* [LTP] [PATCH 1/3] lapi/syscalls: add setns to hppa
@ 2020-06-05 9:02 Jan Stancek
2020-06-05 9:02 ` [LTP] [PATCH 2/3] syscalls/setns: convert to new API Jan Stancek
` (2 more replies)
0 siblings, 3 replies; 11+ messages in thread
From: Jan Stancek @ 2020-06-05 9:02 UTC (permalink / raw)
To: ltp
Signed-off-by: Jan Stancek <jstancek@redhat.com>
---
include/lapi/syscalls/hppa.in | 1 +
1 file changed, 1 insertion(+)
diff --git a/include/lapi/syscalls/hppa.in b/include/lapi/syscalls/hppa.in
index e00d2dc6d37d..7f9b5e0a01b9 100644
--- a/include/lapi/syscalls/hppa.in
+++ b/include/lapi/syscalls/hppa.in
@@ -17,6 +17,7 @@ splice 291
tee 293
vmsplice 294
syncfs 327
+setns 328
process_vm_readv 330
process_vm_writev 331
memfd_create 340
--
2.18.1
^ permalink raw reply related [flat|nested] 11+ messages in thread
* [LTP] [PATCH 2/3] syscalls/setns: convert to new API
2020-06-05 9:02 [LTP] [PATCH 1/3] lapi/syscalls: add setns to hppa Jan Stancek
@ 2020-06-05 9:02 ` Jan Stancek
2020-06-17 15:11 ` Cyril Hrubis
2020-06-05 9:02 ` [LTP] [PATCH 3/3] syscalls/setns01: accept also EBADF for regular fd Jan Stancek
2020-06-17 15:13 ` [LTP] [PATCH 1/3] lapi/syscalls: add setns to hppa Cyril Hrubis
2 siblings, 1 reply; 11+ messages in thread
From: Jan Stancek @ 2020-06-05 9:02 UTC (permalink / raw)
To: ltp
Both tests are converted in single commit since they share setns.h.
Some small warnings are also fixed.
Signed-off-by: Jan Stancek <jstancek@redhat.com>
---
testcases/kernel/syscalls/setns/setns.h | 8 +-
testcases/kernel/syscalls/setns/setns01.c | 78 +++++--------
testcases/kernel/syscalls/setns/setns02.c | 128 ++++++++++------------
3 files changed, 91 insertions(+), 123 deletions(-)
diff --git a/testcases/kernel/syscalls/setns/setns.h b/testcases/kernel/syscalls/setns/setns.h
index a05e6736c64a..942d0833b782 100644
--- a/testcases/kernel/syscalls/setns/setns.h
+++ b/testcases/kernel/syscalls/setns/setns.h
@@ -22,6 +22,8 @@
* 02110-1301, USA.
*/
+#include <stdio.h>
+
#define NS_MAX 5
static int ns_types[NS_MAX];
static int ns_fds[NS_MAX];
@@ -37,10 +39,10 @@ static int get_ns_fd(int pid, const char *ns)
if (stat(tmp, &st) == 0) {
fd = open(tmp, O_RDONLY);
if (fd == -1)
- tst_brkm(TBROK|TERRNO, NULL, "failed to open %s", tmp);
+ tst_brk(TBROK|TERRNO, "failed to open %s", tmp);
} else {
if (errno != ENOENT)
- tst_brkm(TBROK|TERRNO, NULL, "failed to stat %s", tmp);
+ tst_brk(TBROK|TERRNO, "failed to stat %s", tmp);
}
return fd;
}
@@ -53,7 +55,7 @@ static void init_ns_type(int clone_type, const char *proc_name)
if (fd != -1) {
ns_types[ns_total] = clone_type;
ns_fds[ns_total] = fd;
- tst_resm(TINFO, "ns_name=%s, ns_fds[%d]=%d, ns_types[%d]=0x%x",
+ tst_res(TINFO, "ns_name=%s, ns_fds[%d]=%d, ns_types[%d]=0x%x",
proc_name, ns_total, fd, ns_total, clone_type);
ns_total++;
}
diff --git a/testcases/kernel/syscalls/setns/setns01.c b/testcases/kernel/syscalls/setns/setns01.c
index 864899205aa8..0cf2684ba6ef 100644
--- a/testcases/kernel/syscalls/setns/setns01.c
+++ b/testcases/kernel/syscalls/setns/setns01.c
@@ -26,20 +26,14 @@
*/
#define _GNU_SOURCE
#include <sys/stat.h>
-#include <sys/syscall.h>
#include <sys/types.h>
#include <errno.h>
#include <sched.h>
#include <pwd.h>
#include <string.h>
#include "config.h"
-#include "test.h"
+#include "tst_test.h"
#include "lapi/syscalls.h"
-#include "safe_macros.h"
-
-char *TCID = "setns01";
-
-#if defined(__NR_setns)
#include "setns.h"
struct testcase_t {
@@ -53,8 +47,6 @@ struct testcase_t {
void (*cleanup) (struct testcase_t *);
};
-static void setup(void);
-static void cleanup(void);
static void setup0(struct testcase_t *, int);
static void setup1(struct testcase_t *, int);
static void setup2(struct testcase_t *, int);
@@ -63,7 +55,7 @@ static void setup4(struct testcase_t *, int);
static void cleanup1(struct testcase_t *);
static void cleanup4(struct testcase_t *);
-struct testcase_t tdat[] = {
+struct testcase_t tcases[] = {
{
.msg = "invalid fd",
.fd = -1,
@@ -100,7 +92,6 @@ struct testcase_t tdat[] = {
}
};
-static int TST_TOTAL = sizeof(tdat) / sizeof(tdat[0]);
static const char nobody_uid[] = "nobody";
static struct passwd *ltpuser;
@@ -114,7 +105,7 @@ static void setup1(struct testcase_t *t, int i)
t->ns_type = ns_types[i];
t->fd = open("dummy", O_RDWR|O_CREAT, 0600);
if (t->fd == -1)
- tst_brkm(TFAIL|TERRNO, cleanup, "setup1:open failed");
+ tst_brk(TFAIL|TERRNO, "setup1:open failed");
unlink("dummy");
}
@@ -141,41 +132,42 @@ static void setup3(struct testcase_t *t, int i)
static void setup4(struct testcase_t *t, int i)
{
- SAFE_SETEUID(NULL, ltpuser->pw_uid);
+ SAFE_SETEUID(ltpuser->pw_uid);
t->fd = ns_fds[i];
t->ns_type = ns_types[i];
}
-static void cleanup4(struct testcase_t *t)
+static void cleanup4(LTP_ATTRIBUTE_UNUSED struct testcase_t *t)
{
- SAFE_SETEUID(NULL, 0);
+ SAFE_SETEUID(0);
}
-static void test_setns(struct testcase_t *t)
+static void test_setns(unsigned int testno)
{
int ret, i;
+ struct testcase_t *t = &tcases[testno];
for (i = 0; i < ns_total; i++) {
if (t->setup)
t->setup(t, i);
if (t->skip) {
- tst_resm(TINFO, "skip %s", tdat->msg);
+ tst_res(TINFO, "skip %s", t->msg);
continue;
}
- tst_resm(TINFO, "setns(%d, 0x%x)", t->fd, t->ns_type);
- ret = syscall(__NR_setns, t->fd, t->ns_type);
+ tst_res(TINFO, "setns(%d, 0x%x)", t->fd, t->ns_type);
+ ret = tst_syscall(__NR_setns, t->fd, t->ns_type);
if (ret == t->exp_ret) {
if (ret == -1 && errno == t->exp_errno)
- tst_resm(TPASS, "%s exp_errno=%d", t->msg,
+ tst_res(TPASS, "%s exp_errno=%d", t->msg,
t->exp_errno);
else
- tst_resm(TFAIL|TERRNO, "%s exp_errno=%d",
+ tst_res(TFAIL|TERRNO, "%s exp_errno=%d",
t->msg, t->exp_errno);
} else {
- tst_resm(TFAIL, "%s ret=%d expected=%d", t->msg,
+ tst_res(TFAIL, "%s ret=%d expected=%d", t->msg,
ret, t->exp_ret);
}
@@ -184,50 +176,32 @@ static void test_setns(struct testcase_t *t)
}
}
-int main(int argc, char *argv[])
-{
- int lc, testno;
-
- tst_parse_opts(argc, argv, NULL, NULL);
-
- setup();
- for (lc = 0; TEST_LOOPING(lc); lc++) {
- for (testno = 0; testno < TST_TOTAL; testno++)
- test_setns(&tdat[testno]);
- }
- cleanup();
- tst_exit();
-}
-
static void setup(void)
{
- tst_require_root();
-
/* runtime check if syscall is supported */
- ltp_syscall(__NR_setns, -1, 0);
+ tst_syscall(__NR_setns, -1, 0);
init_available_ns();
if (ns_total == 0)
- tst_brkm(TCONF, NULL, "no ns types/proc entries");
+ tst_brk(TCONF, "no ns types/proc entries");
ltpuser = getpwnam(nobody_uid);
if (ltpuser == NULL)
- tst_brkm(TBROK | TERRNO, NULL, "getpwnam failed");
+ tst_brk(TBROK | TERRNO, "getpwnam failed");
-
- tst_tmpdir();
- TEST_PAUSE;
}
static void cleanup(void)
{
close_ns_fds();
- tst_rmdir();
}
-#else
-int main(int argc, char *argv[])
-{
- tst_brkm(TCONF, NULL, "__NR_setns is not defined on your system.");
-}
-#endif
+static struct tst_test test = {
+ .tcnt = ARRAY_SIZE(tcases),
+ .test = test_setns,
+ .setup = setup,
+ .cleanup = cleanup,
+ .needs_root = 1,
+ .needs_tmpdir = 1,
+};
+
diff --git a/testcases/kernel/syscalls/setns/setns02.c b/testcases/kernel/syscalls/setns/setns02.c
index 0f49028450b7..ce97be807256 100644
--- a/testcases/kernel/syscalls/setns/setns02.c
+++ b/testcases/kernel/syscalls/setns/setns02.c
@@ -33,24 +33,20 @@
#include <sys/ipc.h>
#include <sys/shm.h>
#include <sys/stat.h>
-#include <sys/syscall.h>
