blob: 61748c871e51da91ed8f6bdcc0ef2581ddce59b7 [file] [log] [blame]
Kenny Root2a54e5e2012-09-13 10:52:52 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
18
Yabin Cuia04c79b2014-11-18 16:14:54 -080019// Below are the header files we want to test.
20#include <grp.h>
Kenny Root2a54e5e2012-09-13 10:52:52 -070021#include <pwd.h>
Yabin Cuia04c79b2014-11-18 16:14:54 -080022
Kenny Root2a54e5e2012-09-13 10:52:52 -070023#include <errno.h>
24#include <limits.h>
Yabin Cuia04c79b2014-11-18 16:14:54 -080025#include <sys/cdefs.h>
26#include <sys/types.h>
Kenny Root2a54e5e2012-09-13 10:52:52 -070027#include <unistd.h>
28
Tom Cherry4362f892017-11-14 08:50:43 -080029#include <set>
30#include <vector>
Mark Salyzyn722ab052016-04-06 10:35:48 -070031
Tom Cherry4362f892017-11-14 08:50:43 -080032#include <android-base/strings.h>
Mark Salyzyn722ab052016-04-06 10:35:48 -070033#include <private/android_filesystem_config.h>
34
Elliott Hughes3f6eee92016-12-13 23:47:25 +000035// Generated android_ids array
36#include "generated_android_ids.h"
37
Tom Cherry4362f892017-11-14 08:50:43 -080038using android::base::Join;
39
Yabin Cuia04c79b2014-11-18 16:14:54 -080040enum uid_type_t {
Kenny Root2a54e5e2012-09-13 10:52:52 -070041 TYPE_SYSTEM,
42 TYPE_APP
Yabin Cuia04c79b2014-11-18 16:14:54 -080043};
Kenny Root2a54e5e2012-09-13 10:52:52 -070044
Yabin Cuia04c79b2014-11-18 16:14:54 -080045#if defined(__BIONIC__)
46
47static void check_passwd(const passwd* pwd, const char* username, uid_t uid, uid_type_t uid_type) {
Kenny Root2a54e5e2012-09-13 10:52:52 -070048 ASSERT_TRUE(pwd != NULL);
Tom Cherry2c05c0f2017-11-10 10:57:21 -080049 EXPECT_STREQ(username, pwd->pw_name);
50 EXPECT_EQ(uid, pwd->pw_uid);
51 EXPECT_EQ(uid, pwd->pw_gid);
52 EXPECT_EQ(NULL, pwd->pw_passwd);
Calin Juravlec7688742014-05-09 21:50:53 +010053#ifdef __LP64__
Tom Cherry2c05c0f2017-11-10 10:57:21 -080054 EXPECT_EQ(NULL, pwd->pw_gecos);
Calin Juravlec7688742014-05-09 21:50:53 +010055#endif
Kenny Root2a54e5e2012-09-13 10:52:52 -070056
57 if (uid_type == TYPE_SYSTEM) {
Tom Cherry2c05c0f2017-11-10 10:57:21 -080058 EXPECT_STREQ("/", pwd->pw_dir);
Yabin Cuia04c79b2014-11-18 16:14:54 -080059 } else {
Tom Cherry2c05c0f2017-11-10 10:57:21 -080060 EXPECT_STREQ("/data", pwd->pw_dir);
Kenny Root2a54e5e2012-09-13 10:52:52 -070061 }
Tom Cherry2c05c0f2017-11-10 10:57:21 -080062 EXPECT_STREQ("/system/bin/sh", pwd->pw_shell);
Kenny Root2a54e5e2012-09-13 10:52:52 -070063}
Yabin Cuia04c79b2014-11-18 16:14:54 -080064
65static void check_getpwuid(const char* username, uid_t uid, uid_type_t uid_type) {
66 errno = 0;
67 passwd* pwd = getpwuid(uid);
68 ASSERT_EQ(0, errno);
69 SCOPED_TRACE("getpwuid");
70 check_passwd(pwd, username, uid, uid_type);
71}
72
73static void check_getpwnam(const char* username, uid_t uid, uid_type_t uid_type) {
74 errno = 0;
75 passwd* pwd = getpwnam(username);
76 ASSERT_EQ(0, errno);
77 SCOPED_TRACE("getpwnam");
78 check_passwd(pwd, username, uid, uid_type);
79}
80
81static void check_getpwuid_r(const char* username, uid_t uid, uid_type_t uid_type) {
82 passwd pwd_storage;
83 char buf[512];
84 int result;
85
86 errno = 0;
87 passwd* pwd = NULL;
88 result = getpwuid_r(uid, &pwd_storage, buf, sizeof(buf), &pwd);
89 ASSERT_EQ(0, result);
90 ASSERT_EQ(0, errno);
91 SCOPED_TRACE("getpwuid_r");
92 check_passwd(pwd, username, uid, uid_type);
93}
94
95static void check_getpwnam_r(const char* username, uid_t uid, uid_type_t uid_type) {
96 passwd pwd_storage;
