| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 1 | /* | 
|  | 2 | * Copyright (C) 2012 The Android Open Source Project | 
|  | 3 | * | 
|  | 4 | * Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | 5 | * you may not use this file except in compliance with the License. | 
|  | 6 | * You may obtain a copy of the License at | 
|  | 7 | * | 
|  | 8 | *      http://www.apache.org/licenses/LICENSE-2.0 | 
|  | 9 | * | 
|  | 10 | * Unless required by applicable law or agreed to in writing, software | 
|  | 11 | * distributed under the License is distributed on an "AS IS" BASIS, | 
|  | 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | 13 | * See the License for the specific language governing permissions and | 
|  | 14 | * limitations under the License. | 
|  | 15 | */ | 
|  | 16 |  | 
|  | 17 | #include <gtest/gtest.h> | 
|  | 18 |  | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 19 | // Below are the header files we want to test. | 
|  | 20 | #include <grp.h> | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 21 | #include <pwd.h> | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 22 |  | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 23 | #include <errno.h> | 
|  | 24 | #include <limits.h> | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 25 | #include <sys/cdefs.h> | 
|  | 26 | #include <sys/types.h> | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 27 | #include <unistd.h> | 
|  | 28 |  | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 29 | #include <set> | 
|  | 30 | #include <vector> | 
| Mark Salyzyn | 722ab05 | 2016-04-06 10:35:48 -0700 | [diff] [blame] | 31 |  | 
| Tom Cherry | e88b408 | 2018-05-24 14:44:10 -0700 | [diff] [blame] | 32 | #include <android-base/file.h> | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 33 | #include <android-base/strings.h> | 
| Mark Salyzyn | 722ab05 | 2016-04-06 10:35:48 -0700 | [diff] [blame] | 34 | #include <private/android_filesystem_config.h> | 
|  | 35 |  | 
| Tom Cherry | 5c94143 | 2018-10-09 11:01:28 -0700 | [diff] [blame] | 36 | #if defined(__BIONIC__) | 
| Tom Cherry | 9da8ff1 | 2019-02-19 13:23:49 -0800 | [diff] [blame] | 37 | #include <android/api-level.h> | 
| Tom Cherry | 5c94143 | 2018-10-09 11:01:28 -0700 | [diff] [blame] | 38 | #include <android-base/properties.h> | 
|  | 39 | #endif | 
|  | 40 |  | 
| Elliott Hughes | 3f6eee9 | 2016-12-13 23:47:25 +0000 | [diff] [blame] | 41 | // Generated android_ids array | 
|  | 42 | #include "generated_android_ids.h" | 
|  | 43 |  | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 44 | using android::base::Join; | 
| Tom Cherry | e88b408 | 2018-05-24 14:44:10 -0700 | [diff] [blame] | 45 | using android::base::ReadFileToString; | 
|  | 46 | using android::base::Split; | 
|  | 47 | using android::base::StartsWith; | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 48 |  | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 49 | enum uid_type_t { | 
| Tom Cherry | fa5f61c | 2018-09-27 13:19:02 -0700 | [diff] [blame] | 50 | TYPE_APP, | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 51 | TYPE_SYSTEM, | 
| Tom Cherry | fa5f61c | 2018-09-27 13:19:02 -0700 | [diff] [blame] | 52 | TYPE_VENDOR, | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 53 | }; | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 54 |  | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 55 | #if defined(__BIONIC__) | 
|  | 56 |  | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 57 | static void check_passwd(const passwd* pwd, const char* username, uid_t uid, uid_type_t uid_type, | 
|  | 58 | bool check_username) { | 
| Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 59 | ASSERT_TRUE(pwd != nullptr); | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 60 | if (check_username) { | 
|  | 61 | EXPECT_STREQ(username, pwd->pw_name); | 
|  | 62 | } | 
| Tom Cherry | 2c05c0f | 2017-11-10 10:57:21 -0800 | [diff] [blame] | 63 | EXPECT_EQ(uid, pwd->pw_uid); | 
|  | 64 | EXPECT_EQ(uid, pwd->pw_gid); | 
| Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 65 | EXPECT_EQ(nullptr, pwd->pw_passwd); | 
| Calin Juravle | c768874 | 2014-05-09 21:50:53 +0100 | [diff] [blame] | 66 | #ifdef __LP64__ | 
| Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 67 | EXPECT_EQ(nullptr, pwd->pw_gecos); | 
| Calin Juravle | c768874 | 2014-05-09 21:50:53 +0100 | [diff] [blame] | 68 | #endif | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 69 |  | 
| Tom Cherry | fa5f61c | 2018-09-27 13:19:02 -0700 | [diff] [blame] | 70 | if (uid_type == TYPE_APP) { | 
| Tom Cherry | 2c05c0f | 2017-11-10 10:57:21 -0800 | [diff] [blame] | 71 | EXPECT_STREQ("/data", pwd->pw_dir); | 
| Tom Cherry | fa5f61c | 2018-09-27 13:19:02 -0700 | [diff] [blame] | 72 | } else { | 
|  | 73 | EXPECT_STREQ("/", pwd->pw_dir); | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 74 | } | 
| Tom Cherry | fa5f61c | 2018-09-27 13:19:02 -0700 | [diff] [blame] | 75 |  | 
|  | 76 | if (uid_type == TYPE_VENDOR) { | 
|  | 77 | EXPECT_STREQ("/vendor/bin/sh", pwd->pw_shell); | 
|  | 78 | } else { | 
|  | 79 | EXPECT_STREQ("/system/bin/sh", pwd->pw_shell); | 
|  | 80 | } | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 81 | } | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 82 |  | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 83 | static void check_getpwuid(const char* username, uid_t uid, uid_type_t uid_type, | 
