mirror of
https://github.com/torvalds/linux.git
synced 2026-04-19 15:24:02 -04:00
Add tests that validate vsock sockets are resilient to deleting namespaces. The vsock sockets should still function normally. The function check_ns_delete_doesnt_break_connection() is added to re-use the step-by-step logic of 1) setup connections, 2) delete ns, 3) check that the connections are still ok. Reviewed-by: Stefano Garzarella <sgarzare@redhat.com> Signed-off-by: Bobby Eshleman <bobbyeshleman@meta.com> Link: https://patch.msgid.link/20260121-vsock-vmtest-v16-12-2859a7512097@meta.com Acked-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Paolo Abeni <pabeni@redhat.com>
1563 lines
34 KiB
Bash
Executable File
1563 lines
34 KiB
Bash
Executable File
#!/bin/bash
|
|
# SPDX-License-Identifier: GPL-2.0
|
|
#
|
|
# Copyright (c) 2025 Meta Platforms, Inc. and affiliates
|
|
#
|
|
# Dependencies:
|
|
# * virtme-ng
|
|
# * busybox-static (used by virtme-ng)
|
|
# * qemu (used by virtme-ng)
|
|
# * socat
|
|
#
|
|
# shellcheck disable=SC2317,SC2119
|
|
|
|
readonly SCRIPT_DIR="$(cd -P -- "$(dirname -- "${BASH_SOURCE[0]}")" && pwd -P)"
|
|
readonly KERNEL_CHECKOUT=$(realpath "${SCRIPT_DIR}"/../../../../)
|
|
|
|
source "${SCRIPT_DIR}"/../kselftest/ktap_helpers.sh
|
|
|
|
readonly VSOCK_TEST="${SCRIPT_DIR}"/vsock_test
|
|
readonly TEST_GUEST_PORT=51000
|
|
readonly TEST_HOST_PORT=50000
|
|
readonly TEST_HOST_PORT_LISTENER=50001
|
|
readonly SSH_GUEST_PORT=22
|
|
readonly SSH_HOST_PORT=2222
|
|
readonly VSOCK_CID=1234
|
|
readonly WAIT_PERIOD=3
|
|
readonly WAIT_PERIOD_MAX=60
|
|
readonly WAIT_QEMU=5
|
|
readonly PIDFILE_TEMPLATE=/tmp/vsock_vmtest_XXXX.pid
|
|
declare -A PIDFILES
|
|
|
|
# virtme-ng offers a netdev for ssh when using "--ssh", but we also need a
|
|
# control port forwarded for vsock_test. Because virtme-ng doesn't support
|
|
# adding an additional port to forward to the device created from "--ssh" and
|
|
# virtme-init mistakenly sets identical IPs to the ssh device and additional
|
|
# devices, we instead opt out of using --ssh, add the device manually, and also
|
|
# add the kernel cmdline options that virtme-init uses to setup the interface.
|
|
readonly QEMU_TEST_PORT_FWD="hostfwd=tcp::${TEST_HOST_PORT}-:${TEST_GUEST_PORT}"
|
|
readonly QEMU_SSH_PORT_FWD="hostfwd=tcp::${SSH_HOST_PORT}-:${SSH_GUEST_PORT}"
|
|
readonly KERNEL_CMDLINE="\
|
|
virtme.dhcp net.ifnames=0 biosdevname=0 \
|
|
virtme.ssh virtme_ssh_channel=tcp virtme_ssh_user=$USER \
|
|
"
|
|
readonly LOG=$(mktemp /tmp/vsock_vmtest_XXXX.log)
|
|
|
|
# Namespace tests must use the ns_ prefix. This is checked in check_netns() and
|
|
# is used to determine if a test needs namespace setup before test execution.
|
|
readonly TEST_NAMES=(
|
|
vm_server_host_client
|
|
vm_client_host_server
|
|
vm_loopback
|
|
ns_host_vsock_ns_mode_ok
|
|
ns_host_vsock_child_ns_mode_ok
|
|
ns_global_same_cid_fails
|
|
ns_local_same_cid_ok
|
|
ns_global_local_same_cid_ok
|
|
ns_local_global_same_cid_ok
|
|
ns_diff_global_host_connect_to_global_vm_ok
|
|
ns_diff_global_host_connect_to_local_vm_fails
|
|
ns_diff_global_vm_connect_to_global_host_ok
|
|
ns_diff_global_vm_connect_to_local_host_fails
|
|
ns_diff_local_host_connect_to_local_vm_fails
|
|
ns_diff_local_vm_connect_to_local_host_fails
|
|
ns_diff_global_to_local_loopback_local_fails
|
|
ns_diff_local_to_global_loopback_fails
|
|
ns_diff_local_to_local_loopback_fails
|
|
ns_diff_global_to_global_loopback_ok
|
|
ns_same_local_loopback_ok
|
|
ns_same_local_host_connect_to_local_vm_ok
|
|
ns_same_local_vm_connect_to_local_host_ok
|
|
ns_delete_vm_ok
|
|
ns_delete_host_ok
|
|
ns_delete_both_ok
|
|
)
|
|
readonly TEST_DESCS=(
|
|
# vm_server_host_client
|
|
"Run vsock_test in server mode on the VM and in client mode on the host."
|
|
|
|
# vm_client_host_server
|
|
"Run vsock_test in client mode on the VM and in server mode on the host."
|
|
|
|
# vm_loopback
|
|
"Run vsock_test using the loopback transport in the VM."
|
|
|
|
# ns_host_vsock_ns_mode_ok
|
|
"Check /proc/sys/net/vsock/ns_mode strings on the host."
|
|
|
|
# ns_host_vsock_child_ns_mode_ok
|
|
"Check /proc/sys/net/vsock/ns_mode is read-only and child_ns_mode is writable."
|
|
|
|
# ns_global_same_cid_fails
|
|
"Check QEMU fails to start two VMs with same CID in two different global namespaces."
|
|
|
|
# ns_local_same_cid_ok
|
|
"Check QEMU successfully starts two VMs with same CID in two different local namespaces."
|
|
|
|
# ns_global_local_same_cid_ok
|
|
"Check QEMU successfully starts one VM in a global ns and then another VM in a local ns with the same CID."
|
|
|
|
# ns_local_global_same_cid_ok
|
|
"Check QEMU successfully starts one VM in a local ns and then another VM in a global ns with the same CID."
|
|
|
|
# ns_diff_global_host_connect_to_global_vm_ok
|
|
"Run vsock_test client in global ns with server in VM in another global ns."
|
|
|
|
# ns_diff_global_host_connect_to_local_vm_fails
|
|
"Run socat to test a process in a global ns fails to connect to a VM in a local ns."
|
|
|
|
# ns_diff_global_vm_connect_to_global_host_ok
|
|
"Run vsock_test client in VM in a global ns with server in another global ns."
|
|
|
|
# ns_diff_global_vm_connect_to_local_host_fails
|
|
"Run socat to test a VM in a global ns fails to connect to a host process in a local ns."
|
|
|
|
# ns_diff_local_host_connect_to_local_vm_fails
|
|
"Run socat to test a host process in a local ns fails to connect to a VM in another local ns."
|
|
|
|
# ns_diff_local_vm_connect_to_local_host_fails
|
|
"Run socat to test a VM in a local ns fails to connect to a host process in another local ns."
|
|
|
|
# ns_diff_global_to_local_loopback_local_fails
|
|
"Run socat to test a loopback vsock in a global ns fails to connect to a vsock in a local ns."
