blob: 88f5851c193c9669f6f8548d5c79a588124dbb74 [file] [log] [blame]
Elliott Hughesa55f6302013-01-02 14:23:43 -08001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
Elliott Hughes33697a02016-01-26 13:04:57 -080018
Elliott Hughes71ba5892018-02-07 12:44:45 -080019#include "SignalUtils.h"
Elliott Hughes33697a02016-01-26 13:04:57 -080020#include "utils.h"
Elliott Hughesa55f6302013-01-02 14:23:43 -080021
Elliott Hughes915fefb2014-02-18 12:34:51 -080022#include <errno.h>
Colin Cross3d19a832014-02-14 18:56:23 -080023#include <fcntl.h>
Elliott Hughes3c115902016-08-24 19:27:04 -070024#include <libgen.h>
Elliott Hughes21972b62014-07-28 12:24:22 -070025#include <limits.h>
Elliott Hughes428f5562013-02-05 16:10:59 -080026#include <stdint.h>
Greg Hackmanne2faf072016-03-03 08:37:53 -080027#include <sys/capability.h>
Yabin Cuib5e581a2014-11-08 14:58:12 -080028#include <sys/param.h>
Elliott Hughesdb602e82019-11-15 09:04:27 -080029#include <sys/resource.h>
Elliott Hughes7086ad62014-06-19 16:39:01 -070030#include <sys/syscall.h>
Elliott Hughes764a9932014-04-08 19:44:36 -070031#include <sys/types.h>
Derek Xued94e7f02014-09-25 11:12:01 +010032#include <sys/utsname.h>
Elliott Hughes764a9932014-04-08 19:44:36 -070033#include <sys/wait.h>
Yabin Cui9df70402014-11-05 18:01:01 -080034#include <unistd.h>
35
Elliott Hughesca3f8e42019-10-28 15:59:38 -070036#include <chrono>
37
Elliott Hughes939a7e02015-12-04 15:27:46 -080038#include <android-base/file.h>
Elliott Hughes141b9172021-04-09 17:13:09 -070039#include <android-base/silent_death_test.h>
Elliott Hughes939a7e02015-12-04 15:27:46 -080040#include <android-base/strings.h>
Yabin Cuicb6f5992015-09-29 16:11:45 -070041
42#include "private/get_cpu_count_from_string.h"
43
Josh Gao23032832020-05-07 17:02:19 -070044#if defined(__BIONIC__)
45#include "bionic/pthread_internal.h"
46#endif
47
Christopher Ferris13f26a72016-01-13 13:47:58 -080048#if defined(NOFORTIFY)
49#define UNISTD_TEST unistd_nofortify
50#define UNISTD_DEATHTEST unistd_nofortify_DeathTest
51#else
52#define UNISTD_TEST unistd
53#define UNISTD_DEATHTEST unistd_DeathTest
54#endif
55
Elliott Hughes141b9172021-04-09 17:13:09 -070056using UNISTD_DEATHTEST = SilentDeathTest;
57
Elliott Hughesca3f8e42019-10-28 15:59:38 -070058using namespace std::chrono_literals;
59
Elliott Hughes533dde42014-04-25 18:27:38 -070060static void* get_brk() {
61 return sbrk(0);
62}
Elliott Hughes428f5562013-02-05 16:10:59 -080063
Elliott Hughes533dde42014-04-25 18:27:38 -070064static void* page_align(uintptr_t addr) {
65 uintptr_t mask = sysconf(_SC_PAGE_SIZE) - 1;
66 return reinterpret_cast<void*>((addr + mask) & ~mask);
67}
68
Christopher Ferris13f26a72016-01-13 13:47:58 -080069TEST(UNISTD_TEST, brk) {
Elliott Hughes533dde42014-04-25 18:27:38 -070070 void* initial_break = get_brk();
71
Elliott Hughes533dde42014-04-25 18:27:38 -070072 void* new_break = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(initial_break) + 1);
Daniel Micay126ab122015-12-31 08:04:53 -050073 int ret = brk(new_break);
74 if (ret == -1) {
Elliott Hughes95646e62023-09-21 14:11:19 -070075 ASSERT_ERRNO(ENOMEM);
Daniel Micay126ab122015-12-31 08:04:53 -050076 } else {
77 ASSERT_EQ(0, ret);
78 ASSERT_GE(get_brk(), new_break);
79 }
Elliott Hughes428f5562013-02-05 16:10:59 -080080
Daniel Micay126ab122015-12-31 08:04:53 -050081 // Expand by a full page to force the mapping to expand
Elliott Hughes533dde42014-04-25 18:27:38 -070082 new_break = page_align(reinterpret_cast<uintptr_t>(initial_break) + sysconf(_SC_PAGE_SIZE));