97 char buf[512];
98 int result;
99
100 errno = 0;
101 passwd* pwd = NULL;
102 result = getpwnam_r(username, &pwd_storage, buf, sizeof(buf), &pwd);
103 ASSERT_EQ(0, result);
104 ASSERT_EQ(0, errno);
105 SCOPED_TRACE("getpwnam_r");
106 check_passwd(pwd, username, uid, uid_type);
107}
108
109static void check_get_passwd(const char* username, uid_t uid, uid_type_t uid_type) {
110 check_getpwuid(username, uid, uid_type);
111 check_getpwnam(username, uid, uid_type);
112 check_getpwuid_r(username, uid, uid_type);
113 check_getpwnam_r(username, uid, uid_type);
114}
115
116#else // !defined(__BIONIC__)
117
118static void check_get_passwd(const char* /* username */, uid_t /* uid */, uid_type_t /* uid_type */) {
119 GTEST_LOG_(INFO) << "This test is about uid/username translation for Android, which does nothing on libc other than bionic.\n";
120}
121
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800122#endif
Kenny Root2a54e5e2012-09-13 10:52:52 -0700123
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800124TEST(pwd, getpwnam_system_id_root) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800125 check_get_passwd("root", 0, TYPE_SYSTEM);
Kenny Root2a54e5e2012-09-13 10:52:52 -0700126}
127
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800128TEST(pwd, getpwnam_system_id_system) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800129 check_get_passwd("system", 1000, TYPE_SYSTEM);
Kenny Root2a54e5e2012-09-13 10:52:52 -0700130}
131
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800132TEST(pwd, getpwnam_app_id_radio) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800133 check_get_passwd("radio", 1001, TYPE_SYSTEM);
Kenny Root2a54e5e2012-09-13 10:52:52 -0700134}
135
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800136TEST(pwd, getpwnam_oem_id_5000) {
Mark Salyzyn8d387ee2016-04-05 09:24:59 -0700137 check_get_passwd("oem_5000", 5000, TYPE_SYSTEM);
Jorge Lucangeli Obesa39e3012015-09-22 11:46:43 -0700138}
139
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800140TEST(pwd, getpwnam_oem_id_5999) {
Mark Salyzyn8d387ee2016-04-05 09:24:59 -0700141 check_get_passwd("oem_5999", 5999, TYPE_SYSTEM);
142}
143
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800144TEST(pwd, getpwnam_oem_id_2900) {
Mark Salyzyn8d387ee2016-04-05 09:24:59 -0700145 check_get_passwd("oem_2900", 2900, TYPE_SYSTEM);
146}
147
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800148TEST(pwd, getpwnam_oem_id_2999) {
Mark Salyzyn8d387ee2016-04-05 09:24:59 -0700149 check_get_passwd("oem_2999", 2999, TYPE_SYSTEM);
Jorge Lucangeli Obesa39e3012015-09-22 11:46:43 -0700150}
151
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800152TEST(pwd, getpwnam_app_id_nobody) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800153 check_get_passwd("nobody", 9999, TYPE_SYSTEM);
Kenny Root8a05a012012-09-13 14:31:50 -0700154}
155
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800156TEST(pwd, getpwnam_app_id_u0_a0) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800157 check_get_passwd("u0_a0", 10000, TYPE_APP);
Kenny Root2a54e5e2012-09-13 10:52:52 -0700158}
159
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800160TEST(pwd, getpwnam_app_id_u0_a1234) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800161 check_get_passwd("u0_a1234", 11234, TYPE_APP);
Kenny Root2a54e5e2012-09-13 10:52:52 -0700162}
163
Yabin Cuia04c79b2014-11-18 16:14:54 -0800164// Test the difference between uid and shared gid.
