Elliott Hughes | 0620925 | 2013-11-06 16:20:54 -0800 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2013 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | #include <gtest/gtest.h> |
| 18 | |
| 19 | #include <errno.h> |
| 20 | #include <fcntl.h> |
Nick Desaulniers | 094f316 | 2016-07-19 15:20:24 -0700 | [diff] [blame] | 21 | #include <string.h> |
| 22 | #include <sys/utsname.h> |
Matthias Hausner | 47a5210 | 2017-06-02 10:09:19 -0700 | [diff] [blame] | 23 | #include <sys/vfs.h> |
Elliott Hughes | 0620925 | 2013-11-06 16:20:54 -0800 | [diff] [blame] | 24 | |
Mark Salyzyn | 68a3bcc | 2018-11-13 07:35:21 -0800 | [diff] [blame] | 25 | #include <android-base/file.h> |
Elliott Hughes | b115aef | 2017-08-04 09:34:19 -0700 | [diff] [blame] | 26 | #include <android-base/stringprintf.h> |
| 27 | |
Nick Desaulniers | 094f316 | 2016-07-19 15:20:24 -0700 | [diff] [blame] | 28 | // Glibc v2.19 doesn't include these in fcntl.h so host builds will fail without. |
| 29 | #if !defined(FALLOC_FL_PUNCH_HOLE) || !defined(FALLOC_FL_KEEP_SIZE) |
| 30 | #include <linux/falloc.h> |
Matthias Hausner | 47a5210 | 2017-06-02 10:09:19 -0700 | [diff] [blame] | 31 | #include <linux/magic.h> |
Nick Desaulniers | 094f316 | 2016-07-19 15:20:24 -0700 | [diff] [blame] | 32 | #endif |
| 33 | |
Elliott Hughes | 0620925 | 2013-11-06 16:20:54 -0800 | [diff] [blame] | 34 | TEST(fcntl, fcntl_smoke) { |
| 35 | int fd = open("/proc/version", O_RDONLY); |
| 36 | ASSERT_TRUE(fd != -1); |
| 37 | |
| 38 | int flags = fcntl(fd, F_GETFD); |
| 39 | ASSERT_TRUE(flags != -1); |
| 40 | ASSERT_EQ(0, flags & FD_CLOEXEC); |
| 41 | |
| 42 | int rc = fcntl(fd, F_SETFD, FD_CLOEXEC); |
| 43 | ASSERT_EQ(0, rc); |
| 44 | |
| 45 | flags = fcntl(fd, F_GETFD); |
| 46 | ASSERT_TRUE(flags != -1); |
| 47 | ASSERT_EQ(FD_CLOEXEC, flags & FD_CLOEXEC); |
Elliott Hughes | db1ea34 | 2014-01-17 18:42:49 -0800 | [diff] [blame] | 48 | |
| 49 | close(fd); |
| 50 | } |
| 51 | |
| 52 | TEST(fcntl, open_open64) { |
| 53 | int fd; |
| 54 | |
| 55 | fd = open("/proc/version", O_RDONLY); |
| 56 | ASSERT_TRUE(fd != -1); |
| 57 | close(fd); |
| 58 | |
| 59 | fd = open64("/proc/version", O_RDONLY); |
| 60 | ASSERT_TRUE(fd != -1); |
| 61 | close(fd); |
| 62 | } |
| 63 | |
| 64 | TEST(fcntl, openat_openat64) { |
| 65 | int fd; |
| 66 | |
| 67 | fd = openat(AT_FDCWD, "/proc/version", O_RDONLY); |
| 68 | ASSERT_TRUE(fd != -1); |
| 69 | close(fd); |
| 70 | |
| 71 | fd = openat64(AT_FDCWD, "/proc/version", O_RDONLY); |
| 72 | ASSERT_TRUE(fd != -1); |
| 73 | close(fd); |
| 74 | } |
| 75 | |