#include <sys/types.h>
#include <sys/utsname.h>
#include <sys/wait.h>
#include <errno.h>
#include <sched.h>
+#include <stdlib.h>
#include <string.h>
#include "config.h"
-#include "test.h"
+#include "tst_test.h"
#include "lapi/syscalls.h"
-#include "safe_macros.h"
+#include "setns.h"
#define CHILD_STACK_SIZE (1024*1024)
#define CP "(child) "
-char *TCID = "setns02";
-
-#if defined(__NR_setns) && defined(CLONE_NEWIPC) && defined(CLONE_NEWUTS)
-#include "setns.h"
static char *dummy_hostname = "setns_dummy_uts";
static int ns_ipc_fd;
@@ -67,37 +63,37 @@ static int do_child_newuts(void *arg)
int ns_flag = *(int *)arg;
if (uname(&uts_parent) == -1)
- tst_resm(TFAIL|TERRNO, CP"uname");
- tst_resm(TINFO, CP"hostname (inherited from parent): %s",
+ tst_res(TFAIL|TERRNO, CP"uname");
+ tst_res(TINFO, CP"hostname (inherited from parent): %s",
uts_parent.nodename);
if (sethostname(dummy_hostname, strlen(dummy_hostname)) == -1)
- tst_resm(TFAIL|TERRNO, CP"sethostname");
+ tst_res(TFAIL|TERRNO, CP"sethostname");
if (uname(&uts) == -1)
- tst_resm(TFAIL|TERRNO, CP"uname");
+ tst_res(TFAIL|TERRNO, CP"uname");
- tst_resm(TINFO, CP"hostname changed to: %s", uts.nodename);
+ tst_res(TINFO, CP"hostname changed to: %s", uts.nodename);
if (strcmp(uts_parent.nodename, uts.nodename) == 0) {
- tst_resm(TFAIL, CP"expected hostname to be different");
+ tst_res(TFAIL, CP"expected hostname to be different");
return 1;
} else {
- tst_resm(TPASS, CP"hostname is different in parent/child");
+ tst_res(TPASS, CP"hostname is different in parent/child");
}
- tst_resm(TINFO, CP"attempting to switch ns back to parent ns");
- if (syscall(__NR_setns, ns_uts_fd, ns_flag) == -1) {
- tst_resm(TFAIL|TERRNO, CP"setns");
+ tst_res(TINFO, CP"attempting to switch ns back to parent ns");
+ if (tst_syscall(__NR_setns, ns_uts_fd, ns_flag) == -1) {
+ tst_res(TFAIL|TERRNO, CP"setns");
return 2;
}
if (uname(&uts) == -1)
- tst_resm(TFAIL|TERRNO, CP"uname");
+ tst_res(TFAIL|TERRNO, CP"uname");
- tst_resm(TINFO, CP"hostname: %s", uts.nodename);
+ tst_res(TINFO, CP"hostname: %s", uts.nodename);
if (strcmp(uts_parent.nodename, uts.nodename) != 0) {
- tst_resm(TFAIL, CP"expected hostname to match parent");
+ tst_res(TFAIL, CP"expected hostname to match parent");
return 3;
} else {
- tst_resm(TPASS, CP"hostname now as expected");
+ tst_res(TPASS, CP"hostname now as expected");
}
return 0;
}
@@ -109,25 +105,25 @@ static int do_child_newipc(void *arg)
p = shmat(shmid, NULL, 0);
if (p == (void *) -1) {
- tst_resm(TPASS|TERRNO, CP"shmat failed as expected");
+ tst_res(TPASS|TERRNO, CP"shmat failed as expected");
} else {
- tst_resm(TFAIL, CP"shmat unexpectedly suceeded");
+ tst_res(TFAIL, CP"shmat unexpectedly suceeded");
shmdt(p);
return 1;
}
- tst_resm(TINFO, CP"attempting to switch ns back to parent ns");
- if (syscall(__NR_setns, ns_ipc_fd, ns_flag) == -1) {
- tst_resm(TFAIL|TERRNO, CP"setns");
+ tst_res(TINFO, CP"attempting to switch ns back to parent ns");
+ if (tst_syscall(__NR_setns, ns_ipc_fd, ns_flag) == -1) {
+ tst_res(TFAIL|TERRNO, CP"setns");
return 2;
}
p = shmat(shmid, NULL, 0);
if (p == (void *) -1) {
- tst_resm(TFAIL|TERRNO, CP"shmat failed after setns");
+ tst_res(TFAIL|TERRNO, CP"shmat failed after setns");
return 3;
} else {
- tst_resm(TPASS, CP"shmat suceeded");
+ tst_res(TPASS, CP"shmat suceeded");
shmdt(p);
}
@@ -141,70 +137,66 @@ static void test_flag(int clone_flag, int ns_flag, int (*fn) (void *arg))
child_stack = malloc(CHILD_STACK_SIZE);
if (child_stack == NULL)
- tst_brkm(TBROK, cleanup, "Cannot allocate stack for child");
+ tst_brk(TBROK, "Cannot allocate stack for child");
- tst_resm(TINFO, "creating child with clone_flag=0x%x, ns_flag=0x%x",
+ tst_res(TINFO, "creating child with clone_flag=0x%x, ns_flag=0x%x",
clone_flag, ns_flag);
ret = ltp_clone(SIGCHLD|clone_flag, fn, &ns_flag,
CHILD_STACK_SIZE, child_stack);
if (ret == -1)
- tst_brkm(TBROK|TERRNO, cleanup, "ltp_clone");
+ tst_brk(TBROK|TERRNO, "ltp_clone");
- SAFE_WAITPID(cleanup, ret, &status, 0);
+ SAFE_WAITPID(ret, &status, 0);
if (!WIFEXITED(status) || WEXITSTATUS(status) != 0)
- tst_resm(TFAIL, "child returns %d", status);
+ tst_res(TFAIL, "child returns %d", status);
else
- tst_resm(TPASS, "child finished succesfully");
+ tst_res(TPASS, "child finished succesfully");
free(child_stack);
}
-int main(int argc, char *argv[])
+void test_all(void)
{
- int lc;
-
- tst_parse_opts(argc, argv, NULL, NULL);
-
- setup();
- for (lc = 0; TEST_LOOPING(lc); lc++) {
- if (ns_uts_fd != -1) {
- tst_resm(TINFO, "test_newuts");
- test_flag(CLONE_NEWUTS, CLONE_NEWUTS, do_child_newuts);
- test_flag(CLONE_NEWUTS, 0, do_child_newuts);
- }
- if (ns_ipc_fd != -1) {
- tst_resm(TINFO, "test_newipc");
- test_flag(CLONE_NEWIPC, CLONE_NEWIPC, do_child_newipc);
- test_flag(CLONE_NEWIPC, 0, do_child_newipc);
- }
+ int report_tconf = 1;
+#if defined(CLONE_NEWUTS)
+ if (ns_uts_fd != -1) {
+ tst_res(TINFO, "test_newuts");
+ test_flag(CLONE_NEWUTS, CLONE_NEWUTS, do_child_newuts);
+ test_flag(CLONE_NEWUTS, 0, do_child_newuts);
}
- cleanup();
- tst_exit();
+ report_tconf = 0;
+#endif
+#if defined(CLONE_NEWIPC)
+ if (ns_ipc_fd != -1) {
+ tst_res(TINFO, "test_newipc");
+ test_flag(CLONE_NEWIPC, CLONE_NEWIPC, do_child_newipc);
+ test_flag(CLONE_NEWIPC, 0, do_child_newipc);
+ }
+ report_tconf = 0;
+#endif
+ if (report_tconf)
+ tst_brk(TCONF, "CLONE_NEWIPC and CLONE_NEWUTS is not defined");
}
static void setup(void)
{
char tmp[PATH_MAX];
- tst_require_root();
-
/* runtime check if syscall is supported */
- ltp_syscall(__NR_setns, -1, 0);
+ tst_syscall(__NR_setns, -1, 0);
/* check if kernel has CONFIG_*_NS set and exports /proc entries */
ns_ipc_fd = get_ns_fd(getpid(), "ipc");
ns_uts_fd = get_ns_fd(getpid(), "uts");
if (ns_ipc_fd == -1 && ns_uts_fd == -1)
- tst_brkm(TCONF, NULL, "your kernel has CONFIG_IPC_NS, "
+ tst_brk(TCONF, "your kernel has CONFIG_IPC_NS, "
"CONFIG_UTS_NS or CONFIG_PROC disabled");
if (getcwd(tmp, PATH_MAX) == NULL)
- tst_brkm(TBROK|TERRNO, NULL, "getcwd");
+ tst_brk(TBROK|TERRNO, "getcwd");
ipc_key = ftok(tmp, 65);
shmid = shmget(ipc_key, getpagesize(), IPC_CREAT | 0666);
if (shmid == -1)
- tst_brkm(TBROK|TERRNO, NULL, "shmget");
-
- TEST_PAUSE;
+ tst_brk(TBROK|TERRNO, "shmget");
}
static void cleanup(void)
@@ -216,10 +208,10 @@ static void cleanup(void)
shmctl(shmid, IPC_RMID, NULL);
}
-#else
-int main(int argc, char *argv[])
-{
- tst_brkm(TCONF, NULL, "__NR_setns, CLONE_NEWIPC or CLONE_NEWUTS "
- " is not defined on your system.");
-}
-#endif
+
+static struct tst_test test = {
+ .test_all = test_all,
+ .setup = setup,
+ .cleanup = cleanup,
+ .needs_root = 1,
+};
--
2.18.1
^ permalink raw reply related [flat|nested] 11+ messages in thread
* [LTP] [PATCH 3/3] syscalls/setns01: accept also EBADF for regular fd
2020-06-05 9:02 [LTP] [PATCH 1/3] lapi/syscalls: add setns to hppa Jan Stancek
2020-06-05 9:02 ` [LTP] [PATCH 2/3] syscalls/setns: convert to new API Jan Stancek
@ 2020-06-05 9:02 ` Jan Stancek
2020-06-17 15:12 ` Cyril Hrubis
2020-06-17 15:13 ` [LTP] [PATCH 1/3] lapi/syscalls: add setns to hppa Cyril Hrubis
2 siblings, 1 reply; 11+ messages in thread
From: Jan Stancek @ 2020-06-05 9:02 UTC (permalink / raw)
To: ltp
commit 303cc571d107 ("nsproxy: attach to namespaces via pidfds")
changed errno that is returned for regular file from EINVAL to EBADF.