Daniel Micay126ab122015-12-31 08:04:53 -050083 ret = brk(new_break);
84 if (ret == -1) {
Elliott Hughes95646e62023-09-21 14:11:19 -070085 ASSERT_ERRNO(ENOMEM);
Daniel Micay126ab122015-12-31 08:04:53 -050086 } else {
87 ASSERT_EQ(0, ret);
88 ASSERT_EQ(get_brk(), new_break);
89 }
Elliott Hughes533dde42014-04-25 18:27:38 -070090}
91
Christopher Ferris13f26a72016-01-13 13:47:58 -080092TEST(UNISTD_TEST, brk_ENOMEM) {
Elliott Hughes533dde42014-04-25 18:27:38 -070093 ASSERT_EQ(-1, brk(reinterpret_cast<void*>(-1)));
Elliott Hughes95646e62023-09-21 14:11:19 -070094 ASSERT_ERRNO(ENOMEM);
Elliott Hughes533dde42014-04-25 18:27:38 -070095}
96
Christopher Ferris738b0cc2014-05-21 19:03:34 -070097#if defined(__GLIBC__)
98#define SBRK_MIN INTPTR_MIN
99#define SBRK_MAX INTPTR_MAX
100#else
101#define SBRK_MIN PTRDIFF_MIN
102#define SBRK_MAX PTRDIFF_MAX
103#endif
104
Christopher Ferris13f26a72016-01-13 13:47:58 -0800105TEST(UNISTD_TEST, sbrk_ENOMEM) {
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700106#if defined(__BIONIC__) && !defined(__LP64__)
107 // There is no way to guarantee that all overflow conditions can be tested
108 // without manipulating the underlying values of the current break.
109 extern void* __bionic_brk;
110
111 class ScopedBrk {
112 public:
113 ScopedBrk() : saved_brk_(__bionic_brk) {}
114 virtual ~ScopedBrk() { __bionic_brk = saved_brk_; }
115
116 private:
117 void* saved_brk_;
118 };
119
120 ScopedBrk scope_brk;
121
122 // Set the current break to a point that will cause an overflow.
123 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) + 2);
Elliott Hughes533dde42014-04-25 18:27:38 -0700124
125 // Can't increase by so much that we'd overflow.
126 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MAX));
Elliott Hughes95646e62023-09-21 14:11:19 -0700127 ASSERT_ERRNO(ENOMEM);
Elliott Hughes533dde42014-04-25 18:27:38 -0700128
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700129 // Set the current break to a point that will cause an overflow.
130 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX));
Elliott Hughes533dde42014-04-25 18:27:38 -0700131
Elliott Hughes533dde42014-04-25 18:27:38 -0700132 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN));
Elliott Hughes95646e62023-09-21 14:11:19 -0700133 ASSERT_ERRNO(ENOMEM);
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700134
135 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) - 1);
136
137 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN + 1));
Elliott Hughes95646e62023-09-21 14:11:19 -0700138 ASSERT_ERRNO(ENOMEM);
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700139#else
140 class ScopedBrk {
141 public:
142 ScopedBrk() : saved_brk_(get_brk()) {}
143 virtual ~ScopedBrk() { brk(saved_brk_); }
144
145 private:
146 void* saved_brk_;
147 };
148
149 ScopedBrk scope_brk;
150
151 uintptr_t cur_brk = reinterpret_cast<uintptr_t>(get_brk());
152 if (cur_brk < static_cast<uintptr_t>(-(SBRK_MIN+1))) {
153 // Do the overflow test for a max negative increment.
154 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MIN));
155#if defined(__BIONIC__)
156 // GLIBC does not set errno in overflow case.
Elliott Hughes95646e62023-09-21 14:11:19 -0700157 ASSERT_ERRNO(ENOMEM);
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700158#endif
159 }
160
161 uintptr_t overflow_brk = static_cast<uintptr_t>(SBRK_MAX) + 2;
162 if (cur_brk < overflow_brk) {
163 // Try and move the value to PTRDIFF_MAX + 2.
