19762338dSopenharmony_ci/*
29762338dSopenharmony_ci * Copyright (C) 2024 HiHope Open Source Organization.
39762338dSopenharmony_ci * Licensed under the Apache License, Version 2.0 (the "License");
49762338dSopenharmony_ci * you may not use this file except in compliance with the License.
59762338dSopenharmony_ci * You may obtain a copy of the License at
69762338dSopenharmony_ci *
79762338dSopenharmony_ci *     http://www.apache.org/licenses/LICENSE-2.0
89762338dSopenharmony_ci *
99762338dSopenharmony_ci * Unless required by applicable law or agreed to in writing, software
109762338dSopenharmony_ci * distributed under the License is distributed on an "AS IS" BASIS,
119762338dSopenharmony_ci * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
129762338dSopenharmony_ci * See the License for the specific language governing permissions and
139762338dSopenharmony_ci * limitations under the License.
149762338dSopenharmony_ci */
159762338dSopenharmony_ci
169762338dSopenharmony_ci#include <cerrno>
179762338dSopenharmony_ci#include <cstdio>
189762338dSopenharmony_ci#include <cstdlib>
199762338dSopenharmony_ci#include <csignal>
209762338dSopenharmony_ci#include <string>
219762338dSopenharmony_ci#include <vector>
229762338dSopenharmony_ci#include <fcntl.h>
239762338dSopenharmony_ci#include <sched.h>
249762338dSopenharmony_ci#include <unistd.h>
259762338dSopenharmony_ci#include <gtest/gtest.h>
269762338dSopenharmony_ci#include "securec.h"
279762338dSopenharmony_ci
289762338dSopenharmony_ciusing namespace testing::ext;
299762338dSopenharmony_ci
309762338dSopenharmony_cistatic const int PATH_MAX_SIZE = 128;
319762338dSopenharmony_ci
329762338dSopenharmony_ciclass HatsSetnsTest : public testing::Test {
339762338dSopenharmony_cipublic:
349762338dSopenharmony_ci    static void SetUpTestCase();
359762338dSopenharmony_ci    static void TearDownTestCase();
369762338dSopenharmony_ci    void SetUp();
379762338dSopenharmony_ci    void TearDown();
389762338dSopenharmony_ciprivate:
399762338dSopenharmony_ci};
409762338dSopenharmony_civoid HatsSetnsTest::SetUp()
419762338dSopenharmony_ci{
429762338dSopenharmony_ci}
439762338dSopenharmony_ci
449762338dSopenharmony_civoid HatsSetnsTest::TearDown()
459762338dSopenharmony_ci{
469762338dSopenharmony_ci}
479762338dSopenharmony_ci
489762338dSopenharmony_civoid HatsSetnsTest::SetUpTestCase()
499762338dSopenharmony_ci{
509762338dSopenharmony_ci}
519762338dSopenharmony_ci
529762338dSopenharmony_civoid HatsSetnsTest::TearDownTestCase()
539762338dSopenharmony_ci{
549762338dSopenharmony_ci}
559762338dSopenharmony_ci
569762338dSopenharmony_ci/*
579762338dSopenharmony_ci * @tc.number : SUB_KERNEL_SYSCALL_SETNS_0100
589762338dSopenharmony_ci * @tc.name   : SetnsTest_0001
599762338dSopenharmony_ci * @tc.desc   : setns success.
609762338dSopenharmony_ci * @tc.size   : MediumTest
619762338dSopenharmony_ci * @tc.type   : Function
629762338dSopenharmony_ci * @tc.level  : Level 1
639762338dSopenharmony_ci */
649762338dSopenharmony_ciHWTEST_F(HatsSetnsTest, SetnsTest_0001, Function | MediumTest | Level1)
659762338dSopenharmony_ci{
669762338dSopenharmony_ci    char path[PATH_MAX_SIZE] = { 0 };
679762338dSopenharmony_ci    pid_t pid = getpid();
689762338dSopenharmony_ci
699762338dSopenharmony_ci    // test CLONE_NEWIPC success
709762338dSopenharmony_ci    int ret = sprintf_s(path, PATH_MAX_SIZE - 1, "/proc/%d/ns/ipc", pid);
719762338dSopenharmony_ci    EXPECT_TRUE(ret > 0);
729762338dSopenharmony_ci    int fd = open(path, O_RDONLY);
739762338dSopenharmony_ci    EXPECT_TRUE(fd > 0);
749762338dSopenharmony_ci
759762338dSopenharmony_ci    ret = setns(fd, CLONE_NEWIPC);
769762338dSopenharmony_ci    EXPECT_EQ(ret, 0);
779762338dSopenharmony_ci    close(fd);
789762338dSopenharmony_ci
799762338dSopenharmony_ci    // test CLONE_NEWNET success
809762338dSopenharmony_ci    memset_s(path, PATH_MAX_SIZE, 0, sizeof(path));
819762338dSopenharmony_ci    ret = sprintf_s(path, PATH_MAX_SIZE - 1, "/proc/%d/ns/net", pid);
829762338dSopenharmony_ci    EXPECT_TRUE(ret > 0);
839762338dSopenharmony_ci    fd = open(path, O_RDONLY);
849762338dSopenharmony_ci    EXPECT_TRUE(fd > 0);
859762338dSopenharmony_ci
869762338dSopenharmony_ci    ret = setns(fd, CLONE_NEWNET);
879762338dSopenharmony_ci    EXPECT_EQ(ret, 0);
889762338dSopenharmony_ci    close(fd);
899762338dSopenharmony_ci
909762338dSopenharmony_ci    // test CLONE_NEWPID success
919762338dSopenharmony_ci    memset_s(path, PATH_MAX_SIZE, 0, sizeof(path));
929762338dSopenharmony_ci    ret = sprintf_s(path, PATH_MAX_SIZE - 1, "/proc/%d/ns/pid", pid);
939762338dSopenharmony_ci    EXPECT_TRUE(ret > 0);
949762338dSopenharmony_ci    fd = open(path, O_RDONLY);
959762338dSopenharmony_ci    EXPECT_TRUE(fd > 0);
969762338dSopenharmony_ci
979762338dSopenharmony_ci    ret = setns(fd, CLONE_NEWPID);
989762338dSopenharmony_ci    EXPECT_EQ(ret, 0);
999762338dSopenharmony_ci    close(fd);
1009762338dSopenharmony_ci
1019762338dSopenharmony_ci    // test CLONE_NEWUTS success
1029762338dSopenharmony_ci    memset_s(path, PATH_MAX_SIZE, 0, sizeof(path));
1039762338dSopenharmony_ci    ret = sprintf_s(path, PATH_MAX_SIZE - 1, "/proc/%d/ns/uts", pid);
1049762338dSopenharmony_ci    EXPECT_TRUE(ret > 0);
1059762338dSopenharmony_ci    fd = open(path, O_RDONLY);
1069762338dSopenharmony_ci    EXPECT_TRUE(fd > 0);
1079762338dSopenharmony_ci
1089762338dSopenharmony_ci    ret = setns(fd, CLONE_NEWUTS);
1099762338dSopenharmony_ci    EXPECT_EQ(ret, 0);
1109762338dSopenharmony_ci
1119762338dSopenharmony_ci    close(fd);
1129762338dSopenharmony_ci}
113