| Elliott Hughes | a55f630 | 2013-01-02 14:23:43 -0800 | [diff] [blame] | 1 | /* | 
 | 2 |  * Copyright (C) 2012 The Android Open Source Project | 
 | 3 |  * | 
 | 4 |  * Licensed under the Apache License, Version 2.0 (the "License"); | 
 | 5 |  * you may not use this file except in compliance with the License. | 
 | 6 |  * You may obtain a copy of the License at | 
 | 7 |  * | 
 | 8 |  *      http://www.apache.org/licenses/LICENSE-2.0 | 
 | 9 |  * | 
 | 10 |  * Unless required by applicable law or agreed to in writing, software | 
 | 11 |  * distributed under the License is distributed on an "AS IS" BASIS, | 
 | 12 |  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 | 13 |  * See the License for the specific language governing permissions and | 
 | 14 |  * limitations under the License. | 
 | 15 |  */ | 
 | 16 |  | 
 | 17 | #include <gtest/gtest.h> | 
| Elliott Hughes | 33697a0 | 2016-01-26 13:04:57 -0800 | [diff] [blame] | 18 |  | 
| Yabin Cui | 9df7040 | 2014-11-05 18:01:01 -0800 | [diff] [blame] | 19 | #include "BionicDeathTest.h" | 
| Christopher Ferris | 1361313 | 2013-10-28 15:24:04 -0700 | [diff] [blame] | 20 | #include "ScopedSignalHandler.h" | 
| Elliott Hughes | b4f7616 | 2013-09-19 16:27:24 -0700 | [diff] [blame] | 21 | #include "TemporaryFile.h" | 
| Elliott Hughes | 33697a0 | 2016-01-26 13:04:57 -0800 | [diff] [blame] | 22 | #include "utils.h" | 
| Elliott Hughes | a55f630 | 2013-01-02 14:23:43 -0800 | [diff] [blame] | 23 |  | 
| Elliott Hughes | 915fefb | 2014-02-18 12:34:51 -0800 | [diff] [blame] | 24 | #include <errno.h> | 
| Colin Cross | 3d19a83 | 2014-02-14 18:56:23 -0800 | [diff] [blame] | 25 | #include <fcntl.h> | 
| Elliott Hughes | 21972b6 | 2014-07-28 12:24:22 -0700 | [diff] [blame] | 26 | #include <limits.h> | 
| Elliott Hughes | 428f556 | 2013-02-05 16:10:59 -0800 | [diff] [blame] | 27 | #include <stdint.h> | 
| Greg Hackmann | e2faf07 | 2016-03-03 08:37:53 -0800 | [diff] [blame] | 28 | #include <sys/capability.h> | 
| Yabin Cui | b5e581a | 2014-11-08 14:58:12 -0800 | [diff] [blame] | 29 | #include <sys/param.h> | 
| Elliott Hughes | 7086ad6 | 2014-06-19 16:39:01 -0700 | [diff] [blame] | 30 | #include <sys/syscall.h> | 
| Elliott Hughes | 764a993 | 2014-04-08 19:44:36 -0700 | [diff] [blame] | 31 | #include <sys/types.h> | 
| Derek Xue | d94e7f0 | 2014-09-25 11:12:01 +0100 | [diff] [blame] | 32 | #include <sys/utsname.h> | 
| Elliott Hughes | 764a993 | 2014-04-08 19:44:36 -0700 | [diff] [blame] | 33 | #include <sys/wait.h> | 
| Yabin Cui | 9df7040 | 2014-11-05 18:01:01 -0800 | [diff] [blame] | 34 | #include <unistd.h> | 
 | 35 |  | 
| Elliott Hughes | 939a7e0 | 2015-12-04 15:27:46 -0800 | [diff] [blame] | 36 | #include <android-base/file.h> | 
 | 37 | #include <android-base/strings.h> | 
| Yabin Cui | cb6f599 | 2015-09-29 16:11:45 -0700 | [diff] [blame] | 38 |  | 
 | 39 | #include "private/get_cpu_count_from_string.h" | 
 | 40 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 41 | #if defined(NOFORTIFY) | 
 | 42 | #define UNISTD_TEST unistd_nofortify | 
 | 43 | #define UNISTD_DEATHTEST unistd_nofortify_DeathTest | 
 | 44 | #else | 
 | 45 | #define UNISTD_TEST unistd | 
 | 46 | #define UNISTD_DEATHTEST unistd_DeathTest | 
 | 47 | #endif | 
 | 48 |  | 
| Elliott Hughes | 533dde4 | 2014-04-25 18:27:38 -0700 | [diff] [blame] | 49 | static void* get_brk() { | 
 | 50 |   return sbrk(0); | 
 | 51 | } | 
| Elliott Hughes | 428f556 | 2013-02-05 16:10:59 -0800 | [diff] [blame] | 52 |  | 
| Elliott Hughes | 533dde4 | 2014-04-25 18:27:38 -0700 | [diff] [blame] | 53 | static void* page_align(uintptr_t addr) { | 
 | 54 |   uintptr_t mask = sysconf(_SC_PAGE_SIZE) - 1; | 
 | 55 |   return reinterpret_cast<void*>((addr + mask) & ~mask); | 
 | 56 | } | 
 | 57 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 58 | TEST(UNISTD_TEST, brk) { | 
| Elliott Hughes | 533dde4 | 2014-04-25 18:27:38 -0700 | [diff] [blame] | 59 |   void* initial_break = get_brk(); | 
 | 60 |  | 
| Elliott Hughes | 533dde4 | 2014-04-25 18:27:38 -0700 | [diff] [blame] | 61 |   void* new_break = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(initial_break) + 1); | 
| Daniel Micay | 126ab12 | 2015-12-31 08:04:53 -0500 | [diff] [blame] | 62 |   int ret = brk(new_break); | 
 | 63 |   if (ret == -1) { | 
 | 64 |     ASSERT_EQ(errno, ENOMEM); | 
 | 65 |   } else { | 
 | 66 |     ASSERT_EQ(0, ret); | 
 | 67 |     ASSERT_GE(get_brk(), new_break); | 
 | 68 |   } | 
| Elliott Hughes | 428f556 | 2013-02-05 16:10:59 -0800 | [diff] [blame] | 69 |  | 
| Daniel Micay | 126ab12 | 2015-12-31 08:04:53 -0500 | [diff] [blame] | 70 |   // Expand by a full page to force the mapping to expand | 
| Elliott Hughes | 533dde4 | 2014-04-25 18:27:38 -0700 | [diff] [blame] | 71 |   new_break = page_align(reinterpret_cast<uintptr_t>(initial_break) + sysconf(_SC_PAGE_SIZE)); | 
| Daniel Micay | 126ab12 | 2015-12-31 08:04:53 -0500 | [diff] [blame] | 72 |   ret = brk(new_break); | 
 | 73 |   if (ret == -1) { | 
 | 74 |     ASSERT_EQ(errno, ENOMEM); | 
 | 75 |   } else { | 
 | 76 |     ASSERT_EQ(0, ret); | 
 | 77 |     ASSERT_EQ(get_brk(), new_break); | 
 | 78 |   } | 
| Elliott Hughes | 533dde4 | 2014-04-25 18:27:38 -0700 | [diff] [blame] | 79 | } | 
 | 80 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 81 | TEST(UNISTD_TEST, brk_ENOMEM) { | 
| Elliott Hughes | 533dde4 | 2014-04-25 18:27:38 -0700 | [diff] [blame] | 82 |   ASSERT_EQ(-1, brk(reinterpret_cast<void*>(-1))); | 
 | 83 |   ASSERT_EQ(ENOMEM, errno); | 
 | 84 | } | 
 | 85 |  | 
| Christopher Ferris | 738b0cc | 2014-05-21 19:03:34 -0700 | [diff] [blame] | 86 | #if defined(__GLIBC__) | 
 | 87 | #define SBRK_MIN INTPTR_MIN | 
 | 88 | #define SBRK_MAX INTPTR_MAX | 
 | 89 | #else | 
 | 90 | #define SBRK_MIN PTRDIFF_MIN | 
 | 91 | #define SBRK_MAX PTRDIFF_MAX | 
 | 92 | #endif | 
 | 93 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 94 | TEST(UNISTD_TEST, sbrk_ENOMEM) { | 
| Christopher Ferris | 738b0cc | 2014-05-21 19:03:34 -0700 | [diff] [blame] | 95 | #if defined(__BIONIC__) && !defined(__LP64__) | 
 | 96 |   // There is no way to guarantee that all overflow conditions can be tested | 
 | 97 |   // without manipulating the underlying values of the current break. | 
 | 98 |   extern void* __bionic_brk; | 
 | 99 |  | 
 | 100 |   class ScopedBrk { | 
 | 101 |   public: | 
 | 102 |     ScopedBrk() : saved_brk_(__bionic_brk) {} | 
 | 103 |     virtual ~ScopedBrk() { __bionic_brk = saved_brk_; } | 
 | 104 |  | 
 | 105 |   private: | 
 | 106 |     void* saved_brk_; | 
 | 107 |   }; | 
 | 108 |  | 
 | 109 |   ScopedBrk scope_brk; | 
 | 110 |  | 
 | 111 |   // Set the current break to a point that will cause an overflow. | 
 | 112 |   __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) + 2); | 
| Elliott Hughes | 533dde4 | 2014-04-25 18:27:38 -0700 | [diff] [blame] | 113 |  | 
 | 114 |   // Can't increase by so much that we'd overflow. | 
 | 115 |   ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MAX)); | 
 | 116 |   ASSERT_EQ(ENOMEM, errno); | 
 | 117 |  | 
| Christopher Ferris | 738b0cc | 2014-05-21 19:03:34 -0700 | [diff] [blame] | 118 |   // Set the current break to a point that will cause an overflow. | 
 | 119 |   __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX)); | 
| Elliott Hughes | 533dde4 | 2014-04-25 18:27:38 -0700 | [diff] [blame] | 120 |  | 
| Elliott Hughes | 533dde4 | 2014-04-25 18:27:38 -0700 | [diff] [blame] | 121 |   ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN)); | 
 | 122 |   ASSERT_EQ(ENOMEM, errno); | 
| Christopher Ferris | 738b0cc | 2014-05-21 19:03:34 -0700 | [diff] [blame] | 123 |  | 
 | 124 |   __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) - 1); | 
 | 125 |  | 
 | 126 |   ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN + 1)); | 
 | 127 |   ASSERT_EQ(ENOMEM, errno); | 
 | 128 | #else | 
 | 129 |   class ScopedBrk { | 
 | 130 |   public: | 
 | 131 |     ScopedBrk() : saved_brk_(get_brk()) {} | 