|  | 84 | bool check_username) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 85 | errno = 0; | 
|  | 86 | passwd* pwd = getpwuid(uid); | 
|  | 87 | ASSERT_EQ(0, errno); | 
|  | 88 | SCOPED_TRACE("getpwuid"); | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 89 | check_passwd(pwd, username, uid, uid_type, check_username); | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 90 | } | 
|  | 91 |  | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 92 | static void check_getpwnam(const char* username, uid_t uid, uid_type_t uid_type, | 
|  | 93 | bool check_username) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 94 | errno = 0; | 
|  | 95 | passwd* pwd = getpwnam(username); | 
|  | 96 | ASSERT_EQ(0, errno); | 
|  | 97 | SCOPED_TRACE("getpwnam"); | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 98 | check_passwd(pwd, username, uid, uid_type, check_username); | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 99 | } | 
|  | 100 |  | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 101 | static void check_getpwuid_r(const char* username, uid_t uid, uid_type_t uid_type, | 
|  | 102 | bool check_username) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 103 | passwd pwd_storage; | 
|  | 104 | char buf[512]; | 
|  | 105 | int result; | 
|  | 106 |  | 
|  | 107 | errno = 0; | 
| Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 108 | passwd* pwd = nullptr; | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 109 | result = getpwuid_r(uid, &pwd_storage, buf, sizeof(buf), &pwd); | 
|  | 110 | ASSERT_EQ(0, result); | 
|  | 111 | ASSERT_EQ(0, errno); | 
|  | 112 | SCOPED_TRACE("getpwuid_r"); | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 113 | check_passwd(pwd, username, uid, uid_type, check_username); | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 114 | } | 
|  | 115 |  | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 116 | static void check_getpwnam_r(const char* username, uid_t uid, uid_type_t uid_type, | 
|  | 117 | bool check_username) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 118 | passwd pwd_storage; | 
|  | 119 | char buf[512]; | 
|  | 120 | int result; | 
|  | 121 |  | 
|  | 122 | errno = 0; | 
| Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 123 | passwd* pwd = nullptr; | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 124 | result = getpwnam_r(username, &pwd_storage, buf, sizeof(buf), &pwd); | 
|  | 125 | ASSERT_EQ(0, result); | 
|  | 126 | ASSERT_EQ(0, errno); | 
|  | 127 | SCOPED_TRACE("getpwnam_r"); | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 128 | check_passwd(pwd, username, uid, uid_type, check_username); | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 129 | } | 
|  | 130 |  | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 131 | static void check_get_passwd(const char* username, uid_t uid, uid_type_t uid_type, | 
|  | 132 | bool check_username = true) { | 
|  | 133 | check_getpwuid(username, uid, uid_type, check_username); | 
|  | 134 | check_getpwnam(username, uid, uid_type, check_username); | 
|  | 135 | check_getpwuid_r(username, uid, uid_type, check_username); | 
|  | 136 | check_getpwnam_r(username, uid, uid_type, check_username); | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 137 | } | 
|  | 138 |  | 
|  | 139 | #else // !defined(__BIONIC__) | 
|  | 140 |  | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 141 | static void check_get_passwd(const char* /* username */, uid_t /* uid */, uid_type_t /* uid_type */, | 
|  | 142 | bool /* check_username */) { | 
| Elliott Hughes | bcaa454 | 2019-03-08 15:20:23 -0800 | [diff] [blame] | 143 | GTEST_SKIP() << "bionic-only test"; | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 144 | } | 
|  | 145 |  | 
| Josh Gao | 2fe1034 | 2018-02-27 14:05:53 -0800 | [diff] [blame] | 146 | static void check_get_passwd(const char* /* username */, uid_t /* uid */, uid_type_t /* uid_type */) { | 
| Elliott Hughes | bcaa454 | 2019-03-08 15:20:23 -0800 | [diff] [blame] | 147 | GTEST_SKIP() << "bionic-only test"; | 
| Josh Gao | 2fe1034 | 2018-02-27 14:05:53 -0800 | [diff] [blame] | 148 | } | 
|  | 149 |  | 
| Christopher Ferris | f04935c | 2013-12-20 18:43:21 -0800 | [diff] [blame] | 150 | #endif | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 151 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 152 | TEST(pwd, getpwnam_system_id_root) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 153 | check_get_passwd("root", 0, TYPE_SYSTEM); | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 154 | } | 
|  | 155 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 156 | TEST(pwd, getpwnam_system_id_system) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 157 | check_get_passwd("system", 1000, TYPE_SYSTEM); | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 158 | } | 
|  | 159 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 160 | TEST(pwd, getpwnam_app_id_radio) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 161 | check_get_passwd("radio", 1001, TYPE_SYSTEM); | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 162 | } | 
|  | 163 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 164 | TEST(pwd, getpwnam_oem_id_5000) { | 
| Tom Cherry | fa5f61c | 2018-09-27 13:19:02 -0700 | [diff] [blame] | 165 | check_get_passwd("oem_5000", 5000, TYPE_VENDOR, false); | 
| Jorge Lucangeli Obes | a39e301 | 2015-09-22 11:46:43 -0700 | [diff] [blame] | 166 | } | 