164 cur_brk = reinterpret_cast<uintptr_t>(sbrk(overflow_brk));
165 }
166 if (cur_brk >= overflow_brk) {
167 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MAX));
168#if defined(__BIONIC__)
169 // GLIBC does not set errno in overflow case.
Elliott Hughes95646e62023-09-21 14:11:19 -0700170 ASSERT_ERRNO(ENOMEM);
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700171#endif
172 }
Elliott Hughes533dde42014-04-25 18:27:38 -0700173#endif
Elliott Hughes428f5562013-02-05 16:10:59 -0800174}
Elliott Hughesb4f76162013-09-19 16:27:24 -0700175
Christopher Ferris13f26a72016-01-13 13:47:58 -0800176TEST(UNISTD_TEST, truncate) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700177 TemporaryFile tf;
178 ASSERT_EQ(0, close(tf.fd));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800179 ASSERT_EQ(0, truncate(tf.path, 123));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700180
181 struct stat sb;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800182 ASSERT_EQ(0, stat(tf.path, &sb));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700183 ASSERT_EQ(123, sb.st_size);
184}
185
Colin Cross7da20342021-07-28 11:18:11 -0700186TEST(UNISTD_TEST, truncate64_smoke) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700187 TemporaryFile tf;
188 ASSERT_EQ(0, close(tf.fd));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800189 ASSERT_EQ(0, truncate64(tf.path, 123));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700190
191 struct stat sb;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800192 ASSERT_EQ(0, stat(tf.path, &sb));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700193 ASSERT_EQ(123, sb.st_size);
194}
195
Christopher Ferris13f26a72016-01-13 13:47:58 -0800196TEST(UNISTD_TEST, ftruncate) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700197 TemporaryFile tf;
198 ASSERT_EQ(0, ftruncate(tf.fd, 123));
199 ASSERT_EQ(0, close(tf.fd));
200
201 struct stat sb;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800202 ASSERT_EQ(0, stat(tf.path, &sb));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700203 ASSERT_EQ(123, sb.st_size);
204}
205
Colin Cross7da20342021-07-28 11:18:11 -0700206TEST(UNISTD_TEST, ftruncate64_smoke) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700207 TemporaryFile tf;
208 ASSERT_EQ(0, ftruncate64(tf.fd, 123));
209 ASSERT_EQ(0, close(tf.fd));
210
211 struct stat sb;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800212 ASSERT_EQ(0, stat(tf.path, &sb));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700213 ASSERT_EQ(123, sb.st_size);
214}
Elliott Hughes11952072013-10-24 15:15:14 -0700215
Christopher Ferris13f26a72016-01-13 13:47:58 -0800216TEST(UNISTD_TEST, ftruncate_negative) {
Dan Albertc05554e2015-05-19 18:17:31 -0700217 TemporaryFile tf;
218 errno = 0;
Dan Albert9d476a02015-06-01 11:28:31 -0700219 ASSERT_EQ(-1, ftruncate(tf.fd, -123));
Elliott Hughes95646e62023-09-21 14:11:19 -0700220 ASSERT_ERRNO(EINVAL);
Dan Albertc05554e2015-05-19 18:17:31 -0700221}
222
Elliott Hughes1728b232014-05-14 10:02:03 -0700223static bool g_pause_test_flag = false;
Elliott Hughes11952072013-10-24 15:15:14 -0700224static void PauseTestSignalHandler(int) {
Elliott Hughes1728b232014-05-14 10:02:03 -0700225 g_pause_test_flag = true;
Elliott Hughes11952072013-10-24 15:15:14 -0700226}
227
Christopher Ferris13f26a72016-01-13 13:47:58 -0800228TEST(UNISTD_TEST, pause) {
Christopher Ferris13613132013-10-28 15:24:04 -0700229 ScopedSignalHandler handler(SIGALRM, PauseTestSignalHandler);
230
Elliott Hughes11952072013-10-24 15:15:14 -0700231 alarm(1);
Elliott Hughes1728b232014-05-14 10:02:03 -0700232 ASSERT_FALSE(g_pause_test_flag);
Elliott Hughes11952072013-10-24 15:15:14 -0700233 ASSERT_EQ(-1, pause());
Elliott Hughes1728b232014-05-14 10:02:03 -0700234 ASSERT_TRUE(g_pause_test_flag);
Elliott Hughes11952072013-10-24 15:15:14 -0700235}
Colin Cross3d19a832014-02-14 18:56:23 -0800236
Christopher Ferris13f26a72016-01-13 13:47:58 -0800237TEST(UNISTD_TEST, read) {
Colin Cross3d19a832014-02-14 18:56:23 -0800238 int fd = open("/proc/version", O_RDONLY);
239 ASSERT_TRUE(fd != -1);
240
241 char buf[5];
242 ASSERT_EQ(5, read(fd, buf, 5));
243 ASSERT_EQ(buf[0], 'L');
244 ASSERT_EQ(buf[1], 'i');
245 ASSERT_EQ(buf[2], 'n');
246 ASSERT_EQ(buf[3], 'u');
247 ASSERT_EQ(buf[4], 'x');
248 close(fd);
249}
250
Christopher Ferris13f26a72016-01-13 13:47:58 -0800251TEST(UNISTD_TEST, read_EBADF) {
Colin Cross3d19a832014-02-14 18:56:23 -0800252 // read returns ssize_t which is 64-bits on LP64, so it's worth explicitly checking that
253 // our syscall stubs correctly return a 64-bit -1.