 | 132 |     virtual ~ScopedBrk() { brk(saved_brk_); } | 
 | 133 |  | 
 | 134 |   private: | 
 | 135 |     void* saved_brk_; | 
 | 136 |   }; | 
 | 137 |  | 
 | 138 |   ScopedBrk scope_brk; | 
 | 139 |  | 
 | 140 |   uintptr_t cur_brk = reinterpret_cast<uintptr_t>(get_brk()); | 
 | 141 |   if (cur_brk < static_cast<uintptr_t>(-(SBRK_MIN+1))) { | 
 | 142 |     // Do the overflow test for a max negative increment. | 
 | 143 |     ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MIN)); | 
 | 144 | #if defined(__BIONIC__) | 
 | 145 |     // GLIBC does not set errno in overflow case. | 
 | 146 |     ASSERT_EQ(ENOMEM, errno); | 
 | 147 | #endif | 
 | 148 |   } | 
 | 149 |  | 
 | 150 |   uintptr_t overflow_brk = static_cast<uintptr_t>(SBRK_MAX) + 2; | 
 | 151 |   if (cur_brk < overflow_brk) { | 
 | 152 |     // Try and move the value to PTRDIFF_MAX + 2. | 
 | 153 |     cur_brk = reinterpret_cast<uintptr_t>(sbrk(overflow_brk)); | 
 | 154 |   } | 
 | 155 |   if (cur_brk >= overflow_brk) { | 
 | 156 |     ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MAX)); | 
 | 157 | #if defined(__BIONIC__) | 
 | 158 |     // GLIBC does not set errno in overflow case. | 
 | 159 |     ASSERT_EQ(ENOMEM, errno); | 
 | 160 | #endif | 
 | 161 |   } | 
| Elliott Hughes | 533dde4 | 2014-04-25 18:27:38 -0700 | [diff] [blame] | 162 | #endif | 
| Elliott Hughes | 428f556 | 2013-02-05 16:10:59 -0800 | [diff] [blame] | 163 | } | 
| Elliott Hughes | b4f7616 | 2013-09-19 16:27:24 -0700 | [diff] [blame] | 164 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 165 | TEST(UNISTD_TEST, truncate) { | 
| Elliott Hughes | b4f7616 | 2013-09-19 16:27:24 -0700 | [diff] [blame] | 166 |   TemporaryFile tf; | 
 | 167 |   ASSERT_EQ(0, close(tf.fd)); | 
 | 168 |   ASSERT_EQ(0, truncate(tf.filename, 123)); | 
 | 169 |  | 
 | 170 |   struct stat sb; | 
 | 171 |   ASSERT_EQ(0, stat(tf.filename, &sb)); | 
 | 172 |   ASSERT_EQ(123, sb.st_size); | 
 | 173 | } | 
 | 174 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 175 | TEST(UNISTD_TEST, truncate64) { | 
| Elliott Hughes | b4f7616 | 2013-09-19 16:27:24 -0700 | [diff] [blame] | 176 |   TemporaryFile tf; | 
 | 177 |   ASSERT_EQ(0, close(tf.fd)); | 
 | 178 |   ASSERT_EQ(0, truncate64(tf.filename, 123)); | 
 | 179 |  | 
 | 180 |   struct stat sb; | 
 | 181 |   ASSERT_EQ(0, stat(tf.filename, &sb)); | 
 | 182 |   ASSERT_EQ(123, sb.st_size); | 
 | 183 | } | 
 | 184 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 185 | TEST(UNISTD_TEST, ftruncate) { | 
| Elliott Hughes | b4f7616 | 2013-09-19 16:27:24 -0700 | [diff] [blame] | 186 |   TemporaryFile tf; | 
 | 187 |   ASSERT_EQ(0, ftruncate(tf.fd, 123)); | 
 | 188 |   ASSERT_EQ(0, close(tf.fd)); | 
 | 189 |  | 
 | 190 |   struct stat sb; | 
 | 191 |   ASSERT_EQ(0, stat(tf.filename, &sb)); | 
 | 192 |   ASSERT_EQ(123, sb.st_size); | 
 | 193 | } | 
 | 194 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 195 | TEST(UNISTD_TEST, ftruncate64) { | 
| Elliott Hughes | b4f7616 | 2013-09-19 16:27:24 -0700 | [diff] [blame] | 196 |   TemporaryFile tf; | 
 | 197 |   ASSERT_EQ(0, ftruncate64(tf.fd, 123)); | 
 | 198 |   ASSERT_EQ(0, close(tf.fd)); | 
 | 199 |  | 
 | 200 |   struct stat sb; | 
 | 201 |   ASSERT_EQ(0, stat(tf.filename, &sb)); | 
 | 202 |   ASSERT_EQ(123, sb.st_size); | 
 | 203 | } | 
| Elliott Hughes | 1195207 | 2013-10-24 15:15:14 -0700 | [diff] [blame] | 204 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 205 | TEST(UNISTD_TEST, ftruncate_negative) { | 
| Dan Albert | c05554e | 2015-05-19 18:17:31 -0700 | [diff] [blame] | 206 |   TemporaryFile tf; | 
 | 207 |   errno = 0; | 
| Dan Albert | 9d476a0 | 2015-06-01 11:28:31 -0700 | [diff] [blame] | 208 |   ASSERT_EQ(-1, ftruncate(tf.fd, -123)); | 
 | 209 |   ASSERT_EQ(EINVAL, errno); | 
| Dan Albert | c05554e | 2015-05-19 18:17:31 -0700 | [diff] [blame] | 210 | } | 
 | 211 |  | 
| Elliott Hughes | 1728b23 | 2014-05-14 10:02:03 -0700 | [diff] [blame] | 212 | static bool g_pause_test_flag = false; | 
| Elliott Hughes | 1195207 | 2013-10-24 15:15:14 -0700 | [diff] [blame] | 213 | static void PauseTestSignalHandler(int) { | 
| Elliott Hughes | 1728b23 | 2014-05-14 10:02:03 -0700 | [diff] [blame] | 214 |   g_pause_test_flag = true; | 
| Elliott Hughes | 1195207 | 2013-10-24 15:15:14 -0700 | [diff] [blame] | 215 | } | 
 | 216 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 217 | TEST(UNISTD_TEST, pause) { | 
| Christopher Ferris | 1361313 | 2013-10-28 15:24:04 -0700 | [diff] [blame] | 218 |   ScopedSignalHandler handler(SIGALRM, PauseTestSignalHandler); | 
 | 219 |  | 
| Elliott Hughes | 1195207 | 2013-10-24 15:15:14 -0700 | [diff] [blame] | 220 |   alarm(1); | 
| Elliott Hughes | 1728b23 | 2014-05-14 10:02:03 -0700 | [diff] [blame] | 221 |   ASSERT_FALSE(g_pause_test_flag); | 
| Elliott Hughes | 1195207 | 2013-10-24 15:15:14 -0700 | [diff] [blame] | 222 |   ASSERT_EQ(-1, pause()); | 
| Elliott Hughes | 1728b23 | 2014-05-14 10:02:03 -0700 | [diff] [blame] | 223 |   ASSERT_TRUE(g_pause_test_flag); | 
| Elliott Hughes | 1195207 | 2013-10-24 15:15:14 -0700 | [diff] [blame] | 224 | } | 
| Colin Cross | 3d19a83 | 2014-02-14 18:56:23 -0800 | [diff] [blame] | 225 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 226 | TEST(UNISTD_TEST, read) { | 
| Colin Cross | 3d19a83 | 2014-02-14 18:56:23 -0800 | [diff] [blame] | 227 |   int fd = open("/proc/version", O_RDONLY); | 
 | 228 |   ASSERT_TRUE(fd != -1); | 
 | 229 |  | 
 | 230 |   char buf[5]; | 
 | 231 |   ASSERT_EQ(5, read(fd, buf, 5)); | 
 | 232 |   ASSERT_EQ(buf[0], 'L'); | 
 | 233 |   ASSERT_EQ(buf[1], 'i'); | 
 | 234 |   ASSERT_EQ(buf[2], 'n'); | 
 | 235 |   ASSERT_EQ(buf[3], 'u'); | 
 | 236 |   ASSERT_EQ(buf[4], 'x'); | 
 | 237 |   close(fd); | 
 | 238 | } | 
 | 239 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 240 | TEST(UNISTD_TEST, read_EBADF) { | 
| Colin Cross | 3d19a83 | 2014-02-14 18:56:23 -0800 | [diff] [blame] | 241 |   // read returns ssize_t which is 64-bits on LP64, so it's worth explicitly checking that | 
 | 242 |   // our syscall stubs correctly return a 64-bit -1. | 
 | 243 |   char buf[1]; | 
 | 244 |   ASSERT_EQ(-1, read(-1, buf, sizeof(buf))); | 
 | 245 |   ASSERT_EQ(EBADF, errno); | 
 | 246 | } | 
| Elliott Hughes | aedb00d | 2014-03-03 14:38:20 -0800 | [diff] [blame] | 247 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 248 | TEST(UNISTD_TEST, syscall_long) { | 
| Elliott Hughes | 21972b6 | 2014-07-28 12:24:22 -0700 | [diff] [blame] | 249 |   // Check that syscall(3) correctly returns long results. | 
 | 250 |   // https://code.google.com/p/android/issues/detail?id=73952 | 
 | 251 |   // We assume that the break is > 4GiB, but this is potentially flaky. | 
 | 252 |   uintptr_t p = reinterpret_cast<uintptr_t>(sbrk(0)); | 
 | 253 |   ASSERT_EQ(p, static_cast<uintptr_t>(syscall(__NR_brk, 0))); | 
 | 254 | } | 
 | 255 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 256 | TEST(UNISTD_TEST, alarm) { | 
| Elliott Hughes | aedb00d | 2014-03-03 14:38:20 -0800 | [diff] [blame] | 257 |   ASSERT_EQ(0U, alarm(0)); | 
 | 258 | } | 
| Elliott Hughes | 9f52564 | 2014-04-08 17:14:01 -0700 | [diff] [blame] | 259 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 260 | TEST(UNISTD_TEST, _exit) { | 
| Elliott Hughes | 33697a0 | 2016-01-26 13:04:57 -0800 | [diff] [blame] | 261 |   pid_t pid = fork(); | 
| Elliott Hughes | 9f52564 | 2014-04-08 17:14:01 -0700 | [diff] [blame] | 262 |   ASSERT_NE(-1, pid) << strerror(errno); | 
 | 263 |  | 
 | 264 |   if (pid == 0) { | 
 | 265 |     _exit(99); | 
 | 266 |   } | 
 | 267 |  | 
| Elliott Hughes | 33697a0 | 2016-01-26 13:04:57 -0800 | [diff] [blame] | 268 |   AssertChildExited(pid, 99); | 
| Elliott Hughes | 9f52564 | 2014-04-08 17:14:01 -0700 | [diff] [blame] | 269 | } | 
| Grigoriy Kraynov | cbf6df0 | 2013-09-17 15:44:22 +0400 | [diff] [blame] | 270 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 271 | TEST(UNISTD_TEST, getenv_unsetenv) { | 