| 76 | TEST(fcntl, creat_creat64) { |
| 77 | ASSERT_EQ(-1, creat("", 0666)); |
| 78 | ASSERT_EQ(ENOENT, errno); |
| 79 | ASSERT_EQ(-1, creat64("", 0666)); |
| 80 | ASSERT_EQ(ENOENT, errno); |
Elliott Hughes | 0620925 | 2013-11-06 16:20:54 -0800 | [diff] [blame] | 81 | } |
Elliott Hughes | f64b8ea | 2014-02-03 16:20:46 -0800 | [diff] [blame] | 82 | |
Elliott Hughes | b587f33 | 2014-09-10 17:39:00 -0700 | [diff] [blame] | 83 | TEST(fcntl, posix_fadvise) { |
| 84 | TemporaryFile tf; |
| 85 | errno = 0; |
| 86 | |
| 87 | EXPECT_EQ(EBADF, posix_fadvise(-1, 0, 0, POSIX_FADV_NORMAL)); |
| 88 | EXPECT_EQ(0, errno); |
| 89 | |
| 90 | EXPECT_EQ(EBADF, posix_fadvise64(-1, 0, 0, POSIX_FADV_NORMAL)); |
| 91 | EXPECT_EQ(0, errno); |
| 92 | |
| 93 | EXPECT_EQ(EINVAL, posix_fadvise(tf.fd, 0, 0, -1)); |
| 94 | EXPECT_EQ(0, errno); |
| 95 | |
| 96 | EXPECT_EQ(EINVAL, posix_fadvise64(tf.fd, 0, 0, -1)); |
| 97 | EXPECT_EQ(0, errno); |
| 98 | |
| 99 | EXPECT_EQ(0, posix_fadvise(tf.fd, 0, 0, POSIX_FADV_NORMAL)); |
| 100 | EXPECT_EQ(0, posix_fadvise64(tf.fd, 0, 0, POSIX_FADV_NORMAL)); |
| 101 | } |
| 102 | |
Elliott Hughes | f64b8ea | 2014-02-03 16:20:46 -0800 | [diff] [blame] | 103 | TEST(fcntl, fallocate_EINVAL) { |
| 104 | TemporaryFile tf; |
| 105 | |
Elliott Hughes | b587f33 | 2014-09-10 17:39:00 -0700 | [diff] [blame] | 106 | // fallocate/fallocate64 set errno. |
| 107 | // posix_fallocate/posix_fallocate64 return an errno value. |
| 108 | |
Elliott Hughes | f64b8ea | 2014-02-03 16:20:46 -0800 | [diff] [blame] | 109 | errno = 0; |
| 110 | ASSERT_EQ(-1, fallocate(tf.fd, 0, 0, -1)); |
| 111 | ASSERT_EQ(EINVAL, errno); |
| 112 | |
| 113 | errno = 0; |
| 114 | ASSERT_EQ(-1, fallocate64(tf.fd, 0, 0, -1)); |
| 115 | ASSERT_EQ(EINVAL, errno); |
Elliott Hughes | f64b8ea | 2014-02-03 16:20:46 -0800 | [diff] [blame] | 116 | |
| 117 | errno = 0; |
| 118 | ASSERT_EQ(EINVAL, posix_fallocate(tf.fd, 0, -1)); |
| 119 | ASSERT_EQ(0, errno); |
| 120 | |
| 121 | errno = 0; |
| 122 | ASSERT_EQ(EINVAL, posix_fallocate64(tf.fd, 0, -1)); |
| 123 | ASSERT_EQ(0, errno); |
| 124 | } |
| 125 | |
| 126 | TEST(fcntl, fallocate) { |
| 127 | TemporaryFile tf; |
| 128 | struct stat sb; |
| 129 | ASSERT_EQ(0, fstat(tf.fd, &sb)); |
| 130 | ASSERT_EQ(0, sb.st_size); |
| 131 | |
Elliott Hughes | 063525c | 2014-05-13 11:19:57 -0700 | [diff] [blame] | 132 | #if defined(__BIONIC__) |
Elliott Hughes | f64b8ea | 2014-02-03 16:20:46 -0800 | [diff] [blame] | 133 | ASSERT_EQ(0, fallocate(tf.fd, 0, 0, 1)); |
| 134 | ASSERT_EQ(0, fstat(tf.fd, &sb)); |
| 135 | ASSERT_EQ(1, sb.st_size); |
| 136 | |