|  | 167 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 168 | TEST(pwd, getpwnam_oem_id_5999) { | 
| Tom Cherry | fa5f61c | 2018-09-27 13:19:02 -0700 | [diff] [blame] | 169 | check_get_passwd("oem_5999", 5999, TYPE_VENDOR, false); | 
| Mark Salyzyn | 8d387ee | 2016-04-05 09:24:59 -0700 | [diff] [blame] | 170 | } | 
|  | 171 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 172 | TEST(pwd, getpwnam_oem_id_2900) { | 
| Tom Cherry | fa5f61c | 2018-09-27 13:19:02 -0700 | [diff] [blame] | 173 | check_get_passwd("oem_2900", 2900, TYPE_VENDOR, false); | 
| Mark Salyzyn | 8d387ee | 2016-04-05 09:24:59 -0700 | [diff] [blame] | 174 | } | 
|  | 175 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 176 | TEST(pwd, getpwnam_oem_id_2999) { | 
| Tom Cherry | fa5f61c | 2018-09-27 13:19:02 -0700 | [diff] [blame] | 177 | check_get_passwd("oem_2999", 2999, TYPE_VENDOR, false); | 
| Jorge Lucangeli Obes | a39e301 | 2015-09-22 11:46:43 -0700 | [diff] [blame] | 178 | } | 
|  | 179 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 180 | TEST(pwd, getpwnam_app_id_nobody) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 181 | check_get_passwd("nobody", 9999, TYPE_SYSTEM); | 
| Kenny Root | 8a05a01 | 2012-09-13 14:31:50 -0700 | [diff] [blame] | 182 | } | 
|  | 183 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 184 | TEST(pwd, getpwnam_app_id_u0_a0) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 185 | check_get_passwd("u0_a0", 10000, TYPE_APP); | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 186 | } | 
|  | 187 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 188 | TEST(pwd, getpwnam_app_id_u0_a1234) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 189 | check_get_passwd("u0_a1234", 11234, TYPE_APP); | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 190 | } | 
|  | 191 |  | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 192 | // Test the difference between uid and shared gid. | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 193 | TEST(pwd, getpwnam_app_id_u0_a49999) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 194 | check_get_passwd("u0_a49999", 59999, TYPE_APP); | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 195 | } | 
|  | 196 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 197 | TEST(pwd, getpwnam_app_id_u0_i1) { | 
| Martijn Coenen | f9d2299 | 2019-01-16 16:25:40 +0100 | [diff] [blame] | 198 | check_get_passwd("u0_i1", 90001, TYPE_APP); | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 199 | } | 
|  | 200 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 201 | TEST(pwd, getpwnam_app_id_u1_root) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 202 | check_get_passwd("u1_root", 100000, TYPE_SYSTEM); | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 203 | } | 
|  | 204 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 205 | TEST(pwd, getpwnam_app_id_u1_radio) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 206 | check_get_passwd("u1_radio", 101001, TYPE_SYSTEM); | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 207 | } | 
|  | 208 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 209 | TEST(pwd, getpwnam_app_id_u1_a0) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 210 | check_get_passwd("u1_a0", 110000, TYPE_APP); | 
|  | 211 | } | 
|  | 212 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 213 | TEST(pwd, getpwnam_app_id_u1_a40000) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 214 | check_get_passwd("u1_a40000", 150000, TYPE_APP); | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 215 | } | 
|  | 216 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 217 | TEST(pwd, getpwnam_app_id_u1_i0) { | 
| Martijn Coenen | f9d2299 | 2019-01-16 16:25:40 +0100 | [diff] [blame] | 218 | check_get_passwd("u1_i0", 190000, TYPE_APP); | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 219 | } | 
| Tom Cherry | c57c5bd | 2019-05-14 17:02:28 -0700 | [diff] [blame] | 220 |  | 
|  | 221 | TEST(pwd, getpwnam_r_alignment) { | 
|  | 222 | #if defined(__BIONIC__) | 
|  | 223 | passwd pwd_storage; | 
|  | 224 | alignas(16) char buf[512]; | 
|  | 225 | passwd* pwd; | 
|  | 226 | int result = getpwnam_r("root", &pwd_storage, buf + 1, sizeof(buf) - 1, &pwd); | 
|  | 227 | ASSERT_EQ(0, result); | 
|  | 228 | check_passwd(pwd, "root", 0, TYPE_SYSTEM, true); | 
|  | 229 | #else | 
|  | 230 | GTEST_SKIP() << "bionic-only test"; | 
|  | 231 | #endif | 
|  | 232 | } | 
|  | 233 |  | 
|  | 234 | TEST(pwd, getpwuid_r_alignment) { | 
|  | 235 | #if defined(__BIONIC__) | 
|  | 236 | passwd pwd_storage; | 
|  | 237 | alignas(16) char buf[512]; | 
|  | 238 | passwd* pwd; | 
|  | 239 | int result = getpwuid_r(0, &pwd_storage, buf + 1, sizeof(buf) - 1, &pwd); | 
|  | 240 | ASSERT_EQ(0, result); | 
|  | 241 | check_passwd(pwd, "root", 0, TYPE_SYSTEM, true); | 
|  | 242 | #else | 
|  | 243 | GTEST_SKIP() << "bionic-only test"; | 
|  | 244 | #endif | 
|  | 245 | } | 
|  | 246 |  | 
|  | 247 | TEST(pwd, getpwnam_r_reentrancy) { | 
|  | 248 | #if defined(__BIONIC__) | 
|  | 249 | passwd pwd_storage[2]; | 
|  | 250 | char buf[2][512]; | 
|  | 251 | passwd* pwd[3]; | 
|  | 252 | int result = getpwnam_r("root", &pwd_storage[0], buf[0], sizeof(buf[0]), &pwd[0]); | 
|  | 253 | ASSERT_EQ(0, result); | 
|  | 254 | check_passwd(pwd[0], "root", 0, TYPE_SYSTEM, true); | 
|  | 255 | pwd[1] = getpwnam("system"); | 
|  | 256 | ASSERT_NE(nullptr, pwd[1]); | 