|
|
|
|
# ns_diff_local_to_global_loopback_fails
|
|
"Run socat to test a loopback vsock in a local ns fails to connect to a vsock in a global ns."
|
|
|
|
# ns_diff_local_to_local_loopback_fails
|
|
"Run socat to test a loopback vsock in a local ns fails to connect to a vsock in another local ns."
|
|
|
|
# ns_diff_global_to_global_loopback_ok
|
|
"Run socat to test a loopback vsock in a global ns successfully connects to a vsock in another global ns."
|
|
|
|
# ns_same_local_loopback_ok
|
|
"Run socat to test a loopback vsock in a local ns successfully connects to a vsock in the same ns."
|
|
|
|
# ns_same_local_host_connect_to_local_vm_ok
|
|
"Run vsock_test client in a local ns with server in VM in same ns."
|
|
|
|
# ns_same_local_vm_connect_to_local_host_ok
|
|
"Run vsock_test client in VM in a local ns with server in same ns."
|
|
|
|
# ns_delete_vm_ok
|
|
"Check that deleting the VM's namespace does not break the socket connection"
|
|
|
|
# ns_delete_host_ok
|
|
"Check that deleting the host's namespace does not break the socket connection"
|
|
|
|
# ns_delete_both_ok
|
|
"Check that deleting the VM and host's namespaces does not break the socket connection"
|
|
)
|
|
|
|
readonly USE_SHARED_VM=(
|
|
vm_server_host_client
|
|
vm_client_host_server
|
|
vm_loopback
|
|
)
|
|
readonly NS_MODES=("local" "global")
|
|
|
|
VERBOSE=0
|
|
|
|
usage() {
|
|
local name
|
|
local desc
|
|
local i
|
|
|
|
echo
|
|
echo "$0 [OPTIONS] [TEST]..."
|
|
echo "If no TEST argument is given, all tests will be run."
|
|
echo
|
|
echo "Options"
|
|
echo " -b: build the kernel from the current source tree and use it for guest VMs"
|
|
echo " -q: set the path to or name of qemu binary"
|
|
echo " -v: verbose output"
|
|
echo
|
|
echo "Available tests"
|
|
|
|
for ((i = 0; i < ${#TEST_NAMES[@]}; i++)); do
|
|
name=${TEST_NAMES[${i}]}
|
|
desc=${TEST_DESCS[${i}]}
|
|
printf "\t%-55s%-35s\n" "${name}" "${desc}"
|
|
done
|
|
echo
|
|
|
|
exit 1
|
|
}
|
|
|
|
die() {
|
|
echo "$*" >&2
|
|
exit "${KSFT_FAIL}"
|
|
}
|
|
|
|
check_result() {
|
|
local rc arg
|
|
|
|
rc=$1
|
|
arg=$2
|
|
|
|
cnt_total=$(( cnt_total + 1 ))
|
|
|
|
if [[ ${rc} -eq ${KSFT_PASS} ]]; then
|
|
cnt_pass=$(( cnt_pass + 1 ))
|
|
echo "ok ${cnt_total} ${arg}"
|
|
elif [[ ${rc} -eq ${KSFT_SKIP} ]]; then
|
|
cnt_skip=$(( cnt_skip + 1 ))
|
|
echo "ok ${cnt_total} ${arg} # SKIP"
|
|
elif [[ ${rc} -eq ${KSFT_FAIL} ]]; then
|
|
cnt_fail=$(( cnt_fail + 1 ))
|
|
echo "not ok ${cnt_total} ${arg} # exit=${rc}"
|
|
fi
|
|
}
|
|
|
|
add_namespaces() {
|
|
local orig_mode
|
|
orig_mode=$(cat /proc/sys/net/vsock/child_ns_mode)
|
|
|
|
for mode in "${NS_MODES[@]}"; do
|
|
echo "${mode}" > /proc/sys/net/vsock/child_ns_mode
|
|
ip netns add "${mode}0" 2>/dev/null
|
|
ip netns add "${mode}1" 2>/dev/null
|
|
done
|
|
|
|
echo "${orig_mode}" > /proc/sys/net/vsock/child_ns_mode
|
|
}
|
|
|
|
init_namespaces() {
|
|
for mode in "${NS_MODES[@]}"; do
|
|
# we need lo for qemu port forwarding
|
|
ip netns exec "${mode}0" ip link set dev lo up
|
|
ip netns exec "${mode}1" ip link set dev lo up
|
|
done
|
|
}
|
|
|
|
del_namespaces() {
|
|
for mode in "${NS_MODES[@]}"; do
|
|
ip netns del "${mode}0" &>/dev/null
|
|
ip netns del "${mode}1" &>/dev/null
|
|
log_host "removed ns ${mode}0"
|
|
log_host "removed ns ${mode}1"
|
|
done
|
|
}
|
|
|
|
vm_ssh() {
|
|
local ns_exec
|
|
|
|
if [[ "${1}" == init_ns ]]; then
|
|
ns_exec=""
|
|
else
|
|
ns_exec="ip netns exec ${1}"
|
|
fi
|
|
|
|
shift
|
|
|
|
${ns_exec} ssh -q -o UserKnownHostsFile=/dev/null -p "${SSH_HOST_PORT}" localhost "$@"
|
|
|
|
return $?
|
|
}
|
|
|
|
cleanup() {
|
|
terminate_pidfiles "${!PIDFILES[@]}"
|
|
del_namespaces
|
|
}
|
|
|
|
check_args() {
|
|
local found
|
|
|
|
for arg in "$@"; do
|
|
found=0
|
|
for name in "${TEST_NAMES[@]}"; do
|
|
if [[ "${name}" = "${arg}" ]]; then
|
|
found=1
|
|
break
|
|
fi
|
|
done
|
|
|
|
if [[ "${found}" -eq 0 ]]; then
|
|
echo "${arg} is not an available test" >&2
|
|
usage
|
|
fi
|
|
done
|
|
|
|
for arg in "$@"; do
|
|
if ! command -v > /dev/null "test_${arg}"; then
|
|
echo "Test ${arg} not found" >&2
|
|
usage
|
|
fi
|
|
done
|
|
}
|
|
|
|
check_deps() {
|
|
for dep in vng ${QEMU} busybox pkill ssh ss socat; do
|
|
if [[ ! -x $(command -v "${dep}") ]]; then
|
|
echo -e "skip: dependency ${dep} not found!\n"
|
|
exit "${KSFT_SKIP}"
|
|
fi
|
|
done
|
|
|
|
if [[ ! -x $(command -v "${VSOCK_TEST}") ]]; then
|
|
printf "skip: %s not found!" "${VSOCK_TEST}"
|
|
printf " Please build the kselftest vsock target.\n"
|
|
exit "${KSFT_SKIP}"
|
|
fi
|
|
}
|
|
|
|
check_netns() {
|
|
local tname=$1
|
|
|
|
# If the test requires NS support, check if NS support exists
|
|
# using /proc/self/ns
|
|
if [[ "${tname}" =~ ^ns_ ]] &&
|
|
[[ ! -e /proc/self/ns ]]; then
|
|
log_host "No NS support detected for test ${tname}"
|
|
return 1
|
|
fi
|
|
|
|
return 0
|
|
}
|
|
|
|
check_vng() {
|
|
local tested_versions
|
|
local version
|
|
local ok
|
|
|
|
tested_versions=("1.33" "1.36" "1.37")
|
|
version="$(vng --version)"
|
|
|
|
ok=0
|
|
for tv in "${tested_versions[@]}"; do
|
|
if [[ "${version}" == *"${tv}"* ]]; then
|
|
ok=1
|
|
break
|
|
fi
|
|
done
|
|
|
|
if [[ ! "${ok}" -eq 1 ]]; then
|
|
printf "warning: vng version '%s' has not been tested and may " "${version}" >&2
|
|
printf "not function properly.\n\tThe following versions have been tested: " >&2
|
|
echo "${tested_versions[@]}" >&2