| 137 | ASSERT_EQ(0, fallocate64(tf.fd, 0, 0, 2)); |
| 138 | ASSERT_EQ(0, fstat(tf.fd, &sb)); |
| 139 | ASSERT_EQ(2, sb.st_size); |
| 140 | #endif |
| 141 | |
| 142 | ASSERT_EQ(0, posix_fallocate(tf.fd, 0, 3)); |
| 143 | ASSERT_EQ(0, fstat(tf.fd, &sb)); |
| 144 | ASSERT_EQ(3, sb.st_size); |
| 145 | |
| 146 | ASSERT_EQ(0, posix_fallocate64(tf.fd, 0, 4)); |
| 147 | ASSERT_EQ(0, fstat(tf.fd, &sb)); |
| 148 | ASSERT_EQ(4, sb.st_size); |
| 149 | } |
Serban Constantinescu | 48501af | 2014-03-14 13:16:25 +0000 | [diff] [blame] | 150 | |
| 151 | TEST(fcntl, f_getlk64) { |
| 152 | int fd = open64("/proc/version", O_RDONLY); |
| 153 | ASSERT_TRUE(fd != -1); |
| 154 | |
| 155 | struct flock64 check_lock; |
| 156 | check_lock.l_type = F_WRLCK; |
| 157 | check_lock.l_start = 0; |
| 158 | check_lock.l_whence = SEEK_SET; |
| 159 | check_lock.l_len = 0; |
| 160 | |
| 161 | int rc = fcntl(fd, F_GETLK64, &check_lock); |
| 162 | ASSERT_EQ(0, rc); |
| 163 | |
| 164 | close(fd); |
| 165 | } |
Elliott Hughes | 3f525d4 | 2014-06-24 16:32:01 -0700 | [diff] [blame] | 166 | |
| 167 | TEST(fcntl, splice) { |
| 168 | int pipe_fds[2]; |
| 169 | ASSERT_EQ(0, pipe(pipe_fds)); |
| 170 | |
| 171 | int in = open("/proc/cpuinfo", O_RDONLY); |
| 172 | ASSERT_NE(in, -1); |
| 173 | |
| 174 | TemporaryFile tf; |
| 175 | |
Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 176 | ssize_t bytes_read = splice(in, nullptr, pipe_fds[1], nullptr, 8*1024, SPLICE_F_MORE | SPLICE_F_MOVE); |
Elliott Hughes | 3f525d4 | 2014-06-24 16:32:01 -0700 | [diff] [blame] | 177 | ASSERT_NE(bytes_read, -1); |
| 178 | |
Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 179 | ssize_t bytes_written = splice(pipe_fds[0], nullptr, tf.fd, nullptr, bytes_read, SPLICE_F_MORE | SPLICE_F_MOVE); |
Elliott Hughes | 3f525d4 | 2014-06-24 16:32:01 -0700 | [diff] [blame] | 180 | ASSERT_EQ(bytes_read, bytes_written); |
| 181 | |
| 182 | close(pipe_fds[0]); |
| 183 | close(pipe_fds[1]); |
| 184 | close(in); |
| 185 | } |
| 186 | |
| 187 | TEST(fcntl, vmsplice) { |
| 188 | int pipe_fds[2]; |
| 189 | ASSERT_EQ(0, pipe(pipe_fds)); |
| 190 | |
| 191 | iovec v[2]; |
| 192 | v[0].iov_base = const_cast<char*>("hello "); |
| 193 | v[0].iov_len = 6; |
| 194 | v[1].iov_base = const_cast<char*>("world\n"); |
| 195 | v[1].iov_len = 6; |
| 196 | ssize_t bytes_written = vmsplice(pipe_fds[1], v, sizeof(v)/sizeof(iovec), 0); |
| 197 | ASSERT_EQ(v[0].iov_len + v[1].iov_len, static_cast<size_t>(bytes_written)); |
| 198 | close(pipe_fds[1]); |
| 199 | |
| 200 | char buf[BUFSIZ]; |
| 201 | FILE* fp = fdopen(pipe_fds[0], "r"); |
Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 202 | ASSERT_TRUE(fp != nullptr); |
| 203 | ASSERT_TRUE(fgets(buf, sizeof(buf), fp) != nullptr); |
Elliott Hughes | 3f525d4 | 2014-06-24 16:32:01 -0700 | [diff] [blame] | 204 | fclose(fp); |
| 205 | ASSERT_STREQ("hello world\n", buf); |
| 206 | } |
| 207 | |
| 208 | TEST(fcntl, tee) { |
Kazuhiro Inaba | f7a8e95 | 2017-09-25 15:18:29 +0900 | [diff] [blame] | 209 | char expected[BUFSIZ]; |
Elliott Hughes | 3f525d4 | 2014-06-24 16:32:01 -0700 | [diff] [blame] | 210 | FILE* expected_fp = fopen("/proc/version", "r"); |
Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 211 | ASSERT_TRUE(expected_fp != nullptr); |
| 212 | ASSERT_TRUE(fgets(expected, sizeof(expected), expected_fp) != nullptr); |
Elliott Hughes | 3f525d4 | 2014-06-24 16:32:01 -0700 | [diff] [blame] | 213 | fclose(expected_fp); |
| 214 | |
| 215 | int pipe1[2]; |
| 216 | ASSERT_EQ(0, pipe(pipe1)); |
| 217 | |
| 218 | int pipe2[2]; |
| 219 | ASSERT_EQ(0, pipe(pipe2)); |
| 220 | |
| 221 | int in = open("/proc/version", O_RDONLY); |
| 222 | ASSERT_NE(in, -1); |
| 223 | |
| 224 | // Write /proc/version into pipe1. |
Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 225 | ssize_t bytes_read = splice(in, nullptr, pipe1[1], nullptr, 8*1024, SPLICE_F_MORE | SPLICE_F_MOVE); |
Elliott Hughes | 3f525d4 | 2014-06-24 16:32:01 -0700 | [diff] [blame] | 226 | ASSERT_NE(bytes_read, -1); |
| 227 | close(pipe1[1]); |
| 228 | |
| 229 | // Tee /proc/version from pipe1 into pipe2. |
| 230 | ssize_t bytes_teed = tee(pipe1[0], pipe2[1], SIZE_MAX, 0); |
| 231 | ASSERT_EQ(bytes_read, bytes_teed); |
| 232 | close(pipe2[1]); |
| 233 | |
| 234 | // The out fds of both pipe1 and pipe2 should now contain /proc/version. |
| 235 | char buf1[BUFSIZ]; |
| 236 | FILE* fp1 = fdopen(pipe1[0], "r"); |
Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 237 | ASSERT_TRUE(fp1 != nullptr); |
| 238 | ASSERT_TRUE(fgets(buf1, sizeof(buf1), fp1) != nullptr); |
Elliott Hughes | 3f525d4 | 2014-06-24 16:32:01 -0700 | [diff] [blame] | 239 | fclose(fp1); |
| 240 | |
| 241 | char buf2[BUFSIZ]; |
| 242 | FILE* fp2 = fdopen(pipe2[0], "r"); |
Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 243 | ASSERT_TRUE(fp2 != nullptr); |
| 244 | ASSERT_TRUE(fgets(buf2, sizeof(buf2), fp2) != nullptr); |
Elliott Hughes | 3f525d4 | 2014-06-24 16:32:01 -0700 | [diff] [blame] | 245 | fclose(fp2); |
| 246 | |
| 247 | ASSERT_STREQ(expected, buf1); |
| 248 | ASSERT_STREQ(expected, buf2); |
| 249 | } |
Elliott Hughes | 55147ad | 2016-04-05 11:06:02 -0700 | [diff] [blame] | 250 | |