| Grigoriy Kraynov | cbf6df0 | 2013-09-17 15:44:22 +0400 | [diff] [blame] | 272 |   ASSERT_EQ(0, setenv("test-variable", "hello", 1)); | 
 | 273 |   ASSERT_STREQ("hello", getenv("test-variable")); | 
 | 274 |   ASSERT_EQ(0, unsetenv("test-variable")); | 
 | 275 |   ASSERT_TRUE(getenv("test-variable") == NULL); | 
 | 276 | } | 
 | 277 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 278 | TEST(UNISTD_TEST, unsetenv_EINVAL) { | 
| Grigoriy Kraynov | cbf6df0 | 2013-09-17 15:44:22 +0400 | [diff] [blame] | 279 |   EXPECT_EQ(-1, unsetenv("")); | 
 | 280 |   EXPECT_EQ(EINVAL, errno); | 
 | 281 |   EXPECT_EQ(-1, unsetenv("a=b")); | 
 | 282 |   EXPECT_EQ(EINVAL, errno); | 
 | 283 | } | 
 | 284 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 285 | TEST(UNISTD_TEST, setenv_EINVAL) { | 
| Grigoriy Kraynov | cbf6df0 | 2013-09-17 15:44:22 +0400 | [diff] [blame] | 286 |   EXPECT_EQ(-1, setenv(NULL, "value", 0)); | 
 | 287 |   EXPECT_EQ(EINVAL, errno); | 
 | 288 |   EXPECT_EQ(-1, setenv(NULL, "value", 1)); | 
 | 289 |   EXPECT_EQ(EINVAL, errno); | 
 | 290 |   EXPECT_EQ(-1, setenv("", "value", 0)); | 
 | 291 |   EXPECT_EQ(EINVAL, errno); | 
 | 292 |   EXPECT_EQ(-1, setenv("", "value", 1)); | 
 | 293 |   EXPECT_EQ(EINVAL, errno); | 
 | 294 |   EXPECT_EQ(-1, setenv("a=b", "value", 0)); | 
 | 295 |   EXPECT_EQ(EINVAL, errno); | 
 | 296 |   EXPECT_EQ(-1, setenv("a=b", "value", 1)); | 
 | 297 |   EXPECT_EQ(EINVAL, errno); | 
 | 298 | } | 
 | 299 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 300 | TEST(UNISTD_TEST, setenv) { | 
| Grigoriy Kraynov | cbf6df0 | 2013-09-17 15:44:22 +0400 | [diff] [blame] | 301 |   ASSERT_EQ(0, unsetenv("test-variable")); | 
 | 302 |  | 
 | 303 |   char a[] = "a"; | 
 | 304 |   char b[] = "b"; | 
 | 305 |   char c[] = "c"; | 
 | 306 |  | 
 | 307 |   // New value. | 
 | 308 |   EXPECT_EQ(0, setenv("test-variable", a, 0)); | 
 | 309 |   EXPECT_STREQ(a, getenv("test-variable")); | 
 | 310 |  | 
 | 311 |   // Existing value, no overwrite. | 
 | 312 |   EXPECT_EQ(0, setenv("test-variable", b, 0)); | 
 | 313 |   EXPECT_STREQ(a, getenv("test-variable")); | 
 | 314 |  | 
 | 315 |   // Existing value, overwrite. | 
 | 316 |   EXPECT_EQ(0, setenv("test-variable", c, 1)); | 
 | 317 |   EXPECT_STREQ(c, getenv("test-variable")); | 
 | 318 |   // But the arrays backing the values are unchanged. | 
 | 319 |   EXPECT_EQ('a', a[0]); | 
 | 320 |   EXPECT_EQ('b', b[0]); | 
 | 321 |   EXPECT_EQ('c', c[0]); | 
 | 322 |  | 
 | 323 |   ASSERT_EQ(0, unsetenv("test-variable")); | 
 | 324 | } | 
 | 325 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 326 | TEST(UNISTD_TEST, putenv) { | 
| Grigoriy Kraynov | cbf6df0 | 2013-09-17 15:44:22 +0400 | [diff] [blame] | 327 |   ASSERT_EQ(0, unsetenv("a")); | 
 | 328 |  | 
 | 329 |   char* s1 = strdup("a=b"); | 
 | 330 |   ASSERT_EQ(0, putenv(s1)); | 
 | 331 |  | 
 | 332 |   ASSERT_STREQ("b", getenv("a")); | 
 | 333 |   s1[2] = 'c'; | 
 | 334 |   ASSERT_STREQ("c", getenv("a")); | 
 | 335 |  | 
 | 336 |   char* s2 = strdup("a=b"); | 
 | 337 |   ASSERT_EQ(0, putenv(s2)); | 
 | 338 |  | 
 | 339 |   ASSERT_STREQ("b", getenv("a")); | 
 | 340 |   ASSERT_EQ('c', s1[2]); | 
 | 341 |  | 
 | 342 |   ASSERT_EQ(0, unsetenv("a")); | 
 | 343 |   free(s1); | 
 | 344 |   free(s2); | 
 | 345 | } | 
 | 346 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 347 | TEST(UNISTD_TEST, clearenv) { | 
| Grigoriy Kraynov | cbf6df0 | 2013-09-17 15:44:22 +0400 | [diff] [blame] | 348 |   extern char** environ; | 
 | 349 |  | 
 | 350 |   // Guarantee that environ is not initially empty... | 
 | 351 |   ASSERT_EQ(0, setenv("test-variable", "a", 1)); | 
 | 352 |  | 
 | 353 |   // Stash a copy. | 
 | 354 |   std::vector<char*> old_environ; | 
 | 355 |   for (size_t i = 0; environ[i] != NULL; ++i) { | 
 | 356 |     old_environ.push_back(strdup(environ[i])); | 
 | 357 |   } | 
 | 358 |  | 
 | 359 |   ASSERT_EQ(0, clearenv()); | 
 | 360 |  | 
 | 361 |   EXPECT_TRUE(environ == NULL || environ[0] == NULL); | 
 | 362 |   EXPECT_EQ(NULL, getenv("test-variable")); | 
 | 363 |   EXPECT_EQ(0, setenv("test-variable", "post-clear", 1)); | 
 | 364 |   EXPECT_STREQ("post-clear", getenv("test-variable")); | 
 | 365 |  | 
 | 366 |   // Put the old environment back. | 
 | 367 |   for (size_t i = 0; i < old_environ.size(); ++i) { | 
 | 368 |     EXPECT_EQ(0, putenv(old_environ[i])); | 
 | 369 |   } | 
 | 370 |  | 
 | 371 |   // Check it wasn't overwritten. | 
 | 372 |   EXPECT_STREQ("a", getenv("test-variable")); | 
 | 373 |  | 
 | 374 |   EXPECT_EQ(0, unsetenv("test-variable")); | 
 | 375 | } | 
| Elliott Hughes | a62a28d | 2014-05-07 14:30:33 -0700 | [diff] [blame] | 376 |  | 
 | 377 | static void TestFsyncFunction(int (*fn)(int)) { | 
 | 378 |   int fd; | 
 | 379 |  | 
 | 380 |   // Can't sync an invalid fd. | 
 | 381 |   errno = 0; | 
 | 382 |   EXPECT_EQ(-1, fn(-1)); | 
 | 383 |   EXPECT_EQ(EBADF, errno); | 
 | 384 |  | 
 | 385 |   // It doesn't matter whether you've opened a file for write or not. | 
 | 386 |   TemporaryFile tf; | 
 | 387 |   ASSERT_NE(-1, tf.fd); | 
 | 388 |  | 
 | 389 |   EXPECT_EQ(0, fn(tf.fd)); | 
 | 390 |  | 
 | 391 |   ASSERT_NE(-1, fd = open(tf.filename, O_RDONLY)); | 
 | 392 |   EXPECT_EQ(0, fn(fd)); | 
 | 393 |   close(fd); | 
 | 394 |  | 
 | 395 |   ASSERT_NE(-1, fd = open(tf.filename, O_RDWR)); | 
 | 396 |   EXPECT_EQ(0, fn(fd)); | 
 | 397 |   close(fd); | 
 | 398 |  | 
 | 399 |   // The fd can even be a directory. | 
| Christopher Ferris | a948a4e | 2016-05-20 15:32:47 -0700 | [diff] [blame] | 400 |   ASSERT_NE(-1, fd = open("/data/local/tmp", O_RDONLY)); | 
| Elliott Hughes | a62a28d | 2014-05-07 14:30:33 -0700 | [diff] [blame] | 401 |   EXPECT_EQ(0, fn(fd)); | 
 | 402 |   close(fd); | 
 | 403 |  | 
 | 404 |   // But some file systems may choose to be fussy... | 
 | 405 |   errno = 0; | 
 | 406 |   ASSERT_NE(-1, fd = open("/proc/version", O_RDONLY)); | 
 | 407 |   EXPECT_EQ(-1, fn(fd)); | 
 | 408 |   EXPECT_EQ(EINVAL, errno); | 
 | 409 |   close(fd); | 
 | 410 | } | 
 | 411 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 412 | TEST(UNISTD_TEST, fdatasync) { | 
| Elliott Hughes | a62a28d | 2014-05-07 14:30:33 -0700 | [diff] [blame] | 413 |   TestFsyncFunction(fdatasync); | 
 | 414 | } | 
 | 415 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 416 | TEST(UNISTD_TEST, fsync) { | 
| Elliott Hughes | a62a28d | 2014-05-07 14:30:33 -0700 | [diff] [blame] | 417 |   TestFsyncFunction(fsync); | 
 | 418 | } | 
| Elliott Hughes | 7086ad6 | 2014-06-19 16:39:01 -0700 | [diff] [blame] | 419 |  | 
| Elliott Hughes | fa9e16e | 2014-06-23 17:49:45 -0700 | [diff] [blame] | 420 | static void AssertGetPidCorrect() { | 
 | 421 |   // The loop is just to make manual testing/debugging with strace easier. | 
 | 422 |   pid_t getpid_syscall_result = syscall(__NR_getpid); | 
 | 423 |   for (size_t i = 0; i < 128; ++i) { | 
 | 424 |     ASSERT_EQ(getpid_syscall_result, getpid()); | 
 | 425 |   } | 
 | 426 | } | 
 | 427 |  | 
| Elliott Hughes | 5891abd | 2015-08-07 18:27:47 -0700 | [diff] [blame] | 428 | static void TestGetPidCachingWithFork(int (*fork_fn)()) { | 
| Elliott Hughes | 7086ad6 | 2014-06-19 16:39:01 -0700 | [diff] [blame] | 429 |   pid_t parent_pid = getpid(); | 
 | 430 |   ASSERT_EQ(syscall(__NR_getpid), parent_pid); | 
 | 431 |  | 
| Elliott Hughes | 5891abd | 2015-08-07 18:27:47 -0700 | [diff] [blame] | 432 |   pid_t fork_result = fork_fn(); | 
| Elliott Hughes | 7086ad6 | 2014-06-19 16:39:01 -0700 | [diff] [blame] | 433 |   ASSERT_NE(fork_result, -1); | 
 | 434 |   if (fork_result == 0) { | 
 | 435 |     // We're the child. | 
| Elliott Hughes | fa9e16e | 2014-06-23 17:49:45 -0700 | [diff] [blame] | 436 |     AssertGetPidCorrect(); | 
| Elliott Hughes | 7086ad6 | 2014-06-19 16:39:01 -0700 | [diff] [blame] | 437 |     ASSERT_EQ(parent_pid, getppid()); | 
 | 438 |     _exit(123); | 
 | 439 |   } else { | 
 | 440 |     // We're the parent. | 
 | 441 |     ASSERT_EQ(parent_pid, getpid()); | 