|
|
fi
|
|
}
|
|
|
|
check_socat() {
|
|
local support_string
|
|
|
|
support_string="$(socat -V)"
|
|
|
|
if [[ "${support_string}" != *"WITH_VSOCK 1"* ]]; then
|
|
die "err: socat is missing vsock support"
|
|
fi
|
|
|
|
if [[ "${support_string}" != *"WITH_UNIX 1"* ]]; then
|
|
die "err: socat is missing unix support"
|
|
fi
|
|
}
|
|
|
|
handle_build() {
|
|
if [[ ! "${BUILD}" -eq 1 ]]; then
|
|
return
|
|
fi
|
|
|
|
if [[ ! -d "${KERNEL_CHECKOUT}" ]]; then
|
|
echo "-b requires vmtest.sh called from the kernel source tree" >&2
|
|
exit 1
|
|
fi
|
|
|
|
pushd "${KERNEL_CHECKOUT}" &>/dev/null
|
|
|
|
if ! vng --kconfig --config "${SCRIPT_DIR}"/config; then
|
|
die "failed to generate .config for kernel source tree (${KERNEL_CHECKOUT})"
|
|
fi
|
|
|
|
if ! make -j$(nproc); then
|
|
die "failed to build kernel from source tree (${KERNEL_CHECKOUT})"
|
|
fi
|
|
|
|
popd &>/dev/null
|
|
}
|
|
|
|
create_pidfile() {
|
|
local pidfile
|
|
|
|
pidfile=$(mktemp "${PIDFILE_TEMPLATE}")
|
|
PIDFILES["${pidfile}"]=1
|
|
|
|
echo "${pidfile}"
|
|
}
|
|
|
|
terminate_pidfiles() {
|
|
local pidfile
|
|
|
|
for pidfile in "$@"; do
|
|
if [[ -s "${pidfile}" ]]; then
|
|
pkill -SIGTERM -F "${pidfile}" > /dev/null 2>&1
|
|
fi
|
|
|
|
if [[ -e "${pidfile}" ]]; then
|
|
rm -f "${pidfile}"
|
|
fi
|
|
|
|
unset "PIDFILES[${pidfile}]"
|
|
done
|
|
}
|
|
|
|
terminate_pids() {
|
|
local pid
|
|
|
|
for pid in "$@"; do
|
|
kill -SIGTERM "${pid}" &>/dev/null || :
|
|
done
|
|
}
|
|
|
|
vm_start() {
|
|
local pidfile=$1
|
|
local ns=$2
|
|
local logfile=/dev/null
|
|
local verbose_opt=""
|
|
local kernel_opt=""
|
|
local qemu_opts=""
|
|
local ns_exec=""
|
|
local qemu
|
|
|
|
qemu=$(command -v "${QEMU}")
|
|
|
|
if [[ "${VERBOSE}" -eq 1 ]]; then
|
|
verbose_opt="--verbose"
|
|
logfile=/dev/stdout
|
|
fi
|
|
|
|
qemu_opts="\
|
|
-netdev user,id=n0,${QEMU_TEST_PORT_FWD},${QEMU_SSH_PORT_FWD} \
|
|
-device virtio-net-pci,netdev=n0 \
|
|
-device vhost-vsock-pci,guest-cid=${VSOCK_CID} \
|
|
--pidfile ${pidfile}
|
|
"
|
|
|
|
if [[ "${BUILD}" -eq 1 ]]; then
|
|
kernel_opt="${KERNEL_CHECKOUT}"
|
|
fi
|
|
|
|
if [[ "${ns}" != "init_ns" ]]; then
|
|
ns_exec="ip netns exec ${ns}"
|
|
fi
|
|
|
|
${ns_exec} vng \
|
|
--run \
|
|
${kernel_opt} \
|
|
${verbose_opt} \
|
|
--qemu-opts="${qemu_opts}" \
|
|
--qemu="${qemu}" \
|
|
--user root \
|
|
--append "${KERNEL_CMDLINE}" \
|
|
--rw &> ${logfile} &
|
|
|
|
timeout "${WAIT_QEMU}" \
|
|
bash -c 'while [[ ! -s '"${pidfile}"' ]]; do sleep 1; done; exit 0'
|
|
}
|
|
|
|
vm_wait_for_ssh() {
|
|
local ns=$1
|
|
local i
|
|
|
|
i=0
|
|
while true; do
|
|
if [[ ${i} -gt ${WAIT_PERIOD_MAX} ]]; then
|
|
die "Timed out waiting for guest ssh"
|
|
fi
|
|
|
|
if vm_ssh "${ns}" -- true; then
|
|
break
|
|
fi
|
|
i=$(( i + 1 ))
|
|
sleep ${WAIT_PERIOD}
|
|
done
|
|
}
|
|
|
|
# derived from selftests/net/net_helper.sh
|
|
wait_for_listener()
|
|
{
|
|
local port=$1
|
|
local interval=$2
|
|
local max_intervals=$3
|
|
local protocol=$4
|
|
local i
|
|
|
|
for i in $(seq "${max_intervals}"); do
|
|
case "${protocol}" in
|
|
tcp)
|
|
if ss --listening --tcp --numeric | grep -q ":${port} "; then
|
|
break
|
|
fi
|
|
;;
|
|
vsock)
|
|
if ss --listening --vsock --numeric | grep -q ":${port} "; then
|
|
break
|
|
fi
|
|
;;
|
|
unix)
|
|
# For unix sockets, port is actually the socket path
|
|
if ss --listening --unix | grep -q "${port}"; then
|
|
break
|
|
fi
|
|
;;
|
|
*)
|
|
echo "Unknown protocol: ${protocol}" >&2
|
|
break
|
|
;;
|
|
esac
|
|
sleep "${interval}"
|
|
done
|
|
}
|
|
|
|
vm_wait_for_listener() {
|
|
local ns=$1
|
|
local port=$2
|
|
local protocol=$3
|
|
|
|
vm_ssh "${ns}" <<EOF
|
|
$(declare -f wait_for_listener)
|
|
wait_for_listener ${port} ${WAIT_PERIOD} ${WAIT_PERIOD_MAX} ${protocol}
|
|
EOF
|
|
}
|
|
|
|
host_wait_for_listener() {
|
|
local ns=$1
|
|
local port=$2
|
|
local protocol=$3
|
|
|
|
if [[ "${ns}" == "init_ns" ]]; then
|
|
wait_for_listener "${port}" "${WAIT_PERIOD}" "${WAIT_PERIOD_MAX}" "${protocol}"
|
|
else
|
|
ip netns exec "${ns}" bash <<-EOF
|
|
$(declare -f wait_for_listener)
|
|
wait_for_listener ${port} ${WAIT_PERIOD} ${WAIT_PERIOD_MAX} ${protocol}
|
|
EOF
|
|
fi
|
|
}
|
|
|
|
vm_dmesg_oops_count() {
|
|
local ns=$1
|
|
|
|
vm_ssh "${ns}" -- dmesg 2>/dev/null | grep -c -i 'Oops'
|
|
}
|
|
|
|
vm_dmesg_warn_count() {
|
|
local ns=$1
|
|
|
|
vm_ssh "${ns}" -- dmesg --level=warn 2>/dev/null | grep -c -i 'vsock'
|
|
}
|
|
|
|
vm_dmesg_check() {
|
|
local pidfile=$1
|
|
local ns=$2
|
|
local oops_before=$3
|
|
local warn_before=$4
|
|
local oops_after warn_after
|
|
|
|
oops_after=$(vm_dmesg_oops_count "${ns}")
|
|
if [[ "${oops_after}" -gt "${oops_before}" ]]; then
|
|
echo "FAIL: kernel oops detected on vm in ns ${ns}" | log_host
|
|
return 1
|
|
fi
|
|
|
|
warn_after=$(vm_dmesg_warn_count "${ns}")
|
|
if [[ "${warn_after}" -gt "${warn_before}" ]]; then
|
|
echo "FAIL: kernel warning detected on vm in ns ${ns}" | log_host
|
|
return 1
|
|
fi
|
|
|
|
return 0
|
|
}
|
|
|
|
vm_vsock_test() {
|
|
local ns=$1
|
|
local host=$2
|
|
local cid=$3
|
|
local port=$4
|
|
local rc
|
|
|
|
# log output and use pipefail to respect vsock_test errors
|
|
set -o pipefail
|
|
if [[ "${host}" != server ]]; then
|
|
vm_ssh "${ns}" -- "${VSOCK_TEST}" \
|
|
--mode=client \
|
|
--control-host="${host}" \
|
|
--peer-cid="${cid}" \
|
|
--control-port="${port}" \
|
|
2>&1 | log_guest
|
|
rc=$?