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800165TEST(pwd, getpwnam_app_id_u0_a49999) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800166 check_get_passwd("u0_a49999", 59999, TYPE_APP);
Kenny Root2a54e5e2012-09-13 10:52:52 -0700167}
168
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800169TEST(pwd, getpwnam_app_id_u0_i1) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800170 check_get_passwd("u0_i1", 99001, TYPE_APP);
171}
172
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800173TEST(pwd, getpwnam_app_id_u1_root) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800174 check_get_passwd("u1_root", 100000, TYPE_SYSTEM);
Kenny Root2a54e5e2012-09-13 10:52:52 -0700175}
176
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800177TEST(pwd, getpwnam_app_id_u1_radio) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800178 check_get_passwd("u1_radio", 101001, TYPE_SYSTEM);
Kenny Root2a54e5e2012-09-13 10:52:52 -0700179}
180
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800181TEST(pwd, getpwnam_app_id_u1_a0) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800182 check_get_passwd("u1_a0", 110000, TYPE_APP);
183}
184
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800185TEST(pwd, getpwnam_app_id_u1_a40000) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800186 check_get_passwd("u1_a40000", 150000, TYPE_APP);
Kenny Root2a54e5e2012-09-13 10:52:52 -0700187}
188
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800189TEST(pwd, getpwnam_app_id_u1_i0) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800190 check_get_passwd("u1_i0", 199000, TYPE_APP);
191}
192
Tom Cherry4362f892017-11-14 08:50:43 -0800193template <typename T>
194static void expect_ids(const T& ids) {
195 std::set<typename T::key_type> expected_ids;
196 // Ensure that all android_ids are iterated through.
197 for (size_t n = 0; n < android_id_count; ++n) {
198 EXPECT_EQ(1U, ids.count(android_ids[n].aid)) << "android_ids[n].aid: " << android_ids[n].aid;
199 expected_ids.emplace(android_ids[n].aid);
200 }
201
202 auto expect_range = [&ids, &expected_ids](uid_t start, uid_t end) {
203 for (size_t n = start; n <= end; ++n) {
204 EXPECT_EQ(1U, ids.count(n)) << "n: " << n;
205 expected_ids.emplace(n);
206 }
207 };
208
209 // Ensure that all reserved ranges are iterated through.
210 expect_range(AID_OEM_RESERVED_START, AID_OEM_RESERVED_END);
211 expect_range(AID_OEM_RESERVED_2_START, AID_OEM_RESERVED_2_END);
212 expect_range(AID_APP_START, AID_APP_END);
213 expect_range(AID_CACHE_GID_START, AID_CACHE_GID_END);
214 expect_range(AID_EXT_GID_START, AID_EXT_GID_END);
215 expect_range(AID_EXT_CACHE_GID_START, AID_EXT_CACHE_GID_END);
216 expect_range(AID_SHARED_GID_START, AID_SHARED_GID_END);
217 expect_range(AID_ISOLATED_START, AID_ISOLATED_END);
218
219 // Ensure that no other ids were returned.