Accept any of the two as expect errno code.
Signed-off-by: Jan Stancek <jstancek@redhat.com>
---
testcases/kernel/syscalls/setns/setns01.c | 51 ++++++++++++++++-------
1 file changed, 36 insertions(+), 15 deletions(-)
diff --git a/testcases/kernel/syscalls/setns/setns01.c b/testcases/kernel/syscalls/setns/setns01.c
index 0cf2684ba6ef..2115b81e647f 100644
--- a/testcases/kernel/syscalls/setns/setns01.c
+++ b/testcases/kernel/syscalls/setns/setns01.c
@@ -41,7 +41,7 @@ struct testcase_t {
int fd;
int ns_type;
int exp_ret;
- int exp_errno;
+ int exp_errno[2];
int skip;
void (*setup) (struct testcase_t *, int i);
void (*cleanup) (struct testcase_t *);
@@ -60,13 +60,13 @@ struct testcase_t tcases[] = {
.msg = "invalid fd",
.fd = -1,
.exp_ret = -1,
- .exp_errno = EBADF,
+ .exp_errno = { EBADF },
.setup = setup0,
},
{
.msg = "regular file fd",
.exp_ret = -1,
- .exp_errno = EINVAL,
+ .exp_errno = { EINVAL, EBADF },
.setup = setup1,
.cleanup = cleanup1
},
@@ -74,19 +74,19 @@ struct testcase_t tcases[] = {
.msg = "invalid ns_type",
.ns_type = -1,
.exp_ret = -1,
- .exp_errno = EINVAL,
+ .exp_errno = { EINVAL },
.setup = setup2,
},
{
.msg = "mismatch ns_type/fd",
.exp_ret = -1,
- .exp_errno = EINVAL,
+ .exp_errno = { EINVAL },
.setup = setup3,
},
{
.msg = "without CAP_SYS_ADMIN",
.exp_ret = -1,
- .exp_errno = EPERM,
+ .exp_errno = { EPERM },
.setup = setup4,
.cleanup = cleanup4,
}
@@ -145,7 +145,9 @@ static void cleanup4(LTP_ATTRIBUTE_UNUSED struct testcase_t *t)
static void test_setns(unsigned int testno)
{
- int ret, i;
+ int ret, i, tres, saved_errno;
+ unsigned int j;
+ char errnos_str[256], *errnos_pos;
struct testcase_t *t = &tcases[testno];
for (i = 0; i < ns_total; i++) {
@@ -159,18 +161,37 @@ static void test_setns(unsigned int testno)
tst_res(TINFO, "setns(%d, 0x%x)", t->fd, t->ns_type);
ret = tst_syscall(__NR_setns, t->fd, t->ns_type);
- if (ret == t->exp_ret) {
- if (ret == -1 && errno == t->exp_errno)
- tst_res(TPASS, "%s exp_errno=%d", t->msg,
- t->exp_errno);
- else
- tst_res(TFAIL|TERRNO, "%s exp_errno=%d",
- t->msg, t->exp_errno);
- } else {
+ saved_errno = errno;
+
+ if (ret != t->exp_ret) {
tst_res(TFAIL, "%s ret=%d expected=%d", t->msg,
ret, t->exp_ret);
+ goto done;
}
+ /* Consider PASS if any errno matches */
+ tres = TFAIL;
+ memset(errnos_str, 0, sizeof(errnos_str));
+ errnos_pos = errnos_str;
+ for (j = 0; j < ARRAY_SIZE(t->exp_errno); j++) {
+ if (!t->exp_errno[j])
+ break;
+
+ ret = sprintf(errnos_pos, "%s%s",
+ (j == 0) ? "" : ",",
+ tst_strerrno(t->exp_errno[j]));
+
+ if (ret >= 0)
+ errnos_pos += ret;
+
+ if (saved_errno == t->exp_errno[j])
+ tres = TPASS;
+ }
+
+ tst_res(tres, "%s exp_errno(%s), got(%s)", t->msg,
+ errnos_str, tst_strerrno(saved_errno));
+
+done:
if (t->cleanup)
t->cleanup(t);
}
--
2.18.1
^ permalink raw reply related [flat|nested] 11+ messages in thread
* [LTP] [PATCH 2/3] syscalls/setns: convert to new API
2020-06-05 9:02 ` [LTP] [PATCH 2/3] syscalls/setns: convert to new API Jan Stancek
@ 2020-06-17 15:11 ` Cyril Hrubis
2020-06-18 7:33 ` [LTP] [PATCH v2] " Jan Stancek
0 siblings, 1 reply; 11+ messages in thread
From: Cyril Hrubis @ 2020-06-17 15:11 UTC (permalink / raw)
To: ltp
Hi!
> testcases/kernel/syscalls/setns/setns.h | 8 +-
> testcases/kernel/syscalls/setns/setns01.c | 78 +++++--------
> testcases/kernel/syscalls/setns/setns02.c | 128 ++++++++++------------
> 3 files changed, 91 insertions(+), 123 deletions(-)
>
> diff --git a/testcases/kernel/syscalls/setns/setns.h b/testcases/kernel/syscalls/setns/setns.h
> index a05e6736c64a..942d0833b782 100644
> --- a/testcases/kernel/syscalls/setns/setns.h
> +++ b/testcases/kernel/syscalls/setns/setns.h
> @@ -22,6 +22,8 @@
> * 02110-1301, USA.
> */
>
> +#include <stdio.h>
> +
> #define NS_MAX 5
> static int ns_types[NS_MAX];
> static int ns_fds[NS_MAX];
> @@ -37,10 +39,10 @@ static int get_ns_fd(int pid, const char *ns)
> if (stat(tmp, &st) == 0) {
> fd = open(tmp, O_RDONLY);
> if (fd == -1)
> - tst_brkm(TBROK|TERRNO, NULL, "failed to open %s", tmp);
> + tst_brk(TBROK|TERRNO, "failed to open %s", tmp);
> } else {
> if (errno != ENOENT)
> - tst_brkm(TBROK|TERRNO, NULL, "failed to stat %s", tmp);
> + tst_brk(TBROK|TERRNO, "failed to stat %s", tmp);
> }
> return fd;
> }
> @@ -53,7 +55,7 @@ static void init_ns_type(int clone_type, const char *proc_name)
> if (fd != -1) {
> ns_types[ns_total] = clone_type;
> ns_fds[ns_total] = fd;
> - tst_resm(TINFO, "ns_name=%s, ns_fds[%d]=%d, ns_types[%d]=0x%x",
> + tst_res(TINFO, "ns_name=%s, ns_fds[%d]=%d, ns_types[%d]=0x%x",
> proc_name, ns_total, fd, ns_total, clone_type);
> ns_total++;
> }
I guess that we can as well include the lapi/namespace_constants.h and
remove the #ifdefs in the init_available_ns() function.
> diff --git a/testcases/kernel/syscalls/setns/setns01.c b/testcases/kernel/syscalls/setns/setns01.c
> index 864899205aa8..0cf2684ba6ef 100644
> --- a/testcases/kernel/syscalls/setns/setns01.c
> +++ b/testcases/kernel/syscalls/setns/setns01.c
> @@ -26,20 +26,14 @@
> */
Can we please change the GPL comment to SPDX as well?