| Elliott Hughes | 33697a0 | 2016-01-26 13:04:57 -0800 | [diff] [blame] | 442 |     AssertChildExited(fork_result, 123); | 
| Elliott Hughes | 7086ad6 | 2014-06-19 16:39:01 -0700 | [diff] [blame] | 443 |   } | 
 | 444 | } | 
 | 445 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 446 | TEST(UNISTD_TEST, getpid_caching_and_fork) { | 
| Elliott Hughes | 5891abd | 2015-08-07 18:27:47 -0700 | [diff] [blame] | 447 |   TestGetPidCachingWithFork(fork); | 
 | 448 | } | 
 | 449 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 450 | TEST(UNISTD_TEST, getpid_caching_and_vfork) { | 
| Elliott Hughes | 5891abd | 2015-08-07 18:27:47 -0700 | [diff] [blame] | 451 |   TestGetPidCachingWithFork(vfork); | 
 | 452 | } | 
 | 453 |  | 
| Elliott Hughes | fa9e16e | 2014-06-23 17:49:45 -0700 | [diff] [blame] | 454 | static int GetPidCachingCloneStartRoutine(void*) { | 
 | 455 |   AssertGetPidCorrect(); | 
 | 456 |   return 123; | 
| Elliott Hughes | 7086ad6 | 2014-06-19 16:39:01 -0700 | [diff] [blame] | 457 | } | 
 | 458 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 459 | TEST(UNISTD_TEST, getpid_caching_and_clone) { | 
| Elliott Hughes | fa9e16e | 2014-06-23 17:49:45 -0700 | [diff] [blame] | 460 |   pid_t parent_pid = getpid(); | 
 | 461 |   ASSERT_EQ(syscall(__NR_getpid), parent_pid); | 
 | 462 |  | 
 | 463 |   void* child_stack[1024]; | 
 | 464 |   int clone_result = clone(GetPidCachingCloneStartRoutine, &child_stack[1024], CLONE_NEWNS | SIGCHLD, NULL); | 
| Elliott Hughes | 2b3b2ec | 2014-08-21 19:23:53 -0700 | [diff] [blame] | 465 |   if (clone_result == -1 && errno == EPERM && getuid() != 0) { | 
 | 466 |     GTEST_LOG_(INFO) << "This test only works if you have permission to CLONE_NEWNS; try running as root.\n"; | 
 | 467 |     return; | 
 | 468 |   } | 
| Elliott Hughes | fa9e16e | 2014-06-23 17:49:45 -0700 | [diff] [blame] | 469 |   ASSERT_NE(clone_result, -1); | 
 | 470 |  | 
 | 471 |   ASSERT_EQ(parent_pid, getpid()); | 
 | 472 |  | 
| Elliott Hughes | 33697a0 | 2016-01-26 13:04:57 -0800 | [diff] [blame] | 473 |   AssertChildExited(clone_result, 123); | 
| Elliott Hughes | fa9e16e | 2014-06-23 17:49:45 -0700 | [diff] [blame] | 474 | } | 
 | 475 |  | 
 | 476 | static void* GetPidCachingPthreadStartRoutine(void*) { | 
 | 477 |   AssertGetPidCorrect(); | 
| Elliott Hughes | 7086ad6 | 2014-06-19 16:39:01 -0700 | [diff] [blame] | 478 |   return NULL; | 
 | 479 | } | 
 | 480 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 481 | TEST(UNISTD_TEST, getpid_caching_and_pthread_create) { | 
| Elliott Hughes | 7086ad6 | 2014-06-19 16:39:01 -0700 | [diff] [blame] | 482 |   pid_t parent_pid = getpid(); | 
 | 483 |  | 
 | 484 |   pthread_t t; | 
| Elliott Hughes | fa9e16e | 2014-06-23 17:49:45 -0700 | [diff] [blame] | 485 |   ASSERT_EQ(0, pthread_create(&t, NULL, GetPidCachingPthreadStartRoutine, NULL)); | 
| Elliott Hughes | 7086ad6 | 2014-06-19 16:39:01 -0700 | [diff] [blame] | 486 |  | 
 | 487 |   ASSERT_EQ(parent_pid, getpid()); | 
 | 488 |  | 
 | 489 |   void* result; | 
 | 490 |   ASSERT_EQ(0, pthread_join(t, &result)); | 
 | 491 |   ASSERT_EQ(NULL, result); | 
 | 492 | } | 
| Elliott Hughes | 60452a2 | 2014-09-22 14:41:30 -0700 | [diff] [blame] | 493 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 494 | class UNISTD_DEATHTEST : public BionicDeathTest {}; | 
| Yabin Cui | 9df7040 | 2014-11-05 18:01:01 -0800 | [diff] [blame] | 495 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 496 | TEST_F(UNISTD_DEATHTEST, abort) { | 
| Elliott Hughes | 60452a2 | 2014-09-22 14:41:30 -0700 | [diff] [blame] | 497 |   ASSERT_EXIT(abort(), testing::KilledBySignal(SIGABRT), ""); | 
 | 498 | } | 
| Elliott Hughes | b86a4c7 | 2014-11-07 16:07:13 -0800 | [diff] [blame] | 499 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 500 | TEST(UNISTD_TEST, sethostname) { | 
| Elliott Hughes | b86a4c7 | 2014-11-07 16:07:13 -0800 | [diff] [blame] | 501 |   // The permissions check happens before the argument check, so this will | 
 | 502 |   // fail for a different reason if you're running as root than if you're | 
 | 503 |   // not, but it'll fail either way. Checking that we have the symbol is about | 
 | 504 |   // all we can do for sethostname(2). | 
 | 505 |   ASSERT_EQ(-1, sethostname("", -1)); | 
 | 506 | } | 
| Derek Xue | d94e7f0 | 2014-09-25 11:12:01 +0100 | [diff] [blame] | 507 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 508 | TEST(UNISTD_TEST, gethostname) { | 
| Derek Xue | d94e7f0 | 2014-09-25 11:12:01 +0100 | [diff] [blame] | 509 |   char hostname[HOST_NAME_MAX + 1]; | 
| Derek Xue | d94e7f0 | 2014-09-25 11:12:01 +0100 | [diff] [blame] | 510 |   memset(hostname, 0, sizeof(hostname)); | 
 | 511 |  | 
| Yongqin Liu | 2f954ba | 2014-10-30 16:34:55 +0800 | [diff] [blame] | 512 |   // Can we get the hostname with a big buffer? | 
| Derek Xue | d94e7f0 | 2014-09-25 11:12:01 +0100 | [diff] [blame] | 513 |   ASSERT_EQ(0, gethostname(hostname, HOST_NAME_MAX)); | 
| Yongqin Liu | 2f954ba | 2014-10-30 16:34:55 +0800 | [diff] [blame] | 514 |  | 
 | 515 |   // Can we get the hostname with a right-sized buffer? | 
 | 516 |   errno = 0; | 
 | 517 |   ASSERT_EQ(0, gethostname(hostname, strlen(hostname) + 1)); | 
 | 518 |  | 
 | 519 |   // Does uname(2) agree? | 
| Derek Xue | d94e7f0 | 2014-09-25 11:12:01 +0100 | [diff] [blame] | 520 |   utsname buf; | 
 | 521 |   ASSERT_EQ(0, uname(&buf)); | 
 | 522 |   ASSERT_EQ(0, strncmp(hostname, buf.nodename, SYS_NMLN)); | 
 | 523 |   ASSERT_GT(strlen(hostname), 0U); | 
 | 524 |  | 
| Yongqin Liu | 2f954ba | 2014-10-30 16:34:55 +0800 | [diff] [blame] | 525 |   // Do we correctly detect truncation? | 
| Derek Xue | d94e7f0 | 2014-09-25 11:12:01 +0100 | [diff] [blame] | 526 |   errno = 0; | 
 | 527 |   ASSERT_EQ(-1, gethostname(hostname, strlen(hostname))); | 
 | 528 |   ASSERT_EQ(ENAMETOOLONG, errno); | 
| Derek Xue | d94e7f0 | 2014-09-25 11:12:01 +0100 | [diff] [blame] | 529 | } | 
| Yabin Cui | b5e581a | 2014-11-08 14:58:12 -0800 | [diff] [blame] | 530 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 531 | TEST(UNISTD_TEST, pathconf_fpathconf) { | 
| Yabin Cui | b5e581a | 2014-11-08 14:58:12 -0800 | [diff] [blame] | 532 |   TemporaryFile tf; | 
 | 533 |   long rc = 0L; | 
 | 534 |   // As a file system's block size is always power of 2, the configure values | 
 | 535 |   // for ALLOC and XFER should be power of 2 as well. | 
 | 536 |   rc = pathconf(tf.filename, _PC_ALLOC_SIZE_MIN); | 
 | 537 |   ASSERT_TRUE(rc > 0 && powerof2(rc)); | 
 | 538 |   rc = pathconf(tf.filename, _PC_REC_MIN_XFER_SIZE); | 
 | 539 |   ASSERT_TRUE(rc > 0 && powerof2(rc)); | 
 | 540 |   rc = pathconf(tf.filename, _PC_REC_XFER_ALIGN); | 
 | 541 |   ASSERT_TRUE(rc > 0 && powerof2(rc)); | 
 | 542 |  | 
 | 543 |   rc = fpathconf(tf.fd, _PC_ALLOC_SIZE_MIN); | 
 | 544 |   ASSERT_TRUE(rc > 0 && powerof2(rc)); | 
 | 545 |   rc = fpathconf(tf.fd, _PC_REC_MIN_XFER_SIZE); | 
 | 546 |   ASSERT_TRUE(rc > 0 && powerof2(rc)); | 
 | 547 |   rc = fpathconf(tf.fd, _PC_REC_XFER_ALIGN); | 
 | 548 |   ASSERT_TRUE(rc > 0 && powerof2(rc)); | 
 | 549 | } | 
| Derek Xue | bc64476 | 2014-09-25 10:55:34 +0100 | [diff] [blame] | 550 |  | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 551 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 552 | TEST(UNISTD_TEST, _POSIX_macros_smoke) { | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 553 |   // Make a tight verification of _POSIX_* / _POSIX2_* / _XOPEN_* macros, to prevent change by mistake. | 
 | 554 |   // Verify according to POSIX.1-2008. | 
 | 555 |   EXPECT_EQ(200809L, _POSIX_VERSION); | 
 | 556 |  | 
| Yabin Cui | 5afae64 | 2014-11-25 20:17:27 -0800 | [diff] [blame] | 557 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_ADVISORY_INFO); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 558 |   EXPECT_GT(_POSIX_AIO_LISTIO_MAX, 0); | 
 | 559 |   EXPECT_GT(_POSIX_AIO_MAX, 0); | 
 | 560 |   EXPECT_GT(_POSIX_ARG_MAX, 0); | 