254 char buf[1];
255 ASSERT_EQ(-1, read(-1, buf, sizeof(buf)));
Elliott Hughes95646e62023-09-21 14:11:19 -0700256 ASSERT_ERRNO(EBADF);
Colin Cross3d19a832014-02-14 18:56:23 -0800257}
Elliott Hughesaedb00d2014-03-03 14:38:20 -0800258
Christopher Ferris13f26a72016-01-13 13:47:58 -0800259TEST(UNISTD_TEST, syscall_long) {
Elliott Hughes21972b62014-07-28 12:24:22 -0700260 // Check that syscall(3) correctly returns long results.
261 // https://code.google.com/p/android/issues/detail?id=73952
262 // We assume that the break is > 4GiB, but this is potentially flaky.
263 uintptr_t p = reinterpret_cast<uintptr_t>(sbrk(0));
264 ASSERT_EQ(p, static_cast<uintptr_t>(syscall(__NR_brk, 0)));
265}
266
Christopher Ferris13f26a72016-01-13 13:47:58 -0800267TEST(UNISTD_TEST, alarm) {
Elliott Hughesaedb00d2014-03-03 14:38:20 -0800268 ASSERT_EQ(0U, alarm(0));
269}
Elliott Hughes9f525642014-04-08 17:14:01 -0700270
Christopher Ferris13f26a72016-01-13 13:47:58 -0800271TEST(UNISTD_TEST, _exit) {
Elliott Hughes33697a02016-01-26 13:04:57 -0800272 pid_t pid = fork();
Elliott Hughes9f525642014-04-08 17:14:01 -0700273 ASSERT_NE(-1, pid) << strerror(errno);
274
275 if (pid == 0) {
276 _exit(99);
277 }
278
Elliott Hughes33697a02016-01-26 13:04:57 -0800279 AssertChildExited(pid, 99);
Elliott Hughes9f525642014-04-08 17:14:01 -0700280}
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400281
Christopher Ferris13f26a72016-01-13 13:47:58 -0800282TEST(UNISTD_TEST, getenv_unsetenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400283 ASSERT_EQ(0, setenv("test-variable", "hello", 1));
284 ASSERT_STREQ("hello", getenv("test-variable"));
285 ASSERT_EQ(0, unsetenv("test-variable"));
Yi Kong32bc0fc2018-08-02 17:31:13 -0700286 ASSERT_TRUE(getenv("test-variable") == nullptr);
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400287}
288
Christopher Ferris13f26a72016-01-13 13:47:58 -0800289TEST(UNISTD_TEST, unsetenv_EINVAL) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400290 EXPECT_EQ(-1, unsetenv(""));
Elliott Hughes95646e62023-09-21 14:11:19 -0700291 EXPECT_ERRNO(EINVAL);
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400292 EXPECT_EQ(-1, unsetenv("a=b"));
Elliott Hughes95646e62023-09-21 14:11:19 -0700293 EXPECT_ERRNO(EINVAL);
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400294}
295
Christopher Ferris13f26a72016-01-13 13:47:58 -0800296TEST(UNISTD_TEST, setenv_EINVAL) {
zijunzhao5a918d92022-11-28 21:05:55 +0000297#pragma clang diagnostic push
298#pragma clang diagnostic ignored "-Wnonnull"
Yi Kong32bc0fc2018-08-02 17:31:13 -0700299 EXPECT_EQ(-1, setenv(nullptr, "value", 0));
Elliott Hughes95646e62023-09-21 14:11:19 -0700300 EXPECT_ERRNO(EINVAL);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700301 EXPECT_EQ(-1, setenv(nullptr, "value", 1));
Elliott Hughes95646e62023-09-21 14:11:19 -0700302 EXPECT_ERRNO(EINVAL);
zijunzhao5a918d92022-11-28 21:05:55 +0000303#pragma clang diagnostic pop
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400304 EXPECT_EQ(-1, setenv("", "value", 0));