> #define _GNU_SOURCE
> #include <sys/stat.h>
> -#include <sys/syscall.h>
> #include <sys/types.h>
> #include <errno.h>
> #include <sched.h>
> #include <pwd.h>
> #include <string.h>
> #include "config.h"
> -#include "test.h"
> +#include "tst_test.h"
> #include "lapi/syscalls.h"
> -#include "safe_macros.h"
> -
> -char *TCID = "setns01";
> -
> -#if defined(__NR_setns)
> #include "setns.h"
>
> struct testcase_t {
> @@ -53,8 +47,6 @@ struct testcase_t {
> void (*cleanup) (struct testcase_t *);
> };
>
> -static void setup(void);
> -static void cleanup(void);
> static void setup0(struct testcase_t *, int);
> static void setup1(struct testcase_t *, int);
> static void setup2(struct testcase_t *, int);
> @@ -63,7 +55,7 @@ static void setup4(struct testcase_t *, int);
> static void cleanup1(struct testcase_t *);
> static void cleanup4(struct testcase_t *);
>
> -struct testcase_t tdat[] = {
> +struct testcase_t tcases[] = {
> {
> .msg = "invalid fd",
> .fd = -1,
> @@ -100,7 +92,6 @@ struct testcase_t tdat[] = {
> }
> };
>
> -static int TST_TOTAL = sizeof(tdat) / sizeof(tdat[0]);
> static const char nobody_uid[] = "nobody";
> static struct passwd *ltpuser;
>
> @@ -114,7 +105,7 @@ static void setup1(struct testcase_t *t, int i)
> t->ns_type = ns_types[i];
> t->fd = open("dummy", O_RDWR|O_CREAT, 0600);
> if (t->fd == -1)
> - tst_brkm(TFAIL|TERRNO, cleanup, "setup1:open failed");
> + tst_brk(TFAIL|TERRNO, "setup1:open failed");
> unlink("dummy");
> }
>
> @@ -141,41 +132,42 @@ static void setup3(struct testcase_t *t, int i)
>
> static void setup4(struct testcase_t *t, int i)
> {
> - SAFE_SETEUID(NULL, ltpuser->pw_uid);
> + SAFE_SETEUID(ltpuser->pw_uid);
>
> t->fd = ns_fds[i];
> t->ns_type = ns_types[i];
> }
>
> -static void cleanup4(struct testcase_t *t)
> +static void cleanup4(LTP_ATTRIBUTE_UNUSED struct testcase_t *t)
> {
> - SAFE_SETEUID(NULL, 0);
> + SAFE_SETEUID(0);
> }
I would move these functions before the testcsese_t structure so that we
do not have to define the function prototypes.
Also I guess that we can open the regular file once in the test setup
and set only the t->fd in the setup1()
> -static void test_setns(struct testcase_t *t)
> +static void test_setns(unsigned int testno)
> {
> int ret, i;
> + struct testcase_t *t = &tcases[testno];
>
> for (i = 0; i < ns_total; i++) {
> if (t->setup)
> t->setup(t, i);
>
> if (t->skip) {
> - tst_resm(TINFO, "skip %s", tdat->msg);
> + tst_res(TINFO, "skip %s", t->msg);
> continue;
> }
>
> - tst_resm(TINFO, "setns(%d, 0x%x)", t->fd, t->ns_type);
> - ret = syscall(__NR_setns, t->fd, t->ns_type);
> + tst_res(TINFO, "setns(%d, 0x%x)", t->fd, t->ns_type);
> + ret = tst_syscall(__NR_setns, t->fd, t->ns_type);
> if (ret == t->exp_ret) {
> if (ret == -1 && errno == t->exp_errno)
> - tst_resm(TPASS, "%s exp_errno=%d", t->msg,
> + tst_res(TPASS, "%s exp_errno=%d", t->msg,
> t->exp_errno);
> else
> - tst_resm(TFAIL|TERRNO, "%s exp_errno=%d",
> + tst_res(TFAIL|TERRNO, "%s exp_errno=%d",
> t->msg, t->exp_errno);
> } else {
> - tst_resm(TFAIL, "%s ret=%d expected=%d", t->msg,
> + tst_res(TFAIL, "%s ret=%d expected=%d", t->msg,
> ret, t->exp_ret);
Can we also print the expected errno name with tst_strerrno() ?
> }
>
> @@ -184,50 +176,32 @@ static void test_setns(struct testcase_t *t)
> }
> }
>
> -int main(int argc, char *argv[])
> -{
> - int lc, testno;
> -
> - tst_parse_opts(argc, argv, NULL, NULL);
> -
> - setup();
> - for (lc = 0; TEST_LOOPING(lc); lc++) {
> - for (testno = 0; testno < TST_TOTAL; testno++)
> - test_setns(&tdat[testno]);
> - }
> - cleanup();
> - tst_exit();
> -}
> -
> static void setup(void)
> {
> - tst_require_root();
> -
> /* runtime check if syscall is supported */
> - ltp_syscall(__NR_setns, -1, 0);
> + tst_syscall(__NR_setns, -1, 0);
>
> init_available_ns();
> if (ns_total == 0)
> - tst_brkm(TCONF, NULL, "no ns types/proc entries");
> + tst_brk(TCONF, "no ns types/proc entries");
>
> ltpuser = getpwnam(nobody_uid);
> if (ltpuser == NULL)
> - tst_brkm(TBROK | TERRNO, NULL, "getpwnam failed");
> + tst_brk(TBROK | TERRNO, "getpwnam failed");
>
> -
> - tst_tmpdir();
> - TEST_PAUSE;
> }
>
> static void cleanup(void)
> {
> close_ns_fds();
> - tst_rmdir();
> }
> -#else
> -int main(int argc, char *argv[])
> -{
> - tst_brkm(TCONF, NULL, "__NR_setns is not defined on your system.");
>
> -}
> -#endif
> +static struct tst_test test = {
> + .tcnt = ARRAY_SIZE(tcases),
> + .test = test_setns,
> + .setup = setup,
> + .cleanup = cleanup,
> + .needs_root = 1,
> + .needs_tmpdir = 1,
> +};
> +
> diff --git a/testcases/kernel/syscalls/setns/setns02.c b/testcases/kernel/syscalls/setns/setns02.c
> index 0f49028450b7..ce97be807256 100644
> --- a/testcases/kernel/syscalls/setns/setns02.c
> +++ b/testcases/kernel/syscalls/setns/setns02.c
> @@ -33,24 +33,20 @@
> #include <sys/ipc.h>
> #include <sys/shm.h>
> #include <sys/stat.h>
> -#include <sys/syscall.h>
> #include <sys/types.h>
> #include <sys/utsname.h>
> #include <sys/wait.h>
> #include <errno.h>
> #include <sched.h>
> +#include <stdlib.h>
> #include <string.h>
> #include "config.h"
> -#include "test.h"
> +#include "tst_test.h"
> #include "lapi/syscalls.h"
> -#include "safe_macros.h"
> +#include "setns.h"
>
> #define CHILD_STACK_SIZE (1024*1024)
> #define CP "(child) "
> -char *TCID = "setns02";
> -
> -#if defined(__NR_setns) && defined(CLONE_NEWIPC) && defined(CLONE_NEWUTS)
> -#include "setns.h"
>
> static char *dummy_hostname = "setns_dummy_uts";
> static int ns_ipc_fd;
> @@ -67,37 +63,37 @@ static int do_child_newuts(void *arg)
> int ns_flag = *(int *)arg;
>
> if (uname(&uts_parent) == -1)
> - tst_resm(TFAIL|TERRNO, CP"uname");
> - tst_resm(TINFO, CP"hostname (inherited from parent): %s",
> + tst_res(TFAIL|TERRNO, CP"uname");
> + tst_res(TINFO, CP"hostname (inherited from parent): %s",
> uts_parent.nodename);
>
> if (sethostname(dummy_hostname, strlen(dummy_hostname)) == -1)
> - tst_resm(TFAIL|TERRNO, CP"sethostname");
> + tst_res(TFAIL|TERRNO, CP"sethostname");
> if (uname(&uts) == -1)
> - tst_resm(TFAIL|TERRNO, CP"uname");
> + tst_res(TFAIL|TERRNO, CP"uname");
>
> - tst_resm(TINFO, CP"hostname changed to: %s", uts.nodename);
> + tst_res(TINFO, CP"hostname changed to: %s", uts.nodename);
> if (strcmp(uts_parent.nodename, uts.nodename) == 0) {
> - tst_resm(TFAIL, CP"expected hostname to be different");
> + tst_res(TFAIL, CP"expected hostname to be different");
> return 1;
> } else {
> - tst_resm(TPASS, CP"hostname is different in parent/child");
> + tst_res(TPASS, CP"hostname is different in parent/child");
> }
>
> - tst_resm(TINFO, CP"attempting to switch ns back to parent ns");
> - if (syscall(__NR_setns, ns_uts_fd, ns_flag) == -1) {
> - tst_resm(TFAIL|TERRNO, CP"setns");