|
|
else
|
|
vm_ssh "${ns}" -- "${VSOCK_TEST}" \
|
|
--mode=server \
|
|
--peer-cid="${cid}" \
|
|
--control-port="${port}" \
|
|
2>&1 | log_guest &
|
|
rc=$?
|
|
|
|
if [[ $rc -ne 0 ]]; then
|
|
set +o pipefail
|
|
return $rc
|
|
fi
|
|
|
|
vm_wait_for_listener "${ns}" "${port}" "tcp"
|
|
rc=$?
|
|
fi
|
|
set +o pipefail
|
|
|
|
return $rc
|
|
}
|
|
|
|
host_vsock_test() {
|
|
local ns=$1
|
|
local host=$2
|
|
local cid=$3
|
|
local port=$4
|
|
shift 4
|
|
local extra_args=("$@")
|
|
local rc
|
|
|
|
local cmd="${VSOCK_TEST}"
|
|
if [[ "${ns}" != "init_ns" ]]; then
|
|
cmd="ip netns exec ${ns} ${cmd}"
|
|
fi
|
|
|
|
# log output and use pipefail to respect vsock_test errors
|
|
set -o pipefail
|
|
if [[ "${host}" != server ]]; then
|
|
${cmd} \
|
|
--mode=client \
|
|
--peer-cid="${cid}" \
|
|
--control-host="${host}" \
|
|
--control-port="${port}" \
|
|
"${extra_args[@]}" 2>&1 | log_host
|
|
rc=$?
|
|
else
|
|
${cmd} \
|
|
--mode=server \
|
|
--peer-cid="${cid}" \
|
|
--control-port="${port}" \
|
|
"${extra_args[@]}" 2>&1 | log_host &
|
|
rc=$?
|
|
|
|
if [[ $rc -ne 0 ]]; then
|
|
set +o pipefail
|
|
return $rc
|
|
fi
|
|
|
|
host_wait_for_listener "${ns}" "${port}" "tcp"
|
|
rc=$?
|
|
fi
|
|
set +o pipefail
|
|
|
|
return $rc
|
|
}
|
|
|
|
log() {
|
|
local redirect
|
|
local prefix
|
|
|
|
if [[ ${VERBOSE} -eq 0 ]]; then
|
|
redirect=/dev/null
|
|
else
|
|
redirect=/dev/stdout
|
|
fi
|
|
|
|
prefix="${LOG_PREFIX:-}"
|
|
|
|
if [[ "$#" -eq 0 ]]; then
|
|
if [[ -n "${prefix}" ]]; then
|
|
awk -v prefix="${prefix}" '{printf "%s: %s\n", prefix, $0}'
|
|
else
|
|
cat
|
|
fi
|
|
else
|
|
if [[ -n "${prefix}" ]]; then
|
|
echo "${prefix}: " "$@"
|
|
else
|
|
echo "$@"
|
|
fi
|
|
fi | tee -a "${LOG}" > "${redirect}"
|
|
}
|
|
|
|
log_host() {
|
|
LOG_PREFIX=host log "$@"
|
|
}
|
|
|
|
log_guest() {
|
|
LOG_PREFIX=guest log "$@"
|
|
}
|
|
|
|
ns_get_mode() {
|
|
local ns=$1
|
|
|
|
ip netns exec "${ns}" cat /proc/sys/net/vsock/ns_mode 2>/dev/null
|
|
}
|
|
|
|
test_ns_host_vsock_ns_mode_ok() {
|
|
for mode in "${NS_MODES[@]}"; do
|
|
local actual
|
|
|
|
actual=$(ns_get_mode "${mode}0")
|
|
if [[ "${actual}" != "${mode}" ]]; then
|
|
log_host "expected mode ${mode}, got ${actual}"
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
done
|
|
|
|
return "${KSFT_PASS}"
|
|
}
|
|
|
|
test_ns_diff_global_host_connect_to_global_vm_ok() {
|
|
local oops_before warn_before
|
|
local pids pid pidfile
|
|
local ns0 ns1 port
|
|
declare -a pids
|
|
local unixfile
|
|
ns0="global0"
|
|
ns1="global1"
|
|
port=1234
|
|
local rc
|
|
|
|
init_namespaces
|
|
|
|
pidfile="$(create_pidfile)"
|
|
|
|
if ! vm_start "${pidfile}" "${ns0}"; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
vm_wait_for_ssh "${ns0}"
|
|
oops_before=$(vm_dmesg_oops_count "${ns0}")
|
|
warn_before=$(vm_dmesg_warn_count "${ns0}")
|
|
|
|
unixfile=$(mktemp -u /tmp/XXXX.sock)
|
|
ip netns exec "${ns1}" \
|
|
socat TCP-LISTEN:"${TEST_HOST_PORT}",fork \
|
|
UNIX-CONNECT:"${unixfile}" &
|
|
pids+=($!)
|
|
host_wait_for_listener "${ns1}" "${TEST_HOST_PORT}" "tcp"
|
|
|
|
ip netns exec "${ns0}" socat UNIX-LISTEN:"${unixfile}",fork \
|
|
TCP-CONNECT:localhost:"${TEST_HOST_PORT}" &
|
|
pids+=($!)
|
|
host_wait_for_listener "${ns0}" "${unixfile}" "unix"
|
|
|
|
vm_vsock_test "${ns0}" "server" 2 "${TEST_GUEST_PORT}"
|
|
vm_wait_for_listener "${ns0}" "${TEST_GUEST_PORT}" "tcp"
|
|
host_vsock_test "${ns1}" "127.0.0.1" "${VSOCK_CID}" "${TEST_HOST_PORT}"
|
|
rc=$?
|
|
|
|
vm_dmesg_check "${pidfile}" "${ns0}" "${oops_before}" "${warn_before}"
|
|
dmesg_rc=$?