|  | 257 | check_passwd(pwd[1], "system", 1000, TYPE_SYSTEM, true); | 
|  | 258 | result = getpwnam_r("radio", &pwd_storage[1], buf[1], sizeof(buf[1]), &pwd[2]); | 
|  | 259 | ASSERT_EQ(0, result); | 
|  | 260 | check_passwd(pwd[2], "radio", 1001, TYPE_SYSTEM, true); | 
|  | 261 | check_passwd(pwd[0], "root", 0, TYPE_SYSTEM, true); | 
|  | 262 | check_passwd(pwd[1], "system", 1000, TYPE_SYSTEM, true); | 
|  | 263 | #else | 
|  | 264 | GTEST_SKIP() << "bionic-only test"; | 
|  | 265 | #endif | 
|  | 266 | } | 
|  | 267 |  | 
|  | 268 | TEST(pwd, getpwuid_r_reentrancy) { | 
|  | 269 | #if defined(__BIONIC__) | 
|  | 270 | passwd pwd_storage[2]; | 
|  | 271 | char buf[2][512]; | 
|  | 272 | passwd* pwd[3]; | 
|  | 273 | int result = getpwuid_r(0, &pwd_storage[0], buf[0], sizeof(buf[0]), &pwd[0]); | 
|  | 274 | ASSERT_EQ(0, result); | 
|  | 275 | check_passwd(pwd[0], "root", 0, TYPE_SYSTEM, true); | 
|  | 276 | pwd[1] = getpwuid(1000); | 
|  | 277 | ASSERT_NE(nullptr, pwd[1]); | 
|  | 278 | check_passwd(pwd[1], "system", 1000, TYPE_SYSTEM, true); | 
|  | 279 | result = getpwuid_r(1001, &pwd_storage[1], buf[1], sizeof(buf[1]), &pwd[2]); | 
|  | 280 | ASSERT_EQ(0, result); | 
|  | 281 | check_passwd(pwd[2], "radio", 1001, TYPE_SYSTEM, true); | 
|  | 282 | check_passwd(pwd[0], "root", 0, TYPE_SYSTEM, true); | 
|  | 283 | check_passwd(pwd[1], "system", 1000, TYPE_SYSTEM, true); | 
|  | 284 | #else | 
|  | 285 | GTEST_SKIP() << "bionic-only test"; | 
|  | 286 | #endif | 
|  | 287 | } | 
|  | 288 |  | 
|  | 289 | TEST(pwd, getpwnam_r_large_enough_suggested_buffer_size) { | 
|  | 290 | #if defined(__BIONIC__) | 
|  | 291 | long size = sysconf(_SC_GETPW_R_SIZE_MAX); | 
|  | 292 | ASSERT_GT(size, 0); | 
|  | 293 | char buf[size]; | 
|  | 294 | passwd pwd_storage; | 
|  | 295 | passwd* pwd; | 
|  | 296 | ASSERT_EQ(0, getpwnam_r("root", &pwd_storage, buf, size, &pwd)); | 
|  | 297 | check_passwd(pwd, "root", 0, TYPE_SYSTEM, true); | 
|  | 298 | #else | 
|  | 299 | GTEST_SKIP() << "bionic-only test"; | 
|  | 300 | #endif | 
|  | 301 | } | 
|  | 302 |  | 
| Tom Cherry | 5c94143 | 2018-10-09 11:01:28 -0700 | [diff] [blame] | 303 | #if defined(__BIONIC__) | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 304 | template <typename T> | 
|  | 305 | static void expect_ids(const T& ids) { | 
|  | 306 | std::set<typename T::key_type> expected_ids; | 
|  | 307 | // Ensure that all android_ids are iterated through. | 
|  | 308 | for (size_t n = 0; n < android_id_count; ++n) { | 
|  | 309 | EXPECT_EQ(1U, ids.count(android_ids[n].aid)) << "android_ids[n].aid: " << android_ids[n].aid; | 
|  | 310 | expected_ids.emplace(android_ids[n].aid); | 
|  | 311 | } | 
|  | 312 |  | 
|  | 313 | auto expect_range = [&ids, &expected_ids](uid_t start, uid_t end) { | 
|  | 314 | for (size_t n = start; n <= end; ++n) { | 
|  | 315 | EXPECT_EQ(1U, ids.count(n)) << "n: " << n; | 
|  | 316 | expected_ids.emplace(n); | 
|  | 317 | } | 
|  | 318 | }; | 
|  | 319 |  | 
|  | 320 | // Ensure that all reserved ranges are iterated through. | 
|  | 321 | expect_range(AID_OEM_RESERVED_START, AID_OEM_RESERVED_END); | 
|  | 322 | expect_range(AID_OEM_RESERVED_2_START, AID_OEM_RESERVED_2_END); | 
|  | 323 | expect_range(AID_APP_START, AID_APP_END); | 
|  | 324 | expect_range(AID_CACHE_GID_START, AID_CACHE_GID_END); | 
|  | 325 | expect_range(AID_EXT_GID_START, AID_EXT_GID_END); | 
|  | 326 | expect_range(AID_EXT_CACHE_GID_START, AID_EXT_CACHE_GID_END); | 
|  | 327 | expect_range(AID_SHARED_GID_START, AID_SHARED_GID_END); | 
|  | 328 | expect_range(AID_ISOLATED_START, AID_ISOLATED_END); | 
|  | 329 |  | 
| Tom Cherry | 9da8ff1 | 2019-02-19 13:23:49 -0800 | [diff] [blame] | 330 | // TODO(73062966): We still don't have a good way to create vendor AIDs in the system or other | 
|  | 331 | // non-vendor partitions, therefore we keep this check disabled. | 
|  | 332 | if (android::base::GetIntProperty("ro.product.first_api_level", 0) <= __ANDROID_API_Q__) { | 
| Tom Cherry | 5c94143 | 2018-10-09 11:01:28 -0700 | [diff] [blame] | 333 | return; | 
|  | 334 | } | 
|  | 335 |  | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 336 | // Ensure that no other ids were returned. | 
|  | 337 | auto return_differences = [&ids, &expected_ids] { | 
|  | 338 | std::vector<typename T::key_type> missing_from_ids; | 
|  | 339 | std::set_difference(expected_ids.begin(), expected_ids.end(), ids.begin(), ids.end(), | 
|  | 340 | std::inserter(missing_from_ids, missing_from_ids.begin())); | 
|  | 341 | std::vector<typename T::key_type> extra_in_ids; | 
|  | 342 | std::set_difference(ids.begin(), ids.end(), expected_ids.begin(), expected_ids.end(), | 
|  | 343 | std::inserter(extra_in_ids, extra_in_ids.begin())); | 
|  | 344 | std::string result; | 
|  | 345 | if (!missing_from_ids.empty()) { | 
|  | 346 | result += "Missing ids from results: " + Join(missing_from_ids, " "); | 
|  | 347 | } | 
|  | 348 | if (!extra_in_ids.empty()) { | 
|  | 349 | if (!result.empty()) result += ", "; | 
|  | 350 | result += "Extra ids in results: " + Join(extra_in_ids, " "); | 
|  | 351 | } | 
|  | 352 | return result; | 
|  | 353 | }; | 
|  | 354 | EXPECT_EQ(expected_ids, ids) << return_differences(); | 
|  | 355 | } | 
| Tom Cherry | 5c94143 | 2018-10-09 11:01:28 -0700 | [diff] [blame] | 356 | #endif | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 357 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 358 | TEST(pwd, getpwent_iterate) { | 