> + tst_res(TINFO, CP"attempting to switch ns back to parent ns");
> + if (tst_syscall(__NR_setns, ns_uts_fd, ns_flag) == -1) {
> + tst_res(TFAIL|TERRNO, CP"setns");
> return 2;
> }
> if (uname(&uts) == -1)
> - tst_resm(TFAIL|TERRNO, CP"uname");
> + tst_res(TFAIL|TERRNO, CP"uname");
>
> - tst_resm(TINFO, CP"hostname: %s", uts.nodename);
> + tst_res(TINFO, CP"hostname: %s", uts.nodename);
> if (strcmp(uts_parent.nodename, uts.nodename) != 0) {
> - tst_resm(TFAIL, CP"expected hostname to match parent");
> + tst_res(TFAIL, CP"expected hostname to match parent");
> return 3;
> } else {
> - tst_resm(TPASS, CP"hostname now as expected");
> + tst_res(TPASS, CP"hostname now as expected");
> }
> return 0;
> }
> @@ -109,25 +105,25 @@ static int do_child_newipc(void *arg)
>
> p = shmat(shmid, NULL, 0);
> if (p == (void *) -1) {
> - tst_resm(TPASS|TERRNO, CP"shmat failed as expected");
> + tst_res(TPASS|TERRNO, CP"shmat failed as expected");
> } else {
> - tst_resm(TFAIL, CP"shmat unexpectedly suceeded");
> + tst_res(TFAIL, CP"shmat unexpectedly suceeded");
> shmdt(p);
> return 1;
> }
>
> - tst_resm(TINFO, CP"attempting to switch ns back to parent ns");
> - if (syscall(__NR_setns, ns_ipc_fd, ns_flag) == -1) {
> - tst_resm(TFAIL|TERRNO, CP"setns");
> + tst_res(TINFO, CP"attempting to switch ns back to parent ns");
> + if (tst_syscall(__NR_setns, ns_ipc_fd, ns_flag) == -1) {
> + tst_res(TFAIL|TERRNO, CP"setns");
> return 2;
> }
>
> p = shmat(shmid, NULL, 0);
> if (p == (void *) -1) {
> - tst_resm(TFAIL|TERRNO, CP"shmat failed after setns");
> + tst_res(TFAIL|TERRNO, CP"shmat failed after setns");
> return 3;
> } else {
> - tst_resm(TPASS, CP"shmat suceeded");
> + tst_res(TPASS, CP"shmat suceeded");
> shmdt(p);
> }
>
> @@ -141,70 +137,66 @@ static void test_flag(int clone_flag, int ns_flag, int (*fn) (void *arg))
>
> child_stack = malloc(CHILD_STACK_SIZE);
> if (child_stack == NULL)
> - tst_brkm(TBROK, cleanup, "Cannot allocate stack for child");
> + tst_brk(TBROK, "Cannot allocate stack for child");
>
> - tst_resm(TINFO, "creating child with clone_flag=0x%x, ns_flag=0x%x",
> + tst_res(TINFO, "creating child with clone_flag=0x%x, ns_flag=0x%x",
> clone_flag, ns_flag);
> ret = ltp_clone(SIGCHLD|clone_flag, fn, &ns_flag,
> CHILD_STACK_SIZE, child_stack);
> if (ret == -1)
> - tst_brkm(TBROK|TERRNO, cleanup, "ltp_clone");
> + tst_brk(TBROK|TERRNO, "ltp_clone");
>
> - SAFE_WAITPID(cleanup, ret, &status, 0);
> + SAFE_WAITPID(ret, &status, 0);
> if (!WIFEXITED(status) || WEXITSTATUS(status) != 0)
> - tst_resm(TFAIL, "child returns %d", status);
> + tst_res(TFAIL, "child returns %d", status);
> else
> - tst_resm(TPASS, "child finished succesfully");
> + tst_res(TPASS, "child finished succesfully");
> free(child_stack);
> }
Do we still need to propagate the test result via exit value?
That shouldn't be needed in new API test, right?
> -int main(int argc, char *argv[])
> +void test_all(void)
> {
> - int lc;
> -
> - tst_parse_opts(argc, argv, NULL, NULL);
> -
> - setup();
> - for (lc = 0; TEST_LOOPING(lc); lc++) {
> - if (ns_uts_fd != -1) {
> - tst_resm(TINFO, "test_newuts");
> - test_flag(CLONE_NEWUTS, CLONE_NEWUTS, do_child_newuts);
> - test_flag(CLONE_NEWUTS, 0, do_child_newuts);
> - }
> - if (ns_ipc_fd != -1) {
> - tst_resm(TINFO, "test_newipc");
> - test_flag(CLONE_NEWIPC, CLONE_NEWIPC, do_child_newipc);
> - test_flag(CLONE_NEWIPC, 0, do_child_newipc);
> - }
> + int report_tconf = 1;
> +#if defined(CLONE_NEWUTS)
> + if (ns_uts_fd != -1) {
> + tst_res(TINFO, "test_newuts");
> + test_flag(CLONE_NEWUTS, CLONE_NEWUTS, do_child_newuts);
> + test_flag(CLONE_NEWUTS, 0, do_child_newuts);
> }
> - cleanup();
> - tst_exit();
> + report_tconf = 0;
> +#endif
> +#if defined(CLONE_NEWIPC)
> + if (ns_ipc_fd != -1) {
> + tst_res(TINFO, "test_newipc");
> + test_flag(CLONE_NEWIPC, CLONE_NEWIPC, do_child_newipc);
> + test_flag(CLONE_NEWIPC, 0, do_child_newipc);
> + }
> + report_tconf = 0;
> +#endif
> + if (report_tconf)
> + tst_brk(TCONF, "CLONE_NEWIPC and CLONE_NEWUTS is not defined");
Can we get rid of these ifdefs as well? If we include the
lapi/namespace_constants.h in the setns.h we can just remove these,
right?
> }
>
> static void setup(void)
> {
> char tmp[PATH_MAX];
>
> - tst_require_root();
> -
> /* runtime check if syscall is supported */
> - ltp_syscall(__NR_setns, -1, 0);
> + tst_syscall(__NR_setns, -1, 0);
>
> /* check if kernel has CONFIG_*_NS set and exports /proc entries */
> ns_ipc_fd = get_ns_fd(getpid(), "ipc");
> ns_uts_fd = get_ns_fd(getpid(), "uts");
> if (ns_ipc_fd == -1 && ns_uts_fd == -1)
> - tst_brkm(TCONF, NULL, "your kernel has CONFIG_IPC_NS, "
> + tst_brk(TCONF, "your kernel has CONFIG_IPC_NS, "
> "CONFIG_UTS_NS or CONFIG_PROC disabled");
>
> if (getcwd(tmp, PATH_MAX) == NULL)
> - tst_brkm(TBROK|TERRNO, NULL, "getcwd");
> + tst_brk(TBROK|TERRNO, "getcwd");
> ipc_key = ftok(tmp, 65);
> shmid = shmget(ipc_key, getpagesize(), IPC_CREAT | 0666);
> if (shmid == -1)
> - tst_brkm(TBROK|TERRNO, NULL, "shmget");
> -
> - TEST_PAUSE;
> + tst_brk(TBROK|TERRNO, "shmget");
> }
>
> static void cleanup(void)
> @@ -216,10 +208,10 @@ static void cleanup(void)
>
> shmctl(shmid, IPC_RMID, NULL);
> }
> -#else
> -int main(int argc, char *argv[])
> -{
> - tst_brkm(TCONF, NULL, "__NR_setns, CLONE_NEWIPC or CLONE_NEWUTS "
> - " is not defined on your system.");
> -}
> -#endif
> +
> +static struct tst_test test = {
> + .test_all = test_all,
> + .setup = setup,
> + .cleanup = cleanup,
> + .needs_root = 1,
> +};
> --
> 2.18.1
>
>
> --
> Mailing list info: https://lists.linux.it/listinfo/ltp
--
Cyril Hrubis
chrubis@suse.cz
^ permalink raw reply [flat|nested] 11+ messages in thread
* [LTP] [PATCH 3/3] syscalls/setns01: accept also EBADF for regular fd
2020-06-05 9:02 ` [LTP] [PATCH 3/3] syscalls/setns01: accept also EBADF for regular fd Jan Stancek
@ 2020-06-17 15:12 ` Cyril Hrubis
2020-06-18 6:00 ` Jan Stancek
0 siblings, 1 reply; 11+ messages in thread
From: Cyril Hrubis @ 2020-06-17 15:12 UTC (permalink / raw)
To: ltp
Hi!
And I guess that this is no longer needed, right?
--
Cyril Hrubis
chrubis@suse.cz
^ permalink raw reply [flat|nested] 11+ messages in thread
* [LTP] [PATCH 1/3] lapi/syscalls: add setns to hppa
2020-06-05 9:02 [LTP] [PATCH 1/3] lapi/syscalls: add setns to hppa Jan Stancek
2020-06-05 9:02 ` [LTP] [PATCH 2/3] syscalls/setns: convert to new API Jan Stancek
2020-06-05 9:02 ` [LTP] [PATCH 3/3] syscalls/setns01: accept also EBADF for regular fd Jan Stancek
@ 2020-06-17 15:13 ` Cyril Hrubis
2 siblings, 0 replies; 11+ messages in thread
From: Cyril Hrubis @ 2020-06-17 15:13 UTC (permalink / raw)
To: ltp
Hi!
This one is simple enough to get commited without a review, acked
anways.