220 auto return_differences = [&ids, &expected_ids] {
221 std::vector<typename T::key_type> missing_from_ids;
222 std::set_difference(expected_ids.begin(), expected_ids.end(), ids.begin(), ids.end(),
223 std::inserter(missing_from_ids, missing_from_ids.begin()));
224 std::vector<typename T::key_type> extra_in_ids;
225 std::set_difference(ids.begin(), ids.end(), expected_ids.begin(), expected_ids.end(),
226 std::inserter(extra_in_ids, extra_in_ids.begin()));
227 std::string result;
228 if (!missing_from_ids.empty()) {
229 result += "Missing ids from results: " + Join(missing_from_ids, " ");
230 }
231 if (!extra_in_ids.empty()) {
232 if (!result.empty()) result += ", ";
233 result += "Extra ids in results: " + Join(extra_in_ids, " ");
234 }
235 return result;
236 };
237 EXPECT_EQ(expected_ids, ids) << return_differences();
238}
239
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800240TEST(pwd, getpwent_iterate) {
Mark Salyzyn722ab052016-04-06 10:35:48 -0700241 passwd* pwd;
Tom Cherry4362f892017-11-14 08:50:43 -0800242 std::set<uid_t> uids;
Mark Salyzyn722ab052016-04-06 10:35:48 -0700243
244 setpwent();
245 while ((pwd = getpwent()) != NULL) {
246 ASSERT_TRUE(NULL != pwd->pw_name);
Tom Cherry4362f892017-11-14 08:50:43 -0800247
Tom Cherry2c05c0f2017-11-10 10:57:21 -0800248 EXPECT_EQ(pwd->pw_gid, pwd->pw_uid) << "pwd->pw_uid: " << pwd->pw_uid;
249 EXPECT_EQ(NULL, pwd->pw_passwd) << "pwd->pw_uid: " << pwd->pw_uid;
Mark Salyzyn722ab052016-04-06 10:35:48 -0700250#ifdef __LP64__
Tom Cherry2c05c0f2017-11-10 10:57:21 -0800251 EXPECT_TRUE(NULL == pwd->pw_gecos) << "pwd->pw_uid: " << pwd->pw_uid;
Mark Salyzyn722ab052016-04-06 10:35:48 -0700252#endif
Tom Cherry2c05c0f2017-11-10 10:57:21 -0800253 EXPECT_TRUE(NULL != pwd->pw_shell);
Tom Cherry4362f892017-11-14 08:50:43 -0800254 if (pwd->pw_uid < AID_APP_START || pwd->pw_uid == AID_OVERFLOWUID) {
Tom Cherry2c05c0f2017-11-10 10:57:21 -0800255 EXPECT_STREQ("/", pwd->pw_dir) << "pwd->pw_uid: " << pwd->pw_uid;
Tom Cherry4362f892017-11-14 08:50:43 -0800256 } else {
257 EXPECT_STREQ("/data", pwd->pw_dir) << "pwd->pw_uid: " << pwd->pw_uid;
Mark Salyzyn722ab052016-04-06 10:35:48 -0700258 }
Tom Cherry4362f892017-11-14 08:50:43 -0800259
260 // TODO(b/27999086): fix this check with the OEM range
261 // If OEMs add their own AIDs to private/android_filesystem_config.h, this check will fail.
262 // Long term we want to create a better solution for OEMs adding AIDs, but we're not there
263 // yet, so therefore we do not check for uid's in the OEM range.