| 251 | TEST(fcntl, readahead) { |
| 252 | // Just check that the function is available. |
| 253 | errno = 0; |
| 254 | ASSERT_EQ(-1, readahead(-1, 0, 123)); |
| 255 | ASSERT_EQ(EBADF, errno); |
| 256 | } |
Elliott Hughes | 7f72ad4 | 2016-04-05 11:56:03 -0700 | [diff] [blame] | 257 | |
| 258 | TEST(fcntl, sync_file_range) { |
| 259 | // Just check that the function is available. |
| 260 | errno = 0; |
| 261 | ASSERT_EQ(-1, sync_file_range(-1, 0, 0, 0)); |
| 262 | ASSERT_EQ(EBADF, errno); |
| 263 | |
| 264 | TemporaryFile tf; |
| 265 | ASSERT_EQ(0, sync_file_range(tf.fd, 0, 0, 0)); |
| 266 | |
| 267 | // The arguments to the underlying system call are in a different order on 32-bit ARM. |
| 268 | // Check that the `flags` argument gets passed to the kernel correctly. |
| 269 | errno = 0; |
| 270 | ASSERT_EQ(-1, sync_file_range(tf.fd, 0, 0, ~0)); |
| 271 | ASSERT_EQ(EINVAL, errno); |
| 272 | } |
Nick Desaulniers | 094f316 | 2016-07-19 15:20:24 -0700 | [diff] [blame] | 273 | |
| 274 | static bool parse_kernel_release(long* const major, long* const minor) { |
| 275 | struct utsname buf; |
| 276 | if (uname(&buf) == -1) { |
| 277 | return false; |
| 278 | } |
| 279 | return sscanf(buf.release, "%ld.%ld", major, minor) == 2; |
| 280 | } |
| 281 | |
| 282 | /* |
Josh Gao | 24ed8b5 | 2017-06-02 14:57:49 -0700 | [diff] [blame] | 283 | * b/28760453: |
| 284 | * Kernels older than 4.1 should have ext4 FALLOC_FL_PUNCH_HOLE disabled due to CVE-2015-8839. |
| 285 | * Devices that fail this test should cherry-pick the following commit: |
| 286 | * https://android.googlesource.com/kernel/msm/+/bdba352e898cbf57c8620ad68c8abf749c784d1f |
Nick Desaulniers | 094f316 | 2016-07-19 15:20:24 -0700 | [diff] [blame] | 287 | */ |
| 288 | TEST(fcntl, falloc_punch) { |
| 289 | long major = 0, minor = 0; |
| 290 | ASSERT_TRUE(parse_kernel_release(&major, &minor)); |
| 291 | |
| 292 | if (major < 4 || (major == 4 && minor < 1)) { |
| 293 | TemporaryFile tf; |
Matthias Hausner | 47a5210 | 2017-06-02 10:09:19 -0700 | [diff] [blame] | 294 | struct statfs sfs; |
| 295 | ASSERT_EQ(0, fstatfs(tf.fd, &sfs)); |
| 296 | if (sfs.f_type == EXT4_SUPER_MAGIC) { |
| 297 | ASSERT_EQ(-1, fallocate(tf.fd, FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE, 0, 1)); |
| 298 | ASSERT_EQ(errno, EOPNOTSUPP); |
| 299 | } |
Nick Desaulniers | 094f316 | 2016-07-19 15:20:24 -0700 | [diff] [blame] | 300 | } |
| 301 | } |
Elliott Hughes | b115aef | 2017-08-04 09:34:19 -0700 | [diff] [blame] | 302 | |
| 303 | TEST(fcntl, open_O_TMPFILE_mode) { |
