1f08c3bdfSopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
2f08c3bdfSopenharmony_ci/*
3f08c3bdfSopenharmony_ci * Copyright (c) Huawei Technologies Co., Ltd., 2015
4f08c3bdfSopenharmony_ci * Copyright (C) 2023 SUSE LLC Andrea Cervesato <andrea.cervesato@suse.com>
5f08c3bdfSopenharmony_ci */
6f08c3bdfSopenharmony_ci
7f08c3bdfSopenharmony_ci/*\
8f08c3bdfSopenharmony_ci * [Description]
9f08c3bdfSopenharmony_ci *
10f08c3bdfSopenharmony_ci * Clone a process with CLONE_NEWPID flag and check for the maxium amount of
11f08c3bdfSopenharmony_ci * nested containers.
12f08c3bdfSopenharmony_ci */
13f08c3bdfSopenharmony_ci
14f08c3bdfSopenharmony_ci#define _GNU_SOURCE
15f08c3bdfSopenharmony_ci#include <sys/mman.h>
16f08c3bdfSopenharmony_ci#include "tst_test.h"
17f08c3bdfSopenharmony_ci#include "tst_atomic.h"
18f08c3bdfSopenharmony_ci#include "lapi/sched.h"
19f08c3bdfSopenharmony_ci
20f08c3bdfSopenharmony_ci#define MAXNEST 32
21f08c3bdfSopenharmony_ci
22f08c3bdfSopenharmony_cistatic const struct tst_clone_args args = {
23f08c3bdfSopenharmony_ci	.flags = CLONE_NEWPID,
24f08c3bdfSopenharmony_ci	.exit_signal = SIGCHLD,
25f08c3bdfSopenharmony_ci};
26f08c3bdfSopenharmony_cistatic int *level;
27f08c3bdfSopenharmony_ci
28f08c3bdfSopenharmony_cistatic pid_t child_func(void)
29f08c3bdfSopenharmony_ci{
30f08c3bdfSopenharmony_ci	pid_t cpid = 0;
31f08c3bdfSopenharmony_ci
32f08c3bdfSopenharmony_ci	if (tst_atomic_inc(level) == MAXNEST)
33f08c3bdfSopenharmony_ci		return cpid;
34f08c3bdfSopenharmony_ci
35f08c3bdfSopenharmony_ci	cpid = SAFE_CLONE(&args);
36f08c3bdfSopenharmony_ci	if (!cpid) {
37f08c3bdfSopenharmony_ci		child_func();
38f08c3bdfSopenharmony_ci		return cpid;
39f08c3bdfSopenharmony_ci	}
40f08c3bdfSopenharmony_ci
41f08c3bdfSopenharmony_ci	tst_reap_children();
42f08c3bdfSopenharmony_ci
43f08c3bdfSopenharmony_ci	return cpid;
44f08c3bdfSopenharmony_ci}
45f08c3bdfSopenharmony_ci
46f08c3bdfSopenharmony_cistatic void setup(void)
47f08c3bdfSopenharmony_ci{
48f08c3bdfSopenharmony_ci	level = SAFE_MMAP(NULL, sizeof(int), PROT_READ | PROT_WRITE, MAP_SHARED | MAP_ANONYMOUS, -1, 0);
49f08c3bdfSopenharmony_ci}
50f08c3bdfSopenharmony_ci
51f08c3bdfSopenharmony_cistatic void cleanup(void)
52f08c3bdfSopenharmony_ci{
53f08c3bdfSopenharmony_ci	SAFE_MUNMAP(level, sizeof(int));
54f08c3bdfSopenharmony_ci}
55f08c3bdfSopenharmony_ci
56f08c3bdfSopenharmony_cistatic void run(void)
57f08c3bdfSopenharmony_ci{
58f08c3bdfSopenharmony_ci	*level = 0;
59f08c3bdfSopenharmony_ci
60f08c3bdfSopenharmony_ci	if (!child_func())
61f08c3bdfSopenharmony_ci		return;
62f08c3bdfSopenharmony_ci
63f08c3bdfSopenharmony_ci	TST_EXP_EQ_LI(*level, MAXNEST);
64f08c3bdfSopenharmony_ci}
65f08c3bdfSopenharmony_ci
66f08c3bdfSopenharmony_cistatic struct tst_test test = {
67f08c3bdfSopenharmony_ci	.test_all = run,
68f08c3bdfSopenharmony_ci	.needs_root = 1,
69f08c3bdfSopenharmony_ci	.setup = setup,
70f08c3bdfSopenharmony_ci	.cleanup = cleanup,
71f08c3bdfSopenharmony_ci	.forks_child = 1,
72f08c3bdfSopenharmony_ci};
73