264 if (!(pwd->pw_uid >= 2900 && pwd->pw_uid <= 2999) &&
265 !(pwd->pw_uid >= 5000 && pwd->pw_uid <= 5999)) {
266 EXPECT_EQ(0U, uids.count(pwd->pw_uid)) << "pwd->pw_uid: " << pwd->pw_uid;
267 }
268 uids.emplace(pwd->pw_uid);
Mark Salyzyn722ab052016-04-06 10:35:48 -0700269 }
270 endpwent();
271
Tom Cherry4362f892017-11-14 08:50:43 -0800272 expect_ids(uids);
Mark Salyzyn722ab052016-04-06 10:35:48 -0700273}
274
Yabin Cuia04c79b2014-11-18 16:14:54 -0800275static void check_group(const group* grp, const char* group_name, gid_t gid) {
276 ASSERT_TRUE(grp != NULL);
Tom Cherry2c05c0f2017-11-10 10:57:21 -0800277 EXPECT_STREQ(group_name, grp->gr_name);
278 EXPECT_EQ(gid, grp->gr_gid);
Yabin Cuia04c79b2014-11-18 16:14:54 -0800279 ASSERT_TRUE(grp->gr_mem != NULL);
Tom Cherry2c05c0f2017-11-10 10:57:21 -0800280 EXPECT_STREQ(group_name, grp->gr_mem[0]);
281 EXPECT_TRUE(grp->gr_mem[1] == NULL);
Yabin Cuia04c79b2014-11-18 16:14:54 -0800282}
283
Yabin Cuic4786d32015-07-20 19:46:26 -0700284#if defined(__BIONIC__)
285
Yabin Cuia04c79b2014-11-18 16:14:54 -0800286static void check_getgrgid(const char* group_name, gid_t gid) {
287 errno = 0;
288 group* grp = getgrgid(gid);
289 ASSERT_EQ(0, errno);
290 SCOPED_TRACE("getgrgid");
291 check_group(grp, group_name, gid);
292}
293
294static void check_getgrnam(const char* group_name, gid_t gid) {
295 errno = 0;
296 group* grp = getgrnam(group_name);
297 ASSERT_EQ(0, errno);
298 SCOPED_TRACE("getgrnam");
299 check_group(grp, group_name, gid);
300}
301
Yabin Cuic4786d32015-07-20 19:46:26 -0700302static void check_getgrgid_r(const char* group_name, gid_t gid) {
303 group grp_storage;
304 char buf[512];
305 group* grp;
306
307 errno = 0;
308 int result = getgrgid_r(gid, &grp_storage, buf, sizeof(buf), &grp);
309 ASSERT_EQ(0, result);
310 ASSERT_EQ(0, errno);
311 SCOPED_TRACE("getgrgid_r");
312 check_group(grp, group_name, gid);
313}
314
315static void check_getgrnam_r(const char* group_name, gid_t gid) {
316 group grp_storage;
317 char buf[512];
318 group* grp;
319
320 errno = 0;
321 int result = getgrnam_r(group_name, &grp_storage, buf, sizeof(buf), &grp);
322 ASSERT_EQ(0, result);
323 ASSERT_EQ(0, errno);
324 SCOPED_TRACE("getgrnam_r");
325 check_group(grp, group_name, gid);
326}
327
Yabin Cuia04c79b2014-11-18 16:14:54 -0800328static void check_get_group(const char* group_name, gid_t gid) {
329 check_getgrgid(group_name, gid);
330 check_getgrnam(group_name, gid);
Yabin Cuic4786d32015-07-20 19:46:26 -0700331 check_getgrgid_r(group_name, gid);
332 check_getgrnam_r(group_name, gid);
Yabin Cuia04c79b2014-11-18 16:14:54 -0800333}
334
335#else // !defined(__BIONIC__)
336
Yabin Cuic4786d32015-07-20 19:46:26 -0700337static void print_no_getgrnam_test_info() {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800338 GTEST_LOG_(INFO) << "This test is about gid/group_name translation for Android, which does nothing on libc other than bionic.\n";
339}
340
Yabin Cuic4786d32015-07-20 19:46:26 -0700341static void check_get_group(const char*, gid_t) {
342 print_no_getgrnam_test_info();
343}
344
Yabin Cuia04c79b2014-11-18 16:14:54 -0800345#endif
346
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800347TEST(grp, getgrnam_system_id_root) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800348 check_get_group("root", 0);
349}
350
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800351TEST(grp, getgrnam_system_id_system) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800352 check_get_group("system", 1000);
353}
354