| Josh Gao | 2fe1034 | 2018-02-27 14:05:53 -0800 | [diff] [blame] | 359 | #if defined(__BIONIC__) | 
| Mark Salyzyn | 722ab05 | 2016-04-06 10:35:48 -0700 | [diff] [blame] | 360 | passwd* pwd; | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 361 | std::set<uid_t> uids; | 
| Mark Salyzyn | 722ab05 | 2016-04-06 10:35:48 -0700 | [diff] [blame] | 362 |  | 
|  | 363 | setpwent(); | 
| Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 364 | while ((pwd = getpwent()) != nullptr) { | 
|  | 365 | ASSERT_TRUE(nullptr != pwd->pw_name); | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 366 |  | 
| Tom Cherry | 2c05c0f | 2017-11-10 10:57:21 -0800 | [diff] [blame] | 367 | EXPECT_EQ(pwd->pw_gid, pwd->pw_uid) << "pwd->pw_uid: " << pwd->pw_uid; | 
| Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 368 | EXPECT_EQ(nullptr, pwd->pw_passwd) << "pwd->pw_uid: " << pwd->pw_uid; | 
| Mark Salyzyn | 722ab05 | 2016-04-06 10:35:48 -0700 | [diff] [blame] | 369 | #ifdef __LP64__ | 
| Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 370 | EXPECT_TRUE(nullptr == pwd->pw_gecos) << "pwd->pw_uid: " << pwd->pw_uid; | 
| Mark Salyzyn | 722ab05 | 2016-04-06 10:35:48 -0700 | [diff] [blame] | 371 | #endif | 
| Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 372 | EXPECT_TRUE(nullptr != pwd->pw_shell); | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 373 | if (pwd->pw_uid < AID_APP_START || pwd->pw_uid == AID_OVERFLOWUID) { | 
| Tom Cherry | 2c05c0f | 2017-11-10 10:57:21 -0800 | [diff] [blame] | 374 | EXPECT_STREQ("/", pwd->pw_dir) << "pwd->pw_uid: " << pwd->pw_uid; | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 375 | } else { | 
|  | 376 | EXPECT_STREQ("/data", pwd->pw_dir) << "pwd->pw_uid: " << pwd->pw_uid; | 
| Mark Salyzyn | 722ab05 | 2016-04-06 10:35:48 -0700 | [diff] [blame] | 377 | } | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 378 |  | 
| Tom Cherry | 4cddb00 | 2018-06-29 10:39:43 -0700 | [diff] [blame] | 379 | // TODO(b/27999086): fix this check with the OEM range | 
|  | 380 | // If OEMs add their own AIDs to private/android_filesystem_config.h, this check will fail. | 
|  | 381 | // Long term we want to create a better solution for OEMs adding AIDs, but we're not there | 
|  | 382 | // yet, so therefore we do not check for uid's in the OEM range. | 
|  | 383 | if (!(pwd->pw_uid >= 2900 && pwd->pw_uid <= 2999) && | 
|  | 384 | !(pwd->pw_uid >= 5000 && pwd->pw_uid <= 5999)) { | 
|  | 385 | EXPECT_EQ(0U, uids.count(pwd->pw_uid)) << "pwd->pw_uid: " << pwd->pw_uid; | 
|  | 386 | } | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 387 | uids.emplace(pwd->pw_uid); | 
| Mark Salyzyn | 722ab05 | 2016-04-06 10:35:48 -0700 | [diff] [blame] | 388 | } | 
|  | 389 | endpwent(); | 
|  | 390 |  | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 391 | expect_ids(uids); | 
| Josh Gao | 2fe1034 | 2018-02-27 14:05:53 -0800 | [diff] [blame] | 392 | #else | 
| Elliott Hughes | bcaa454 | 2019-03-08 15:20:23 -0800 | [diff] [blame] | 393 | GTEST_SKIP() << "bionic-only test"; | 
| Josh Gao | 2fe1034 | 2018-02-27 14:05:53 -0800 | [diff] [blame] | 394 | #endif | 
| Mark Salyzyn | 722ab05 | 2016-04-06 10:35:48 -0700 | [diff] [blame] | 395 | } | 
|  | 396 |  | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 397 | static void check_group(const group* grp, const char* group_name, gid_t gid, | 
|  | 398 | bool check_groupname = true) { | 
| Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 399 | ASSERT_TRUE(grp != nullptr); | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 400 | if (check_groupname) { | 
|  | 401 | EXPECT_STREQ(group_name, grp->gr_name); | 
|  | 402 | } | 
| Tom Cherry | 2c05c0f | 2017-11-10 10:57:21 -0800 | [diff] [blame] | 403 | EXPECT_EQ(gid, grp->gr_gid); | 
| Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 404 | ASSERT_TRUE(grp->gr_mem != nullptr); | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 405 | if (check_groupname) { | 
|  | 406 | EXPECT_STREQ(group_name, grp->gr_mem[0]); | 
|  | 407 | } | 
| Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 408 | EXPECT_TRUE(grp->gr_mem[1] == nullptr); | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 409 | } | 
|  | 410 |  | 
| Yabin Cui | c4786d3 | 2015-07-20 19:46:26 -0700 | [diff] [blame] | 411 | #if defined(__BIONIC__) | 
|  | 412 |  | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 413 | static void check_getgrgid(const char* group_name, gid_t gid, bool check_groupname) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 414 | errno = 0; | 
|  | 415 | group* grp = getgrgid(gid); | 
|  | 416 | ASSERT_EQ(0, errno); | 
|  | 417 | SCOPED_TRACE("getgrgid"); | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 418 | check_group(grp, group_name, gid, check_groupname); | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 419 | } | 
|  | 420 |  | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 421 | static void check_getgrnam(const char* group_name, gid_t gid, bool check_groupname) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 422 | errno = 0; | 
|  | 423 | group* grp = getgrnam(group_name); | 
|  | 424 | ASSERT_EQ(0, errno); | 
|  | 425 | SCOPED_TRACE("getgrnam"); | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 426 | check_group(grp, group_name, gid, check_groupname); | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 427 | } | 
|  | 428 |  | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 429 | static void check_getgrgid_r(const char* group_name, gid_t gid, bool check_groupname) { | 