|
|
|
|
terminate_pids "${pids[@]}"
|
|
terminate_pidfiles "${pidfile}"
|
|
|
|
if [[ "${rc}" -ne 0 ]] || [[ "${dmesg_rc}" -ne 0 ]]; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
return "${KSFT_PASS}"
|
|
}
|
|
|
|
test_ns_diff_global_host_connect_to_local_vm_fails() {
|
|
local oops_before warn_before
|
|
local ns0="global0"
|
|
local ns1="local0"
|
|
local port=12345
|
|
local dmesg_rc
|
|
local pidfile
|
|
local result
|
|
local pid
|
|
|
|
init_namespaces
|
|
|
|
outfile=$(mktemp)
|
|
|
|
pidfile="$(create_pidfile)"
|
|
if ! vm_start "${pidfile}" "${ns1}"; then
|
|
log_host "failed to start vm (cid=${VSOCK_CID}, ns=${ns0})"
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
vm_wait_for_ssh "${ns1}"
|
|
oops_before=$(vm_dmesg_oops_count "${ns1}")
|
|
warn_before=$(vm_dmesg_warn_count "${ns1}")
|
|
|
|
vm_ssh "${ns1}" -- socat VSOCK-LISTEN:"${port}" STDOUT > "${outfile}" &
|
|
vm_wait_for_listener "${ns1}" "${port}" "vsock"
|
|
echo TEST | ip netns exec "${ns0}" \
|
|
socat STDIN VSOCK-CONNECT:"${VSOCK_CID}":"${port}" 2>/dev/null
|
|
|
|
vm_dmesg_check "${pidfile}" "${ns1}" "${oops_before}" "${warn_before}"
|
|
dmesg_rc=$?
|
|
|
|
terminate_pidfiles "${pidfile}"
|
|
result=$(cat "${outfile}")
|
|
rm -f "${outfile}"
|
|
|
|
if [[ "${result}" == "TEST" ]] || [[ "${dmesg_rc}" -ne 0 ]]; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
return "${KSFT_PASS}"
|
|
}
|
|
|
|
test_ns_diff_global_vm_connect_to_global_host_ok() {
|
|
local oops_before warn_before
|
|
local ns0="global0"
|
|
local ns1="global1"
|
|
local port=12345
|
|
local unixfile
|
|
local dmesg_rc
|
|
local pidfile
|
|
local pids
|
|
local rc
|
|
|
|
init_namespaces
|
|
|
|
declare -a pids
|
|
|
|
log_host "Setup socat bridge from ns ${ns0} to ns ${ns1} over port ${port}"
|
|
|
|
unixfile=$(mktemp -u /tmp/XXXX.sock)
|
|
|
|
ip netns exec "${ns0}" \
|
|
socat TCP-LISTEN:"${port}" UNIX-CONNECT:"${unixfile}" &
|
|
pids+=($!)
|
|
host_wait_for_listener "${ns0}" "${port}" "tcp"
|
|
|
|
ip netns exec "${ns1}" \
|
|
socat UNIX-LISTEN:"${unixfile}" TCP-CONNECT:127.0.0.1:"${port}" &
|
|
pids+=($!)
|
|
host_wait_for_listener "${ns1}" "${unixfile}" "unix"
|
|
|
|
log_host "Launching ${VSOCK_TEST} in ns ${ns1}"
|
|
host_vsock_test "${ns1}" "server" "${VSOCK_CID}" "${port}"
|
|
|
|
pidfile="$(create_pidfile)"
|
|
if ! vm_start "${pidfile}" "${ns0}"; then
|
|
log_host "failed to start vm (cid=${cid}, ns=${ns0})"
|
|
terminate_pids "${pids[@]}"
|
|
rm -f "${unixfile}"
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
vm_wait_for_ssh "${ns0}"
|
|
|
|
oops_before=$(vm_dmesg_oops_count "${ns0}")
|
|
warn_before=$(vm_dmesg_warn_count "${ns0}")
|
|
|
|
vm_vsock_test "${ns0}" "10.0.2.2" 2 "${port}"
|
|
rc=$?
|
|
|
|
vm_dmesg_check "${pidfile}" "${ns0}" "${oops_before}" "${warn_before}"
|
|
dmesg_rc=$?
|
|
|
|
terminate_pidfiles "${pidfile}"
|
|
terminate_pids "${pids[@]}"
|
|
rm -f "${unixfile}"
|
|
|
|
if [[ "${rc}" -ne 0 ]] || [[ "${dmesg_rc}" -ne 0 ]]; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
return "${KSFT_PASS}"
|
|
|
|
}
|
|
|
|
test_ns_diff_global_vm_connect_to_local_host_fails() {
|
|
local ns0="global0"
|
|
local ns1="local0"
|
|
local port=12345
|
|
local oops_before warn_before
|
|
local dmesg_rc
|
|
local pidfile
|
|
local result
|
|
local pid
|
|
|
|
init_namespaces
|
|
|
|
log_host "Launching socat in ns ${ns1}"
|
|
outfile=$(mktemp)
|
|
|
|
ip netns exec "${ns1}" socat VSOCK-LISTEN:"${port}" STDOUT &> "${outfile}" &
|
|
pid=$!
|
|
host_wait_for_listener "${ns1}" "${port}" "vsock"
|
|
|
|
pidfile="$(create_pidfile)"
|
|
if ! vm_start "${pidfile}" "${ns0}"; then
|
|
log_host "failed to start vm (cid=${cid}, ns=${ns0})"
|
|
terminate_pids "${pid}"
|
|
rm -f "${outfile}"
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
vm_wait_for_ssh "${ns0}"
|
|
|
|
oops_before=$(vm_dmesg_oops_count "${ns0}")
|
|
warn_before=$(vm_dmesg_warn_count "${ns0}")
|
|
|
|
vm_ssh "${ns0}" -- \
|
|
bash -c "echo TEST | socat STDIN VSOCK-CONNECT:2:${port}" 2>&1 | log_guest
|
|
|
|
vm_dmesg_check "${pidfile}" "${ns0}" "${oops_before}" "${warn_before}"
|
|
dmesg_rc=$?
|
|
|
|
terminate_pidfiles "${pidfile}"
|
|
terminate_pids "${pid}"
|
|
|
|
result=$(cat "${outfile}")
|
|
rm -f "${outfile}"
|
|
|
|
if [[ "${result}" != TEST ]] && [[ "${dmesg_rc}" -eq 0 ]]; then
|
|
return "${KSFT_PASS}"
|
|
fi
|
|
|
|
return "${KSFT_FAIL}"
|
|
}
|
|
|
|
test_ns_diff_local_host_connect_to_local_vm_fails() {
|
|
local ns0="local0"
|
|
local ns1="local1"
|
|
local port=12345
|
|
local oops_before warn_before
|
|
local dmesg_rc
|
|
local pidfile
|
|
local result
|
|
local pid
|
|
|
|
init_namespaces
|
|
|
|
outfile=$(mktemp)
|
|
|
|
pidfile="$(create_pidfile)"
|
|
if ! vm_start "${pidfile}" "${ns1}"; then
|
|
log_host "failed to start vm (cid=${cid}, ns=${ns0})"
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
vm_wait_for_ssh "${ns1}"
|
|
oops_before=$(vm_dmesg_oops_count "${ns1}")
|
|
warn_before=$(vm_dmesg_warn_count "${ns1}")
|
|
|
|
vm_ssh "${ns1}" -- socat VSOCK-LISTEN:"${port}" STDOUT > "${outfile}" &
|
|
vm_wait_for_listener "${ns1}" "${port}" "vsock"
|
|
|
|
echo TEST | ip netns exec "${ns0}" \
|
|
socat STDIN VSOCK-CONNECT:"${VSOCK_CID}":"${port}" 2>/dev/null
|
|
|
|
vm_dmesg_check "${pidfile}" "${ns1}" "${oops_before}" "${warn_before}"
|
|
dmesg_rc=$?