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800355TEST(grp, getgrnam_app_id_radio) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800356 check_get_group("radio", 1001);
357}
358
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800359TEST(grp, getgrnam_oem_id_5000) {
Mark Salyzyn8d387ee2016-04-05 09:24:59 -0700360 check_get_group("oem_5000", 5000);
Jorge Lucangeli Obesa39e3012015-09-22 11:46:43 -0700361}
362
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800363TEST(grp, getgrnam_oem_id_5999) {
Mark Salyzyn8d387ee2016-04-05 09:24:59 -0700364 check_get_group("oem_5999", 5999);
365}
366
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800367TEST(grp, getgrnam_oem_id_2900) {
Mark Salyzyn8d387ee2016-04-05 09:24:59 -0700368 check_get_group("oem_2900", 2900);
369}
370
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800371TEST(grp, getgrnam_oem_id_2999) {
Mark Salyzyn8d387ee2016-04-05 09:24:59 -0700372 check_get_group("oem_2999", 2999);
Jorge Lucangeli Obesa39e3012015-09-22 11:46:43 -0700373}
374
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800375TEST(grp, getgrnam_app_id_nobody) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800376 check_get_group("nobody", 9999);
377}
378
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800379TEST(grp, getgrnam_app_id_u0_a0) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800380 check_get_group("u0_a0", 10000);
381}
382
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800383TEST(grp, getgrnam_app_id_u0_a1234) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800384 check_get_group("u0_a1234", 11234);
385}
386
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800387TEST(grp, getgrnam_app_id_u0_a9999) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800388 check_get_group("u0_a9999", 19999);
389}
390
Jeff Sharkey934bc862016-12-13 14:03:19 -0700391TEST(getgrnam, app_id_u0_a0_cache) {
392 check_get_group("u0_a0_cache", 20000);
393}
394
395TEST(getgrnam, app_id_u0_a1234_cache) {
396 check_get_group("u0_a1234_cache", 21234);
397}
398
399TEST(getgrnam, app_id_u0_a9999_cache) {
400 check_get_group("u0_a9999_cache", 29999);
401}
402
403TEST(getgrnam, app_id_u10_a1234_cache) {
404 check_get_group("u10_a1234_cache", 1021234);
405}
406
Yabin Cuia04c79b2014-11-18 16:14:54 -0800407// Test the difference between uid and shared gid.
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800408TEST(grp, getgrnam_app_id_all_a9999) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800409 check_get_group("all_a9999", 59999);
410}
411
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800412TEST(grp, getgrnam_app_id_u0_i1) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800413 check_get_group("u0_i1", 99001);
414}
415
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800416TEST(grp, getgrnam_app_id_u1_root) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800417 check_get_group("u1_root", 100000);
418}
419
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800420TEST(grp, getgrnam_app_id_u1_radio) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800421 check_get_group("u1_radio", 101001);
422}
423
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800424TEST(grp, getgrnam_app_id_u1_a0) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800425 check_get_group("u1_a0", 110000);
426}
427
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800428TEST(grp, getgrnam_app_id_u1_a40000) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800429 check_get_group("u1_a40000", 150000);
430}
431
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800432TEST(grp, getgrnam_app_id_u1_i0) {