 | 561 |   EXPECT_GT(_POSIX_CHILD_MAX, 0); | 
 | 562 |   EXPECT_NE(_POSIX_CHOWN_RESTRICTED, -1); | 
 | 563 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_CLOCK_SELECTION); | 
| Yabin Cui | 7257560 | 2014-12-08 11:54:12 -0800 | [diff] [blame] | 564 |   EXPECT_EQ(0, _POSIX_CPUTIME);             // Use sysconf to detect support at runtime. | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 565 |   EXPECT_GT(_POSIX_DELAYTIMER_MAX, 0); | 
 | 566 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_FSYNC); | 
 | 567 |   EXPECT_GT(_POSIX_HOST_NAME_MAX, 0); | 
 | 568 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_IPV6); | 
 | 569 |   EXPECT_GT(_POSIX_JOB_CONTROL, 0); | 
 | 570 |   EXPECT_GT(_POSIX_LINK_MAX, 0); | 
 | 571 |   EXPECT_GT(_POSIX_LOGIN_NAME_MAX, 0); | 
 | 572 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_MAPPED_FILES); | 
 | 573 |   EXPECT_GT(_POSIX_MAX_CANON, 0); | 
 | 574 |   EXPECT_GT(_POSIX_MAX_INPUT, 0); | 
 | 575 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK); | 
 | 576 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK_RANGE); | 
 | 577 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMORY_PROTECTION); | 
 | 578 |   EXPECT_EQ(0, _POSIX_MONOTONIC_CLOCK); | 
 | 579 |   EXPECT_GT(_POSIX_MQ_OPEN_MAX, 0); | 
 | 580 |   EXPECT_GT(_POSIX_MQ_PRIO_MAX, 0); | 
 | 581 |   EXPECT_GT(_POSIX_NAME_MAX, 0); | 
 | 582 |   EXPECT_GT(_POSIX_NGROUPS_MAX, 0); | 
 | 583 |   EXPECT_GT(_POSIX_NO_TRUNC, 0); | 
 | 584 |   EXPECT_GT(_POSIX_OPEN_MAX, 0); | 
 | 585 |   EXPECT_GT(_POSIX_PATH_MAX, 0); | 
 | 586 |   EXPECT_GT(_POSIX_PIPE_BUF, 0); | 
 | 587 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_PRIORITY_SCHEDULING); | 
 | 588 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_RAW_SOCKETS); | 
 | 589 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_READER_WRITER_LOCKS); | 
| Yabin Cui | 6348160 | 2014-12-01 17:41:04 -0800 | [diff] [blame] | 590 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_REALTIME_SIGNALS); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 591 |   EXPECT_GT(_POSIX_REGEXP, 0); | 
 | 592 |   EXPECT_GT(_POSIX_RE_DUP_MAX, 0); | 
 | 593 |   EXPECT_GT(_POSIX_SAVED_IDS, 0); | 
 | 594 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_SEMAPHORES); | 
 | 595 |   EXPECT_GT(_POSIX_SEM_NSEMS_MAX, 0); | 
 | 596 |   EXPECT_GT(_POSIX_SEM_VALUE_MAX, 0); | 
 | 597 |   EXPECT_GT(_POSIX_SHELL, 0); | 
 | 598 |   EXPECT_GT(_POSIX_SIGQUEUE_MAX, 0); | 
 | 599 |   EXPECT_EQ(-1, _POSIX_SPORADIC_SERVER); | 
 | 600 |   EXPECT_GT(_POSIX_SSIZE_MAX, 0); | 
 | 601 |   EXPECT_GT(_POSIX_STREAM_MAX, 0); | 
 | 602 |   EXPECT_GT(_POSIX_SYMLINK_MAX, 0); | 
 | 603 |   EXPECT_GT(_POSIX_SYMLOOP_MAX, 0); | 
 | 604 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_SYNCHRONIZED_IO); | 
 | 605 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_THREADS); | 
 | 606 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKADDR); | 
 | 607 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKSIZE); | 
| Yabin Cui | 7257560 | 2014-12-08 11:54:12 -0800 | [diff] [blame] | 608 |   EXPECT_EQ(0, _POSIX_THREAD_CPUTIME);       // Use sysconf to detect support at runtime. | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 609 |   EXPECT_GT(_POSIX_THREAD_DESTRUCTOR_ITERATIONS, 0); | 
| Yabin Cui | 6c238f2 | 2014-12-11 20:50:41 -0800 | [diff] [blame] | 610 |   EXPECT_EQ(_POSIX_THREAD_KEYS_MAX, 128); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 611 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PRIORITY_SCHEDULING); | 
| Elliott Hughes | 7292725 | 2016-07-27 14:05:10 -0700 | [diff] [blame] | 612 |   EXPECT_EQ(-1, _POSIX_THREAD_PRIO_INHERIT); | 
 | 613 |   EXPECT_EQ(-1, _POSIX_THREAD_PRIO_PROTECT); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 614 |   EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_PROTECT); | 
 | 615 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_SAFE_FUNCTIONS); | 
 | 616 |   EXPECT_EQ(-1, _POSIX_THREAD_SPORADIC_SERVER); | 
 | 617 |   EXPECT_GT(_POSIX_THREAD_THREADS_MAX, 0); | 
 | 618 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMEOUTS); | 
 | 619 |   EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMERS); | 
 | 620 |   EXPECT_GT(_POSIX_TIMER_MAX, 0); | 
 | 621 |   EXPECT_EQ(-1, _POSIX_TRACE); | 
 | 622 |   EXPECT_EQ(-1, _POSIX_TRACE_EVENT_FILTER); | 
 | 623 |   EXPECT_EQ(-1, _POSIX_TRACE_INHERIT); | 
 | 624 |   EXPECT_EQ(-1, _POSIX_TRACE_LOG); | 
 | 625 |   EXPECT_GT(_POSIX_TTY_NAME_MAX, 0); | 
 | 626 |   EXPECT_EQ(-1, _POSIX_TYPED_MEMORY_OBJECTS); | 
 | 627 |   EXPECT_GT(_POSIX_TZNAME_MAX, 0); | 
 | 628 |   EXPECT_NE(-1, _POSIX_VDISABLE); | 
 | 629 |  | 
 | 630 |   EXPECT_GT(_POSIX2_BC_BASE_MAX, 0); | 
 | 631 |   EXPECT_GT(_POSIX2_BC_DIM_MAX, 0); | 
 | 632 |   EXPECT_GT(_POSIX2_BC_SCALE_MAX, 0); | 
 | 633 |   EXPECT_GT(_POSIX2_BC_STRING_MAX, 0); | 
 | 634 |   EXPECT_GT(_POSIX2_CHARCLASS_NAME_MAX, 0); | 
 | 635 |   EXPECT_GT(_POSIX2_COLL_WEIGHTS_MAX, 0); | 
 | 636 |   EXPECT_EQ(_POSIX_VERSION, _POSIX2_C_BIND); | 
 | 637 |   EXPECT_GT(_POSIX2_EXPR_NEST_MAX, 0); | 
 | 638 |   EXPECT_GT(_POSIX2_LINE_MAX, 0); | 
 | 639 |   EXPECT_GT(_POSIX2_RE_DUP_MAX, 0); | 
 | 640 |  | 
 | 641 |   EXPECT_EQ(700, _XOPEN_VERSION); | 
 | 642 |   EXPECT_GT(_XOPEN_IOV_MAX, 0); | 
 | 643 |   EXPECT_GT(_XOPEN_UNIX, 0); | 
 | 644 |  | 
 | 645 | #if defined(__BIONIC__) | 
 | 646 |   // These tests only pass on bionic, as bionic and glibc has different support on these macros. | 
| Yabin Cui | 5afae64 | 2014-11-25 20:17:27 -0800 | [diff] [blame] | 647 |   // Macros like _POSIX_ASYNCHRONOUS_IO are not supported on bionic yet. | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 648 |   EXPECT_EQ(-1, _POSIX_ASYNCHRONOUS_IO); | 
 | 649 |   EXPECT_EQ(-1, _POSIX_BARRIERS); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 650 |   EXPECT_EQ(-1, _POSIX_MESSAGE_PASSING); | 
 | 651 |   EXPECT_EQ(-1, _POSIX_PRIORITIZED_IO); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 652 |   EXPECT_EQ(-1, _POSIX_SHARED_MEMORY_OBJECTS); | 
 | 653 |   EXPECT_EQ(-1, _POSIX_SPAWN); | 
 | 654 |   EXPECT_EQ(-1, _POSIX_SPIN_LOCKS); | 
 | 655 |   EXPECT_EQ(-1, _POSIX_THREAD_PROCESS_SHARED); | 
 | 656 |   EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_INHERIT); | 
 | 657 |  | 
 | 658 |   EXPECT_EQ(-1, _POSIX2_VERSION); | 
 | 659 |   EXPECT_EQ(-1, _POSIX2_CHAR_TERM); | 
 | 660 |   EXPECT_EQ(-1, _POSIX2_C_DEV); | 
 | 661 |   EXPECT_EQ(-1, _POSIX2_LOCALEDEF); | 
 | 662 |   EXPECT_EQ(-1, _POSIX2_SW_DEV); | 
 | 663 |   EXPECT_EQ(-1, _POSIX2_UPE); | 
 | 664 |  | 
 | 665 |   EXPECT_EQ(-1, _XOPEN_ENH_I18N); | 
 | 666 |   EXPECT_EQ(-1, _XOPEN_CRYPT); | 
 | 667 |   EXPECT_EQ(-1, _XOPEN_LEGACY); | 
 | 668 |   EXPECT_EQ(-1, _XOPEN_REALTIME); | 
 | 669 |   EXPECT_EQ(-1, _XOPEN_REALTIME_THREADS); | 
 | 670 |   EXPECT_EQ(-1, _XOPEN_SHM); | 
 | 671 |  | 
 | 672 | #endif // defined(__BIONIC__) | 
 | 673 | } | 
 | 674 |  | 
| Elliott Hughes | 7292725 | 2016-07-27 14:05:10 -0700 | [diff] [blame] | 675 | #define VERIFY_SYSCONF_UNSUPPORTED(name) VerifySysconf(name, #name, [](long v){return v == -1;}) | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 676 |  | 
 | 677 | // sysconf() means unlimited when it returns -1 with errno unchanged. | 
 | 678 | #define VERIFY_SYSCONF_POSITIVE(name) \ | 
 | 679 |   VerifySysconf(name, #name, [](long v){return (v > 0 || v == -1);}) | 
 | 680 |  | 
 | 681 | #define VERIFY_SYSCONF_POSIX_VERSION(name) \ | 
 | 682 |   VerifySysconf(name, #name, [](long v){return v == _POSIX_VERSION;}) | 
 | 683 |  | 
 | 684 | static void VerifySysconf(int option, const char *option_name, bool (*verify)(long)) { | 
 | 685 |   errno = 0; | 
 | 686 |   long ret = sysconf(option); | 
 | 687 |   EXPECT_TRUE(0 == errno && verify(ret)) << "name = " << option_name << ", ret = " | 
 | 688 |       << ret <<", Error Message: " << strerror(errno); | 
 | 689 | } | 
| Derek Xue | bc64476 | 2014-09-25 10:55:34 +0100 | [diff] [blame] | 690 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 691 | TEST(UNISTD_TEST, sysconf) { | 