--
Cyril Hrubis
chrubis@suse.cz
^ permalink raw reply [flat|nested] 11+ messages in thread
* [LTP] [PATCH 3/3] syscalls/setns01: accept also EBADF for regular fd
2020-06-17 15:12 ` Cyril Hrubis
@ 2020-06-18 6:00 ` Jan Stancek
0 siblings, 0 replies; 11+ messages in thread
From: Jan Stancek @ 2020-06-18 6:00 UTC (permalink / raw)
To: ltp
----- Original Message -----
> Hi!
> And I guess that this is no longer needed, right?
If Christian's patch goes in then yes, we can drop this one.
I'll send v2 for 2/3.
^ permalink raw reply [flat|nested] 11+ messages in thread
* [LTP] [PATCH v2] syscalls/setns: convert to new API
2020-06-17 15:11 ` Cyril Hrubis
@ 2020-06-18 7:33 ` Jan Stancek
2020-06-18 8:51 ` Petr Vorel
2020-06-23 15:19 ` Cyril Hrubis
0 siblings, 2 replies; 11+ messages in thread
From: Jan Stancek @ 2020-06-18 7:33 UTC (permalink / raw)
To: ltp
Both tests are converted in single commit since they share setns.h.
Some small warnings are also fixed.
Signed-off-by: Jan Stancek <jstancek@redhat.com>
---
testcases/kernel/syscalls/setns/setns.h | 42 +----
testcases/kernel/syscalls/setns/setns01.c | 216 ++++++++--------------
testcases/kernel/syscalls/setns/setns02.c | 154 ++++++---------
3 files changed, 143 insertions(+), 269 deletions(-)
Changes in v2:
- relace GPL comment with SPDX
- include "lapi/namespaces_constants.h" and drop ifdefs
- move setup/cleanup functions and remove forward declarations
- open regular fd once in setup(), drop cleanup1()
- modify messages to print expected errno also as string
- don't check child exit code, not needed in newlib
- use SAFE_GETPWNAM, SAFE_MALLOC, SAFE_GETCWD, SAFE_SHMGET
diff --git a/testcases/kernel/syscalls/setns/setns.h b/testcases/kernel/syscalls/setns/setns.h
index a05e6736c64a..c2097f2e5105 100644
--- a/testcases/kernel/syscalls/setns/setns.h
+++ b/testcases/kernel/syscalls/setns/setns.h
@@ -1,27 +1,11 @@
+// SPDX-License-Identifier: GPL-2.0-or-later
/*
- * Copyright (C) 2013 Linux Test Project, Inc.
- *
- * This program is free software; you can redistribute it and/or
- * modify it under the terms of version 2 of the GNU General Public
- * License as published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it would be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
- *
- * Further, this software is distributed without any warranty that it
- * is free of the rightful claim of any third person regarding
- * infringement or the like. Any license provided herein, whether
- * implied or otherwise, applies only to this software file. Patent
- * licenses, if any, provided herein do not apply to combinations of
- * this program with other software, or any other product whatsoever.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
- * 02110-1301, USA.
+ * Copyright (c) Linux Test Project, 2014-2020
*/
+#include <stdio.h>
+#include "lapi/namespaces_constants.h"
+
#define NS_MAX 5
static int ns_types[NS_MAX];
static int ns_fds[NS_MAX];
@@ -37,10 +21,10 @@ static int get_ns_fd(int pid, const char *ns)
if (stat(tmp, &st) == 0) {
fd = open(tmp, O_RDONLY);
if (fd == -1)
- tst_brkm(TBROK|TERRNO, NULL, "failed to open %s", tmp);
+ tst_brk(TBROK|TERRNO, "failed to open %s", tmp);
} else {
if (errno != ENOENT)
- tst_brkm(TBROK|TERRNO, NULL, "failed to stat %s", tmp);
+ tst_brk(TBROK|TERRNO, "failed to stat %s", tmp);
}
return fd;
}
@@ -53,7 +37,7 @@ static void init_ns_type(int clone_type, const char *proc_name)
if (fd != -1) {
ns_types[ns_total] = clone_type;
ns_fds[ns_total] = fd;
- tst_resm(TINFO, "ns_name=%s, ns_fds[%d]=%d, ns_types[%d]=0x%x",
+ tst_res(TINFO, "ns_name=%s, ns_fds[%d]=%d, ns_types[%d]=0x%x",
proc_name, ns_total, fd, ns_total, clone_type);
ns_total++;
}
@@ -61,21 +45,11 @@ static void init_ns_type(int clone_type, const char *proc_name)
static void init_available_ns(void)
{
-#if defined(CLONE_NEWIPC)
init_ns_type(CLONE_NEWIPC, "ipc");
-#endif
-#if defined(CLONE_NEWNS)
init_ns_type(CLONE_NEWNS, "mnt");
-#endif
-#if defined(CLONE_NEWNET)
init_ns_type(CLONE_NEWNET, "net");
-#endif
-#if defined(CLONE_NEWPID)
init_ns_type(CLONE_NEWPID, "pid");
-#endif
-#if defined(CLONE_NEWUTS)
init_ns_type(CLONE_NEWUTS, "uts");
-#endif
}
static void close_ns_fds(void)
diff --git a/testcases/kernel/syscalls/setns/setns01.c b/testcases/kernel/syscalls/setns/setns01.c
index 864899205aa8..b0704406013a 100644
--- a/testcases/kernel/syscalls/setns/setns01.c
+++ b/testcases/kernel/syscalls/setns/setns01.c
@@ -1,47 +1,25 @@
+// SPDX-License-Identifier: GPL-2.0-or-later
/*
- * Copyright (C) 2013 Linux Test Project, Inc.
+ * Copyright (c) Linux Test Project, 2014-2020
*
- * This program is free software; you can redistribute it and/or
- * modify it under the terms of version 2 of the GNU General Public
- * License as published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it would be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
- *
- * Further, this software is distributed without any warranty that it
- * is free of the rightful claim of any third person regarding
- * infringement or the like. Any license provided herein, whether
- * implied or otherwise, applies only to this software file. Patent
- * licenses, if any, provided herein do not apply to combinations of
- * this program with other software, or any other product whatsoever.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
- * 02110-1301, USA.
- */
-/*
* errno tests for setns(2) - reassociate thread with a namespace
*/
#define _GNU_SOURCE
#include <sys/stat.h>
-#include <sys/syscall.h>
#include <sys/types.h>
#include <errno.h>
#include <sched.h>
#include <pwd.h>
#include <string.h>
#include "config.h"
-#include "test.h"
+#include "tst_test.h"
#include "lapi/syscalls.h"
-#include "safe_macros.h"
-
-char *TCID = "setns01";
-
-#if defined(__NR_setns)
#include "setns.h"
+static const char nobody_uid[] = "nobody";
+static struct passwd *ltpuser;
+static int regular_fd;
+
struct testcase_t {
const char *msg;
int fd;
@@ -53,57 +31,6 @@ struct testcase_t {
void (*cleanup) (struct testcase_t *);
};
-static void setup(void);
-static void cleanup(void);
-static void setup0(struct testcase_t *, int);
-static void setup1(struct testcase_t *, int);
-static void setup2(struct testcase_t *, int);
-static void setup3(struct testcase_t *, int);
-static void setup4(struct testcase_t *, int);
-static void cleanup1(struct testcase_t *);
-static void cleanup4(struct testcase_t *);
-
-struct testcase_t tdat[] = {
- {
- .msg = "invalid fd",
- .fd = -1,
- .exp_ret = -1,
- .exp_errno = EBADF,
- .setup = setup0,
- },
- {
- .msg = "regular file fd",
- .exp_ret = -1,
- .exp_errno = EINVAL,
- .setup = setup1,
- .cleanup = cleanup1
- },
- {
- .msg = "invalid ns_type",
- .ns_type = -1,
- .exp_ret = -1,
- .exp_errno = EINVAL,
- .setup = setup2,
- },
- {
- .msg = "mismatch ns_type/fd",
- .exp_ret = -1,
- .exp_errno = EINVAL,
- .setup = setup3,
- },
- {
- .msg = "without CAP_SYS_ADMIN",
- .exp_ret = -1,
- .exp_errno = EPERM,
- .setup = setup4,
- .cleanup = cleanup4,
- }
-};
-
-static int TST_TOTAL = sizeof(tdat) / sizeof(tdat[0]);
-static const char nobody_uid[] = "nobody";
-static struct passwd *ltpuser;