| Yabin Cui | c4786d3 | 2015-07-20 19:46:26 -0700 | [diff] [blame] | 430 | group grp_storage; | 
|  | 431 | char buf[512]; | 
|  | 432 | group* grp; | 
|  | 433 |  | 
|  | 434 | errno = 0; | 
|  | 435 | int result = getgrgid_r(gid, &grp_storage, buf, sizeof(buf), &grp); | 
|  | 436 | ASSERT_EQ(0, result); | 
|  | 437 | ASSERT_EQ(0, errno); | 
|  | 438 | SCOPED_TRACE("getgrgid_r"); | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 439 | check_group(grp, group_name, gid, check_groupname); | 
| Yabin Cui | c4786d3 | 2015-07-20 19:46:26 -0700 | [diff] [blame] | 440 | } | 
|  | 441 |  | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 442 | static void check_getgrnam_r(const char* group_name, gid_t gid, bool check_groupname) { | 
| Yabin Cui | c4786d3 | 2015-07-20 19:46:26 -0700 | [diff] [blame] | 443 | group grp_storage; | 
|  | 444 | char buf[512]; | 
|  | 445 | group* grp; | 
|  | 446 |  | 
|  | 447 | errno = 0; | 
|  | 448 | int result = getgrnam_r(group_name, &grp_storage, buf, sizeof(buf), &grp); | 
|  | 449 | ASSERT_EQ(0, result); | 
|  | 450 | ASSERT_EQ(0, errno); | 
|  | 451 | SCOPED_TRACE("getgrnam_r"); | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 452 | check_group(grp, group_name, gid, check_groupname); | 
| Yabin Cui | c4786d3 | 2015-07-20 19:46:26 -0700 | [diff] [blame] | 453 | } | 
|  | 454 |  | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 455 | static void check_get_group(const char* group_name, gid_t gid, bool check_groupname = true) { | 
|  | 456 | check_getgrgid(group_name, gid, check_groupname); | 
|  | 457 | check_getgrnam(group_name, gid, check_groupname); | 
|  | 458 | check_getgrgid_r(group_name, gid, check_groupname); | 
|  | 459 | check_getgrnam_r(group_name, gid, check_groupname); | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 460 | } | 
|  | 461 |  | 
|  | 462 | #else // !defined(__BIONIC__) | 
|  | 463 |  | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 464 | static void check_get_group(const char*, gid_t, bool) { | 
| Elliott Hughes | bcaa454 | 2019-03-08 15:20:23 -0800 | [diff] [blame] | 465 | GTEST_SKIP() << "bionic-only test"; | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 466 | } | 
|  | 467 |  | 
| Yabin Cui | c4786d3 | 2015-07-20 19:46:26 -0700 | [diff] [blame] | 468 | static void check_get_group(const char*, gid_t) { | 
| Elliott Hughes | bcaa454 | 2019-03-08 15:20:23 -0800 | [diff] [blame] | 469 | GTEST_SKIP() << "bionic-only test"; | 
| Yabin Cui | c4786d3 | 2015-07-20 19:46:26 -0700 | [diff] [blame] | 470 | } | 
|  | 471 |  | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 472 | #endif | 
|  | 473 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 474 | TEST(grp, getgrnam_system_id_root) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 475 | check_get_group("root", 0); | 
|  | 476 | } | 
|  | 477 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 478 | TEST(grp, getgrnam_system_id_system) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 479 | check_get_group("system", 1000); | 
|  | 480 | } | 
|  | 481 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 482 | TEST(grp, getgrnam_app_id_radio) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 483 | check_get_group("radio", 1001); | 
|  | 484 | } | 
|  | 485 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 486 | TEST(grp, getgrnam_oem_id_5000) { | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 487 | check_get_group("oem_5000", 5000, false); | 
| Jorge Lucangeli Obes | a39e301 | 2015-09-22 11:46:43 -0700 | [diff] [blame] | 488 | } | 
|  | 489 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 490 | TEST(grp, getgrnam_oem_id_5999) { | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 491 | check_get_group("oem_5999", 5999, false); | 
| Mark Salyzyn | 8d387ee | 2016-04-05 09:24:59 -0700 | [diff] [blame] | 492 | } | 
|  | 493 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 494 | TEST(grp, getgrnam_oem_id_2900) { | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 495 | check_get_group("oem_2900", 2900, false); | 
| Mark Salyzyn | 8d387ee | 2016-04-05 09:24:59 -0700 | [diff] [blame] | 496 | } | 
|  | 497 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 498 | TEST(grp, getgrnam_oem_id_2999) { | 
| Tom Cherry | b4c25c8 | 2018-04-04 15:02:55 -0700 | [diff] [blame] | 499 | check_get_group("oem_2999", 2999, false); | 
| Jorge Lucangeli Obes | a39e301 | 2015-09-22 11:46:43 -0700 | [diff] [blame] | 500 | } | 
|  | 501 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 502 | TEST(grp, getgrnam_app_id_nobody) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 503 | check_get_group("nobody", 9999); | 
|  | 504 | } | 
|  | 505 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 506 | TEST(grp, getgrnam_app_id_u0_a0) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 507 | check_get_group("u0_a0", 10000); | 
|  | 508 | } | 
|  | 509 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 510 | TEST(grp, getgrnam_app_id_u0_a1234) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 511 | check_get_group("u0_a1234", 11234); | 
|  | 512 | } | 
|  | 513 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 514 | TEST(grp, getgrnam_app_id_u0_a9999) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 515 | check_get_group("u0_a9999", 19999); | 
|  | 516 | } | 
|  | 517 |  | 