|
|
|
|
terminate_pidfiles "${pidfile}"
|
|
|
|
result=$(cat "${outfile}")
|
|
rm -f "${outfile}"
|
|
|
|
if [[ "${result}" != TEST ]] && [[ "${dmesg_rc}" -eq 0 ]]; then
|
|
return "${KSFT_PASS}"
|
|
fi
|
|
|
|
return "${KSFT_FAIL}"
|
|
}
|
|
|
|
test_ns_diff_local_vm_connect_to_local_host_fails() {
|
|
local oops_before warn_before
|
|
local ns0="local0"
|
|
local ns1="local1"
|
|
local port=12345
|
|
local dmesg_rc
|
|
local pidfile
|
|
local result
|
|
local pid
|
|
|
|
init_namespaces
|
|
|
|
log_host "Launching socat in ns ${ns1}"
|
|
outfile=$(mktemp)
|
|
ip netns exec "${ns1}" socat VSOCK-LISTEN:"${port}" STDOUT &> "${outfile}" &
|
|
pid=$!
|
|
host_wait_for_listener "${ns1}" "${port}" "vsock"
|
|
|
|
pidfile="$(create_pidfile)"
|
|
if ! vm_start "${pidfile}" "${ns0}"; then
|
|
log_host "failed to start vm (cid=${cid}, ns=${ns0})"
|
|
rm -f "${outfile}"
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
vm_wait_for_ssh "${ns0}"
|
|
oops_before=$(vm_dmesg_oops_count "${ns0}")
|
|
warn_before=$(vm_dmesg_warn_count "${ns0}")
|
|
|
|
vm_ssh "${ns0}" -- \
|
|
bash -c "echo TEST | socat STDIN VSOCK-CONNECT:2:${port}" 2>&1 | log_guest
|
|
|
|
vm_dmesg_check "${pidfile}" "${ns0}" "${oops_before}" "${warn_before}"
|
|
dmesg_rc=$?
|
|
|
|
terminate_pidfiles "${pidfile}"
|
|
terminate_pids "${pid}"
|
|
|
|
result=$(cat "${outfile}")
|
|
rm -f "${outfile}"
|
|
|
|
if [[ "${result}" != TEST ]] && [[ "${dmesg_rc}" -eq 0 ]]; then
|
|
return "${KSFT_PASS}"
|
|
fi
|
|
|
|
return "${KSFT_FAIL}"
|
|
}
|
|
|
|
__test_loopback_two_netns() {
|
|
local ns0=$1
|
|
local ns1=$2
|
|
local port=12345
|
|
local result
|
|
local pid
|
|
|
|
modprobe vsock_loopback &> /dev/null || :
|
|
|
|
log_host "Launching socat in ns ${ns1}"
|
|
outfile=$(mktemp)
|
|
|
|
ip netns exec "${ns1}" socat VSOCK-LISTEN:"${port}" STDOUT > "${outfile}" 2>/dev/null &
|
|
pid=$!
|
|
host_wait_for_listener "${ns1}" "${port}" "vsock"
|
|
|
|
log_host "Launching socat in ns ${ns0}"
|
|
echo TEST | ip netns exec "${ns0}" socat STDIN VSOCK-CONNECT:1:"${port}" 2>/dev/null
|
|
terminate_pids "${pid}"
|
|
|
|
result=$(cat "${outfile}")
|
|
rm -f "${outfile}"
|
|
|
|
if [[ "${result}" == TEST ]]; then
|
|
return 0
|
|
fi
|
|
|
|
return 1
|
|
}
|
|
|
|
test_ns_diff_global_to_local_loopback_local_fails() {
|
|
init_namespaces
|
|
|
|
if ! __test_loopback_two_netns "global0" "local0"; then
|
|
return "${KSFT_PASS}"
|
|
fi
|
|
|
|
return "${KSFT_FAIL}"
|
|
}
|
|
|
|
test_ns_diff_local_to_global_loopback_fails() {
|
|
init_namespaces
|
|
|
|
if ! __test_loopback_two_netns "local0" "global0"; then
|
|
return "${KSFT_PASS}"
|
|
fi
|
|
|
|
return "${KSFT_FAIL}"
|
|
}
|
|
|
|
test_ns_diff_local_to_local_loopback_fails() {
|
|
init_namespaces
|
|
|
|
if ! __test_loopback_two_netns "local0" "local1"; then
|
|
return "${KSFT_PASS}"
|
|
fi
|
|
|
|
return "${KSFT_FAIL}"
|
|
}
|
|
|
|
test_ns_diff_global_to_global_loopback_ok() {
|
|
init_namespaces
|
|
|
|
if __test_loopback_two_netns "global0" "global1"; then
|
|
return "${KSFT_PASS}"
|
|
fi
|
|
|
|
return "${KSFT_FAIL}"
|
|
}
|
|
|
|
test_ns_same_local_loopback_ok() {
|
|
init_namespaces
|
|
|
|
if __test_loopback_two_netns "local0" "local0"; then
|
|
return "${KSFT_PASS}"
|
|
fi
|
|
|
|
return "${KSFT_FAIL}"
|
|
}
|
|
|
|
test_ns_same_local_host_connect_to_local_vm_ok() {
|
|
local oops_before warn_before
|
|
local ns="local0"
|
|
local port=1234
|
|
local dmesg_rc
|
|
local pidfile
|
|
local rc
|
|
|
|
init_namespaces
|
|
|
|
pidfile="$(create_pidfile)"
|
|
|
|
if ! vm_start "${pidfile}" "${ns}"; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
vm_wait_for_ssh "${ns}"
|
|
oops_before=$(vm_dmesg_oops_count "${ns}")
|
|
warn_before=$(vm_dmesg_warn_count "${ns}")
|
|
|
|
vm_vsock_test "${ns}" "server" 2 "${TEST_GUEST_PORT}"
|
|
|
|
# Skip test 29 (transport release use-after-free): This test attempts
|
|
# binding both G2H and H2G CIDs. Because virtio-vsock (G2H) doesn't
|
|
# support local namespaces the test will fail when
|
|
# transport_g2h->stream_allow() returns false. This edge case only
|
|
# happens for vsock_test in client mode on the host in a local
|
|
# namespace. This is a false positive.
|
|
host_vsock_test "${ns}" "127.0.0.1" "${VSOCK_CID}" "${TEST_HOST_PORT}" --skip=29
|
|
rc=$?
|
|
|
|
vm_dmesg_check "${pidfile}" "${ns}" "${oops_before}" "${warn_before}"
|
|
dmesg_rc=$?
|
|
|
|
terminate_pidfiles "${pidfile}"
|
|
|
|
if [[ "${rc}" -ne 0 ]] || [[ "${dmesg_rc}" -ne 0 ]]; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
return "${KSFT_PASS}"
|
|
}
|
|
|
|
test_ns_same_local_vm_connect_to_local_host_ok() {
|
|
local oops_before warn_before
|
|
local ns="local0"
|
|
local port=1234
|
|
local dmesg_rc
|
|
local pidfile
|
|
local rc
|
|
|
|
init_namespaces
|
|
|
|
pidfile="$(create_pidfile)"
|
|
|
|
if ! vm_start "${pidfile}" "${ns}"; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
vm_wait_for_ssh "${ns}"
|
|
oops_before=$(vm_dmesg_oops_count "${ns}")
|
|
warn_before=$(vm_dmesg_warn_count "${ns}")
|
|
|
|
host_vsock_test "${ns}" "server" "${VSOCK_CID}" "${port}"
|
|
vm_vsock_test "${ns}" "10.0.2.2" 2 "${port}"
|
|
rc=$?