| Yabin Cui | 5afae64 | 2014-11-25 20:17:27 -0800 | [diff] [blame] | 692 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_ADVISORY_INFO); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 693 |   VERIFY_SYSCONF_POSITIVE(_SC_ARG_MAX); | 
 | 694 |   VERIFY_SYSCONF_POSITIVE(_SC_BC_BASE_MAX); | 
 | 695 |   VERIFY_SYSCONF_POSITIVE(_SC_BC_DIM_MAX); | 
 | 696 |   VERIFY_SYSCONF_POSITIVE(_SC_BC_SCALE_MAX); | 
 | 697 |   VERIFY_SYSCONF_POSITIVE(_SC_CHILD_MAX); | 
 | 698 |   VERIFY_SYSCONF_POSITIVE(_SC_CLK_TCK); | 
 | 699 |   VERIFY_SYSCONF_POSITIVE(_SC_COLL_WEIGHTS_MAX); | 
| Yabin Cui | d5c6527 | 2014-11-26 14:04:26 -0800 | [diff] [blame] | 700 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_CPUTIME); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 701 |   VERIFY_SYSCONF_POSITIVE(_SC_EXPR_NEST_MAX); | 
 | 702 |   VERIFY_SYSCONF_POSITIVE(_SC_LINE_MAX); | 
 | 703 |   VERIFY_SYSCONF_POSITIVE(_SC_NGROUPS_MAX); | 
 | 704 |   VERIFY_SYSCONF_POSITIVE(_SC_OPEN_MAX); | 
 | 705 |   VERIFY_SYSCONF_POSITIVE(_SC_PASS_MAX); | 
 | 706 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_2_C_BIND); | 
| Elliott Hughes | 7292725 | 2016-07-27 14:05:10 -0700 | [diff] [blame] | 707 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_DEV); | 
 | 708 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_RUN); | 
 | 709 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_UPE); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 710 |   VERIFY_SYSCONF_POSITIVE(_SC_JOB_CONTROL); | 
 | 711 |   VERIFY_SYSCONF_POSITIVE(_SC_SAVED_IDS); | 
 | 712 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_VERSION); | 
 | 713 |   VERIFY_SYSCONF_POSITIVE(_SC_RE_DUP_MAX); | 
 | 714 |   VERIFY_SYSCONF_POSITIVE(_SC_STREAM_MAX); | 
 | 715 |   VERIFY_SYSCONF_POSITIVE(_SC_TZNAME_MAX); | 
 | 716 |   VerifySysconf(_SC_XOPEN_VERSION, "_SC_XOPEN_VERSION", [](long v){return v == _XOPEN_VERSION;}); | 
 | 717 |   VERIFY_SYSCONF_POSITIVE(_SC_ATEXIT_MAX); | 
 | 718 |   VERIFY_SYSCONF_POSITIVE(_SC_IOV_MAX); | 
 | 719 |   VERIFY_SYSCONF_POSITIVE(_SC_PAGESIZE); | 
 | 720 |   VERIFY_SYSCONF_POSITIVE(_SC_PAGE_SIZE); | 
| Elliott Hughes | 189394b | 2015-07-24 23:22:07 -0700 | [diff] [blame] | 721 |   VerifySysconf(_SC_PAGE_SIZE, "_SC_PAGE_SIZE", | 
 | 722 |                 [](long v){return v == sysconf(_SC_PAGESIZE) && v == getpagesize();}); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 723 |   VERIFY_SYSCONF_POSITIVE(_SC_XOPEN_UNIX); | 
 | 724 |   VERIFY_SYSCONF_POSITIVE(_SC_AIO_LISTIO_MAX); | 
 | 725 |   VERIFY_SYSCONF_POSITIVE(_SC_AIO_MAX); | 
 | 726 |   VerifySysconf(_SC_AIO_PRIO_DELTA_MAX, "_SC_AIO_PRIO_DELTA_MAX", [](long v){return v >= 0;}); | 
 | 727 |   VERIFY_SYSCONF_POSITIVE(_SC_DELAYTIMER_MAX); | 
 | 728 |   VERIFY_SYSCONF_POSITIVE(_SC_MQ_OPEN_MAX); | 
 | 729 |   VERIFY_SYSCONF_POSITIVE(_SC_MQ_PRIO_MAX); | 
 | 730 |   VERIFY_SYSCONF_POSITIVE(_SC_RTSIG_MAX); | 
 | 731 |   VERIFY_SYSCONF_POSITIVE(_SC_SEM_NSEMS_MAX); | 
 | 732 |   VERIFY_SYSCONF_POSITIVE(_SC_SEM_VALUE_MAX); | 
 | 733 |   VERIFY_SYSCONF_POSITIVE(_SC_TIMER_MAX); | 
 | 734 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_FSYNC); | 
 | 735 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_MAPPED_FILES); | 
 | 736 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK); | 
 | 737 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK_RANGE); | 
 | 738 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMORY_PROTECTION); | 
 | 739 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_PRIORITY_SCHEDULING); | 
| Yabin Cui | 6348160 | 2014-12-01 17:41:04 -0800 | [diff] [blame] | 740 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_REALTIME_SIGNALS); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 741 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_SEMAPHORES); | 
 | 742 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_SYNCHRONIZED_IO); | 
 | 743 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMERS); | 
 | 744 |   VERIFY_SYSCONF_POSITIVE(_SC_GETGR_R_SIZE_MAX); | 
 | 745 |   VERIFY_SYSCONF_POSITIVE(_SC_GETPW_R_SIZE_MAX); | 
 | 746 |   VERIFY_SYSCONF_POSITIVE(_SC_LOGIN_NAME_MAX); | 
 | 747 |   VERIFY_SYSCONF_POSITIVE(_SC_THREAD_DESTRUCTOR_ITERATIONS); | 
 | 748 |   VERIFY_SYSCONF_POSITIVE(_SC_THREAD_KEYS_MAX); | 
 | 749 |   VERIFY_SYSCONF_POSITIVE(_SC_THREAD_STACK_MIN); | 
 | 750 |   VERIFY_SYSCONF_POSITIVE(_SC_THREAD_THREADS_MAX); | 
 | 751 |   VERIFY_SYSCONF_POSITIVE(_SC_TTY_NAME_MAX); | 
 | 752 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_THREADS); | 
 | 753 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKADDR); | 
 | 754 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKSIZE); | 
 | 755 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PRIORITY_SCHEDULING); | 
| Elliott Hughes | 7292725 | 2016-07-27 14:05:10 -0700 | [diff] [blame] | 756 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_INHERIT); | 
 | 757 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_PROTECT); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 758 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_SAFE_FUNCTIONS); | 
 | 759 |   VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_CONF); | 
 | 760 |   VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_ONLN); | 
 | 761 |   VERIFY_SYSCONF_POSITIVE(_SC_PHYS_PAGES); | 
 | 762 |   VERIFY_SYSCONF_POSITIVE(_SC_AVPHYS_PAGES); | 
 | 763 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_MONOTONIC_CLOCK); | 
| Elliott Hughes | 7292725 | 2016-07-27 14:05:10 -0700 | [diff] [blame] | 764 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS); | 
 | 765 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_ACCOUNTING); | 
 | 766 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_CHECKPOINT); | 
 | 767 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_LOCATE); | 
 | 768 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_MESSAGE); | 
 | 769 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_TRACK); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 770 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_CLOCK_SELECTION); | 
 | 771 |   VERIFY_SYSCONF_POSITIVE(_SC_HOST_NAME_MAX); | 
 | 772 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_IPV6); | 
 | 773 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_RAW_SOCKETS); | 
 | 774 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_READER_WRITER_LOCKS); | 
 | 775 |   VERIFY_SYSCONF_POSITIVE(_SC_REGEXP); | 
 | 776 |   VERIFY_SYSCONF_POSITIVE(_SC_SHELL); | 
| Elliott Hughes | 7292725 | 2016-07-27 14:05:10 -0700 | [diff] [blame] | 777 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_SPORADIC_SERVER); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 778 |   VERIFY_SYSCONF_POSITIVE(_SC_SYMLOOP_MAX); | 
 | 779 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_CPUTIME); | 
| Elliott Hughes | 7292725 | 2016-07-27 14:05:10 -0700 | [diff] [blame] | 780 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_SPORADIC_SERVER); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 781 |   VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMEOUTS); | 
| Elliott Hughes | 7292725 | 2016-07-27 14:05:10 -0700 | [diff] [blame] | 782 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE); | 
 | 783 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_FILTER); | 
 | 784 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_NAME_MAX); | 
 | 785 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_INHERIT); | 
 | 786 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_LOG); | 
 | 787 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_NAME_MAX); | 
 | 788 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_SYS_MAX); | 
 | 789 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_USER_EVENT_MAX); | 
 | 790 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_TYPED_MEMORY_OBJECTS); | 
 | 791 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_STREAMS); | 