-
static void setup0(struct testcase_t *t, int i)
{
t->ns_type = ns_types[i];
@@ -112,15 +39,7 @@ static void setup0(struct testcase_t *t, int i)
static void setup1(struct testcase_t *t, int i)
{
t->ns_type = ns_types[i];
- t->fd = open("dummy", O_RDWR|O_CREAT, 0600);
- if (t->fd == -1)
- tst_brkm(TFAIL|TERRNO, cleanup, "setup1:open failed");
- unlink("dummy");
-}
-
-static void cleanup1(struct testcase_t *t)
-{
- close(t->fd);
+ t->fd = regular_fd;
}
static void setup2(struct testcase_t *t, int i)
@@ -141,42 +60,82 @@ static void setup3(struct testcase_t *t, int i)
static void setup4(struct testcase_t *t, int i)
{
- SAFE_SETEUID(NULL, ltpuser->pw_uid);
+ SAFE_SETEUID(ltpuser->pw_uid);
t->fd = ns_fds[i];
t->ns_type = ns_types[i];
}
-static void cleanup4(struct testcase_t *t)
+static void cleanup4(LTP_ATTRIBUTE_UNUSED struct testcase_t *t)
{
- SAFE_SETEUID(NULL, 0);
+ SAFE_SETEUID(0);
}
-static void test_setns(struct testcase_t *t)
+static struct testcase_t tcases[] = {
+ {
+ .msg = "invalid fd",
+ .fd = -1,
+ .exp_ret = -1,
+ .exp_errno = EBADF,
+ .setup = setup0,
+ },
+ {
+ .msg = "regular file fd",
+ .exp_ret = -1,
+ .exp_errno = EINVAL,
+ .setup = setup1,
+ },
+ {
+ .msg = "invalid ns_type",
+ .ns_type = -1,
+ .exp_ret = -1,
+ .exp_errno = EINVAL,
+ .setup = setup2,
+ },
+ {
+ .msg = "mismatch ns_type/fd",
+ .exp_ret = -1,
+ .exp_errno = EINVAL,
+ .setup = setup3,
+ },
+ {
+ .msg = "without CAP_SYS_ADMIN",
+ .exp_ret = -1,
+ .exp_errno = EPERM,
+ .setup = setup4,
+ .cleanup = cleanup4,
+ }
+};
+
+static void test_setns(unsigned int testno)
{
int ret, i;
+ struct testcase_t *t = &tcases[testno];
for (i = 0; i < ns_total; i++) {
if (t->setup)
t->setup(t, i);
if (t->skip) {
- tst_resm(TINFO, "skip %s", tdat->msg);
+ tst_res(TINFO, "skip %s", t->msg);
continue;
}
- tst_resm(TINFO, "setns(%d, 0x%x)", t->fd, t->ns_type);
- ret = syscall(__NR_setns, t->fd, t->ns_type);
+ tst_res(TINFO, "setns(%d, 0x%x)", t->fd, t->ns_type);
+ ret = tst_syscall(__NR_setns, t->fd, t->ns_type);
if (ret == t->exp_ret) {
- if (ret == -1 && errno == t->exp_errno)
- tst_resm(TPASS, "%s exp_errno=%d", t->msg,
- t->exp_errno);
- else
- tst_resm(TFAIL|TERRNO, "%s exp_errno=%d",
- t->msg, t->exp_errno);
+ if (ret == -1 && errno == t->exp_errno) {
+ tst_res(TPASS, "%s exp_errno=%d (%s)",
+ t->msg, t->exp_errno,
+ tst_strerrno(t->exp_errno));
+ } else {
+ tst_res(TFAIL|TERRNO, "%s exp_errno=%d (%s)",
+ t->msg, t->exp_errno,
+ tst_strerrno(t->exp_errno));
+ }
} else {
- tst_resm(TFAIL, "%s ret=%d expected=%d", t->msg,
- ret, t->exp_ret);
+ tst_res(TFAIL, "%s ret=%d expected=%d",
+ t->msg, ret, t->exp_ret);
}
if (t->cleanup)
@@ -184,50 +143,33 @@ static void test_setns(struct testcase_t *t)
}
}
-int main(int argc, char *argv[])
-{
- int lc, testno;
-
- tst_parse_opts(argc, argv, NULL, NULL);
-
- setup();
- for (lc = 0; TEST_LOOPING(lc); lc++) {
- for (testno = 0; testno < TST_TOTAL; testno++)
- test_setns(&tdat[testno]);
- }
- cleanup();
- tst_exit();
-}
-
static void setup(void)
{
- tst_require_root();
-
/* runtime check if syscall is supported */
- ltp_syscall(__NR_setns, -1, 0);
+ tst_syscall(__NR_setns, -1, 0);
init_available_ns();
if (ns_total == 0)
- tst_brkm(TCONF, NULL, "no ns types/proc entries");
+ tst_brk(TCONF, "no ns types/proc entries");
- ltpuser = getpwnam(nobody_uid);
- if (ltpuser == NULL)
- tst_brkm(TBROK | TERRNO, NULL, "getpwnam failed");
-
-
- tst_tmpdir();
- TEST_PAUSE;
+ ltpuser = SAFE_GETPWNAM(nobody_uid);
+ regular_fd = SAFE_OPEN("dummy", O_RDWR|O_CREAT, 0600);
+ SAFE_UNLINK("dummy");
}
static void cleanup(void)
{
close_ns_fds();
- tst_rmdir();
+ if (regular_fd)
+ SAFE_CLOSE(regular_fd);
}
-#else
-int main(int argc, char *argv[])
-{
- tst_brkm(TCONF, NULL, "__NR_setns is not defined on your system.");
-}
-#endif
+static struct tst_test test = {
+ .tcnt = ARRAY_SIZE(tcases),
+ .test = test_setns,
+ .setup = setup,
+ .cleanup = cleanup,
+ .needs_root = 1,
+ .needs_tmpdir = 1,
+};
+
diff --git a/testcases/kernel/syscalls/setns/setns02.c b/testcases/kernel/syscalls/setns/setns02.c
index 0f49028450b7..0e20c52e4f18 100644
--- a/testcases/kernel/syscalls/setns/setns02.c
+++ b/testcases/kernel/syscalls/setns/setns02.c
@@ -1,27 +1,7 @@
+// SPDX-License-Identifier: GPL-2.0-or-later
/*
- * Copyright (C) 2013 Linux Test Project, Inc.
+ * Copyright (c) Linux Test Project, 2014-2020
*
- * This program is free software; you can redistribute it and/or
- * modify it under the terms of version 2 of the GNU General Public
- * License as published by the Free Software Foundation.
- *
- * This program is distributed in the hope that it would be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
- *
- * Further, this software is distributed without any warranty that it
- * is free of the rightful claim of any third person regarding
- * infringement or the like. Any license provided herein, whether
- * implied or otherwise, applies only to this software file. Patent
- * licenses, if any, provided herein do not apply to combinations of
- * this program with other software, or any other product whatsoever.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
- * 02110-1301, USA.
- */
-/*
* functional test for setns(2) - reassociate thread with a namespace
* 1. create child with CLONE_NEWUTS, set different hostname in child,
* set namespace back to parent ns and check that hostname has changed
@@ -33,24 +13,21 @@
#include <sys/ipc.h>
#include <sys/shm.h>
#include <sys/stat.h>
-#include <sys/syscall.h>
#include <sys/types.h>
#include <sys/utsname.h>
#include <sys/wait.h>
#include <errno.h>
#include <sched.h>
+#include <stdlib.h>
#include <string.h>
#include "config.h"
-#include "test.h"
+#include "tst_test.h"
+#include "tst_safe_sysv_ipc.h"
#include "lapi/syscalls.h"
-#include "safe_macros.h"
+#include "setns.h"
#define CHILD_STACK_SIZE (1024*1024)
#define CP "(child) "
-char *TCID = "setns02";
-
-#if defined(__NR_setns) && defined(CLONE_NEWIPC) && defined(CLONE_NEWUTS)
-#include "setns.h"
static char *dummy_hostname = "setns_dummy_uts";
static int ns_ipc_fd;
@@ -67,37 +44,37 @@ static int do_child_newuts(void *arg)
int ns_flag = *(int *)arg;
if (uname(&uts_parent) == -1)
- tst_resm(TFAIL|TERRNO, CP"uname");
- tst_resm(TINFO, CP"hostname (inherited from parent): %s",
+ tst_res(TFAIL|TERRNO, CP"uname");
+ tst_res(TINFO, CP"hostname (inherited from parent): %s",
uts_parent.nodename);
if (sethostname(dummy_hostname, strlen(dummy_hostname)) == -1)
- tst_resm(TFAIL|TERRNO, CP"sethostname");
+ tst_res(TFAIL|TERRNO, CP"sethostname");
if (uname(&uts) == -1)
- tst_resm(TFAIL|TERRNO, CP"uname");
+ tst_res(TFAIL|TERRNO, CP"uname");
- tst_resm(TINFO, CP"hostname changed to: %s", uts.nodename);
+ tst_res(TINFO, CP"hostname changed to: %s", uts.nodename);
if (strcmp(uts_parent.nodename, uts.nodename) == 0) {
- tst_resm(TFAIL, CP"expected hostname to be different");
+ tst_res(TFAIL, CP"expected hostname to be different");
return 1;
} else {
- tst_resm(TPASS, CP"hostname is different in parent/child");
+ tst_res(TPASS, CP"hostname is different in parent/child");
}
- tst_resm(TINFO, CP"attempting to switch ns back to parent ns");