|
|
|
|
vm_dmesg_check "${pidfile}" "${ns}" "${oops_before}" "${warn_before}"
|
|
dmesg_rc=$?
|
|
|
|
terminate_pidfiles "${pidfile}"
|
|
|
|
if [[ "${rc}" -ne 0 ]] || [[ "${dmesg_rc}" -ne 0 ]]; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
return "${KSFT_PASS}"
|
|
}
|
|
|
|
namespaces_can_boot_same_cid() {
|
|
local ns0=$1
|
|
local ns1=$2
|
|
local pidfile1 pidfile2
|
|
local rc
|
|
|
|
pidfile1="$(create_pidfile)"
|
|
|
|
# The first VM should be able to start. If it can't then we have
|
|
# problems and need to return non-zero.
|
|
if ! vm_start "${pidfile1}" "${ns0}"; then
|
|
return 1
|
|
fi
|
|
|
|
pidfile2="$(create_pidfile)"
|
|
vm_start "${pidfile2}" "${ns1}"
|
|
rc=$?
|
|
terminate_pidfiles "${pidfile1}" "${pidfile2}"
|
|
|
|
return "${rc}"
|
|
}
|
|
|
|
test_ns_global_same_cid_fails() {
|
|
init_namespaces
|
|
|
|
if namespaces_can_boot_same_cid "global0" "global1"; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
return "${KSFT_PASS}"
|
|
}
|
|
|
|
test_ns_local_global_same_cid_ok() {
|
|
init_namespaces
|
|
|
|
if namespaces_can_boot_same_cid "local0" "global0"; then
|
|
return "${KSFT_PASS}"
|
|
fi
|
|
|
|
return "${KSFT_FAIL}"
|
|
}
|
|
|
|
test_ns_global_local_same_cid_ok() {
|
|
init_namespaces
|
|
|
|
if namespaces_can_boot_same_cid "global0" "local0"; then
|
|
return "${KSFT_PASS}"
|
|
fi
|
|
|
|
return "${KSFT_FAIL}"
|
|
}
|
|
|
|
test_ns_local_same_cid_ok() {
|
|
init_namespaces
|
|
|
|
if namespaces_can_boot_same_cid "local0" "local1"; then
|
|
return "${KSFT_PASS}"
|
|
fi
|
|
|
|
return "${KSFT_FAIL}"
|
|
}
|
|
|
|
test_ns_host_vsock_child_ns_mode_ok() {
|
|
local orig_mode
|
|
local rc
|
|
|
|
orig_mode=$(cat /proc/sys/net/vsock/child_ns_mode)
|
|
|
|
rc="${KSFT_PASS}"
|
|
for mode in "${NS_MODES[@]}"; do
|
|
local ns="${mode}0"
|
|
|
|
if echo "${mode}" 2>/dev/null > /proc/sys/net/vsock/ns_mode; then
|
|
log_host "ns_mode should be read-only but write succeeded"
|
|
rc="${KSFT_FAIL}"
|
|
continue
|
|
fi
|
|
|
|
if ! echo "${mode}" > /proc/sys/net/vsock/child_ns_mode; then
|
|
log_host "child_ns_mode should be writable to ${mode}"
|
|
rc="${KSFT_FAIL}"
|
|
continue
|
|
fi
|
|
done
|
|
|
|
echo "${orig_mode}" > /proc/sys/net/vsock/child_ns_mode
|
|
|
|
return "${rc}"
|
|
}
|
|
|
|
test_vm_server_host_client() {
|
|
if ! vm_vsock_test "init_ns" "server" 2 "${TEST_GUEST_PORT}"; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
if ! host_vsock_test "init_ns" "127.0.0.1" "${VSOCK_CID}" "${TEST_HOST_PORT}"; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
return "${KSFT_PASS}"
|
|
}
|
|
|
|
test_vm_client_host_server() {
|
|
if ! host_vsock_test "init_ns" "server" "${VSOCK_CID}" "${TEST_HOST_PORT_LISTENER}"; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
if ! vm_vsock_test "init_ns" "10.0.2.2" 2 "${TEST_HOST_PORT_LISTENER}"; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
return "${KSFT_PASS}"
|
|
}
|
|
|
|
test_vm_loopback() {
|
|
local port=60000 # non-forwarded local port
|
|
|
|
vm_ssh "init_ns" -- modprobe vsock_loopback &> /dev/null || :
|
|
|
|
if ! vm_vsock_test "init_ns" "server" 1 "${port}"; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
|
|
if ! vm_vsock_test "init_ns" "127.0.0.1" 1 "${port}"; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
|
|
return "${KSFT_PASS}"
|
|
}
|
|
|
|
check_ns_delete_doesnt_break_connection() {
|
|
local pipefile pidfile outfile
|
|
local ns0="global0"
|
|
local ns1="global1"
|
|
local port=12345
|
|
local pids=()
|
|
local rc=0
|
|
|
|
init_namespaces
|
|
|
|
pidfile="$(create_pidfile)"
|
|
if ! vm_start "${pidfile}" "${ns0}"; then
|
|
return "${KSFT_FAIL}"
|
|
fi
|
|
vm_wait_for_ssh "${ns0}"
|
|
|
|
outfile=$(mktemp)
|
|
vm_ssh "${ns0}" -- \
|
|
socat VSOCK-LISTEN:"${port}",fork STDOUT > "${outfile}" 2>/dev/null &
|
|
pids+=($!)
|
|
vm_wait_for_listener "${ns0}" "${port}" "vsock"
|
|
|
|
# We use a pipe here so that we can echo into the pipe instead of using
|
|
# socat and a unix socket file. We just need a name for the pipe (not a
|
|
# regular file) so use -u.
|
|
pipefile=$(mktemp -u /tmp/vmtest_pipe_XXXX)
|
|
ip netns exec "${ns1}" \
|
|
socat PIPE:"${pipefile}" VSOCK-CONNECT:"${VSOCK_CID}":"${port}" &
|
|
pids+=($!)