| Derek Xue | bc64476 | 2014-09-25 10:55:34 +0100 | [diff] [blame] | 792 |  | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 793 | #if defined(__LP64__) | 
| Elliott Hughes | 7292725 | 2016-07-27 14:05:10 -0700 | [diff] [blame] | 794 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFF32); | 
 | 795 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 796 |   VERIFY_SYSCONF_POSITIVE(_SC_V7_LP64_OFF64); | 
 | 797 |   VERIFY_SYSCONF_POSITIVE(_SC_V7_LPBIG_OFFBIG); | 
 | 798 | #else | 
 | 799 |   VERIFY_SYSCONF_POSITIVE(_SC_V7_ILP32_OFF32); | 
 | 800 | #if defined(__BIONIC__) | 
 | 801 |   // bionic does not support 64 bits off_t type on 32bit machine. | 
| Elliott Hughes | 7292725 | 2016-07-27 14:05:10 -0700 | [diff] [blame] | 802 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 803 | #endif | 
| Elliott Hughes | 7292725 | 2016-07-27 14:05:10 -0700 | [diff] [blame] | 804 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LP64_OFF64); | 
 | 805 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LPBIG_OFFBIG); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 806 | #endif | 
| Derek Xue | bc64476 | 2014-09-25 10:55:34 +0100 | [diff] [blame] | 807 |  | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 808 | #if defined(__BIONIC__) | 
 | 809 |   // Tests can only run on bionic, as bionic and glibc have different support for these options. | 
 | 810 |   // Below options are not supported on bionic yet. | 
| Elliott Hughes | 7292725 | 2016-07-27 14:05:10 -0700 | [diff] [blame] | 811 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_ASYNCHRONOUS_IO); | 
 | 812 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_BARRIERS); | 
 | 813 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_MESSAGE_PASSING); | 
 | 814 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_PRIORITIZED_IO); | 
 | 815 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_SHARED_MEMORY_OBJECTS); | 
 | 816 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_SPAWN); | 
 | 817 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_SPIN_LOCKS); | 
 | 818 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PROCESS_SHARED); | 
 | 819 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_INHERIT); | 
 | 820 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_PROTECT); | 
| Derek Xue | bc64476 | 2014-09-25 10:55:34 +0100 | [diff] [blame] | 821 |  | 
| Elliott Hughes | 7292725 | 2016-07-27 14:05:10 -0700 | [diff] [blame] | 822 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_C_DEV); | 
 | 823 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_CHAR_TERM); | 
 | 824 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_LOCALEDEF); | 
 | 825 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_SW_DEV); | 
 | 826 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_VERSION); | 
| Derek Xue | bc64476 | 2014-09-25 10:55:34 +0100 | [diff] [blame] | 827 |  | 
| Elliott Hughes | 7292725 | 2016-07-27 14:05:10 -0700 | [diff] [blame] | 828 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_CRYPT); | 
 | 829 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_ENH_I18N); | 
 | 830 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_LEGACY); | 
 | 831 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_REALTIME); | 
 | 832 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_REALTIME_THREADS); | 
 | 833 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_SHM); | 
 | 834 |   VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_UUCP); | 
| Yabin Cui | 1c19194 | 2014-11-19 19:49:14 -0800 | [diff] [blame] | 835 | #endif // defined(__BIONIC__) | 
| Derek Xue | bc64476 | 2014-09-25 10:55:34 +0100 | [diff] [blame] | 836 | } | 
| Elliott Hughes | be52e65 | 2015-02-23 18:02:29 -0800 | [diff] [blame] | 837 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 838 | TEST(UNISTD_TEST, get_cpu_count_from_string) { | 
| Yabin Cui | cb6f599 | 2015-09-29 16:11:45 -0700 | [diff] [blame] | 839 |   ASSERT_EQ(0, GetCpuCountFromString(" ")); | 
 | 840 |   ASSERT_EQ(1, GetCpuCountFromString("0")); | 
 | 841 |   ASSERT_EQ(40, GetCpuCountFromString("0-39")); | 
 | 842 |   ASSERT_EQ(4, GetCpuCountFromString("0, 1-2, 4\n")); | 
 | 843 | } | 
 | 844 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 845 | TEST(UNISTD_TEST, sysconf_SC_NPROCESSORS_ONLN) { | 
| Elliott Hughes | 0b2acdf | 2015-10-02 18:25:19 -0700 | [diff] [blame] | 846 |   std::string line; | 
 | 847 |   ASSERT_TRUE(android::base::ReadFileToString("/sys/devices/system/cpu/online", &line)); | 
| Yabin Cui | cb6f599 | 2015-09-29 16:11:45 -0700 | [diff] [blame] | 848 |   long online_cpus = 0; | 
| Elliott Hughes | 0b2acdf | 2015-10-02 18:25:19 -0700 | [diff] [blame] | 849 |   for (const std::string& s : android::base::Split(line, ",")) { | 
| Yabin Cui | cb6f599 | 2015-09-29 16:11:45 -0700 | [diff] [blame] | 850 |     std::vector<std::string> numbers = android::base::Split(s, "-"); | 
 | 851 |     if (numbers.size() == 1u) { | 
 | 852 |       online_cpus++; | 
 | 853 |     } else { | 
 | 854 |       online_cpus += atoi(numbers[1].c_str()) - atoi(numbers[0].c_str()) + 1; | 
 | 855 |     } | 
 | 856 |   } | 
 | 857 |   ASSERT_EQ(online_cpus, sysconf(_SC_NPROCESSORS_ONLN)); | 
 | 858 | } | 
 | 859 |  | 
| Elliott Hughes | 38dba2e | 2016-08-10 15:51:06 -0700 | [diff] [blame] | 860 | TEST(UNISTD_TEST, sysconf_SC_ARG_MAX) { | 
 | 861 |   // Since Linux 2.6.23, ARG_MAX isn't a constant and depends on RLIMIT_STACK. | 
 | 862 |  | 
 | 863 |   // Get our current limit, and set things up so we restore the limit. | 
 | 864 |   rlimit rl; | 
 | 865 |   ASSERT_EQ(0, getrlimit(RLIMIT_STACK, &rl)); | 
 | 866 |   uint64_t original_rlim_cur = rl.rlim_cur; | 
 | 867 |   if (rl.rlim_cur == RLIM_INFINITY) { | 
 | 868 |     rl.rlim_cur = 8 * 1024 * 1024; // Bionic reports unlimited stacks as 8MiB. | 
 | 869 |   } | 
 | 870 |   auto guard = make_scope_guard([&rl, original_rlim_cur]() { | 
 | 871 |     rl.rlim_cur = original_rlim_cur; | 
 | 872 |     ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl)); | 
 | 873 |   }); | 
 | 874 |  | 
 | 875 |   // _SC_ARG_MAX should be 1/4 the stack size. | 
 | 876 |   EXPECT_EQ(static_cast<long>(rl.rlim_cur / 4), sysconf(_SC_ARG_MAX)); | 
 | 877 |  | 
 | 878 |   // If you have a really small stack, the kernel still guarantees "32 pages" (fs/exec.c). | 
 | 879 |   rl.rlim_cur = 1024; | 
 | 880 |   rl.rlim_max = RLIM_INFINITY; | 
 | 881 |   ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl)); | 
 | 882 |  | 
 | 883 |   EXPECT_EQ(static_cast<long>(32 * sysconf(_SC_PAGE_SIZE)), sysconf(_SC_ARG_MAX)); | 
 | 884 |  | 
 | 885 |   // With a 128-page stack limit, we know exactly what _SC_ARG_MAX should be... | 
 | 886 |   rl.rlim_cur = 128 * sysconf(_SC_PAGE_SIZE); | 
 | 887 |   rl.rlim_max = RLIM_INFINITY; | 
 | 888 |   ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl)); | 
 | 889 |  | 
 | 890 |   EXPECT_EQ(static_cast<long>((128 * sysconf(_SC_PAGE_SIZE)) / 4), sysconf(_SC_ARG_MAX)); | 
 | 891 | } | 
 | 892 |  | 
| Christopher Ferris | 13f26a7 | 2016-01-13 13:47:58 -0800 | [diff] [blame] | 893 | TEST(UNISTD_TEST, dup2_same) { | 
| Elliott Hughes | be52e65 | 2015-02-23 18:02:29 -0800 | [diff] [blame] | 894 |   // POSIX says of dup2: | 
 | 895 |   // If fildes2 is already a valid open file descriptor ... | 
 | 896 |   // [and] fildes is equal to fildes2 ... dup2() shall return | 
 | 897 |   // fildes2 without closing it. | 
 | 898 |   // This isn't true of dup3(2), so we need to manually implement that. | 
 | 899 |  | 
 | 900 |   // Equal and valid. | 
 | 901 |   int fd = open("/proc/version", O_RDONLY); | 
 | 902 |   ASSERT_TRUE(fd != -1); | 
 | 903 |   ASSERT_EQ(fd, dup2(fd, fd)); | 
 | 904 |   ASSERT_EQ(0, close(fd)); // Check that dup2 didn't close fd. | 
 | 905 |  | 
 | 906 |   // Equal, but invalid. | 
 | 907 |   errno = 0; | 
 | 908 |   ASSERT_EQ(-1, dup2(fd, fd)); | 
 | 909 |   ASSERT_EQ(EBADF, errno); | 
 | 910 | } | 