| Jeff Sharkey | 934bc86 | 2016-12-13 14:03:19 -0700 | [diff] [blame] | 518 | TEST(getgrnam, app_id_u0_a0_cache) { | 
|  | 519 | check_get_group("u0_a0_cache", 20000); | 
|  | 520 | } | 
|  | 521 |  | 
|  | 522 | TEST(getgrnam, app_id_u0_a1234_cache) { | 
|  | 523 | check_get_group("u0_a1234_cache", 21234); | 
|  | 524 | } | 
|  | 525 |  | 
|  | 526 | TEST(getgrnam, app_id_u0_a9999_cache) { | 
|  | 527 | check_get_group("u0_a9999_cache", 29999); | 
|  | 528 | } | 
|  | 529 |  | 
|  | 530 | TEST(getgrnam, app_id_u10_a1234_cache) { | 
|  | 531 | check_get_group("u10_a1234_cache", 1021234); | 
|  | 532 | } | 
|  | 533 |  | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 534 | // Test the difference between uid and shared gid. | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 535 | TEST(grp, getgrnam_app_id_all_a9999) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 536 | check_get_group("all_a9999", 59999); | 
|  | 537 | } | 
|  | 538 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 539 | TEST(grp, getgrnam_app_id_u0_i1) { | 
| Martijn Coenen | f9d2299 | 2019-01-16 16:25:40 +0100 | [diff] [blame] | 540 | check_get_group("u0_i1", 90001); | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 541 | } | 
|  | 542 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 543 | TEST(grp, getgrnam_app_id_u1_root) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 544 | check_get_group("u1_root", 100000); | 
|  | 545 | } | 
|  | 546 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 547 | TEST(grp, getgrnam_app_id_u1_radio) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 548 | check_get_group("u1_radio", 101001); | 
|  | 549 | } | 
|  | 550 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 551 | TEST(grp, getgrnam_app_id_u1_a0) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 552 | check_get_group("u1_a0", 110000); | 
|  | 553 | } | 
|  | 554 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 555 | TEST(grp, getgrnam_app_id_u1_a40000) { | 
| Yabin Cui | a04c79b | 2014-11-18 16:14:54 -0800 | [diff] [blame] | 556 | check_get_group("u1_a40000", 150000); | 
|  | 557 | } | 
|  | 558 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 559 | TEST(grp, getgrnam_app_id_u1_i0) { | 
| Martijn Coenen | f9d2299 | 2019-01-16 16:25:40 +0100 | [diff] [blame] | 560 | check_get_group("u1_i0", 190000); | 
| Kenny Root | 2a54e5e | 2012-09-13 10:52:52 -0700 | [diff] [blame] | 561 | } | 
| Yabin Cui | c4786d3 | 2015-07-20 19:46:26 -0700 | [diff] [blame] | 562 |  | 
| Tom Cherry | c57c5bd | 2019-05-14 17:02:28 -0700 | [diff] [blame] | 563 | TEST(grp, getgrnam_r_alignment) { | 
|  | 564 | #if defined(__BIONIC__) | 
|  | 565 | group grp_storage; | 
|  | 566 | alignas(16) char buf[512]; | 
|  | 567 | group* grp; | 
|  | 568 | int result = getgrnam_r("root", &grp_storage, buf + 1, sizeof(buf) - 1, &grp); | 
|  | 569 | ASSERT_EQ(0, result); | 
|  | 570 | check_group(grp, "root", 0); | 
|  | 571 | #else | 
|  | 572 | GTEST_SKIP() << "bionic-only test"; | 
|  | 573 | #endif | 
|  | 574 | } | 
|  | 575 |  | 
|  | 576 | TEST(grp, getgrgid_r_alignment) { | 
|  | 577 | #if defined(__BIONIC__) | 
|  | 578 | group grp_storage; | 
|  | 579 | alignas(16) char buf[512]; | 
|  | 580 | group* grp; | 
|  | 581 | int result = getgrgid_r(0, &grp_storage, buf + 1, sizeof(buf) - 1, &grp); | 
|  | 582 | ASSERT_EQ(0, result); | 
|  | 583 | check_group(grp, "root", 0); | 
|  | 584 | #else | 
|  | 585 | GTEST_SKIP() << "bionic-only test"; | 
|  | 586 | #endif | 
|  | 587 | } | 
|  | 588 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 589 | TEST(grp, getgrnam_r_reentrancy) { | 
| Yabin Cui | c4786d3 | 2015-07-20 19:46:26 -0700 | [diff] [blame] | 590 | #if defined(__BIONIC__) | 
|  | 591 | group grp_storage[2]; | 
|  | 592 | char buf[2][512]; | 
|  | 593 | group* grp[3]; | 
|  | 594 | int result = getgrnam_r("root", &grp_storage[0], buf[0], sizeof(buf[0]), &grp[0]); | 
|  | 595 | ASSERT_EQ(0, result); | 
|  | 596 | check_group(grp[0], "root", 0); | 
|  | 597 | grp[1] = getgrnam("system"); | 
|  | 598 | check_group(grp[1], "system", 1000); | 
|  | 599 | result = getgrnam_r("radio", &grp_storage[1], buf[1], sizeof(buf[1]), &grp[2]); | 
|  | 600 | ASSERT_EQ(0, result); | 
|  | 601 | check_group(grp[2], "radio", 1001); | 
|  | 602 | check_group(grp[0], "root", 0); | 
|  | 603 | check_group(grp[1], "system", 1000); | 
|  | 604 | #else | 
| Elliott Hughes | bcaa454 | 2019-03-08 15:20:23 -0800 | [diff] [blame] | 605 | GTEST_SKIP() << "bionic-only test"; | 
| Yabin Cui | c4786d3 | 2015-07-20 19:46:26 -0700 | [diff] [blame] | 606 | #endif | 
|  | 607 | } | 
|  | 608 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 609 | TEST(grp, getgrgid_r_reentrancy) { | 
| Yabin Cui | c4786d3 | 2015-07-20 19:46:26 -0700 | [diff] [blame] | 610 | #if defined(__BIONIC__) | 
|  | 611 | group grp_storage[2]; | 
|  | 612 | char buf[2][512]; | 
|  | 613 | group* grp[3]; | 
|  | 614 | int result = getgrgid_r(0, &grp_storage[0], buf[0], sizeof(buf[0]), &grp[0]); | 
|  | 615 | ASSERT_EQ(0, result); | 
|  | 616 | check_group(grp[0], "root", 0); | 
|  | 617 | grp[1] = getgrgid(1000); | 
|  | 618 | check_group(grp[1], "system", 1000); | 
|  | 619 | result = getgrgid_r(1001, &grp_storage[1], buf[1], sizeof(buf[1]), &grp[2]); | 
|  | 620 | ASSERT_EQ(0, result); | 
|  | 621 | check_group(grp[2], "radio", 1001); | 
|  | 622 | check_group(grp[0], "root", 0); | 
|  | 623 | check_group(grp[1], "system", 1000); | 