Elliott Hughes95646e62023-09-21 14:11:19 -0700305 EXPECT_ERRNO(EINVAL);
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400306 EXPECT_EQ(-1, setenv("", "value", 1));
Elliott Hughes95646e62023-09-21 14:11:19 -0700307 EXPECT_ERRNO(EINVAL);
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400308 EXPECT_EQ(-1, setenv("a=b", "value", 0));
Elliott Hughes95646e62023-09-21 14:11:19 -0700309 EXPECT_ERRNO(EINVAL);
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400310 EXPECT_EQ(-1, setenv("a=b", "value", 1));
Elliott Hughes95646e62023-09-21 14:11:19 -0700311 EXPECT_ERRNO(EINVAL);
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400312}
313
Christopher Ferris13f26a72016-01-13 13:47:58 -0800314TEST(UNISTD_TEST, setenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400315 ASSERT_EQ(0, unsetenv("test-variable"));
316
317 char a[] = "a";
318 char b[] = "b";
319 char c[] = "c";
320
321 // New value.
322 EXPECT_EQ(0, setenv("test-variable", a, 0));
323 EXPECT_STREQ(a, getenv("test-variable"));
324
325 // Existing value, no overwrite.
326 EXPECT_EQ(0, setenv("test-variable", b, 0));
327 EXPECT_STREQ(a, getenv("test-variable"));
328
329 // Existing value, overwrite.
330 EXPECT_EQ(0, setenv("test-variable", c, 1));
331 EXPECT_STREQ(c, getenv("test-variable"));
332 // But the arrays backing the values are unchanged.
333 EXPECT_EQ('a', a[0]);
334 EXPECT_EQ('b', b[0]);
335 EXPECT_EQ('c', c[0]);
336
337 ASSERT_EQ(0, unsetenv("test-variable"));
338}
339
Christopher Ferris13f26a72016-01-13 13:47:58 -0800340TEST(UNISTD_TEST, putenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400341 ASSERT_EQ(0, unsetenv("a"));
342
343 char* s1 = strdup("a=b");
344 ASSERT_EQ(0, putenv(s1));
345
346 ASSERT_STREQ("b", getenv("a"));
347 s1[2] = 'c';
348 ASSERT_STREQ("c", getenv("a"));
349
350 char* s2 = strdup("a=b");
351 ASSERT_EQ(0, putenv(s2));
352
353 ASSERT_STREQ("b", getenv("a"));
354 ASSERT_EQ('c', s1[2]);
355
356 ASSERT_EQ(0, unsetenv("a"));
357 free(s1);
358 free(s2);
359}
360
Christopher Ferris13f26a72016-01-13 13:47:58 -0800361TEST(UNISTD_TEST, clearenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400362 extern char** environ;
363
364 // Guarantee that environ is not initially empty...
365 ASSERT_EQ(0, setenv("test-variable", "a", 1));
366
367 // Stash a copy.
368 std::vector<char*> old_environ;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700369 for (size_t i = 0; environ[i] != nullptr; ++i) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400370 old_environ.push_back(strdup(environ[i]));
371 }
372
373 ASSERT_EQ(0, clearenv());
374
Yi Kong32bc0fc2018-08-02 17:31:13 -0700375 EXPECT_TRUE(environ == nullptr || environ[0] == nullptr);
376 EXPECT_EQ(nullptr, getenv("test-variable"));
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400377 EXPECT_EQ(0, setenv("test-variable", "post-clear", 1));
378 EXPECT_STREQ("post-clear", getenv("test-variable"));
379
380 // Put the old environment back.