|
|
|
|
timeout "${WAIT_PERIOD}" \
|
|
bash -c 'while [[ ! -e '"${pipefile}"' ]]; do sleep 1; done; exit 0'
|
|
|
|
if [[ "$1" == "vm" ]]; then
|
|
ip netns del "${ns0}"
|
|
elif [[ "$1" == "host" ]]; then
|
|
ip netns del "${ns1}"
|
|
elif [[ "$1" == "both" ]]; then
|
|
ip netns del "${ns0}"
|
|
ip netns del "${ns1}"
|
|
fi
|
|
|
|
echo "TEST" > "${pipefile}"
|
|
|
|
timeout "${WAIT_PERIOD}" \
|
|
bash -c 'while [[ ! -s '"${outfile}"' ]]; do sleep 1; done; exit 0'
|
|
|
|
if grep -q "TEST" "${outfile}"; then
|
|
rc="${KSFT_PASS}"
|
|
else
|
|
rc="${KSFT_FAIL}"
|
|
fi
|
|
|
|
terminate_pidfiles "${pidfile}"
|
|
terminate_pids "${pids[@]}"
|
|
rm -f "${outfile}" "${pipefile}"
|
|
|
|
return "${rc}"
|
|
}
|
|
|
|
test_ns_delete_vm_ok() {
|
|
check_ns_delete_doesnt_break_connection "vm"
|
|
}
|
|
|
|
test_ns_delete_host_ok() {
|
|
check_ns_delete_doesnt_break_connection "host"
|
|
}
|
|
|
|
test_ns_delete_both_ok() {
|
|
check_ns_delete_doesnt_break_connection "both"
|
|
}
|
|
|
|
shared_vm_test() {
|
|
local tname
|
|
|
|
tname="${1}"
|
|
|
|
for testname in "${USE_SHARED_VM[@]}"; do
|
|
if [[ "${tname}" == "${testname}" ]]; then
|
|
return 0
|
|
fi
|
|
done
|
|
|
|
return 1
|
|
}
|
|
|
|
shared_vm_tests_requested() {
|
|
for arg in "$@"; do
|
|
if shared_vm_test "${arg}"; then
|
|
return 0
|
|
fi
|
|
done
|
|
|
|
return 1
|
|
}
|
|
|
|
run_shared_vm_tests() {
|
|
local arg
|
|
|
|
for arg in "$@"; do
|
|
if ! shared_vm_test "${arg}"; then
|
|
continue
|
|
fi
|
|
|
|
if ! check_netns "${arg}"; then
|
|
check_result "${KSFT_SKIP}" "${arg}"
|
|
continue
|
|
fi
|
|
|
|
run_shared_vm_test "${arg}"
|
|
check_result "$?" "${arg}"
|
|
done
|
|
}
|
|
|
|
run_shared_vm_test() {
|
|
local host_oops_cnt_before
|
|
local host_warn_cnt_before
|
|
local vm_oops_cnt_before
|
|
local vm_warn_cnt_before
|
|
local host_oops_cnt_after
|
|
local host_warn_cnt_after
|
|
local vm_oops_cnt_after
|
|
local vm_warn_cnt_after
|
|
local name
|
|
local rc
|
|
|
|
host_oops_cnt_before=$(dmesg | grep -c -i 'Oops')
|
|
host_warn_cnt_before=$(dmesg --level=warn | grep -c -i 'vsock')
|
|
vm_oops_cnt_before=$(vm_dmesg_oops_count "init_ns")
|
|
vm_warn_cnt_before=$(vm_dmesg_warn_count "init_ns")
|
|
|
|
name=$(echo "${1}" | awk '{ print $1 }')
|
|
eval test_"${name}"
|
|
rc=$?
|
|
|
|
host_oops_cnt_after=$(dmesg | grep -i 'Oops' | wc -l)
|
|
if [[ ${host_oops_cnt_after} -gt ${host_oops_cnt_before} ]]; then
|
|
echo "FAIL: kernel oops detected on host" | log_host
|
|
rc=$KSFT_FAIL
|
|
fi
|
|
|
|
host_warn_cnt_after=$(dmesg --level=warn | grep -c -i 'vsock')
|
|
if [[ ${host_warn_cnt_after} -gt ${host_warn_cnt_before} ]]; then
|
|
echo "FAIL: kernel warning detected on host" | log_host
|
|
rc=$KSFT_FAIL
|
|
fi
|
|
|
|
vm_oops_cnt_after=$(vm_dmesg_oops_count "init_ns")
|
|
if [[ ${vm_oops_cnt_after} -gt ${vm_oops_cnt_before} ]]; then
|
|
echo "FAIL: kernel oops detected on vm" | log_host
|
|
rc=$KSFT_FAIL
|
|
fi
|
|
|
|
vm_warn_cnt_after=$(vm_dmesg_warn_count "init_ns")
|
|
if [[ ${vm_warn_cnt_after} -gt ${vm_warn_cnt_before} ]]; then
|
|
echo "FAIL: kernel warning detected on vm" | log_host
|
|
rc=$KSFT_FAIL
|
|
fi
|
|
|
|
return "${rc}"
|
|
}
|
|
|
|
run_ns_tests() {
|
|
for arg in "${ARGS[@]}"; do
|
|
if shared_vm_test "${arg}"; then
|
|
continue
|
|
fi
|
|
|
|
if ! check_netns "${arg}"; then
|
|
check_result "${KSFT_SKIP}" "${arg}"
|
|
continue
|
|
fi
|
|
|
|
add_namespaces
|
|
|
|
name=$(echo "${arg}" | awk '{ print $1 }')
|
|
log_host "Executing test_${name}"
|
|
|
|
host_oops_before=$(dmesg 2>/dev/null | grep -c -i 'Oops')
|
|
host_warn_before=$(dmesg --level=warn 2>/dev/null | grep -c -i 'vsock')
|
|
eval test_"${name}"
|
|
rc=$?
|
|
|
|
host_oops_after=$(dmesg 2>/dev/null | grep -c -i 'Oops')
|
|
if [[ "${host_oops_after}" -gt "${host_oops_before}" ]]; then
|
|
echo "FAIL: kernel oops detected on host" | log_host
|
|
check_result "${KSFT_FAIL}" "${name}"
|
|
del_namespaces
|
|
continue
|
|
fi
|
|
|
|
host_warn_after=$(dmesg --level=warn 2>/dev/null | grep -c -i 'vsock')
|
|
if [[ "${host_warn_after}" -gt "${host_warn_before}" ]]; then
|
|
echo "FAIL: kernel warning detected on host" | log_host
|
|
check_result "${KSFT_FAIL}" "${name}"
|
|
del_namespaces
|
|
continue
|
|
fi
|
|
|
|
check_result "${rc}" "${name}"
|
|
|
|
del_namespaces
|
|
done
|
|
}
|
|
|
|
BUILD=0
|
|
QEMU="qemu-system-$(uname -m)"
|
|
|
|
while getopts :hvsq:b o
|
|
do
|
|
case $o in
|
|
v) VERBOSE=1;;
|
|
b) BUILD=1;;
|
|
q) QEMU=$OPTARG;;
|
|
h|*) usage;;
|
|
esac
|
|
done
|
|
shift $((OPTIND-1))
|
|
|
|
trap cleanup EXIT
|
|
|
|
if [[ ${#} -eq 0 ]]; then
|
|
ARGS=("${TEST_NAMES[@]}")
|
|
else
|
|
ARGS=("$@")
|
|
fi
|
|
|
|
check_args "${ARGS[@]}"
|
|
check_deps
|
|
check_vng
|
|
check_socat
|
|
handle_build
|
|
|
|
echo "1..${#ARGS[@]}"
|
|
|
|
cnt_pass=0
|
|
cnt_fail=0
|
|
cnt_skip=0
|
|
cnt_total=0
|
|
|
|
if shared_vm_tests_requested "${ARGS[@]}"; then
|
|
log_host "Booting up VM"
|
|
pidfile="$(create_pidfile)"
|
|
vm_start "${pidfile}" "init_ns"
|
|
vm_wait_for_ssh "init_ns"
|
|
log_host "VM booted up"
|
|
|
|
run_shared_vm_tests "${ARGS[@]}"
|
|
terminate_pidfiles "${pidfile}"
|
|
fi
|
|
|
|
run_ns_tests "${ARGS[@]}"
|
|
|
|
echo "SUMMARY: PASS=${cnt_pass} SKIP=${cnt_skip} FAIL=${cnt_fail}"
|
|
echo "Log: ${LOG}"
|
|
|
|
if [ $((cnt_pass + cnt_skip)) -eq ${cnt_total} ]; then
|
|
exit "$KSFT_PASS"
|
|
else
|
|
exit "$KSFT_FAIL"
|
|
fi
|