Yabin Cuia04c79b2014-11-18 16:14:54 -0800433 check_get_group("u1_i0", 199000);
Kenny Root2a54e5e2012-09-13 10:52:52 -0700434}
Yabin Cuic4786d32015-07-20 19:46:26 -0700435
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800436TEST(grp, getgrnam_r_reentrancy) {
Yabin Cuic4786d32015-07-20 19:46:26 -0700437#if defined(__BIONIC__)
438 group grp_storage[2];
439 char buf[2][512];
440 group* grp[3];
441 int result = getgrnam_r("root", &grp_storage[0], buf[0], sizeof(buf[0]), &grp[0]);
442 ASSERT_EQ(0, result);
443 check_group(grp[0], "root", 0);
444 grp[1] = getgrnam("system");
445 check_group(grp[1], "system", 1000);
446 result = getgrnam_r("radio", &grp_storage[1], buf[1], sizeof(buf[1]), &grp[2]);
447 ASSERT_EQ(0, result);
448 check_group(grp[2], "radio", 1001);
449 check_group(grp[0], "root", 0);
450 check_group(grp[1], "system", 1000);
451#else
452 print_no_getgrnam_test_info();
453#endif
454}
455
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800456TEST(grp, getgrgid_r_reentrancy) {
Yabin Cuic4786d32015-07-20 19:46:26 -0700457#if defined(__BIONIC__)
458 group grp_storage[2];
459 char buf[2][512];
460 group* grp[3];
461 int result = getgrgid_r(0, &grp_storage[0], buf[0], sizeof(buf[0]), &grp[0]);
462 ASSERT_EQ(0, result);
463 check_group(grp[0], "root", 0);
464 grp[1] = getgrgid(1000);
465 check_group(grp[1], "system", 1000);
466 result = getgrgid_r(1001, &grp_storage[1], buf[1], sizeof(buf[1]), &grp[2]);
467 ASSERT_EQ(0, result);
468 check_group(grp[2], "radio", 1001);
469 check_group(grp[0], "root", 0);
470 check_group(grp[1], "system", 1000);
471#else
472 print_no_getgrnam_test_info();
473#endif
474}
475
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800476TEST(grp, getgrnam_r_large_enough_suggested_buffer_size) {
Yabin Cuic4786d32015-07-20 19:46:26 -0700477 long size = sysconf(_SC_GETGR_R_SIZE_MAX);
478 ASSERT_GT(size, 0);
479 char buf[size];
480 group grp_storage;
481 group* grp;
482 ASSERT_EQ(0, getgrnam_r("root", &grp_storage, buf, size, &grp));
483 check_group(grp, "root", 0);
484}
Mark Salyzyn722ab052016-04-06 10:35:48 -0700485
Elliott Hughes5367d1b2016-12-12 17:32:14 -0800486TEST(grp, getgrent_iterate) {
Mark Salyzyn722ab052016-04-06 10:35:48 -0700487 group* grp;
Tom Cherry4362f892017-11-14 08:50:43 -0800488 std::set<gid_t> gids;
Mark Salyzyn722ab052016-04-06 10:35:48 -0700489
490 setgrent();
491 while ((grp = getgrent()) != NULL) {
Tom Cherry2c05c0f2017-11-10 10:57:21 -0800492 ASSERT_TRUE(grp->gr_name != NULL) << "grp->gr_gid: " << grp->gr_gid;
493 ASSERT_TRUE(grp->gr_mem != NULL) << "grp->gr_gid: " << grp->gr_gid;
494 EXPECT_STREQ(grp->gr_name, grp->gr_mem[0]) << "grp->gr_gid: " << grp->gr_gid;
495 EXPECT_TRUE(grp->gr_mem[1] == NULL) << "grp->gr_gid: " << grp->gr_gid;
Tom Cherry4362f892017-11-14 08:50:43 -0800496
497 // TODO(b/27999086): fix this check with the OEM range
498 // If OEMs add their own AIDs to private/android_filesystem_config.h, this check will fail.
499 // Long term we want to create a better solution for OEMs adding AIDs, but we're not there
500 // yet, so therefore we do not check for gid's in the OEM range.
501 if (!(grp->gr_gid >= 2900 && grp->gr_gid <= 2999) &&
502 !(grp->gr_gid >= 5000 && grp->gr_gid <= 5999)) {
503 EXPECT_EQ(0U, gids.count(grp->gr_gid)) << "grp->gr_gid: " << grp->gr_gid;
Mark Salyzyn722ab052016-04-06 10:35:48 -0700504 }
Tom Cherry4362f892017-11-14 08:50:43 -0800505 gids.emplace(grp->gr_gid);
Mark Salyzyn722ab052016-04-06 10:35:48 -0700506 }
507 endgrent();
508
Tom Cherry4362f892017-11-14 08:50:43 -0800509 expect_ids(gids);
Mark Salyzyn722ab052016-04-06 10:35:48 -0700510}