| Elliott Hughes | 5704c42 | 2016-01-25 18:06:24 -0800 | [diff] [blame] | 911 |  | 
| Elliott Hughes | 5704c42 | 2016-01-25 18:06:24 -0800 | [diff] [blame] | 912 | TEST(UNISTD_TEST, lockf_smoke) { | 
 | 913 |   constexpr off64_t file_size = 32*1024LL; | 
 | 914 |  | 
 | 915 |   TemporaryFile tf; | 
 | 916 |   ASSERT_EQ(0, ftruncate(tf.fd, file_size)); | 
 | 917 |  | 
 | 918 |   // Lock everything. | 
 | 919 |   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); | 
 | 920 |   ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size)); | 
 | 921 |  | 
 | 922 |   // Try-lock everything, this should succeed too. | 
 | 923 |   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); | 
 | 924 |   ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size)); | 
 | 925 |  | 
 | 926 |   // Check status. | 
 | 927 |   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); | 
 | 928 |   ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size)); | 
 | 929 |  | 
 | 930 |   // Unlock file. | 
 | 931 |   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); | 
 | 932 |   ASSERT_EQ(0, lockf64(tf.fd, F_ULOCK, file_size)); | 
 | 933 | } | 
 | 934 |  | 
 | 935 | TEST(UNISTD_TEST, lockf_zero) { | 
 | 936 |   constexpr off64_t file_size = 32*1024LL; | 
 | 937 |  | 
 | 938 |   TemporaryFile tf; | 
 | 939 |   ASSERT_EQ(0, ftruncate(tf.fd, file_size)); | 
 | 940 |  | 
 | 941 |   // Lock everything by specifying a size of 0 (meaning "to the end, even if it changes"). | 
 | 942 |   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); | 
 | 943 |   ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, 0)); | 
 | 944 |  | 
 | 945 |   // Check that it's locked. | 
 | 946 |   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); | 
 | 947 |   ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size)); | 
 | 948 |  | 
 | 949 |   // Move the end. | 
 | 950 |   ASSERT_EQ(0, ftruncate(tf.fd, 2*file_size)); | 
 | 951 |  | 
 | 952 |   // Check that the new section is locked too. | 
 | 953 |   ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET)); | 
 | 954 |   ASSERT_EQ(0, lockf64(tf.fd, F_TEST, 2*file_size)); | 
 | 955 | } | 
 | 956 |  | 
 | 957 | TEST(UNISTD_TEST, lockf_negative) { | 
 | 958 |   constexpr off64_t file_size = 32*1024LL; | 
 | 959 |  | 
 | 960 |   TemporaryFile tf; | 
 | 961 |   ASSERT_EQ(0, ftruncate(tf.fd, file_size)); | 
 | 962 |  | 
 | 963 |   // Lock everything, but specifying the range in reverse. | 
 | 964 |   ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET)); | 
 | 965 |   ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, -file_size)); | 
 | 966 |  | 
 | 967 |   // Check that it's locked. | 
 | 968 |   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); | 
 | 969 |   ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size)); | 
 | 970 | } | 
 | 971 |  | 
 | 972 | TEST(UNISTD_TEST, lockf_with_child) { | 
 | 973 |   constexpr off64_t file_size = 32*1024LL; | 
 | 974 |  | 
 | 975 |   TemporaryFile tf; | 
 | 976 |   ASSERT_EQ(0, ftruncate(tf.fd, file_size)); | 
 | 977 |  | 
 | 978 |   // Lock everything. | 
 | 979 |   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); | 
 | 980 |   ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size)); | 
 | 981 |  | 
 | 982 |   // Fork a child process | 
 | 983 |   pid_t pid = fork(); | 
 | 984 |   ASSERT_NE(-1, pid); | 
 | 985 |   if (pid == 0) { | 
 | 986 |     // Check that the child cannot lock the file. | 
 | 987 |     ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); | 
 | 988 |     ASSERT_EQ(-1, lockf64(tf.fd, F_TLOCK, file_size)); | 
 | 989 |     ASSERT_EQ(EAGAIN, errno); | 
 | 990 |     // Check also that it reports itself as locked. | 
 | 991 |     ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); | 
 | 992 |     ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size)); | 
 | 993 |     ASSERT_EQ(EACCES, errno); | 
 | 994 |     _exit(0); | 
 | 995 |   } | 
| Elliott Hughes | 33697a0 | 2016-01-26 13:04:57 -0800 | [diff] [blame] | 996 |   AssertChildExited(pid, 0); | 
| Elliott Hughes | 5704c42 | 2016-01-25 18:06:24 -0800 | [diff] [blame] | 997 | } | 
 | 998 |  | 
 | 999 | TEST(UNISTD_TEST, lockf_partial_with_child) { | 
 | 1000 |   constexpr off64_t file_size = 32*1024LL; | 
 | 1001 |  | 
 | 1002 |   TemporaryFile tf; | 
 | 1003 |   ASSERT_EQ(0, ftruncate(tf.fd, file_size)); | 
 | 1004 |  | 
 | 1005 |   // Lock the first half of the file. | 
 | 1006 |   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); | 
 | 1007 |   ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size/2)); | 
 | 1008 |  | 
 | 1009 |   // Fork a child process. | 
 | 1010 |   pid_t pid = fork(); | 
 | 1011 |   ASSERT_NE(-1, pid); | 
 | 1012 |   if (pid == 0) { | 
 | 1013 |     // Check that the child can lock the other half. | 
 | 1014 |     ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET)); | 
 | 1015 |     ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2)); | 
 | 1016 |     // Check that the child cannot lock the first half. | 
 | 1017 |     ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); | 
 | 1018 |     ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2)); | 
 | 1019 |     ASSERT_EQ(EACCES, errno); | 
 | 1020 |     // Check also that it reports itself as locked. | 
 | 1021 |     ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); | 
 | 1022 |     ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2)); | 
 | 1023 |     ASSERT_EQ(EACCES, errno); | 
 | 1024 |     _exit(0); | 
 | 1025 |   } | 
| Elliott Hughes | 33697a0 | 2016-01-26 13:04:57 -0800 | [diff] [blame] | 1026 |   AssertChildExited(pid, 0); | 
| Elliott Hughes | 5704c42 | 2016-01-25 18:06:24 -0800 | [diff] [blame] | 1027 |  | 
 | 1028 |   // The second half was locked by the child, but the lock disappeared | 
 | 1029 |   // when the process exited, so check it can be locked now. | 
 | 1030 |   ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET)); | 
 | 1031 |   ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2)); | 
 | 1032 | } | 
| Greg Hackmann | e2faf07 | 2016-03-03 08:37:53 -0800 | [diff] [blame] | 1033 |  | 
 | 1034 | TEST(UNISTD_TEST, getdomainname) { | 
 | 1035 |   struct utsname u; | 
 | 1036 |   ASSERT_EQ(0, uname(&u)); | 
 | 1037 |  | 
 | 1038 |   char buf[sizeof(u.domainname)]; | 
 | 1039 |   ASSERT_EQ(0, getdomainname(buf, sizeof(buf))); | 
 | 1040 |   EXPECT_STREQ(u.domainname, buf); | 
 | 1041 |  | 
 | 1042 | #if defined(__BIONIC__) | 
 | 1043 |   // bionic and glibc have different behaviors when len is too small | 
 | 1044 |   ASSERT_EQ(-1, getdomainname(buf, strlen(u.domainname))); | 
 | 1045 |   EXPECT_EQ(EINVAL, errno); | 
 | 1046 | #endif | 
 | 1047 | } | 
 | 1048 |  | 
 | 1049 | TEST(UNISTD_TEST, setdomainname) { | 
 | 1050 |   __user_cap_header_struct header; | 
 | 1051 |   memset(&header, 0, sizeof(header)); | 
 | 1052 |   header.version = _LINUX_CAPABILITY_VERSION_3; | 
 | 1053 |  | 
 | 1054 |   __user_cap_data_struct old_caps[_LINUX_CAPABILITY_U32S_3]; | 
 | 1055 |   ASSERT_EQ(0, capget(&header, &old_caps[0])); | 
 | 1056 |  | 
 | 1057 |   auto admin_idx = CAP_TO_INDEX(CAP_SYS_ADMIN); | 
 | 1058 |   auto admin_mask = CAP_TO_MASK(CAP_SYS_ADMIN); | 
 | 1059 |   bool has_admin = old_caps[admin_idx].effective & admin_mask; | 
 | 1060 |   if (has_admin) { | 
 | 1061 |     __user_cap_data_struct new_caps[_LINUX_CAPABILITY_U32S_3]; | 
 | 1062 |     memcpy(new_caps, old_caps, sizeof(new_caps)); | 
 | 1063 |     new_caps[admin_idx].effective &= ~admin_mask; | 
 | 1064 |  | 
 | 1065 |     ASSERT_EQ(0, capset(&header, &new_caps[0])) << "failed to drop admin privileges"; | 
 | 1066 |   } | 
 | 1067 |  | 
 | 1068 |   const char* name = "newdomainname"; | 
 | 1069 |   ASSERT_EQ(-1, setdomainname(name, strlen(name))); | 
 | 1070 |   ASSERT_EQ(EPERM, errno); | 
 | 1071 |  | 
 | 1072 |   if (has_admin) { | 
 | 1073 |     ASSERT_EQ(0, capset(&header, &old_caps[0])) << "failed to restore admin privileges"; | 
 | 1074 |   } | 
 | 1075 | } |