381 for (size_t i = 0; i < old_environ.size(); ++i) {
382 EXPECT_EQ(0, putenv(old_environ[i]));
383 }
384
385 // Check it wasn't overwritten.
386 EXPECT_STREQ("a", getenv("test-variable"));
387
388 EXPECT_EQ(0, unsetenv("test-variable"));
389}
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700390
Elliott Hughes896362e2017-08-24 16:31:49 -0700391static void TestSyncFunction(int (*fn)(int)) {
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700392 int fd;
393
394 // Can't sync an invalid fd.
395 errno = 0;
396 EXPECT_EQ(-1, fn(-1));
Elliott Hughes95646e62023-09-21 14:11:19 -0700397 EXPECT_ERRNO(EBADF);
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700398
399 // It doesn't matter whether you've opened a file for write or not.
400 TemporaryFile tf;
401 ASSERT_NE(-1, tf.fd);
402
403 EXPECT_EQ(0, fn(tf.fd));
404
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800405 ASSERT_NE(-1, fd = open(tf.path, O_RDONLY));
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700406 EXPECT_EQ(0, fn(fd));
407 close(fd);
408
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800409 ASSERT_NE(-1, fd = open(tf.path, O_RDWR));
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700410 EXPECT_EQ(0, fn(fd));
411 close(fd);
412
413 // The fd can even be a directory.
Christopher Ferrisa948a4e2016-05-20 15:32:47 -0700414 ASSERT_NE(-1, fd = open("/data/local/tmp", O_RDONLY));
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700415 EXPECT_EQ(0, fn(fd));
416 close(fd);
Elliott Hughes896362e2017-08-24 16:31:49 -0700417}
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700418
Elliott Hughes896362e2017-08-24 16:31:49 -0700419static void TestFsyncFunction(int (*fn)(int)) {
420 TestSyncFunction(fn);
421
422 // But some file systems are fussy about fsync/fdatasync...
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700423 errno = 0;
Elliott Hughes896362e2017-08-24 16:31:49 -0700424 int fd = open("/proc/version", O_RDONLY);
425 ASSERT_NE(-1, fd);
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700426 EXPECT_EQ(-1, fn(fd));
Elliott Hughes95646e62023-09-21 14:11:19 -0700427 EXPECT_ERRNO(EINVAL);
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700428 close(fd);
429}
430
Christopher Ferris13f26a72016-01-13 13:47:58 -0800431TEST(UNISTD_TEST, fdatasync) {
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700432 TestFsyncFunction(fdatasync);
433}
434
Christopher Ferris13f26a72016-01-13 13:47:58 -0800435TEST(UNISTD_TEST, fsync) {
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700436 TestFsyncFunction(fsync);
437}
Elliott Hughes7086ad62014-06-19 16:39:01 -0700438
Elliott Hughes896362e2017-08-24 16:31:49 -0700439TEST(UNISTD_TEST, syncfs) {
440 TestSyncFunction(syncfs);
441}
442
Josh Gao23032832020-05-07 17:02:19 -0700443TEST(UNISTD_TEST, vfork) {
444#if defined(__BIONIC__)
445 pthread_internal_t* self = __get_thread();
446
447 pid_t cached_pid;
448 ASSERT_TRUE(self->get_cached_pid(&cached_pid));
449 ASSERT_EQ(syscall(__NR_getpid), cached_pid);
450 ASSERT_FALSE(self->is_vforked());
451
452 pid_t rc = vfork();
453 ASSERT_NE(-1, rc);
454 if (rc == 0) {
455 if (self->get_cached_pid(&cached_pid)) {
456 const char* error = "__get_thread()->cached_pid_ set after vfork\n";
457 write(STDERR_FILENO, error, strlen(error));
458 _exit(1);
459 }
460
461 if (!self->is_vforked()) {
462 const char* error = "__get_thread()->vforked_ not set after vfork\n";
463 write(STDERR_FILENO, error, strlen(error));
464 _exit(1);
465 }
466
467 _exit(0);
468 } else {
469 ASSERT_TRUE(self->get_cached_pid(&cached_pid));
470 ASSERT_EQ(syscall(__NR_getpid), cached_pid);
471 ASSERT_FALSE(self->is_vforked());
472
473 int status;
474 pid_t wait_result = waitpid(rc, &status, 0);
475 ASSERT_EQ(wait_result, rc);
476 ASSERT_TRUE(WIFEXITED(status));
477 ASSERT_EQ(0, WEXITSTATUS(status));
478 }
479#endif
480}
481
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700482static void AssertGetPidCorrect() {
483 // The loop is just to make manual testing/debugging with strace easier.
