1,
292 -1,
293 1,
Dylan Reid837c74a2016-01-22 17:25:21 -0800294 1000,
295 1001,
296 1,
297 1,
298 0);
299
Chinyue Chen4f3fd682016-07-01 14:11:42 +0800300 container_config_set_cpu_shares(self->config, TEST_CPU_SHARES);
301 container_config_set_cpu_cfs_params(
302 self->config, TEST_CPU_QUOTA, TEST_CPU_PERIOD);
Chinyue Chenfac909e2016-06-24 14:17:42 +0800303 /* Invalid params, so this won't be applied. */
304 container_config_set_cpu_rt_params(self->config, 20000, 20000);
305
Dylan Reid837c74a2016-01-22 17:25:21 -0800306 rundir = mkdtemp(rundir_template);
Dylan Reide040c6b2016-05-02 18:49:02 -0700307 self->container = container_new("containerUT", rundir);
Dylan Reid837c74a2016-01-22 17:25:21 -0800308 ASSERT_NE(NULL, self->container);
309}
310
311FIXTURE_TEARDOWN(container_test)
312{
313 char path[256];
314 int i;
315
316 container_destroy(self->container);
317 snprintf(path, sizeof(path), "rm -rf %s", self->rootfs);
318 EXPECT_EQ(0, system(path));
319 free(self->rootfs);
320
321 for (i = 0; i < mount_called; i++) {
322 free(mount_call_args[i].source);
323 free(mount_call_args[i].target);
324 free(mount_call_args[i].filesystemtype);
325 }
326 free(mknod_call_args.pathname);
327 free(mkdtemp_root);
328}
329
330TEST_F(container_test, test_mount_tmp_start)
331{
332 char *path;
333
Dylan Reide040c6b2016-05-02 18:49:02 -0700334 EXPECT_EQ(0, container_start(self->container, self->config));
Dylan Reid837c74a2016-01-22 17:25:21 -0800335 EXPECT_EQ(2, mount_called);
336 EXPECT_EQ(0, strcmp(mount_call_args[1].source, "tmpfs"));
337 EXPECT_LT(0, asprintf(&path, "%s/root/tmp", mkdtemp_root));
338 EXPECT_EQ(0, strcmp(mount_call_args[1].target, path));
339 free(path);
340 EXPECT_EQ(0, strcmp(mount_call_args[1].filesystemtype,
341 "tmpfs"));
342 EXPECT_EQ(mount_call_args[1].mountflags, self->mount_flags);
343 EXPECT_EQ(mount_call_args[1].data, NULL);
344
345 EXPECT_EQ(1, minijail_ipc_called);
346 EXPECT_EQ(1, minijail_vfs_called);
347 EXPECT_EQ(1, minijail_net_called);
348 EXPECT_EQ(1, minijail_pids_called);
349 EXPECT_EQ(1, minijail_user_called);
350 EXPECT_EQ(1, minijail_run_as_init_called);
351 EXPECT_EQ(1, gmcg.deny_all_devs_called_count);
352
Dylan Reid355d5e42016-04-29 16:53:31 -0700353 EXPECT_EQ(245, gmcg.add_dev_major[0]);
354 EXPECT_EQ(2, gmcg.add_dev_minor[0]);
355 EXPECT_EQ(1, gmcg.add_dev_read[0]);
356 EXPECT_EQ(1, gmcg.add_dev_write[0]);
357 EXPECT_EQ(0, gmcg.add_dev_modify[0]);
358 EXPECT_EQ('c', gmcg.add_dev_type[0]);
359
360 EXPECT_EQ(1, gmcg.add_dev_major[1]);
361 EXPECT_EQ(3, gmcg.add_dev_minor[1]);
362 EXPECT_EQ(1, gmcg.add_dev_read[1]);
363 EXPECT_EQ(1, gmcg.add_dev_write[1]);
364 EXPECT_EQ(0, gmcg.add_dev_modify[1]);
365 EXPECT_EQ('c', gmcg.add_dev_type[1]);
Dylan Reid837c74a2016-01-22 17:25:21 -0800366
Chinyue Chen03c54ae2016-06-29 12:29:10 +0800367 EXPECT_LT(0, asprintf(&path, "%s/root/dev/null", mkdtemp_root));
368 EXPECT_EQ(0, strcmp(mknod_call_args.pathname, path));
369 free(path);