| 304 | #if __BIONIC__ // Our glibc is too old for O_TMPFILE. |
| 305 | TemporaryDir dir; |
| 306 | // Without O_EXCL, we're allowed to give this a name later. |
| 307 | // (This is unrelated to the O_CREAT interaction with O_EXCL.) |
| 308 | const mode_t perms = S_IRUSR | S_IWUSR; |
Mark Salyzyn | 68a3bcc | 2018-11-13 07:35:21 -0800 | [diff] [blame] | 309 | int fd = open(dir.path, O_TMPFILE | O_RDWR, perms); |
Elliott Hughes | b115aef | 2017-08-04 09:34:19 -0700 | [diff] [blame] | 310 | |
| 311 | // Ignore kernels without O_TMPFILE support (< 3.11). |
| 312 | if (fd == -1 && (errno == EISDIR || errno == EINVAL || errno == EOPNOTSUPP)) return; |
| 313 | |
| 314 | ASSERT_TRUE(fd != -1) << strerror(errno); |
| 315 | |
| 316 | // Does the fd claim to have the mode we set? |
| 317 | struct stat sb = {}; |
| 318 | ASSERT_EQ(0, fstat(fd, &sb)); |
| 319 | ASSERT_EQ(perms, (sb.st_mode & ~S_IFMT)); |
| 320 | |
Elliott Hughes | fc30bfe | 2017-10-24 22:54:34 -0700 | [diff] [blame] | 321 | // On Android if we're not root, we won't be able to create links anyway... |
| 322 | if (getuid() != 0) return; |
| 323 | |
Mark Salyzyn | 68a3bcc | 2018-11-13 07:35:21 -0800 | [diff] [blame] | 324 | std::string final_path = android::base::StringPrintf("%s/named_now", dir.path); |
Elliott Hughes | b115aef | 2017-08-04 09:34:19 -0700 | [diff] [blame] | 325 | ASSERT_EQ(0, linkat(AT_FDCWD, android::base::StringPrintf("/proc/self/fd/%d", fd).c_str(), |
| 326 | AT_FDCWD, final_path.c_str(), |
| 327 | AT_SYMLINK_FOLLOW)); |
| 328 | ASSERT_EQ(0, close(fd)); |
| 329 | |
| 330 | // Does the resulting file claim to have the mode we set? |
| 331 | ASSERT_EQ(0, stat(final_path.c_str(), &sb)); |
| 332 | ASSERT_EQ(perms, (sb.st_mode & ~S_IFMT)); |
| 333 | |
| 334 | // With O_EXCL, you're not allowed to add a name later. |
Mark Salyzyn | 68a3bcc | 2018-11-13 07:35:21 -0800 | [diff] [blame] | 335 | fd = open(dir.path, O_TMPFILE | O_RDWR | O_EXCL, S_IRUSR | S_IWUSR); |
Elliott Hughes | b115aef | 2017-08-04 09:34:19 -0700 | [diff] [blame] | 336 | ASSERT_TRUE(fd != -1) << strerror(errno); |
| 337 | errno = 0; |
| 338 | ASSERT_EQ(-1, linkat(AT_FDCWD, android::base::StringPrintf("/proc/self/fd/%d", fd).c_str(), |
Mark Salyzyn | 68a3bcc | 2018-11-13 07:35:21 -0800 | [diff] [blame] | 339 | AT_FDCWD, android::base::StringPrintf("%s/no_chance", dir.path).c_str(), |
Elliott Hughes | b115aef | 2017-08-04 09:34:19 -0700 | [diff] [blame] | 340 | AT_SYMLINK_FOLLOW)); |
| 341 | ASSERT_EQ(ENOENT, errno); |
| 342 | ASSERT_EQ(0, close(fd)); |
| 343 | #endif |
| 344 | } |