- if (syscall(__NR_setns, ns_uts_fd, ns_flag) == -1) {
- tst_resm(TFAIL|TERRNO, CP"setns");
+ tst_res(TINFO, CP"attempting to switch ns back to parent ns");
+ if (tst_syscall(__NR_setns, ns_uts_fd, ns_flag) == -1) {
+ tst_res(TFAIL|TERRNO, CP"setns");
return 2;
}
if (uname(&uts) == -1)
- tst_resm(TFAIL|TERRNO, CP"uname");
+ tst_res(TFAIL|TERRNO, CP"uname");
- tst_resm(TINFO, CP"hostname: %s", uts.nodename);
+ tst_res(TINFO, CP"hostname: %s", uts.nodename);
if (strcmp(uts_parent.nodename, uts.nodename) != 0) {
- tst_resm(TFAIL, CP"expected hostname to match parent");
+ tst_res(TFAIL, CP"expected hostname to match parent");
return 3;
} else {
- tst_resm(TPASS, CP"hostname now as expected");
+ tst_res(TPASS, CP"hostname now as expected");
}
return 0;
}
@@ -109,25 +86,25 @@ static int do_child_newipc(void *arg)
p = shmat(shmid, NULL, 0);
if (p == (void *) -1) {
- tst_resm(TPASS|TERRNO, CP"shmat failed as expected");
+ tst_res(TPASS|TERRNO, CP"shmat failed as expected");
} else {
- tst_resm(TFAIL, CP"shmat unexpectedly suceeded");
+ tst_res(TFAIL, CP"shmat unexpectedly suceeded");
shmdt(p);
return 1;
}
- tst_resm(TINFO, CP"attempting to switch ns back to parent ns");
- if (syscall(__NR_setns, ns_ipc_fd, ns_flag) == -1) {
- tst_resm(TFAIL|TERRNO, CP"setns");
+ tst_res(TINFO, CP"attempting to switch ns back to parent ns");
+ if (tst_syscall(__NR_setns, ns_ipc_fd, ns_flag) == -1) {
+ tst_res(TFAIL|TERRNO, CP"setns");
return 2;
}
p = shmat(shmid, NULL, 0);
if (p == (void *) -1) {
- tst_resm(TFAIL|TERRNO, CP"shmat failed after setns");
+ tst_res(TFAIL|TERRNO, CP"shmat failed after setns");
return 3;
} else {
- tst_resm(TPASS, CP"shmat suceeded");
+ tst_res(TPASS, CP"shmat suceeded");
shmdt(p);
}
@@ -139,72 +116,53 @@ static void test_flag(int clone_flag, int ns_flag, int (*fn) (void *arg))
void *child_stack;
int ret, status;
- child_stack = malloc(CHILD_STACK_SIZE);
- if (child_stack == NULL)
- tst_brkm(TBROK, cleanup, "Cannot allocate stack for child");
+ child_stack = SAFE_MALLOC(CHILD_STACK_SIZE);
- tst_resm(TINFO, "creating child with clone_flag=0x%x, ns_flag=0x%x",
+ tst_res(TINFO, "creating child with clone_flag=0x%x, ns_flag=0x%x",
clone_flag, ns_flag);
ret = ltp_clone(SIGCHLD|clone_flag, fn, &ns_flag,
CHILD_STACK_SIZE, child_stack);
if (ret == -1)
- tst_brkm(TBROK|TERRNO, cleanup, "ltp_clone");
+ tst_brk(TBROK|TERRNO, "ltp_clone");
- SAFE_WAITPID(cleanup, ret, &status, 0);
- if (!WIFEXITED(status) || WEXITSTATUS(status) != 0)
- tst_resm(TFAIL, "child returns %d", status);
- else
- tst_resm(TPASS, "child finished succesfully");
+ SAFE_WAITPID(ret, &status, 0);
free(child_stack);
}
-int main(int argc, char *argv[])
+void test_all(void)
{
- int lc;
-
- tst_parse_opts(argc, argv, NULL, NULL);
-
- setup();
- for (lc = 0; TEST_LOOPING(lc); lc++) {
- if (ns_uts_fd != -1) {
- tst_resm(TINFO, "test_newuts");
- test_flag(CLONE_NEWUTS, CLONE_NEWUTS, do_child_newuts);
- test_flag(CLONE_NEWUTS, 0, do_child_newuts);
- }
- if (ns_ipc_fd != -1) {
- tst_resm(TINFO, "test_newipc");
- test_flag(CLONE_NEWIPC, CLONE_NEWIPC, do_child_newipc);
- test_flag(CLONE_NEWIPC, 0, do_child_newipc);
- }
- }
- cleanup();
- tst_exit();
+ if (ns_uts_fd != -1) {
+ tst_res(TINFO, "test_newuts");
+ test_flag(CLONE_NEWUTS, CLONE_NEWUTS, do_child_newuts);
+ test_flag(CLONE_NEWUTS, 0, do_child_newuts);
+ } else
+ tst_res(TCONF, "CLONE_NEWUTS is not supported");
+
+ if (ns_ipc_fd != -1) {
+ tst_res(TINFO, "test_newipc");
+ test_flag(CLONE_NEWIPC, CLONE_NEWIPC, do_child_newipc);
+ test_flag(CLONE_NEWIPC, 0, do_child_newipc);
+ } else
+ tst_res(TCONF, "CLONE_NEWIPC is not supported");
}
static void setup(void)
{
char tmp[PATH_MAX];
- tst_require_root();
-
/* runtime check if syscall is supported */
- ltp_syscall(__NR_setns, -1, 0);
+ tst_syscall(__NR_setns, -1, 0);
/* check if kernel has CONFIG_*_NS set and exports /proc entries */
ns_ipc_fd = get_ns_fd(getpid(), "ipc");
ns_uts_fd = get_ns_fd(getpid(), "uts");
if (ns_ipc_fd == -1 && ns_uts_fd == -1)
- tst_brkm(TCONF, NULL, "your kernel has CONFIG_IPC_NS, "
+ tst_brk(TCONF, "your kernel has CONFIG_IPC_NS, "
"CONFIG_UTS_NS or CONFIG_PROC disabled");
- if (getcwd(tmp, PATH_MAX) == NULL)
- tst_brkm(TBROK|TERRNO, NULL, "getcwd");
+ SAFE_GETCWD(tmp, PATH_MAX);
ipc_key = ftok(tmp, 65);
- shmid = shmget(ipc_key, getpagesize(), IPC_CREAT | 0666);
- if (shmid == -1)
- tst_brkm(TBROK|TERRNO, NULL, "shmget");
-
- TEST_PAUSE;
+ shmid = SAFE_SHMGET(ipc_key, getpagesize(), IPC_CREAT | 0666);
}
static void cleanup(void)
@@ -216,10 +174,10 @@ static void cleanup(void)
shmctl(shmid, IPC_RMID, NULL);
}
-#else
-int main(int argc, char *argv[])
-{
- tst_brkm(TCONF, NULL, "__NR_setns, CLONE_NEWIPC or CLONE_NEWUTS "
- " is not defined on your system.");
-}
-#endif
+
+static struct tst_test test = {
+ .test_all = test_all,
+ .setup = setup,
+ .cleanup = cleanup,
+ .needs_root = 1,
+};
--
2.18.1
^ permalink raw reply related [flat|nested] 11+ messages in thread
* [LTP] [PATCH v2] syscalls/setns: convert to new API
2020-06-18 7:33 ` [LTP] [PATCH v2] " Jan Stancek
@ 2020-06-18 8:51 ` Petr Vorel
2020-06-23 15:19 ` Cyril Hrubis
1 sibling, 0 replies; 11+ messages in thread
From: Petr Vorel @ 2020-06-18 8:51 UTC (permalink / raw)
To: ltp
Hi Jan,
> Both tests are converted in single commit since they share setns.h.
> Some small warnings are also fixed.
Reviewed-by: Petr Vorel <pvorel@suse.cz>
Thanks!
Kind regards,
Petr
^ permalink raw reply [flat|nested] 11+ messages in thread
* [LTP] [PATCH v2] syscalls/setns: convert to new API
2020-06-18 7:33 ` [LTP] [PATCH v2] " Jan Stancek
2020-06-18 8:51 ` Petr Vorel
@ 2020-06-23 15:19 ` Cyril Hrubis
2020-06-23 15:27 ` Jan Stancek
1 sibling, 1 reply; 11+ messages in thread
From: Cyril Hrubis @ 2020-06-23 15:19 UTC (permalink / raw)
To: ltp
Hi!
Reviewed-by: Cyril Hrubis <chrubis@suse.cz>
--
Cyril Hrubis
chrubis@suse.cz
^ permalink raw reply [flat|nested] 11+ messages in thread
* [LTP] [PATCH v2] syscalls/setns: convert to new API
2020-06-23 15:19 ` Cyril Hrubis
@ 2020-06-23 15:27 ` Jan Stancek
0 siblings, 0 replies; 11+ messages in thread
From: Jan Stancek @ 2020-06-23 15:27 UTC (permalink / raw)
To: ltp
----- Original Message -----
> Hi!
> Reviewed-by: Cyril Hrubis <chrubis@suse.cz>
Thanks Cyril, Petr. Pushed.
^ permalink raw reply [flat|nested] 11+ messages in thread
end of thread, other threads:[~2020-06-23 15:27 UTC | newest]
Thread overview: 11+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2020-06-05 9:02 [LTP] [PATCH 1/3] lapi/syscalls: add setns to hppa Jan Stancek
2020-06-05 9:02 ` [LTP] [PATCH 2/3] syscalls/setns: convert to new API Jan Stancek
2020-06-17 15:11 ` Cyril Hrubis
2020-06-18 7:33 ` [LTP] [PATCH v2] " Jan Stancek
2020-06-18 8:51 ` Petr Vorel
2020-06-23 15:19 ` Cyril Hrubis
2020-06-23 15:27 ` Jan Stancek
2020-06-05 9:02 ` [LTP] [PATCH 3/3] syscalls/setns01: accept also EBADF for regular fd Jan Stancek
2020-06-17 15:12 ` Cyril Hrubis
2020-06-18 6:00 ` Jan Stancek
2020-06-17 15:13 ` [LTP] [PATCH 1/3] lapi/syscalls: add setns to hppa Cyril Hrubis
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox