blob: 6b2856169bd58b45dbca9b8b88bd2c5fe1f03b1b [file] [log] [blame]
Elliott Hughesa55f6302013-01-02 14:23:43 -08001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
Elliott Hughes33697a02016-01-26 13:04:57 -080018
Yabin Cui9df70402014-11-05 18:01:01 -080019#include "BionicDeathTest.h"
Elliott Hughes71ba5892018-02-07 12:44:45 -080020#include "SignalUtils.h"
Elliott Hughes33697a02016-01-26 13:04:57 -080021#include "utils.h"
Elliott Hughesa55f6302013-01-02 14:23:43 -080022
Elliott Hughes915fefb2014-02-18 12:34:51 -080023#include <errno.h>
Colin Cross3d19a832014-02-14 18:56:23 -080024#include <fcntl.h>
Elliott Hughes3c115902016-08-24 19:27:04 -070025#include <libgen.h>
Elliott Hughes21972b62014-07-28 12:24:22 -070026#include <limits.h>
Elliott Hughes428f5562013-02-05 16:10:59 -080027#include <stdint.h>
Greg Hackmanne2faf072016-03-03 08:37:53 -080028#include <sys/capability.h>
Yabin Cuib5e581a2014-11-08 14:58:12 -080029#include <sys/param.h>
Elliott Hughesdb602e82019-11-15 09:04:27 -080030#include <sys/resource.h>
Elliott Hughes7086ad62014-06-19 16:39:01 -070031#include <sys/syscall.h>
Elliott Hughes764a9932014-04-08 19:44:36 -070032#include <sys/types.h>
Derek Xued94e7f02014-09-25 11:12:01 +010033#include <sys/utsname.h>
Elliott Hughes764a9932014-04-08 19:44:36 -070034#include <sys/wait.h>
Yabin Cui9df70402014-11-05 18:01:01 -080035#include <unistd.h>
36
Elliott Hughesca3f8e42019-10-28 15:59:38 -070037#include <chrono>
38
Elliott Hughes939a7e02015-12-04 15:27:46 -080039#include <android-base/file.h>
40#include <android-base/strings.h>
Yabin Cuicb6f5992015-09-29 16:11:45 -070041
42#include "private/get_cpu_count_from_string.h"
43
Josh Gao23032832020-05-07 17:02:19 -070044#if defined(__BIONIC__)
45#include "bionic/pthread_internal.h"
46#endif
47
Christopher Ferris13f26a72016-01-13 13:47:58 -080048#if defined(NOFORTIFY)
49#define UNISTD_TEST unistd_nofortify
50#define UNISTD_DEATHTEST unistd_nofortify_DeathTest
51#else
52#define UNISTD_TEST unistd
53#define UNISTD_DEATHTEST unistd_DeathTest
54#endif
55
Elliott Hughesca3f8e42019-10-28 15:59:38 -070056using namespace std::chrono_literals;
57
Elliott Hughes533dde42014-04-25 18:27:38 -070058static void* get_brk() {
59 return sbrk(0);
60}
Elliott Hughes428f5562013-02-05 16:10:59 -080061
Elliott Hughes533dde42014-04-25 18:27:38 -070062static void* page_align(uintptr_t addr) {
63 uintptr_t mask = sysconf(_SC_PAGE_SIZE) - 1;
64 return reinterpret_cast<void*>((addr + mask) & ~mask);
65}
66
Christopher Ferris13f26a72016-01-13 13:47:58 -080067TEST(UNISTD_TEST, brk) {
Elliott Hughes533dde42014-04-25 18:27:38 -070068 void* initial_break = get_brk();
69
Elliott Hughes533dde42014-04-25 18:27:38 -070070 void* new_break = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(initial_break) + 1);
Daniel Micay126ab122015-12-31 08:04:53 -050071 int ret = brk(new_break);
72 if (ret == -1) {
73 ASSERT_EQ(errno, ENOMEM);
74 } else {
75 ASSERT_EQ(0, ret);
76 ASSERT_GE(get_brk(), new_break);
77 }
Elliott Hughes428f5562013-02-05 16:10:59 -080078
Daniel Micay126ab122015-12-31 08:04:53 -050079 // Expand by a full page to force the mapping to expand
Elliott Hughes533dde42014-04-25 18:27:38 -070080 new_break = page_align(reinterpret_cast<uintptr_t>(initial_break) + sysconf(_SC_PAGE_SIZE));
Daniel Micay126ab122015-12-31 08:04:53 -050081 ret = brk(new_break);
82 if (ret == -1) {
83 ASSERT_EQ(errno, ENOMEM);
84 } else {
85 ASSERT_EQ(0, ret);
86 ASSERT_EQ(get_brk(), new_break);
87 }
Elliott Hughes533dde42014-04-25 18:27:38 -070088}
89
Christopher Ferris13f26a72016-01-13 13:47:58 -080090TEST(UNISTD_TEST, brk_ENOMEM) {
Elliott Hughes533dde42014-04-25 18:27:38 -070091 ASSERT_EQ(-1, brk(reinterpret_cast<void*>(-1)));
92 ASSERT_EQ(ENOMEM, errno);
93}
94
Christopher Ferris738b0cc2014-05-21 19:03:34 -070095#if defined(__GLIBC__)
96#define SBRK_MIN INTPTR_MIN
97#define SBRK_MAX INTPTR_MAX
98#else
99#define SBRK_MIN PTRDIFF_MIN
100#define SBRK_MAX PTRDIFF_MAX
101#endif
102
Christopher Ferris13f26a72016-01-13 13:47:58 -0800103TEST(UNISTD_TEST, sbrk_ENOMEM) {
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700104#if defined(__BIONIC__) && !defined(__LP64__)
105 // There is no way to guarantee that all overflow conditions can be tested
106 // without manipulating the underlying values of the current break.
107 extern void* __bionic_brk;
108
109 class ScopedBrk {
110 public:
111 ScopedBrk() : saved_brk_(__bionic_brk) {}
112 virtual ~ScopedBrk() { __bionic_brk = saved_brk_; }
113
114 private:
115 void* saved_brk_;
116 };
117
118 ScopedBrk scope_brk;
119
120 // Set the current break to a point that will cause an overflow.
121 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) + 2);
Elliott Hughes533dde42014-04-25 18:27:38 -0700122
123 // Can't increase by so much that we'd overflow.
124 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MAX));
125 ASSERT_EQ(ENOMEM, errno);
126
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700127 // Set the current break to a point that will cause an overflow.
128 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX));
Elliott Hughes533dde42014-04-25 18:27:38 -0700129
Elliott Hughes533dde42014-04-25 18:27:38 -0700130 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN));
131 ASSERT_EQ(ENOMEM, errno);
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700132
133 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) - 1);
134
135 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN + 1));
136 ASSERT_EQ(ENOMEM, errno);
137#else
138 class ScopedBrk {
139 public:
140 ScopedBrk() : saved_brk_(get_brk()) {}
141 virtual ~ScopedBrk() { brk(saved_brk_); }
142
143 private:
144 void* saved_brk_;
145 };
146
147 ScopedBrk scope_brk;
148
149 uintptr_t cur_brk = reinterpret_cast<uintptr_t>(get_brk());
150 if (cur_brk < static_cast<uintptr_t>(-(SBRK_MIN+1))) {
151 // Do the overflow test for a max negative increment.
152 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MIN));
153#if defined(__BIONIC__)
154 // GLIBC does not set errno in overflow case.
155 ASSERT_EQ(ENOMEM, errno);
156#endif
157 }
158
159 uintptr_t overflow_brk = static_cast<uintptr_t>(SBRK_MAX) + 2;
160 if (cur_brk < overflow_brk) {
161 // Try and move the value to PTRDIFF_MAX + 2.
162 cur_brk = reinterpret_cast<uintptr_t>(sbrk(overflow_brk));
163 }
164 if (cur_brk >= overflow_brk) {
165 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MAX));
166#if defined(__BIONIC__)
167 // GLIBC does not set errno in overflow case.
168 ASSERT_EQ(ENOMEM, errno);
169#endif
170 }
Elliott Hughes533dde42014-04-25 18:27:38 -0700171#endif
Elliott Hughes428f5562013-02-05 16:10:59 -0800172}
Elliott Hughesb4f76162013-09-19 16:27:24 -0700173
Christopher Ferris13f26a72016-01-13 13:47:58 -0800174TEST(UNISTD_TEST, truncate) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700175 TemporaryFile tf;
176 ASSERT_EQ(0, close(tf.fd));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800177 ASSERT_EQ(0, truncate(tf.path, 123));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700178
179 struct stat sb;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800180 ASSERT_EQ(0, stat(tf.path, &sb));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700181 ASSERT_EQ(123, sb.st_size);
182}
183
Christopher Ferris13f26a72016-01-13 13:47:58 -0800184TEST(UNISTD_TEST, truncate64) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700185 TemporaryFile tf;
186 ASSERT_EQ(0, close(tf.fd));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800187 ASSERT_EQ(0, truncate64(tf.path, 123));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700188
189 struct stat sb;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800190 ASSERT_EQ(0, stat(tf.path, &sb));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700191 ASSERT_EQ(123, sb.st_size);
192}
193
Christopher Ferris13f26a72016-01-13 13:47:58 -0800194TEST(UNISTD_TEST, ftruncate) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700195 TemporaryFile tf;
196 ASSERT_EQ(0, ftruncate(tf.fd, 123));
197 ASSERT_EQ(0, close(tf.fd));
198
199 struct stat sb;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800200 ASSERT_EQ(0, stat(tf.path, &sb));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700201 ASSERT_EQ(123, sb.st_size);
202}
203
Christopher Ferris13f26a72016-01-13 13:47:58 -0800204TEST(UNISTD_TEST, ftruncate64) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700205 TemporaryFile tf;
206 ASSERT_EQ(0, ftruncate64(tf.fd, 123));
207 ASSERT_EQ(0, close(tf.fd));
208
209 struct stat sb;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800210 ASSERT_EQ(0, stat(tf.path, &sb));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700211 ASSERT_EQ(123, sb.st_size);
212}
Elliott Hughes11952072013-10-24 15:15:14 -0700213
Christopher Ferris13f26a72016-01-13 13:47:58 -0800214TEST(UNISTD_TEST, ftruncate_negative) {
Dan Albertc05554e2015-05-19 18:17:31 -0700215 TemporaryFile tf;
216 errno = 0;
Dan Albert9d476a02015-06-01 11:28:31 -0700217 ASSERT_EQ(-1, ftruncate(tf.fd, -123));
218 ASSERT_EQ(EINVAL, errno);
Dan Albertc05554e2015-05-19 18:17:31 -0700219}
220
Elliott Hughes1728b232014-05-14 10:02:03 -0700221static bool g_pause_test_flag = false;
Elliott Hughes11952072013-10-24 15:15:14 -0700222static void PauseTestSignalHandler(int) {
Elliott Hughes1728b232014-05-14 10:02:03 -0700223 g_pause_test_flag = true;
Elliott Hughes11952072013-10-24 15:15:14 -0700224}
225
Christopher Ferris13f26a72016-01-13 13:47:58 -0800226TEST(UNISTD_TEST, pause) {
Christopher Ferris13613132013-10-28 15:24:04 -0700227 ScopedSignalHandler handler(SIGALRM, PauseTestSignalHandler);
228
Elliott Hughes11952072013-10-24 15:15:14 -0700229 alarm(1);
Elliott Hughes1728b232014-05-14 10:02:03 -0700230 ASSERT_FALSE(g_pause_test_flag);
Elliott Hughes11952072013-10-24 15:15:14 -0700231 ASSERT_EQ(-1, pause());
Elliott Hughes1728b232014-05-14 10:02:03 -0700232 ASSERT_TRUE(g_pause_test_flag);
Elliott Hughes11952072013-10-24 15:15:14 -0700233}
Colin Cross3d19a832014-02-14 18:56:23 -0800234
Christopher Ferris13f26a72016-01-13 13:47:58 -0800235TEST(UNISTD_TEST, read) {
Colin Cross3d19a832014-02-14 18:56:23 -0800236 int fd = open("/proc/version", O_RDONLY);
237 ASSERT_TRUE(fd != -1);
238
239 char buf[5];
240 ASSERT_EQ(5, read(fd, buf, 5));
241 ASSERT_EQ(buf[0], 'L');
242 ASSERT_EQ(buf[1], 'i');
243 ASSERT_EQ(buf[2], 'n');
244 ASSERT_EQ(buf[3], 'u');
245 ASSERT_EQ(buf[4], 'x');
246 close(fd);
247}
248
Christopher Ferris13f26a72016-01-13 13:47:58 -0800249TEST(UNISTD_TEST, read_EBADF) {
Colin Cross3d19a832014-02-14 18:56:23 -0800250 // read returns ssize_t which is 64-bits on LP64, so it's worth explicitly checking that
251 // our syscall stubs correctly return a 64-bit -1.
252 char buf[1];
253 ASSERT_EQ(-1, read(-1, buf, sizeof(buf)));
254 ASSERT_EQ(EBADF, errno);
255}
Elliott Hughesaedb00d2014-03-03 14:38:20 -0800256
Christopher Ferris13f26a72016-01-13 13:47:58 -0800257TEST(UNISTD_TEST, syscall_long) {
Elliott Hughes21972b62014-07-28 12:24:22 -0700258 // Check that syscall(3) correctly returns long results.
259 // https://code.google.com/p/android/issues/detail?id=73952
260 // We assume that the break is > 4GiB, but this is potentially flaky.
261 uintptr_t p = reinterpret_cast<uintptr_t>(sbrk(0));
262 ASSERT_EQ(p, static_cast<uintptr_t>(syscall(__NR_brk, 0)));
263}
264
Christopher Ferris13f26a72016-01-13 13:47:58 -0800265TEST(UNISTD_TEST, alarm) {
Elliott Hughesaedb00d2014-03-03 14:38:20 -0800266 ASSERT_EQ(0U, alarm(0));
267}
Elliott Hughes9f525642014-04-08 17:14:01 -0700268
Christopher Ferris13f26a72016-01-13 13:47:58 -0800269TEST(UNISTD_TEST, _exit) {
Elliott Hughes33697a02016-01-26 13:04:57 -0800270 pid_t pid = fork();
Elliott Hughes9f525642014-04-08 17:14:01 -0700271 ASSERT_NE(-1, pid) << strerror(errno);
272
273 if (pid == 0) {
274 _exit(99);
275 }
276
Elliott Hughes33697a02016-01-26 13:04:57 -0800277 AssertChildExited(pid, 99);
Elliott Hughes9f525642014-04-08 17:14:01 -0700278}
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400279
Christopher Ferris13f26a72016-01-13 13:47:58 -0800280TEST(UNISTD_TEST, getenv_unsetenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400281 ASSERT_EQ(0, setenv("test-variable", "hello", 1));
282 ASSERT_STREQ("hello", getenv("test-variable"));
283 ASSERT_EQ(0, unsetenv("test-variable"));
Yi Kong32bc0fc2018-08-02 17:31:13 -0700284 ASSERT_TRUE(getenv("test-variable") == nullptr);
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400285}
286
Christopher Ferris13f26a72016-01-13 13:47:58 -0800287TEST(UNISTD_TEST, unsetenv_EINVAL) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400288 EXPECT_EQ(-1, unsetenv(""));
289 EXPECT_EQ(EINVAL, errno);
290 EXPECT_EQ(-1, unsetenv("a=b"));
291 EXPECT_EQ(EINVAL, errno);
292}
293
Christopher Ferris13f26a72016-01-13 13:47:58 -0800294TEST(UNISTD_TEST, setenv_EINVAL) {
Yi Kong32bc0fc2018-08-02 17:31:13 -0700295 EXPECT_EQ(-1, setenv(nullptr, "value", 0));
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400296 EXPECT_EQ(EINVAL, errno);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700297 EXPECT_EQ(-1, setenv(nullptr, "value", 1));
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400298 EXPECT_EQ(EINVAL, errno);
299 EXPECT_EQ(-1, setenv("", "value", 0));
300 EXPECT_EQ(EINVAL, errno);
301 EXPECT_EQ(-1, setenv("", "value", 1));
302 EXPECT_EQ(EINVAL, errno);
303 EXPECT_EQ(-1, setenv("a=b", "value", 0));
304 EXPECT_EQ(EINVAL, errno);
305 EXPECT_EQ(-1, setenv("a=b", "value", 1));
306 EXPECT_EQ(EINVAL, errno);
307}
308
Christopher Ferris13f26a72016-01-13 13:47:58 -0800309TEST(UNISTD_TEST, setenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400310 ASSERT_EQ(0, unsetenv("test-variable"));
311
312 char a[] = "a";
313 char b[] = "b";
314 char c[] = "c";
315
316 // New value.
317 EXPECT_EQ(0, setenv("test-variable", a, 0));
318 EXPECT_STREQ(a, getenv("test-variable"));
319
320 // Existing value, no overwrite.
321 EXPECT_EQ(0, setenv("test-variable", b, 0));
322 EXPECT_STREQ(a, getenv("test-variable"));
323
324 // Existing value, overwrite.
325 EXPECT_EQ(0, setenv("test-variable", c, 1));
326 EXPECT_STREQ(c, getenv("test-variable"));
327 // But the arrays backing the values are unchanged.
328 EXPECT_EQ('a', a[0]);
329 EXPECT_EQ('b', b[0]);
330 EXPECT_EQ('c', c[0]);
331
332 ASSERT_EQ(0, unsetenv("test-variable"));
333}
334
Christopher Ferris13f26a72016-01-13 13:47:58 -0800335TEST(UNISTD_TEST, putenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400336 ASSERT_EQ(0, unsetenv("a"));
337
338 char* s1 = strdup("a=b");
339 ASSERT_EQ(0, putenv(s1));
340
341 ASSERT_STREQ("b", getenv("a"));
342 s1[2] = 'c';
343 ASSERT_STREQ("c", getenv("a"));
344
345 char* s2 = strdup("a=b");
346 ASSERT_EQ(0, putenv(s2));
347
348 ASSERT_STREQ("b", getenv("a"));
349 ASSERT_EQ('c', s1[2]);
350
351 ASSERT_EQ(0, unsetenv("a"));
352 free(s1);
353 free(s2);
354}
355
Christopher Ferris13f26a72016-01-13 13:47:58 -0800356TEST(UNISTD_TEST, clearenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400357 extern char** environ;
358
359 // Guarantee that environ is not initially empty...
360 ASSERT_EQ(0, setenv("test-variable", "a", 1));
361
362 // Stash a copy.
363 std::vector<char*> old_environ;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700364 for (size_t i = 0; environ[i] != nullptr; ++i) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400365 old_environ.push_back(strdup(environ[i]));
366 }
367
368 ASSERT_EQ(0, clearenv());
369
Yi Kong32bc0fc2018-08-02 17:31:13 -0700370 EXPECT_TRUE(environ == nullptr || environ[0] == nullptr);
371 EXPECT_EQ(nullptr, getenv("test-variable"));
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400372 EXPECT_EQ(0, setenv("test-variable", "post-clear", 1));
373 EXPECT_STREQ("post-clear", getenv("test-variable"));
374
375 // Put the old environment back.
376 for (size_t i = 0; i < old_environ.size(); ++i) {
377 EXPECT_EQ(0, putenv(old_environ[i]));
378 }
379
380 // Check it wasn't overwritten.
381 EXPECT_STREQ("a", getenv("test-variable"));
382
383 EXPECT_EQ(0, unsetenv("test-variable"));
384}
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700385
Elliott Hughes896362e2017-08-24 16:31:49 -0700386static void TestSyncFunction(int (*fn)(int)) {
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700387 int fd;
388
389 // Can't sync an invalid fd.
390 errno = 0;
391 EXPECT_EQ(-1, fn(-1));
392 EXPECT_EQ(EBADF, errno);
393
394 // It doesn't matter whether you've opened a file for write or not.
395 TemporaryFile tf;
396 ASSERT_NE(-1, tf.fd);
397
398 EXPECT_EQ(0, fn(tf.fd));
399
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800400 ASSERT_NE(-1, fd = open(tf.path, O_RDONLY));
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700401 EXPECT_EQ(0, fn(fd));
402 close(fd);
403
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800404 ASSERT_NE(-1, fd = open(tf.path, O_RDWR));
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700405 EXPECT_EQ(0, fn(fd));
406 close(fd);
407
408 // The fd can even be a directory.
Christopher Ferrisa948a4e2016-05-20 15:32:47 -0700409 ASSERT_NE(-1, fd = open("/data/local/tmp", O_RDONLY));
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700410 EXPECT_EQ(0, fn(fd));
411 close(fd);
Elliott Hughes896362e2017-08-24 16:31:49 -0700412}
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700413
Elliott Hughes896362e2017-08-24 16:31:49 -0700414static void TestFsyncFunction(int (*fn)(int)) {
415 TestSyncFunction(fn);
416
417 // But some file systems are fussy about fsync/fdatasync...
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700418 errno = 0;
Elliott Hughes896362e2017-08-24 16:31:49 -0700419 int fd = open("/proc/version", O_RDONLY);
420 ASSERT_NE(-1, fd);
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700421 EXPECT_EQ(-1, fn(fd));
422 EXPECT_EQ(EINVAL, errno);
423 close(fd);
424}
425
Christopher Ferris13f26a72016-01-13 13:47:58 -0800426TEST(UNISTD_TEST, fdatasync) {
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700427 TestFsyncFunction(fdatasync);
428}
429
Christopher Ferris13f26a72016-01-13 13:47:58 -0800430TEST(UNISTD_TEST, fsync) {
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700431 TestFsyncFunction(fsync);
432}
Elliott Hughes7086ad62014-06-19 16:39:01 -0700433
Elliott Hughes896362e2017-08-24 16:31:49 -0700434TEST(UNISTD_TEST, syncfs) {
435 TestSyncFunction(syncfs);
436}
437
Josh Gao23032832020-05-07 17:02:19 -0700438TEST(UNISTD_TEST, vfork) {
439#if defined(__BIONIC__)
440 pthread_internal_t* self = __get_thread();
441
442 pid_t cached_pid;
443 ASSERT_TRUE(self->get_cached_pid(&cached_pid));
444 ASSERT_EQ(syscall(__NR_getpid), cached_pid);
445 ASSERT_FALSE(self->is_vforked());
446
447 pid_t rc = vfork();
448 ASSERT_NE(-1, rc);
449 if (rc == 0) {
450 if (self->get_cached_pid(&cached_pid)) {
451 const char* error = "__get_thread()->cached_pid_ set after vfork\n";
452 write(STDERR_FILENO, error, strlen(error));
453 _exit(1);
454 }
455
456 if (!self->is_vforked()) {
457 const char* error = "__get_thread()->vforked_ not set after vfork\n";
458 write(STDERR_FILENO, error, strlen(error));
459 _exit(1);
460 }
461
462 _exit(0);
463 } else {
464 ASSERT_TRUE(self->get_cached_pid(&cached_pid));
465 ASSERT_EQ(syscall(__NR_getpid), cached_pid);
466 ASSERT_FALSE(self->is_vforked());
467
468 int status;
469 pid_t wait_result = waitpid(rc, &status, 0);
470 ASSERT_EQ(wait_result, rc);
471 ASSERT_TRUE(WIFEXITED(status));
472 ASSERT_EQ(0, WEXITSTATUS(status));
473 }
474#endif
475}
476
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700477static void AssertGetPidCorrect() {
478 // The loop is just to make manual testing/debugging with strace easier.
479 pid_t getpid_syscall_result = syscall(__NR_getpid);
480 for (size_t i = 0; i < 128; ++i) {
481 ASSERT_EQ(getpid_syscall_result, getpid());
482 }
483}
484
Robert Seseke4621172016-11-03 15:00:53 -0400485static void TestGetPidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) {
Elliott Hughes7086ad62014-06-19 16:39:01 -0700486 pid_t parent_pid = getpid();
487 ASSERT_EQ(syscall(__NR_getpid), parent_pid);
488
Elliott Hughes5891abd2015-08-07 18:27:47 -0700489 pid_t fork_result = fork_fn();
Elliott Hughes7086ad62014-06-19 16:39:01 -0700490 ASSERT_NE(fork_result, -1);
491 if (fork_result == 0) {
492 // We're the child.
Robert Seseka4edf7a2016-10-25 10:29:02 -0400493 ASSERT_NO_FATAL_FAILURE(AssertGetPidCorrect());
Elliott Hughes7086ad62014-06-19 16:39:01 -0700494 ASSERT_EQ(parent_pid, getppid());
Robert Seseke4621172016-11-03 15:00:53 -0400495 exit_fn(123);
Elliott Hughes7086ad62014-06-19 16:39:01 -0700496 } else {
497 // We're the parent.
498 ASSERT_EQ(parent_pid, getpid());
Elliott Hughes33697a02016-01-26 13:04:57 -0800499 AssertChildExited(fork_result, 123);
Elliott Hughes7086ad62014-06-19 16:39:01 -0700500 }
501}
502
Robert Seseka4edf7a2016-10-25 10:29:02 -0400503// gettid() is marked as __attribute_const__, which will have the compiler
504// optimize out multiple calls to gettid in the same function. This wrapper
505// defeats that optimization.
506static __attribute__((__noinline__)) pid_t GetTidForTest() {
507 __asm__("");
508 return gettid();
509}
510
511static void AssertGetTidCorrect() {
512 // The loop is just to make manual testing/debugging with strace easier.
513 pid_t gettid_syscall_result = syscall(__NR_gettid);
514 for (size_t i = 0; i < 128; ++i) {
515 ASSERT_EQ(gettid_syscall_result, GetTidForTest());
516 }
517}
518
Robert Seseke4621172016-11-03 15:00:53 -0400519static void TestGetTidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) {
Robert Seseka4edf7a2016-10-25 10:29:02 -0400520 pid_t parent_tid = GetTidForTest();
521 ASSERT_EQ(syscall(__NR_gettid), parent_tid);
522
523 pid_t fork_result = fork_fn();
524 ASSERT_NE(fork_result, -1);
525 if (fork_result == 0) {
526 // We're the child.
527 EXPECT_EQ(syscall(__NR_getpid), syscall(__NR_gettid));
528 EXPECT_EQ(getpid(), GetTidForTest()) << "real tid is " << syscall(__NR_gettid)
529 << ", pid is " << syscall(__NR_getpid);
530 ASSERT_NO_FATAL_FAILURE(AssertGetTidCorrect());
Robert Seseke4621172016-11-03 15:00:53 -0400531 exit_fn(123);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400532 } else {
533 // We're the parent.
534 ASSERT_EQ(parent_tid, GetTidForTest());
535 AssertChildExited(fork_result, 123);
536 }
537}
538
Christopher Ferris13f26a72016-01-13 13:47:58 -0800539TEST(UNISTD_TEST, getpid_caching_and_fork) {
Robert Seseke4621172016-11-03 15:00:53 -0400540 TestGetPidCachingWithFork(fork, exit);
Elliott Hughes5891abd2015-08-07 18:27:47 -0700541}
542
Robert Seseka4edf7a2016-10-25 10:29:02 -0400543TEST(UNISTD_TEST, gettid_caching_and_fork) {
Robert Seseke4621172016-11-03 15:00:53 -0400544 TestGetTidCachingWithFork(fork, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400545}
546
Christopher Ferris13f26a72016-01-13 13:47:58 -0800547TEST(UNISTD_TEST, getpid_caching_and_vfork) {
Robert Seseke4621172016-11-03 15:00:53 -0400548 TestGetPidCachingWithFork(vfork, _exit);
Elliott Hughes5891abd2015-08-07 18:27:47 -0700549}
550
Robert Seseka4edf7a2016-10-25 10:29:02 -0400551static int CloneLikeFork() {
552 return clone(nullptr, nullptr, SIGCHLD, nullptr);
553}
554
555TEST(UNISTD_TEST, getpid_caching_and_clone_process) {
Robert Seseke4621172016-11-03 15:00:53 -0400556 TestGetPidCachingWithFork(CloneLikeFork, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400557}
558
559TEST(UNISTD_TEST, gettid_caching_and_clone_process) {
Robert Seseke4621172016-11-03 15:00:53 -0400560 TestGetTidCachingWithFork(CloneLikeFork, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400561}
562
563static int CloneAndSetTid() {
564 pid_t child_tid = 0;
565 pid_t parent_tid = GetTidForTest();
566
567 int rv = clone(nullptr, nullptr, CLONE_CHILD_SETTID | SIGCHLD, nullptr, nullptr, nullptr, &child_tid);
568 EXPECT_NE(-1, rv);
569
570 if (rv == 0) {
571 // Child.
572 EXPECT_EQ(child_tid, GetTidForTest());
573 EXPECT_NE(child_tid, parent_tid);
574 } else {
575 EXPECT_NE(child_tid, GetTidForTest());
576 EXPECT_NE(child_tid, parent_tid);
577 EXPECT_EQ(GetTidForTest(), parent_tid);
578 }
579
580 return rv;
581}
582
583TEST(UNISTD_TEST, gettid_caching_and_clone_process_settid) {
Robert Seseke4621172016-11-03 15:00:53 -0400584 TestGetTidCachingWithFork(CloneAndSetTid, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400585}
586
587static int CloneStartRoutine(int (*start_routine)(void*)) {
588 void* child_stack[1024];
Evgenii Stepanov7cc67062019-02-05 18:43:34 -0800589 return clone(start_routine, untag_address(&child_stack[1024]), SIGCHLD, nullptr);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400590}
591
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700592static int GetPidCachingCloneStartRoutine(void*) {
593 AssertGetPidCorrect();
594 return 123;
Elliott Hughes7086ad62014-06-19 16:39:01 -0700595}
596
Christopher Ferris13f26a72016-01-13 13:47:58 -0800597TEST(UNISTD_TEST, getpid_caching_and_clone) {
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700598 pid_t parent_pid = getpid();
599 ASSERT_EQ(syscall(__NR_getpid), parent_pid);
600
Robert Seseka4edf7a2016-10-25 10:29:02 -0400601 int clone_result = CloneStartRoutine(GetPidCachingCloneStartRoutine);
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700602 ASSERT_NE(clone_result, -1);
603
604 ASSERT_EQ(parent_pid, getpid());
605
Elliott Hughes33697a02016-01-26 13:04:57 -0800606 AssertChildExited(clone_result, 123);
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700607}
608
Robert Seseka4edf7a2016-10-25 10:29:02 -0400609static int GetTidCachingCloneStartRoutine(void*) {
610 AssertGetTidCorrect();
611 return 123;
612}
613
614TEST(UNISTD_TEST, gettid_caching_and_clone) {
615 pid_t parent_tid = GetTidForTest();
616 ASSERT_EQ(syscall(__NR_gettid), parent_tid);
617
618 int clone_result = CloneStartRoutine(GetTidCachingCloneStartRoutine);
619 ASSERT_NE(clone_result, -1);
620
621 ASSERT_EQ(parent_tid, GetTidForTest());
622
623 AssertChildExited(clone_result, 123);
624}
625
Robert Seseke4621172016-11-03 15:00:53 -0400626static int CloneChildExit(void*) {
627 AssertGetPidCorrect();
628 AssertGetTidCorrect();
629 exit(33);
630}
631
632TEST(UNISTD_TEST, clone_fn_and_exit) {
633 int clone_result = CloneStartRoutine(CloneChildExit);
634 ASSERT_NE(-1, clone_result);
635
636 AssertGetPidCorrect();
637 AssertGetTidCorrect();
638
639 AssertChildExited(clone_result, 33);
640}
641
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700642static void* GetPidCachingPthreadStartRoutine(void*) {
643 AssertGetPidCorrect();
Yi Kong32bc0fc2018-08-02 17:31:13 -0700644 return nullptr;
Elliott Hughes7086ad62014-06-19 16:39:01 -0700645}
646
Christopher Ferris13f26a72016-01-13 13:47:58 -0800647TEST(UNISTD_TEST, getpid_caching_and_pthread_create) {
Elliott Hughes7086ad62014-06-19 16:39:01 -0700648 pid_t parent_pid = getpid();
649
650 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700651 ASSERT_EQ(0, pthread_create(&t, nullptr, GetPidCachingPthreadStartRoutine, nullptr));
Elliott Hughes7086ad62014-06-19 16:39:01 -0700652
653 ASSERT_EQ(parent_pid, getpid());
654
655 void* result;
656 ASSERT_EQ(0, pthread_join(t, &result));
Yi Kong32bc0fc2018-08-02 17:31:13 -0700657 ASSERT_EQ(nullptr, result);
Elliott Hughes7086ad62014-06-19 16:39:01 -0700658}
Elliott Hughes60452a22014-09-22 14:41:30 -0700659
Robert Seseka4edf7a2016-10-25 10:29:02 -0400660static void* GetTidCachingPthreadStartRoutine(void*) {
661 AssertGetTidCorrect();
662 uint64_t tid = GetTidForTest();
663 return reinterpret_cast<void*>(tid);
664}
665
666TEST(UNISTD_TEST, gettid_caching_and_pthread_create) {
667 pid_t parent_tid = GetTidForTest();
668
669 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700670 ASSERT_EQ(0, pthread_create(&t, nullptr, GetTidCachingPthreadStartRoutine, &parent_tid));
Robert Seseka4edf7a2016-10-25 10:29:02 -0400671
672 ASSERT_EQ(parent_tid, GetTidForTest());
673
674 void* result;
675 ASSERT_EQ(0, pthread_join(t, &result));
676 ASSERT_NE(static_cast<uint64_t>(parent_tid), reinterpret_cast<uint64_t>(result));
677}
678
Evgenii Stepanov505168e2019-02-28 18:44:56 -0800679static void optimization_barrier(void* arg) {
680 asm volatile("" : : "r"(arg) : "memory");
681}
682
683__attribute__((noinline)) static void HwasanVforkTestChild() {
684 // Allocate a tagged region on stack and leave it there.
685 char x[10000];
686 optimization_barrier(x);
687 _exit(0);
688}
689
690__attribute__((noinline)) static void HwasanReadMemory(const char* p, size_t size) {
691 // Read memory byte-by-byte. This will blow up if the pointer tag in p does not match any memory
692 // tag in [p, p+size).
693 volatile char z;
694 for (size_t i = 0; i < size; ++i) {
695 z = p[i];
696 }
697}
698
699__attribute__((noinline, no_sanitize("hwaddress"))) static void HwasanVforkTestParent() {
700 // Allocate a region on stack, but don't tag it (see the function attribute).
701 // This depends on unallocated stack space at current function entry being untagged.
702 char x[10000];
703 optimization_barrier(x);
704 // Verify that contents of x[] are untagged.
705 HwasanReadMemory(x, sizeof(x));
706}
707
708TEST(UNISTD_TEST, hwasan_vfork) {
709 // Test hwasan annotation in vfork. This test is only interesting when built with hwasan, but it
710 // is supposed to work correctly either way.
711 if (vfork()) {
712 HwasanVforkTestParent();
713 } else {
714 HwasanVforkTestChild();
715 }
716}
717
Christopher Ferris13f26a72016-01-13 13:47:58 -0800718class UNISTD_DEATHTEST : public BionicDeathTest {};
Yabin Cui9df70402014-11-05 18:01:01 -0800719
Christopher Ferris13f26a72016-01-13 13:47:58 -0800720TEST_F(UNISTD_DEATHTEST, abort) {
Elliott Hughes60452a22014-09-22 14:41:30 -0700721 ASSERT_EXIT(abort(), testing::KilledBySignal(SIGABRT), "");
722}
Elliott Hughesb86a4c72014-11-07 16:07:13 -0800723
Christopher Ferris13f26a72016-01-13 13:47:58 -0800724TEST(UNISTD_TEST, sethostname) {
Elliott Hughesb86a4c72014-11-07 16:07:13 -0800725 // The permissions check happens before the argument check, so this will
726 // fail for a different reason if you're running as root than if you're
727 // not, but it'll fail either way. Checking that we have the symbol is about
728 // all we can do for sethostname(2).
729 ASSERT_EQ(-1, sethostname("", -1));
730}
Derek Xued94e7f02014-09-25 11:12:01 +0100731
Christopher Ferris13f26a72016-01-13 13:47:58 -0800732TEST(UNISTD_TEST, gethostname) {
Derek Xued94e7f02014-09-25 11:12:01 +0100733 char hostname[HOST_NAME_MAX + 1];
Derek Xued94e7f02014-09-25 11:12:01 +0100734 memset(hostname, 0, sizeof(hostname));
735
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800736 // Can we get the hostname with a big buffer?
Derek Xued94e7f02014-09-25 11:12:01 +0100737 ASSERT_EQ(0, gethostname(hostname, HOST_NAME_MAX));
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800738
739 // Can we get the hostname with a right-sized buffer?
740 errno = 0;
741 ASSERT_EQ(0, gethostname(hostname, strlen(hostname) + 1));
742
743 // Does uname(2) agree?
Derek Xued94e7f02014-09-25 11:12:01 +0100744 utsname buf;
745 ASSERT_EQ(0, uname(&buf));
746 ASSERT_EQ(0, strncmp(hostname, buf.nodename, SYS_NMLN));
747 ASSERT_GT(strlen(hostname), 0U);
748
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800749 // Do we correctly detect truncation?
Derek Xued94e7f02014-09-25 11:12:01 +0100750 errno = 0;
751 ASSERT_EQ(-1, gethostname(hostname, strlen(hostname)));
752 ASSERT_EQ(ENAMETOOLONG, errno);
Derek Xued94e7f02014-09-25 11:12:01 +0100753}
Yabin Cuib5e581a2014-11-08 14:58:12 -0800754
Christopher Ferris13f26a72016-01-13 13:47:58 -0800755TEST(UNISTD_TEST, pathconf_fpathconf) {
Yabin Cuib5e581a2014-11-08 14:58:12 -0800756 TemporaryFile tf;
757 long rc = 0L;
758 // As a file system's block size is always power of 2, the configure values
759 // for ALLOC and XFER should be power of 2 as well.
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800760 rc = pathconf(tf.path, _PC_ALLOC_SIZE_MIN);
Yabin Cuib5e581a2014-11-08 14:58:12 -0800761 ASSERT_TRUE(rc > 0 && powerof2(rc));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800762 rc = pathconf(tf.path, _PC_REC_MIN_XFER_SIZE);
Yabin Cuib5e581a2014-11-08 14:58:12 -0800763 ASSERT_TRUE(rc > 0 && powerof2(rc));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800764 rc = pathconf(tf.path, _PC_REC_XFER_ALIGN);
Yabin Cuib5e581a2014-11-08 14:58:12 -0800765 ASSERT_TRUE(rc > 0 && powerof2(rc));
766
767 rc = fpathconf(tf.fd, _PC_ALLOC_SIZE_MIN);
768 ASSERT_TRUE(rc > 0 && powerof2(rc));
769 rc = fpathconf(tf.fd, _PC_REC_MIN_XFER_SIZE);
770 ASSERT_TRUE(rc > 0 && powerof2(rc));
771 rc = fpathconf(tf.fd, _PC_REC_XFER_ALIGN);
772 ASSERT_TRUE(rc > 0 && powerof2(rc));
773}
Derek Xuebc644762014-09-25 10:55:34 +0100774
Elliott Hughes19d76852017-10-18 13:27:01 -0700775TEST(UNISTD_TEST, _POSIX_constants) {
Yabin Cui1c191942014-11-19 19:49:14 -0800776 // Make a tight verification of _POSIX_* / _POSIX2_* / _XOPEN_* macros, to prevent change by mistake.
777 // Verify according to POSIX.1-2008.
778 EXPECT_EQ(200809L, _POSIX_VERSION);
779
Elliott Hughes19d76852017-10-18 13:27:01 -0700780 EXPECT_EQ(2, _POSIX_AIO_LISTIO_MAX);
781 EXPECT_EQ(1, _POSIX_AIO_MAX);
782 EXPECT_EQ(4096, _POSIX_ARG_MAX);
783 EXPECT_EQ(25, _POSIX_CHILD_MAX);
784 EXPECT_EQ(20000000, _POSIX_CLOCKRES_MIN);
785 EXPECT_EQ(32, _POSIX_DELAYTIMER_MAX);
786 EXPECT_EQ(255, _POSIX_HOST_NAME_MAX);
787 EXPECT_EQ(8, _POSIX_LINK_MAX);
788 EXPECT_EQ(9, _POSIX_LOGIN_NAME_MAX);
789 EXPECT_EQ(255, _POSIX_MAX_CANON);
790 EXPECT_EQ(255, _POSIX_MAX_INPUT);
791 EXPECT_EQ(8, _POSIX_MQ_OPEN_MAX);
792 EXPECT_EQ(32, _POSIX_MQ_PRIO_MAX);
793 EXPECT_EQ(14, _POSIX_NAME_MAX);
794 EXPECT_EQ(8, _POSIX_NGROUPS_MAX);
795 EXPECT_EQ(20, _POSIX_OPEN_MAX);
796 EXPECT_EQ(256, _POSIX_PATH_MAX);
797 EXPECT_EQ(512, _POSIX_PIPE_BUF);
798 EXPECT_EQ(255, _POSIX_RE_DUP_MAX);
799 EXPECT_EQ(8, _POSIX_RTSIG_MAX);
800 EXPECT_EQ(256, _POSIX_SEM_NSEMS_MAX);
801 EXPECT_EQ(32767, _POSIX_SEM_VALUE_MAX);
802 EXPECT_EQ(32, _POSIX_SIGQUEUE_MAX);
803 EXPECT_EQ(32767, _POSIX_SSIZE_MAX);
804 EXPECT_EQ(8, _POSIX_STREAM_MAX);
805#if !defined(__GLIBC__)
806 EXPECT_EQ(4, _POSIX_SS_REPL_MAX);
807#endif
808 EXPECT_EQ(255, _POSIX_SYMLINK_MAX);
809 EXPECT_EQ(8, _POSIX_SYMLOOP_MAX);
810 EXPECT_EQ(4, _POSIX_THREAD_DESTRUCTOR_ITERATIONS);
811 EXPECT_EQ(128, _POSIX_THREAD_KEYS_MAX);
812 EXPECT_EQ(64, _POSIX_THREAD_THREADS_MAX);
813 EXPECT_EQ(32, _POSIX_TIMER_MAX);
814#if !defined(__GLIBC__)
815 EXPECT_EQ(30, _POSIX_TRACE_EVENT_NAME_MAX);
816 EXPECT_EQ(8, _POSIX_TRACE_NAME_MAX);
817 EXPECT_EQ(8, _POSIX_TRACE_SYS_MAX);
818 EXPECT_EQ(32, _POSIX_TRACE_USER_EVENT_MAX);
819#endif
820 EXPECT_EQ(9, _POSIX_TTY_NAME_MAX);
821 EXPECT_EQ(6, _POSIX_TZNAME_MAX);
822 EXPECT_EQ(99, _POSIX2_BC_BASE_MAX);
823 EXPECT_EQ(2048, _POSIX2_BC_DIM_MAX);
824 EXPECT_EQ(99, _POSIX2_BC_SCALE_MAX);
825 EXPECT_EQ(1000, _POSIX2_BC_STRING_MAX);
826 EXPECT_EQ(14, _POSIX2_CHARCLASS_NAME_MAX);
827 EXPECT_EQ(2, _POSIX2_COLL_WEIGHTS_MAX);
828 EXPECT_EQ(32, _POSIX2_EXPR_NEST_MAX);
829 EXPECT_EQ(2048, _POSIX2_LINE_MAX);
830 EXPECT_EQ(255, _POSIX2_RE_DUP_MAX);
831
832 EXPECT_EQ(16, _XOPEN_IOV_MAX);
833#if !defined(__GLIBC__)
834 EXPECT_EQ(255, _XOPEN_NAME_MAX);
835 EXPECT_EQ(1024, _XOPEN_PATH_MAX);
836#endif
837}
838
839TEST(UNISTD_TEST, _POSIX_options) {
Yabin Cui5afae642014-11-25 20:17:27 -0800840 EXPECT_EQ(_POSIX_VERSION, _POSIX_ADVISORY_INFO);
Elliott Hughes73c44a42016-10-19 09:27:02 -0700841 EXPECT_GT(_POSIX_BARRIERS, 0);
842 EXPECT_GT(_POSIX_SPIN_LOCKS, 0);
Yabin Cui1c191942014-11-19 19:49:14 -0800843 EXPECT_NE(_POSIX_CHOWN_RESTRICTED, -1);
844 EXPECT_EQ(_POSIX_VERSION, _POSIX_CLOCK_SELECTION);
Elliott Hughes19d76852017-10-18 13:27:01 -0700845#if !defined(__GLIBC__) // glibc supports ancient kernels.
Elliott Hughes3a8f75d2017-10-05 10:33:18 -0700846 EXPECT_EQ(_POSIX_VERSION, _POSIX_CPUTIME);
Elliott Hughes19d76852017-10-18 13:27:01 -0700847#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800848 EXPECT_EQ(_POSIX_VERSION, _POSIX_FSYNC);
Yabin Cui1c191942014-11-19 19:49:14 -0800849 EXPECT_EQ(_POSIX_VERSION, _POSIX_IPV6);
850 EXPECT_GT(_POSIX_JOB_CONTROL, 0);
Yabin Cui1c191942014-11-19 19:49:14 -0800851 EXPECT_EQ(_POSIX_VERSION, _POSIX_MAPPED_FILES);
Yabin Cui1c191942014-11-19 19:49:14 -0800852 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK);
853 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK_RANGE);
854 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMORY_PROTECTION);
Elliott Hughes19d76852017-10-18 13:27:01 -0700855#if !defined(__GLIBC__) // glibc supports ancient kernels.
Elliott Hughes3a8f75d2017-10-05 10:33:18 -0700856 EXPECT_EQ(_POSIX_VERSION, _POSIX_MONOTONIC_CLOCK);
Elliott Hughes19d76852017-10-18 13:27:01 -0700857#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800858 EXPECT_GT(_POSIX_NO_TRUNC, 0);
Yabin Cui1c191942014-11-19 19:49:14 -0800859 EXPECT_EQ(_POSIX_VERSION, _POSIX_PRIORITY_SCHEDULING);
860 EXPECT_EQ(_POSIX_VERSION, _POSIX_RAW_SOCKETS);
861 EXPECT_EQ(_POSIX_VERSION, _POSIX_READER_WRITER_LOCKS);
Yabin Cui63481602014-12-01 17:41:04 -0800862 EXPECT_EQ(_POSIX_VERSION, _POSIX_REALTIME_SIGNALS);
Yabin Cui1c191942014-11-19 19:49:14 -0800863 EXPECT_GT(_POSIX_REGEXP, 0);
Yabin Cui1c191942014-11-19 19:49:14 -0800864 EXPECT_GT(_POSIX_SAVED_IDS, 0);
865 EXPECT_EQ(_POSIX_VERSION, _POSIX_SEMAPHORES);
Yabin Cui1c191942014-11-19 19:49:14 -0800866 EXPECT_GT(_POSIX_SHELL, 0);
Elliott Hughes14e3ff92017-10-06 16:58:36 -0700867 EXPECT_EQ(_POSIX_VERSION, _POSIX_SPAWN);
Elliott Hughes19d76852017-10-18 13:27:01 -0700868 EXPECT_EQ(-1, _POSIX_SPORADIC_SERVER);
Yabin Cui1c191942014-11-19 19:49:14 -0800869 EXPECT_EQ(_POSIX_VERSION, _POSIX_SYNCHRONIZED_IO);
870 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREADS);
871 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKADDR);
872 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKSIZE);
Elliott Hughes19d76852017-10-18 13:27:01 -0700873#if !defined(__GLIBC__) // glibc supports ancient kernels.
Elliott Hughes3a8f75d2017-10-05 10:33:18 -0700874 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_CPUTIME);
Elliott Hughes19d76852017-10-18 13:27:01 -0700875#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800876 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PRIORITY_SCHEDULING);
Elliott Hughes468c8082017-05-20 12:47:14 -0700877 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PROCESS_SHARED);
Yabin Cui1c191942014-11-19 19:49:14 -0800878 EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_PROTECT);
879 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_SAFE_FUNCTIONS);
Elliott Hughes19d76852017-10-18 13:27:01 -0700880 EXPECT_EQ(-1, _POSIX_THREAD_SPORADIC_SERVER);
Yabin Cui1c191942014-11-19 19:49:14 -0800881 EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMEOUTS);
882 EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMERS);
Yabin Cui1c191942014-11-19 19:49:14 -0800883 EXPECT_EQ(-1, _POSIX_TRACE);
884 EXPECT_EQ(-1, _POSIX_TRACE_EVENT_FILTER);
885 EXPECT_EQ(-1, _POSIX_TRACE_INHERIT);
886 EXPECT_EQ(-1, _POSIX_TRACE_LOG);
Yabin Cui1c191942014-11-19 19:49:14 -0800887 EXPECT_EQ(-1, _POSIX_TYPED_MEMORY_OBJECTS);
Yabin Cui1c191942014-11-19 19:49:14 -0800888 EXPECT_NE(-1, _POSIX_VDISABLE);
889
Elliott Hughesa3529352017-07-13 10:20:41 -0700890 EXPECT_EQ(_POSIX_VERSION, _POSIX2_VERSION);
Yabin Cui1c191942014-11-19 19:49:14 -0800891 EXPECT_EQ(_POSIX_VERSION, _POSIX2_C_BIND);
Elliott Hughes19d76852017-10-18 13:27:01 -0700892 EXPECT_EQ(_POSIX_VERSION, _POSIX2_CHAR_TERM);
Yabin Cui1c191942014-11-19 19:49:14 -0800893
894 EXPECT_EQ(700, _XOPEN_VERSION);
Elliott Hughes19d76852017-10-18 13:27:01 -0700895 EXPECT_EQ(1, _XOPEN_ENH_I18N);
896 EXPECT_EQ(1, _XOPEN_REALTIME);
897 EXPECT_EQ(1, _XOPEN_REALTIME_THREADS);
898 EXPECT_EQ(1, _XOPEN_SHM);
899 EXPECT_EQ(1, _XOPEN_UNIX);
Yabin Cui1c191942014-11-19 19:49:14 -0800900
901#if defined(__BIONIC__)
902 // These tests only pass on bionic, as bionic and glibc has different support on these macros.
Yabin Cui5afae642014-11-25 20:17:27 -0800903 // Macros like _POSIX_ASYNCHRONOUS_IO are not supported on bionic yet.
Yabin Cui1c191942014-11-19 19:49:14 -0800904 EXPECT_EQ(-1, _POSIX_ASYNCHRONOUS_IO);
Yabin Cui1c191942014-11-19 19:49:14 -0800905 EXPECT_EQ(-1, _POSIX_MESSAGE_PASSING);
906 EXPECT_EQ(-1, _POSIX_PRIORITIZED_IO);
Yabin Cui1c191942014-11-19 19:49:14 -0800907 EXPECT_EQ(-1, _POSIX_SHARED_MEMORY_OBJECTS);
Elliott Hughes19d76852017-10-18 13:27:01 -0700908 EXPECT_EQ(-1, _POSIX_THREAD_PRIO_INHERIT);
909 EXPECT_EQ(-1, _POSIX_THREAD_PRIO_PROTECT);
Yabin Cui1c191942014-11-19 19:49:14 -0800910 EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_INHERIT);
911
Yabin Cui1c191942014-11-19 19:49:14 -0800912 EXPECT_EQ(-1, _POSIX2_C_DEV);
Elliott Hughes19d76852017-10-18 13:27:01 -0700913 EXPECT_EQ(-1, _POSIX2_FORT_DEV);
914 EXPECT_EQ(-1, _POSIX2_FORT_RUN);
Yabin Cui1c191942014-11-19 19:49:14 -0800915 EXPECT_EQ(-1, _POSIX2_LOCALEDEF);
916 EXPECT_EQ(-1, _POSIX2_SW_DEV);
917 EXPECT_EQ(-1, _POSIX2_UPE);
918
Yabin Cui1c191942014-11-19 19:49:14 -0800919 EXPECT_EQ(-1, _XOPEN_CRYPT);
920 EXPECT_EQ(-1, _XOPEN_LEGACY);
Elliott Hughes19d76852017-10-18 13:27:01 -0700921 EXPECT_EQ(-1, _XOPEN_STREAMS);
Yabin Cui1c191942014-11-19 19:49:14 -0800922#endif // defined(__BIONIC__)
923}
924
Elliott Hughesd6f57302018-04-25 22:13:14 -0700925#define VERIFY_SYSCONF_UNKNOWN(name) \
926 VerifySysconf(name, #name, [](long v){return v == -1 && errno == EINVAL;})
927
928#define VERIFY_SYSCONF_UNSUPPORTED(name) \
929 VerifySysconf(name, #name, [](long v){return v == -1 && errno == 0;})
Yabin Cui1c191942014-11-19 19:49:14 -0800930
931// sysconf() means unlimited when it returns -1 with errno unchanged.
932#define VERIFY_SYSCONF_POSITIVE(name) \
Elliott Hughesd6f57302018-04-25 22:13:14 -0700933 VerifySysconf(name, #name, [](long v){return (v > 0 || v == -1) && errno == 0;})
Yabin Cui1c191942014-11-19 19:49:14 -0800934
935#define VERIFY_SYSCONF_POSIX_VERSION(name) \
Elliott Hughesd6f57302018-04-25 22:13:14 -0700936 VerifySysconf(name, #name, [](long v){return v == _POSIX_VERSION && errno == 0;})
Yabin Cui1c191942014-11-19 19:49:14 -0800937
938static void VerifySysconf(int option, const char *option_name, bool (*verify)(long)) {
939 errno = 0;
940 long ret = sysconf(option);
Elliott Hughesd6f57302018-04-25 22:13:14 -0700941 EXPECT_TRUE(verify(ret)) << "name = " << option_name << ", ret = "
Yabin Cui1c191942014-11-19 19:49:14 -0800942 << ret <<", Error Message: " << strerror(errno);
943}
Derek Xuebc644762014-09-25 10:55:34 +0100944
Christopher Ferris13f26a72016-01-13 13:47:58 -0800945TEST(UNISTD_TEST, sysconf) {
Yabin Cui5afae642014-11-25 20:17:27 -0800946 VERIFY_SYSCONF_POSIX_VERSION(_SC_ADVISORY_INFO);
Yabin Cui1c191942014-11-19 19:49:14 -0800947 VERIFY_SYSCONF_POSITIVE(_SC_ARG_MAX);
Elliott Hughes73c44a42016-10-19 09:27:02 -0700948 VERIFY_SYSCONF_POSIX_VERSION(_SC_BARRIERS);
Yabin Cui1c191942014-11-19 19:49:14 -0800949 VERIFY_SYSCONF_POSITIVE(_SC_BC_BASE_MAX);
950 VERIFY_SYSCONF_POSITIVE(_SC_BC_DIM_MAX);
951 VERIFY_SYSCONF_POSITIVE(_SC_BC_SCALE_MAX);
952 VERIFY_SYSCONF_POSITIVE(_SC_CHILD_MAX);
953 VERIFY_SYSCONF_POSITIVE(_SC_CLK_TCK);
954 VERIFY_SYSCONF_POSITIVE(_SC_COLL_WEIGHTS_MAX);
Yabin Cuid5c65272014-11-26 14:04:26 -0800955 VERIFY_SYSCONF_POSIX_VERSION(_SC_CPUTIME);
Yabin Cui1c191942014-11-19 19:49:14 -0800956 VERIFY_SYSCONF_POSITIVE(_SC_EXPR_NEST_MAX);
957 VERIFY_SYSCONF_POSITIVE(_SC_LINE_MAX);
958 VERIFY_SYSCONF_POSITIVE(_SC_NGROUPS_MAX);
959 VERIFY_SYSCONF_POSITIVE(_SC_OPEN_MAX);
960 VERIFY_SYSCONF_POSITIVE(_SC_PASS_MAX);
961 VERIFY_SYSCONF_POSIX_VERSION(_SC_2_C_BIND);
Elliott Hughes72927252016-07-27 14:05:10 -0700962 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_DEV);
963 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_RUN);
964 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_UPE);
Elliott Hughes6c135f42017-07-28 16:53:32 -0700965 VERIFY_SYSCONF_POSIX_VERSION(_SC_2_VERSION);
Yabin Cui1c191942014-11-19 19:49:14 -0800966 VERIFY_SYSCONF_POSITIVE(_SC_JOB_CONTROL);
967 VERIFY_SYSCONF_POSITIVE(_SC_SAVED_IDS);
968 VERIFY_SYSCONF_POSIX_VERSION(_SC_VERSION);
969 VERIFY_SYSCONF_POSITIVE(_SC_RE_DUP_MAX);
970 VERIFY_SYSCONF_POSITIVE(_SC_STREAM_MAX);
971 VERIFY_SYSCONF_POSITIVE(_SC_TZNAME_MAX);
Elliott Hughesd6f57302018-04-25 22:13:14 -0700972 VerifySysconf(_SC_XOPEN_VERSION, "_SC_XOPEN_VERSION", [](long v){return v == _XOPEN_VERSION && errno == 0;});
Yabin Cui1c191942014-11-19 19:49:14 -0800973 VERIFY_SYSCONF_POSITIVE(_SC_ATEXIT_MAX);
974 VERIFY_SYSCONF_POSITIVE(_SC_IOV_MAX);
Elliott Hughes82ab4812018-10-09 13:56:06 -0700975 VERIFY_SYSCONF_POSITIVE(_SC_UIO_MAXIOV);
976 EXPECT_EQ(sysconf(_SC_IOV_MAX), sysconf(_SC_UIO_MAXIOV));
Yabin Cui1c191942014-11-19 19:49:14 -0800977 VERIFY_SYSCONF_POSITIVE(_SC_PAGESIZE);
978 VERIFY_SYSCONF_POSITIVE(_SC_PAGE_SIZE);
Elliott Hughes189394b2015-07-24 23:22:07 -0700979 VerifySysconf(_SC_PAGE_SIZE, "_SC_PAGE_SIZE",
Elliott Hughesd6f57302018-04-25 22:13:14 -0700980 [](long v){return v == sysconf(_SC_PAGESIZE) && errno == 0 && v == getpagesize();});
Yabin Cui1c191942014-11-19 19:49:14 -0800981 VERIFY_SYSCONF_POSITIVE(_SC_XOPEN_UNIX);
982 VERIFY_SYSCONF_POSITIVE(_SC_AIO_LISTIO_MAX);
983 VERIFY_SYSCONF_POSITIVE(_SC_AIO_MAX);
Elliott Hughesd6f57302018-04-25 22:13:14 -0700984 VerifySysconf(_SC_AIO_PRIO_DELTA_MAX, "_SC_AIO_PRIO_DELTA_MAX", [](long v){return v >= 0 && errno == 0;});
Yabin Cui1c191942014-11-19 19:49:14 -0800985 VERIFY_SYSCONF_POSITIVE(_SC_DELAYTIMER_MAX);
986 VERIFY_SYSCONF_POSITIVE(_SC_MQ_OPEN_MAX);
987 VERIFY_SYSCONF_POSITIVE(_SC_MQ_PRIO_MAX);
988 VERIFY_SYSCONF_POSITIVE(_SC_RTSIG_MAX);
989 VERIFY_SYSCONF_POSITIVE(_SC_SEM_NSEMS_MAX);
990 VERIFY_SYSCONF_POSITIVE(_SC_SEM_VALUE_MAX);
Elliott Hughes73c44a42016-10-19 09:27:02 -0700991 VERIFY_SYSCONF_POSIX_VERSION(_SC_SPIN_LOCKS);
Yabin Cui1c191942014-11-19 19:49:14 -0800992 VERIFY_SYSCONF_POSITIVE(_SC_TIMER_MAX);
993 VERIFY_SYSCONF_POSIX_VERSION(_SC_FSYNC);
994 VERIFY_SYSCONF_POSIX_VERSION(_SC_MAPPED_FILES);
995 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK);
996 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK_RANGE);
997 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMORY_PROTECTION);
998 VERIFY_SYSCONF_POSIX_VERSION(_SC_PRIORITY_SCHEDULING);
Yabin Cui63481602014-12-01 17:41:04 -0800999 VERIFY_SYSCONF_POSIX_VERSION(_SC_REALTIME_SIGNALS);
Yabin Cui1c191942014-11-19 19:49:14 -08001000 VERIFY_SYSCONF_POSIX_VERSION(_SC_SEMAPHORES);
1001 VERIFY_SYSCONF_POSIX_VERSION(_SC_SYNCHRONIZED_IO);
1002 VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMERS);
1003 VERIFY_SYSCONF_POSITIVE(_SC_GETGR_R_SIZE_MAX);
1004 VERIFY_SYSCONF_POSITIVE(_SC_GETPW_R_SIZE_MAX);
1005 VERIFY_SYSCONF_POSITIVE(_SC_LOGIN_NAME_MAX);
1006 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_DESTRUCTOR_ITERATIONS);
1007 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_KEYS_MAX);
1008 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_STACK_MIN);
1009 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_THREADS_MAX);
1010 VERIFY_SYSCONF_POSITIVE(_SC_TTY_NAME_MAX);
1011 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREADS);
1012 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKADDR);
1013 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKSIZE);
1014 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PRIORITY_SCHEDULING);
Elliott Hughes72927252016-07-27 14:05:10 -07001015 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_INHERIT);
1016 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_PROTECT);
Yabin Cui1c191942014-11-19 19:49:14 -08001017 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_SAFE_FUNCTIONS);
1018 VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_CONF);
1019 VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_ONLN);
1020 VERIFY_SYSCONF_POSITIVE(_SC_PHYS_PAGES);
1021 VERIFY_SYSCONF_POSITIVE(_SC_AVPHYS_PAGES);
1022 VERIFY_SYSCONF_POSIX_VERSION(_SC_MONOTONIC_CLOCK);
Elliott Hughes72927252016-07-27 14:05:10 -07001023 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS);
1024 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_ACCOUNTING);
1025 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_CHECKPOINT);
1026 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_LOCATE);
1027 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_MESSAGE);
1028 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_TRACK);
Yabin Cui1c191942014-11-19 19:49:14 -08001029 VERIFY_SYSCONF_POSIX_VERSION(_SC_CLOCK_SELECTION);
1030 VERIFY_SYSCONF_POSITIVE(_SC_HOST_NAME_MAX);
1031 VERIFY_SYSCONF_POSIX_VERSION(_SC_IPV6);
1032 VERIFY_SYSCONF_POSIX_VERSION(_SC_RAW_SOCKETS);
1033 VERIFY_SYSCONF_POSIX_VERSION(_SC_READER_WRITER_LOCKS);
1034 VERIFY_SYSCONF_POSITIVE(_SC_REGEXP);
1035 VERIFY_SYSCONF_POSITIVE(_SC_SHELL);
Elliott Hughes14e3ff92017-10-06 16:58:36 -07001036 VERIFY_SYSCONF_POSIX_VERSION(_SC_SPAWN);
Elliott Hughes19d76852017-10-18 13:27:01 -07001037 VERIFY_SYSCONF_UNSUPPORTED(_SC_SPORADIC_SERVER);
Yabin Cui1c191942014-11-19 19:49:14 -08001038 VERIFY_SYSCONF_POSITIVE(_SC_SYMLOOP_MAX);
1039 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_CPUTIME);
Elliott Hughes468c8082017-05-20 12:47:14 -07001040 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PROCESS_SHARED);
Elliott Hughes19d76852017-10-18 13:27:01 -07001041 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_SPORADIC_SERVER);
Yabin Cui1c191942014-11-19 19:49:14 -08001042 VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMEOUTS);
Elliott Hughes72927252016-07-27 14:05:10 -07001043 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE);
1044 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_FILTER);
1045 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_NAME_MAX);
1046 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_INHERIT);
1047 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_LOG);
1048 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_NAME_MAX);
1049 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_SYS_MAX);
1050 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_USER_EVENT_MAX);
1051 VERIFY_SYSCONF_UNSUPPORTED(_SC_TYPED_MEMORY_OBJECTS);
1052 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_STREAMS);
Derek Xuebc644762014-09-25 10:55:34 +01001053
Yabin Cui1c191942014-11-19 19:49:14 -08001054#if defined(__LP64__)
Elliott Hughes72927252016-07-27 14:05:10 -07001055 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFF32);
1056 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG);
Yabin Cui1c191942014-11-19 19:49:14 -08001057 VERIFY_SYSCONF_POSITIVE(_SC_V7_LP64_OFF64);
1058 VERIFY_SYSCONF_POSITIVE(_SC_V7_LPBIG_OFFBIG);
1059#else
1060 VERIFY_SYSCONF_POSITIVE(_SC_V7_ILP32_OFF32);
1061#if defined(__BIONIC__)
1062 // bionic does not support 64 bits off_t type on 32bit machine.
Elliott Hughes72927252016-07-27 14:05:10 -07001063 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG);
Yabin Cui1c191942014-11-19 19:49:14 -08001064#endif
Elliott Hughes72927252016-07-27 14:05:10 -07001065 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LP64_OFF64);
1066 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LPBIG_OFFBIG);
Yabin Cui1c191942014-11-19 19:49:14 -08001067#endif
Derek Xuebc644762014-09-25 10:55:34 +01001068
Yabin Cui1c191942014-11-19 19:49:14 -08001069#if defined(__BIONIC__)
1070 // Tests can only run on bionic, as bionic and glibc have different support for these options.
1071 // Below options are not supported on bionic yet.
Elliott Hughes72927252016-07-27 14:05:10 -07001072 VERIFY_SYSCONF_UNSUPPORTED(_SC_ASYNCHRONOUS_IO);
Elliott Hughes72927252016-07-27 14:05:10 -07001073 VERIFY_SYSCONF_UNSUPPORTED(_SC_MESSAGE_PASSING);
1074 VERIFY_SYSCONF_UNSUPPORTED(_SC_PRIORITIZED_IO);
1075 VERIFY_SYSCONF_UNSUPPORTED(_SC_SHARED_MEMORY_OBJECTS);
Elliott Hughes72927252016-07-27 14:05:10 -07001076 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_INHERIT);
1077 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_PROTECT);
Derek Xuebc644762014-09-25 10:55:34 +01001078
Elliott Hughes72927252016-07-27 14:05:10 -07001079 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_C_DEV);
Elliott Hughes72927252016-07-27 14:05:10 -07001080 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_LOCALEDEF);
1081 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_SW_DEV);
Derek Xuebc644762014-09-25 10:55:34 +01001082
Elliott Hughes72927252016-07-27 14:05:10 -07001083 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_CRYPT);
Elliott Hughes72927252016-07-27 14:05:10 -07001084 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_LEGACY);
Elliott Hughes72927252016-07-27 14:05:10 -07001085 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_UUCP);
Yabin Cui1c191942014-11-19 19:49:14 -08001086#endif // defined(__BIONIC__)
Derek Xuebc644762014-09-25 10:55:34 +01001087}
Elliott Hughesbe52e652015-02-23 18:02:29 -08001088
Christopher Ferris13f26a72016-01-13 13:47:58 -08001089TEST(UNISTD_TEST, get_cpu_count_from_string) {
Yabin Cuicb6f5992015-09-29 16:11:45 -07001090 ASSERT_EQ(0, GetCpuCountFromString(" "));
1091 ASSERT_EQ(1, GetCpuCountFromString("0"));
1092 ASSERT_EQ(40, GetCpuCountFromString("0-39"));
1093 ASSERT_EQ(4, GetCpuCountFromString("0, 1-2, 4\n"));
1094}
1095
Christopher Ferris13f26a72016-01-13 13:47:58 -08001096TEST(UNISTD_TEST, sysconf_SC_NPROCESSORS_ONLN) {
Elliott Hughes0b2acdf2015-10-02 18:25:19 -07001097 std::string line;
1098 ASSERT_TRUE(android::base::ReadFileToString("/sys/devices/system/cpu/online", &line));
Yabin Cuicb6f5992015-09-29 16:11:45 -07001099 long online_cpus = 0;
Elliott Hughes0b2acdf2015-10-02 18:25:19 -07001100 for (const std::string& s : android::base::Split(line, ",")) {
Yabin Cuicb6f5992015-09-29 16:11:45 -07001101 std::vector<std::string> numbers = android::base::Split(s, "-");
1102 if (numbers.size() == 1u) {
1103 online_cpus++;
1104 } else {
1105 online_cpus += atoi(numbers[1].c_str()) - atoi(numbers[0].c_str()) + 1;
1106 }
1107 }
1108 ASSERT_EQ(online_cpus, sysconf(_SC_NPROCESSORS_ONLN));
1109}
1110
Elliott Hughes38dba2e2016-08-10 15:51:06 -07001111TEST(UNISTD_TEST, sysconf_SC_ARG_MAX) {
Elliott Hughesdb602e82019-11-15 09:04:27 -08001112 // Since Linux 2.6.23, ARG_MAX isn't a constant and depends on RLIMIT_STACK.
1113 // See prepare_arg_pages() in the kernel for the gory details:
1114 // https://elixir.bootlin.com/linux/v5.3.11/source/fs/exec.c#L451
1115
1116 // Get our current limit, and set things up so we restore the limit.
1117 rlimit rl;
1118 ASSERT_EQ(0, getrlimit(RLIMIT_STACK, &rl));
1119 uint64_t original_rlim_cur = rl.rlim_cur;
1120 if (rl.rlim_cur == RLIM_INFINITY) {
1121 rl.rlim_cur = 8 * 1024 * 1024; // Bionic reports unlimited stacks as 8MiB.
1122 }
1123 auto guard = android::base::make_scope_guard([&rl, original_rlim_cur]() {
1124 rl.rlim_cur = original_rlim_cur;
1125 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1126 });
1127
1128 // _SC_ARG_MAX should be 1/4 the stack size.
1129 EXPECT_EQ(static_cast<long>(rl.rlim_cur / 4), sysconf(_SC_ARG_MAX));
1130
1131 // If you have a really small stack, the kernel still guarantees "32 pages" (see fs/exec.c).
1132 rl.rlim_cur = 1024;
1133 rl.rlim_max = RLIM_INFINITY;
1134 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1135
1136 EXPECT_EQ(static_cast<long>(32 * sysconf(_SC_PAGE_SIZE)), sysconf(_SC_ARG_MAX));
1137
1138 // With a 128-page stack limit, we know exactly what _SC_ARG_MAX should be...
1139 rl.rlim_cur = 128 * sysconf(_SC_PAGE_SIZE);
1140 rl.rlim_max = RLIM_INFINITY;
1141 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1142
1143 EXPECT_EQ(static_cast<long>((128 * sysconf(_SC_PAGE_SIZE)) / 4), sysconf(_SC_ARG_MAX));
Elliott Hughes38dba2e2016-08-10 15:51:06 -07001144}
1145
Elliott Hughesd6f57302018-04-25 22:13:14 -07001146TEST(UNISTD_TEST, sysconf_unknown) {
1147 VERIFY_SYSCONF_UNKNOWN(-1);
1148 VERIFY_SYSCONF_UNKNOWN(666);
1149}
1150
Christopher Ferris13f26a72016-01-13 13:47:58 -08001151TEST(UNISTD_TEST, dup2_same) {
Elliott Hughesbe52e652015-02-23 18:02:29 -08001152 // POSIX says of dup2:
1153 // If fildes2 is already a valid open file descriptor ...
1154 // [and] fildes is equal to fildes2 ... dup2() shall return
1155 // fildes2 without closing it.
1156 // This isn't true of dup3(2), so we need to manually implement that.
1157
1158 // Equal and valid.
1159 int fd = open("/proc/version", O_RDONLY);
1160 ASSERT_TRUE(fd != -1);
1161 ASSERT_EQ(fd, dup2(fd, fd));
1162 ASSERT_EQ(0, close(fd)); // Check that dup2 didn't close fd.
1163
1164 // Equal, but invalid.
1165 errno = 0;
1166 ASSERT_EQ(-1, dup2(fd, fd));
1167 ASSERT_EQ(EBADF, errno);
1168}
Elliott Hughes5704c422016-01-25 18:06:24 -08001169
Elliott Hughesa7f12942017-12-15 13:55:53 -08001170TEST(UNISTD_TEST, dup3) {
1171 int fd = open("/proc/version", O_RDONLY);
1172 ASSERT_EQ(666, dup3(fd, 666, 0));
1173 AssertCloseOnExec(666, false);
1174 close(666);
1175 ASSERT_EQ(667, dup3(fd, 667, O_CLOEXEC));
1176 AssertCloseOnExec(667, true);
1177 close(667);
1178 close(fd);
1179}
1180
Elliott Hughes5704c422016-01-25 18:06:24 -08001181TEST(UNISTD_TEST, lockf_smoke) {
1182 constexpr off64_t file_size = 32*1024LL;
1183
1184 TemporaryFile tf;
1185 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1186
1187 // Lock everything.
1188 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1189 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
1190
1191 // Try-lock everything, this should succeed too.
1192 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1193 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size));
1194
1195 // Check status.
1196 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1197 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1198
1199 // Unlock file.
1200 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1201 ASSERT_EQ(0, lockf64(tf.fd, F_ULOCK, file_size));
1202}
1203
1204TEST(UNISTD_TEST, lockf_zero) {
1205 constexpr off64_t file_size = 32*1024LL;
1206
1207 TemporaryFile tf;
1208 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1209
1210 // Lock everything by specifying a size of 0 (meaning "to the end, even if it changes").
1211 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1212 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, 0));
1213
1214 // Check that it's locked.
1215 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1216 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1217
1218 // Move the end.
1219 ASSERT_EQ(0, ftruncate(tf.fd, 2*file_size));
1220
1221 // Check that the new section is locked too.
1222 ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
1223 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, 2*file_size));
1224}
1225
1226TEST(UNISTD_TEST, lockf_negative) {
1227 constexpr off64_t file_size = 32*1024LL;
1228
1229 TemporaryFile tf;
1230 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1231
1232 // Lock everything, but specifying the range in reverse.
1233 ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
1234 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, -file_size));
1235
1236 // Check that it's locked.
1237 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1238 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1239}
1240
1241TEST(UNISTD_TEST, lockf_with_child) {
1242 constexpr off64_t file_size = 32*1024LL;
1243
1244 TemporaryFile tf;
1245 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1246
1247 // Lock everything.
1248 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1249 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
1250
1251 // Fork a child process
1252 pid_t pid = fork();
1253 ASSERT_NE(-1, pid);
1254 if (pid == 0) {
1255 // Check that the child cannot lock the file.
1256 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1257 ASSERT_EQ(-1, lockf64(tf.fd, F_TLOCK, file_size));
1258 ASSERT_EQ(EAGAIN, errno);
1259 // Check also that it reports itself as locked.
1260 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1261 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size));
1262 ASSERT_EQ(EACCES, errno);
1263 _exit(0);
1264 }
Elliott Hughes33697a02016-01-26 13:04:57 -08001265 AssertChildExited(pid, 0);
Elliott Hughes5704c422016-01-25 18:06:24 -08001266}
1267
1268TEST(UNISTD_TEST, lockf_partial_with_child) {
1269 constexpr off64_t file_size = 32*1024LL;
1270
1271 TemporaryFile tf;
1272 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1273
1274 // Lock the first half of the file.
1275 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1276 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size/2));
1277
1278 // Fork a child process.
1279 pid_t pid = fork();
1280 ASSERT_NE(-1, pid);
1281 if (pid == 0) {
1282 // Check that the child can lock the other half.
1283 ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
1284 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
1285 // Check that the child cannot lock the first half.
1286 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1287 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
1288 ASSERT_EQ(EACCES, errno);
1289 // Check also that it reports itself as locked.
1290 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1291 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
1292 ASSERT_EQ(EACCES, errno);
1293 _exit(0);
1294 }
Elliott Hughes33697a02016-01-26 13:04:57 -08001295 AssertChildExited(pid, 0);
Elliott Hughes5704c422016-01-25 18:06:24 -08001296
1297 // The second half was locked by the child, but the lock disappeared
1298 // when the process exited, so check it can be locked now.
1299 ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
1300 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
1301}
Greg Hackmanne2faf072016-03-03 08:37:53 -08001302
1303TEST(UNISTD_TEST, getdomainname) {
1304 struct utsname u;
1305 ASSERT_EQ(0, uname(&u));
1306
1307 char buf[sizeof(u.domainname)];
1308 ASSERT_EQ(0, getdomainname(buf, sizeof(buf)));
1309 EXPECT_STREQ(u.domainname, buf);
1310
1311#if defined(__BIONIC__)
1312 // bionic and glibc have different behaviors when len is too small
1313 ASSERT_EQ(-1, getdomainname(buf, strlen(u.domainname)));
1314 EXPECT_EQ(EINVAL, errno);
1315#endif
1316}
1317
1318TEST(UNISTD_TEST, setdomainname) {
1319 __user_cap_header_struct header;
1320 memset(&header, 0, sizeof(header));
1321 header.version = _LINUX_CAPABILITY_VERSION_3;
1322
1323 __user_cap_data_struct old_caps[_LINUX_CAPABILITY_U32S_3];
1324 ASSERT_EQ(0, capget(&header, &old_caps[0]));
1325
1326 auto admin_idx = CAP_TO_INDEX(CAP_SYS_ADMIN);
1327 auto admin_mask = CAP_TO_MASK(CAP_SYS_ADMIN);
1328 bool has_admin = old_caps[admin_idx].effective & admin_mask;
1329 if (has_admin) {
1330 __user_cap_data_struct new_caps[_LINUX_CAPABILITY_U32S_3];
1331 memcpy(new_caps, old_caps, sizeof(new_caps));
1332 new_caps[admin_idx].effective &= ~admin_mask;
1333
1334 ASSERT_EQ(0, capset(&header, &new_caps[0])) << "failed to drop admin privileges";
1335 }
1336
1337 const char* name = "newdomainname";
1338 ASSERT_EQ(-1, setdomainname(name, strlen(name)));
1339 ASSERT_EQ(EPERM, errno);
1340
1341 if (has_admin) {
1342 ASSERT_EQ(0, capset(&header, &old_caps[0])) << "failed to restore admin privileges";
1343 }
1344}
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001345
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001346TEST(UNISTD_TEST, execve_failure) {
1347 ExecTestHelper eth;
1348 errno = 0;
1349 ASSERT_EQ(-1, execve("/", eth.GetArgs(), eth.GetEnv()));
1350 ASSERT_EQ(EACCES, errno);
1351}
1352
Elliott Hughes3c115902016-08-24 19:27:04 -07001353TEST(UNISTD_TEST, execve_args) {
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001354 // int execve(const char* path, char* argv[], char* envp[]);
1355
1356 // Test basic argument passing.
1357 ExecTestHelper eth;
1358 eth.SetArgs({"echo", "hello", "world", nullptr});
1359 eth.Run([&]() { execve(BIN_DIR "echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1360
1361 // Test environment variable setting too.
1362 eth.SetArgs({"printenv", nullptr});
1363 eth.SetEnv({"A=B", nullptr});
1364 eth.Run([&]() { execve(BIN_DIR "printenv", eth.GetArgs(), eth.GetEnv()); }, 0, "A=B\n");
1365}
1366
1367TEST(UNISTD_TEST, execl_failure) {
1368 errno = 0;
1369 ASSERT_EQ(-1, execl("/", "/", nullptr));
1370 ASSERT_EQ(EACCES, errno);
1371}
1372
1373TEST(UNISTD_TEST, execl) {
1374 ExecTestHelper eth;
1375 // int execl(const char* path, const char* arg, ...);
1376 eth.Run([&]() { execl(BIN_DIR "echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n");
1377}
1378
1379TEST(UNISTD_TEST, execle_failure) {
1380 ExecTestHelper eth;
1381 errno = 0;
1382 ASSERT_EQ(-1, execle("/", "/", nullptr, eth.GetEnv()));
1383 ASSERT_EQ(EACCES, errno);
1384}
1385
1386TEST(UNISTD_TEST, execle) {
1387 ExecTestHelper eth;
1388 eth.SetEnv({"A=B", nullptr});
1389 // int execle(const char* path, const char* arg, ..., char* envp[]);
1390 eth.Run([&]() { execle(BIN_DIR "printenv", "printenv", nullptr, eth.GetEnv()); }, 0, "A=B\n");
1391}
1392
1393TEST(UNISTD_TEST, execv_failure) {
1394 ExecTestHelper eth;
1395 errno = 0;
1396 ASSERT_EQ(-1, execv("/", eth.GetArgs()));
1397 ASSERT_EQ(EACCES, errno);
1398}
1399
1400TEST(UNISTD_TEST, execv) {
1401 ExecTestHelper eth;
1402 eth.SetArgs({"echo", "hello", "world", nullptr});
1403 // int execv(const char* path, char* argv[]);
1404 eth.Run([&]() { execv(BIN_DIR "echo", eth.GetArgs()); }, 0, "hello world\n");
1405}
1406
1407TEST(UNISTD_TEST, execlp_failure) {
1408 errno = 0;
1409 ASSERT_EQ(-1, execlp("/", "/", nullptr));
1410 ASSERT_EQ(EACCES, errno);
1411}
1412
1413TEST(UNISTD_TEST, execlp) {
1414 ExecTestHelper eth;
1415 // int execlp(const char* file, const char* arg, ...);
1416 eth.Run([&]() { execlp("echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n");
1417}
1418
1419TEST(UNISTD_TEST, execvp_failure) {
1420 ExecTestHelper eth;
Elliott Hughes3c115902016-08-24 19:27:04 -07001421 eth.SetArgs({nullptr});
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001422 errno = 0;
1423 ASSERT_EQ(-1, execvp("/", eth.GetArgs()));
1424 ASSERT_EQ(EACCES, errno);
1425}
1426
1427TEST(UNISTD_TEST, execvp) {
1428 ExecTestHelper eth;
1429 eth.SetArgs({"echo", "hello", "world", nullptr});
1430 // int execvp(const char* file, char* argv[]);
1431 eth.Run([&]() { execvp("echo", eth.GetArgs()); }, 0, "hello world\n");
1432}
1433
1434TEST(UNISTD_TEST, execvpe_failure) {
1435 ExecTestHelper eth;
1436 errno = 0;
1437 ASSERT_EQ(-1, execvpe("this-does-not-exist", eth.GetArgs(), eth.GetEnv()));
Elliott Hughes5965bf02016-12-01 17:12:49 -08001438 // Running in CTS we might not even be able to search all directories in $PATH.
1439 ASSERT_TRUE(errno == ENOENT || errno == EACCES);
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001440}
1441
1442TEST(UNISTD_TEST, execvpe) {
1443 // int execvpe(const char* file, char* argv[], char* envp[]);
1444
1445 // Test basic argument passing.
1446 ExecTestHelper eth;
1447 eth.SetArgs({"echo", "hello", "world", nullptr});
1448 eth.Run([&]() { execvpe("echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1449
1450 // Test environment variable setting too.
1451 eth.SetArgs({"printenv", nullptr});
1452 eth.SetEnv({"A=B", nullptr});
1453 eth.Run([&]() { execvpe("printenv", eth.GetArgs(), eth.GetEnv()); }, 0, "A=B\n");
1454}
Elliott Hughes3c115902016-08-24 19:27:04 -07001455
1456TEST(UNISTD_TEST, execvpe_ENOEXEC) {
1457 // Create a shell script with #!.
1458 TemporaryFile tf;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001459 ASSERT_TRUE(android::base::WriteStringToFile("#!" BIN_DIR "sh\necho script\n", tf.path));
Elliott Hughes3c115902016-08-24 19:27:04 -07001460
1461 // Set $PATH so we can find it.
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001462 setenv("PATH", dirname(tf.path), 1);
Elliott Hughes3c115902016-08-24 19:27:04 -07001463
1464 ExecTestHelper eth;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001465 eth.SetArgs({basename(tf.path), nullptr});
Elliott Hughes3c115902016-08-24 19:27:04 -07001466
1467 // It's not inherently executable.
1468 errno = 0;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001469 ASSERT_EQ(-1, execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()));
Elliott Hughes3c115902016-08-24 19:27:04 -07001470 ASSERT_EQ(EACCES, errno);
1471
Elliott Hughes5965bf02016-12-01 17:12:49 -08001472 // Make it executable (and keep it writable because we're going to rewrite it below).
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001473 ASSERT_EQ(0, chmod(tf.path, 0777));
Elliott Hughes3c115902016-08-24 19:27:04 -07001474
1475 // TemporaryFile will have a writable fd, so we can test ETXTBSY while we're here...
1476 errno = 0;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001477 ASSERT_EQ(-1, execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()));
Elliott Hughes3c115902016-08-24 19:27:04 -07001478 ASSERT_EQ(ETXTBSY, errno);
1479
1480 // 1. The simplest test: the kernel should handle this.
1481 ASSERT_EQ(0, close(tf.fd));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001482 eth.Run([&]() { execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
Elliott Hughes3c115902016-08-24 19:27:04 -07001483
1484 // 2. Try again without a #!. We should have to handle this ourselves.
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001485 ASSERT_TRUE(android::base::WriteStringToFile("echo script\n", tf.path));
1486 eth.Run([&]() { execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
Elliott Hughes3c115902016-08-24 19:27:04 -07001487
1488 // 3. Again without a #!, but also with a leading '/', since that's a special case in the
1489 // implementation.
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001490 eth.Run([&]() { execvpe(tf.path, eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
Elliott Hughes3c115902016-08-24 19:27:04 -07001491}
Elliott Hughes63615062016-08-25 17:40:27 -07001492
1493TEST(UNISTD_TEST, execvp_libcore_test_55017) {
1494 ExecTestHelper eth;
1495 eth.SetArgs({"/system/bin/does-not-exist", nullptr});
1496
1497 errno = 0;
1498 ASSERT_EQ(-1, execvp("/system/bin/does-not-exist", eth.GetArgs()));
1499 ASSERT_EQ(ENOENT, errno);
1500}
Elliott Hughes30a36272017-02-22 17:31:41 -08001501
1502TEST(UNISTD_TEST, exec_argv0_null) {
1503 // http://b/33276926
1504 char* args[] = {nullptr};
1505 char* envs[] = {nullptr};
1506 ASSERT_EXIT(execve("/system/bin/run-as", args, envs), testing::ExitedWithCode(1),
1507 "<unknown>: usage: run-as");
1508}
Elliott Hughes06bd5862017-07-28 16:27:49 -07001509
Elliott Hughes4d215aa2017-10-18 15:54:56 -07001510TEST(UNISTD_TEST, fexecve_failure) {
1511 ExecTestHelper eth;
1512 errno = 0;
1513 int fd = open("/", O_RDONLY);
1514 ASSERT_NE(-1, fd);
1515 ASSERT_EQ(-1, fexecve(fd, eth.GetArgs(), eth.GetEnv()));
1516 ASSERT_EQ(EACCES, errno);
1517 close(fd);
1518}
1519
1520TEST(UNISTD_TEST, fexecve_bad_fd) {
1521 ExecTestHelper eth;
1522 errno = 0;
1523 ASSERT_EQ(-1, fexecve(-1, eth.GetArgs(), eth.GetEnv()));
1524 ASSERT_EQ(EBADF, errno);
1525}
1526
1527TEST(UNISTD_TEST, fexecve_args) {
1528 // Test basic argument passing.
1529 int echo_fd = open(BIN_DIR "echo", O_RDONLY | O_CLOEXEC);
1530 ASSERT_NE(-1, echo_fd);
1531 ExecTestHelper eth;
1532 eth.SetArgs({"echo", "hello", "world", nullptr});
1533 eth.Run([&]() { fexecve(echo_fd, eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1534 close(echo_fd);
1535
1536 // Test environment variable setting too.
1537 int printenv_fd = open(BIN_DIR "printenv", O_RDONLY | O_CLOEXEC);
1538 ASSERT_NE(-1, printenv_fd);
1539 eth.SetArgs({"printenv", nullptr});
1540 eth.SetEnv({"A=B", nullptr});
1541 eth.Run([&]() { fexecve(printenv_fd, eth.GetArgs(), eth.GetEnv()); }, 0, "A=B\n");
1542 close(printenv_fd);
1543}
1544
Elliott Hughes06bd5862017-07-28 16:27:49 -07001545TEST(UNISTD_TEST, getlogin_r) {
1546 char buf[LOGIN_NAME_MAX] = {};
1547 EXPECT_EQ(ERANGE, getlogin_r(buf, 0));
1548 EXPECT_EQ(0, getlogin_r(buf, sizeof(buf)));
1549 EXPECT_STREQ(getlogin(), buf);
1550}
Elliott Hughesfa386e02017-10-18 13:34:32 -07001551
1552TEST(UNISTD_TEST, swab) {
1553 // POSIX: "The swab() function shall copy nbytes bytes, which are pointed to by src,
1554 // to the object pointed to by dest, exchanging adjacent bytes."
1555 char buf[BUFSIZ];
1556 memset(buf, 'x', sizeof(buf));
1557 swab("ehll oowlr\0d", buf, 12);
1558 ASSERT_STREQ("hello world", buf);
1559}
1560
1561TEST(UNISTD_TEST, swab_odd_byte_count) {
1562 // POSIX: "If nbytes is odd, swab() copies and exchanges nbytes-1 bytes and the disposition
1563 // of the last byte is unspecified."
1564 // ...but it seems unreasonable to not just leave the last byte alone.
1565 char buf[BUFSIZ];
1566 memset(buf, 'x', sizeof(buf));
1567 swab("012345", buf, 3);
1568 ASSERT_EQ('1', buf[0]);
1569 ASSERT_EQ('0', buf[1]);
1570 ASSERT_EQ('x', buf[2]);
1571}
1572
1573TEST(UNISTD_TEST, swab_overlap) {
1574 // POSIX: "If copying takes place between objects that overlap, the behavior is undefined."
1575 // ...but it seems unreasonable to not just do the right thing.
1576 char buf[] = "012345";
1577 swab(buf, buf, 4);
1578 ASSERT_EQ('1', buf[0]);
1579 ASSERT_EQ('0', buf[1]);
1580 ASSERT_EQ('3', buf[2]);
1581 ASSERT_EQ('2', buf[3]);
1582 ASSERT_EQ('4', buf[4]);
1583 ASSERT_EQ('5', buf[5]);
1584 ASSERT_EQ(0, buf[6]);
1585}
1586
1587TEST(UNISTD_TEST, swab_negative_byte_count) {
1588 // POSIX: "If nbytes is negative, swab() does nothing."
1589 char buf[BUFSIZ];
1590 memset(buf, 'x', sizeof(buf));
1591 swab("hello", buf, -1);
1592 ASSERT_EQ('x', buf[0]);
1593}
Elliott Hughesca3f8e42019-10-28 15:59:38 -07001594
1595TEST(UNISTD_TEST, usleep) {
1596 auto t0 = std::chrono::steady_clock::now();
1597 ASSERT_EQ(0, usleep(5000));
1598 auto t1 = std::chrono::steady_clock::now();
1599 ASSERT_GE(t1-t0, 5000us);
1600}
1601
1602TEST(UNISTD_TEST, sleep) {
1603 auto t0 = std::chrono::steady_clock::now();
1604 ASSERT_EQ(0U, sleep(1));
1605 auto t1 = std::chrono::steady_clock::now();
1606 ASSERT_GE(t1-t0, 1s);
1607}