|  | 624 | #else | 
| Elliott Hughes | bcaa454 | 2019-03-08 15:20:23 -0800 | [diff] [blame] | 625 | GTEST_SKIP() << "bionic-only test"; | 
| Yabin Cui | c4786d3 | 2015-07-20 19:46:26 -0700 | [diff] [blame] | 626 | #endif | 
|  | 627 | } | 
|  | 628 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 629 | TEST(grp, getgrnam_r_large_enough_suggested_buffer_size) { | 
| Yabin Cui | c4786d3 | 2015-07-20 19:46:26 -0700 | [diff] [blame] | 630 | long size = sysconf(_SC_GETGR_R_SIZE_MAX); | 
|  | 631 | ASSERT_GT(size, 0); | 
|  | 632 | char buf[size]; | 
|  | 633 | group grp_storage; | 
|  | 634 | group* grp; | 
|  | 635 | ASSERT_EQ(0, getgrnam_r("root", &grp_storage, buf, size, &grp)); | 
|  | 636 | check_group(grp, "root", 0); | 
|  | 637 | } | 
| Mark Salyzyn | 722ab05 | 2016-04-06 10:35:48 -0700 | [diff] [blame] | 638 |  | 
| Elliott Hughes | 5367d1b | 2016-12-12 17:32:14 -0800 | [diff] [blame] | 639 | TEST(grp, getgrent_iterate) { | 
| Josh Gao | 2fe1034 | 2018-02-27 14:05:53 -0800 | [diff] [blame] | 640 | #if defined(__BIONIC__) | 
| Mark Salyzyn | 722ab05 | 2016-04-06 10:35:48 -0700 | [diff] [blame] | 641 | group* grp; | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 642 | std::set<gid_t> gids; | 
| Mark Salyzyn | 722ab05 | 2016-04-06 10:35:48 -0700 | [diff] [blame] | 643 |  | 
|  | 644 | setgrent(); | 
| Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 645 | while ((grp = getgrent()) != nullptr) { | 
|  | 646 | ASSERT_TRUE(grp->gr_name != nullptr) << "grp->gr_gid: " << grp->gr_gid; | 
|  | 647 | ASSERT_TRUE(grp->gr_mem != nullptr) << "grp->gr_gid: " << grp->gr_gid; | 
| Tom Cherry | 2c05c0f | 2017-11-10 10:57:21 -0800 | [diff] [blame] | 648 | EXPECT_STREQ(grp->gr_name, grp->gr_mem[0]) << "grp->gr_gid: " << grp->gr_gid; | 
| Yi Kong | 32bc0fc | 2018-08-02 17:31:13 -0700 | [diff] [blame] | 649 | EXPECT_TRUE(grp->gr_mem[1] == nullptr) << "grp->gr_gid: " << grp->gr_gid; | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 650 |  | 
| Tom Cherry | 4cddb00 | 2018-06-29 10:39:43 -0700 | [diff] [blame] | 651 | // TODO(b/27999086): fix this check with the OEM range | 
|  | 652 | // If OEMs add their own AIDs to private/android_filesystem_config.h, this check will fail. | 
|  | 653 | // Long term we want to create a better solution for OEMs adding AIDs, but we're not there | 
|  | 654 | // yet, so therefore we do not check for gid's in the OEM range. | 
|  | 655 | if (!(grp->gr_gid >= 2900 && grp->gr_gid <= 2999) && | 
|  | 656 | !(grp->gr_gid >= 5000 && grp->gr_gid <= 5999)) { | 
|  | 657 | EXPECT_EQ(0U, gids.count(grp->gr_gid)) << "grp->gr_gid: " << grp->gr_gid; | 
|  | 658 | } | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 659 | gids.emplace(grp->gr_gid); | 
| Mark Salyzyn | 722ab05 | 2016-04-06 10:35:48 -0700 | [diff] [blame] | 660 | } | 
|  | 661 | endgrent(); | 
|  | 662 |  | 
| Tom Cherry | 4362f89 | 2017-11-14 08:50:43 -0800 | [diff] [blame] | 663 | expect_ids(gids); | 
| Josh Gao | 2fe1034 | 2018-02-27 14:05:53 -0800 | [diff] [blame] | 664 | #else | 
| Elliott Hughes | bcaa454 | 2019-03-08 15:20:23 -0800 | [diff] [blame] | 665 | GTEST_SKIP() << "bionic-only test"; | 
| Josh Gao | 2fe1034 | 2018-02-27 14:05:53 -0800 | [diff] [blame] | 666 | #endif | 
| Mark Salyzyn | 722ab05 | 2016-04-06 10:35:48 -0700 | [diff] [blame] | 667 | } | 
| Tom Cherry | e88b408 | 2018-05-24 14:44:10 -0700 | [diff] [blame] | 668 |  | 
|  | 669 | #if defined(__BIONIC__) | 
|  | 670 | static void TestAidNamePrefix(const std::string& file_path) { | 
|  | 671 | std::string file_contents; | 
|  | 672 | if (!ReadFileToString(file_path, &file_contents)) { | 
|  | 673 | // If we cannot read this file, then there are no vendor defind AID names, in which case this | 
|  | 674 | // test passes by default. | 
|  | 675 | return; | 
|  | 676 | } | 
|  | 677 | auto lines = Split(file_contents, "\n"); | 
|  | 678 | for (const auto& line : lines) { | 
|  | 679 | if (line.empty()) continue; | 
|  | 680 | auto name = Split(line, ":")[0]; | 
|  | 681 | EXPECT_TRUE(StartsWith(name, "vendor_")); | 
|  | 682 | } | 
|  | 683 | } | 
|  | 684 | #endif | 
|  | 685 |  | 
|  | 686 | TEST(pwd, vendor_prefix_users) { | 
|  | 687 | #if defined(__BIONIC__) | 
| Chuwei Xu | 5d9312b | 2018-10-23 13:50:04 +0800 | [diff] [blame] | 688 | if (android::base::GetIntProperty("ro.product.first_api_level", 0) <= 28) { | 
|  | 689 | return; | 
|  | 690 | } | 
|  | 691 |  | 
| Tom Cherry | e88b408 | 2018-05-24 14:44:10 -0700 | [diff] [blame] | 692 | TestAidNamePrefix("/vendor/etc/passwd"); | 
|  | 693 | #else | 
| Elliott Hughes | bcaa454 | 2019-03-08 15:20:23 -0800 | [diff] [blame] | 694 | GTEST_SKIP() << "bionic-only test"; | 
| Tom Cherry | e88b408 | 2018-05-24 14:44:10 -0700 | [diff] [blame] | 695 | #endif | 
|  | 696 | } | 
|  | 697 |  | 
|  | 698 | TEST(pwd, vendor_prefix_groups) { | 
|  | 699 | #if defined(__BIONIC__) | 
| Chuwei Xu | 5d9312b | 2018-10-23 13:50:04 +0800 | [diff] [blame] | 700 | if (android::base::GetIntProperty("ro.product.first_api_level", 0) <= 28) { | 
|  | 701 | return; | 
|  | 702 | } | 
|  | 703 |  | 
| Tom Cherry | e88b408 | 2018-05-24 14:44:10 -0700 | [diff] [blame] | 704 | TestAidNamePrefix("/vendor/etc/group"); | 
|  | 705 | #else | 
| Elliott Hughes | bcaa454 | 2019-03-08 15:20:23 -0800 | [diff] [blame] | 706 | GTEST_SKIP() << "bionic-only test"; | 
| Tom Cherry | e88b408 | 2018-05-24 14:44:10 -0700 | [diff] [blame] | 707 | #endif | 
|  | 708 | } |