370 EXPECT_EQ(mknod_call_args.mode, S_IRWXU | S_IRWXG | S_IFCHR);
371 EXPECT_EQ(mknod_call_args.dev, makedev(1, 3));
372
Chinyue Chenfac909e2016-06-24 14:17:42 +0800373 EXPECT_EQ(1, gmcg.set_cpu_shares_count);
Chinyue Chen4f3fd682016-07-01 14:11:42 +0800374 EXPECT_EQ(TEST_CPU_SHARES,
375 container_config_get_cpu_shares(self->config));
Chinyue Chenfac909e2016-06-24 14:17:42 +0800376 EXPECT_EQ(1, gmcg.set_cpu_quota_count);
Chinyue Chen4f3fd682016-07-01 14:11:42 +0800377 EXPECT_EQ(TEST_CPU_QUOTA,
378 container_config_get_cpu_quota(self->config));
Chinyue Chenfac909e2016-06-24 14:17:42 +0800379 EXPECT_EQ(1, gmcg.set_cpu_period_count);
Chinyue Chen4f3fd682016-07-01 14:11:42 +0800380 EXPECT_EQ(TEST_CPU_PERIOD,
381 container_config_get_cpu_period(self->config));
Chinyue Chenfac909e2016-06-24 14:17:42 +0800382 EXPECT_EQ(0, gmcg.set_cpu_rt_runtime_count);
Chinyue Chen4f3fd682016-07-01 14:11:42 +0800383 EXPECT_EQ(0, container_config_get_cpu_rt_runtime(self->config));
Chinyue Chenfac909e2016-06-24 14:17:42 +0800384 EXPECT_EQ(0, gmcg.set_cpu_rt_period_count);
Chinyue Chen4f3fd682016-07-01 14:11:42 +0800385 EXPECT_EQ(0, container_config_get_cpu_rt_period(self->config));
Chinyue Chenfac909e2016-06-24 14:17:42 +0800386
Dylan Reid837c74a2016-01-22 17:25:21 -0800387 ASSERT_NE(NULL, minijail_alt_syscall_table);
388 EXPECT_EQ(0, strcmp(minijail_alt_syscall_table,
389 "testsyscalltable"));
390
391 EXPECT_EQ(0, container_wait(self->container));
392 EXPECT_EQ(1, minijail_wait_called);
393 EXPECT_EQ(1, minijail_reset_signal_mask_called);
394}
395
396TEST_F(container_test, test_kill_container)
397{
Dylan Reide040c6b2016-05-02 18:49:02 -0700398 EXPECT_EQ(0, container_start(self->container, self->config));
Dylan Reid837c74a2016-01-22 17:25:21 -0800399 EXPECT_EQ(0, container_kill(self->container));
400 EXPECT_EQ(1, kill_called);
401 EXPECT_EQ(SIGKILL, kill_sig);
402 EXPECT_EQ(1, minijail_wait_called);
403}
404
405/* libc stubs so the UT doesn't need root to call mount, etc. */
406int mount(const char *source, const char *target,
407 const char *filesystemtype, unsigned long mountflags,
408 const void *data)
409{
410 if (mount_called >= 5)
411 return 0;
412
413 mount_call_args[mount_called].source = strdup(source);
414 mount_call_args[mount_called].target = strdup(target);
415 mount_call_args[mount_called].filesystemtype = strdup(filesystemtype);
416 mount_call_args[mount_called].mountflags = mountflags;
417 mount_call_args[mount_called].data = data;
418 ++mount_called;
419 return 0;
420}
421
422int umount(const char *target)
423{
424 return 0;
425}
426
427int mknod(const char *pathname, mode_t mode, dev_t dev)
428{
429 mknod_call_args.pathname = strdup(pathname);
430 mknod_call_args.mode = mode;
431 mknod_call_args.dev = dev;
432 return 0;
433}
434
435int chown(const char *path, uid_t owner, gid_t group)
436{
437 return 0;
438};
439
440int kill(pid_t pid, int sig)
441{
442 ++kill_called;
443 kill_sig = sig;
444 return 0;
445}
446
447int stat(const char *path, struct stat *buf)
448{
Chinyue Chen03c54ae2016-06-29 12:29:10 +0800449 buf->st_rdev = stat_rdev_ret;
Dylan Reid837c74a2016-01-22 17:25:21 -0800450 return 0;
451}
452
453int chmod(const char *path, mode_t mode)
454{
455 return 0;
456}
457
458char *mkdtemp(char *template)
459{
460 mkdtemp_root = strdup(template);
461 return template;
462}
463
464int mkdir(const char *pathname, mode_t mode)
465{
466 return 0;
467}
468
469int rmdir(const char *pathname)
470{
471 return 0;
472}
473
474int unlink(const char *pathname)
475{
476 return 0;
477}
478
479/* Minijail stubs */
480struct minijail *minijail_new(void)
481{
Chinyue Chen03c54ae2016-06-29 12:29:10 +0800482 return (struct minijail *)0x55;
483}
484
485void minijail_destroy(struct minijail *j)
486{
Dylan Reid837c74a2016-01-22 17:25:21 -0800487}
488
489int minijail_mount(struct minijail *j, const char *src, const char *dest,
490 const char *type, unsigned long flags)
491{
492 return 0;
493}
494
495void minijail_namespace_vfs(struct minijail *j)
496{
497 ++minijail_vfs_called;
498}
499
500void minijail_namespace_ipc(struct minijail *j)
501{
502 ++minijail_ipc_called;
503}
504
505void minijail_namespace_net(struct minijail *j)
506{
507 ++minijail_net_called;
508}
509
510void minijail_namespace_pids(struct minijail *j)
511{
512 ++minijail_pids_called;
513}
514
515void minijail_namespace_user(struct minijail *j)
516{
517 ++minijail_user_called;
518}
519
520int minijail_uidmap(struct minijail *j, const char *uidmap)
521{
522 return 0;
523}
524
525int minijail_gidmap(struct minijail *j, const char *gidmap)
526{
527 return 0;
528}
529
530int minijail_enter_pivot_root(struct minijail *j, const char *dir)
531{
532 return 0;
533}
534
535void minijail_run_as_init(struct minijail *j)
536{
537 ++minijail_run_as_init_called;
538}
539
540int minijail_run_pid_pipes_no_preload(struct minijail *j, const char *filename,
541 char *const argv[], pid_t *pchild_pid,
542 int *pstdin_fd, int *pstdout_fd,
543 int *pstderr_fd)
544{
545 *pchild_pid = INIT_TEST_PID;
546 return 0;
547}
548
549int minijail_write_pid_file(struct minijail *j, const char *path)
550{
551 return 0;
552}
553
554int minijail_wait(struct minijail *j)
555{
556 ++minijail_wait_called;
557 return 0;
558}
559
560int minijail_use_alt_syscall(struct minijail *j, const char *table)
561{
562 minijail_alt_syscall_table = table;
563 return 0;
564}
565
Chinyue Chen03c54ae2016-06-29 12:29:10 +0800566int minijail_add_to_cgroup(struct minijail *j, const char *cg_path)
Dylan Reid837c74a2016-01-22 17:25:21 -0800567{
Chinyue Chen03c54ae2016-06-29 12:29:10 +0800568 return 0;
Dylan Reid837c74a2016-01-22 17:25:21 -0800569}
570
571void minijail_reset_signal_mask(struct minijail *j)
572{
573 ++minijail_reset_signal_mask_called;
574}
575
Chinyue Chen03c54ae2016-06-29 12:29:10 +0800576void minijail_skip_remount_private(struct minijail *j)
577{
578}
579
Dylan Reid837c74a2016-01-22 17:25:21 -0800580TEST_HARNESS_MAIN