484 pid_t getpid_syscall_result = syscall(__NR_getpid);
485 for (size_t i = 0; i < 128; ++i) {
486 ASSERT_EQ(getpid_syscall_result, getpid());
487 }
488}
489
Robert Seseke4621172016-11-03 15:00:53 -0400490static void TestGetPidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) {
Elliott Hughes7086ad62014-06-19 16:39:01 -0700491 pid_t parent_pid = getpid();
492 ASSERT_EQ(syscall(__NR_getpid), parent_pid);
493
Elliott Hughes5891abd2015-08-07 18:27:47 -0700494 pid_t fork_result = fork_fn();
Elliott Hughes7086ad62014-06-19 16:39:01 -0700495 ASSERT_NE(fork_result, -1);
496 if (fork_result == 0) {
497 // We're the child.
Robert Seseka4edf7a2016-10-25 10:29:02 -0400498 ASSERT_NO_FATAL_FAILURE(AssertGetPidCorrect());
Elliott Hughes7086ad62014-06-19 16:39:01 -0700499 ASSERT_EQ(parent_pid, getppid());
Robert Seseke4621172016-11-03 15:00:53 -0400500 exit_fn(123);
Elliott Hughes7086ad62014-06-19 16:39:01 -0700501 } else {
502 // We're the parent.
503 ASSERT_EQ(parent_pid, getpid());
Elliott Hughes33697a02016-01-26 13:04:57 -0800504 AssertChildExited(fork_result, 123);
Elliott Hughes7086ad62014-06-19 16:39:01 -0700505 }
506}
507
Robert Seseka4edf7a2016-10-25 10:29:02 -0400508// gettid() is marked as __attribute_const__, which will have the compiler
509// optimize out multiple calls to gettid in the same function. This wrapper
510// defeats that optimization.
511static __attribute__((__noinline__)) pid_t GetTidForTest() {
512 __asm__("");
513 return gettid();
514}
515
516static void AssertGetTidCorrect() {
517 // The loop is just to make manual testing/debugging with strace easier.
518 pid_t gettid_syscall_result = syscall(__NR_gettid);
519 for (size_t i = 0; i < 128; ++i) {
520 ASSERT_EQ(gettid_syscall_result, GetTidForTest());
521 }
522}
523
Robert Seseke4621172016-11-03 15:00:53 -0400524static void TestGetTidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) {
Robert Seseka4edf7a2016-10-25 10:29:02 -0400525 pid_t parent_tid = GetTidForTest();
526 ASSERT_EQ(syscall(__NR_gettid), parent_tid);
527
528 pid_t fork_result = fork_fn();
529 ASSERT_NE(fork_result, -1);
530 if (fork_result == 0) {
531 // We're the child.
532 EXPECT_EQ(syscall(__NR_getpid), syscall(__NR_gettid));
533 EXPECT_EQ(getpid(), GetTidForTest()) << "real tid is " << syscall(__NR_gettid)
534 << ", pid is " << syscall(__NR_getpid);
535 ASSERT_NO_FATAL_FAILURE(AssertGetTidCorrect());
Robert Seseke4621172016-11-03 15:00:53 -0400536 exit_fn(123);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400537 } else {
538 // We're the parent.
539 ASSERT_EQ(parent_tid, GetTidForTest());
540 AssertChildExited(fork_result, 123);
541 }
542}
543
Christopher Ferris13f26a72016-01-13 13:47:58 -0800544TEST(UNISTD_TEST, getpid_caching_and_fork) {
Robert Seseke4621172016-11-03 15:00:53 -0400545 TestGetPidCachingWithFork(fork, exit);
Elliott Hughes5891abd2015-08-07 18:27:47 -0700546}
547
Robert Seseka4edf7a2016-10-25 10:29:02 -0400548TEST(UNISTD_TEST, gettid_caching_and_fork) {
Robert Seseke4621172016-11-03 15:00:53 -0400549 TestGetTidCachingWithFork(fork, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400550}
551
Christopher Ferris13f26a72016-01-13 13:47:58 -0800552TEST(UNISTD_TEST, getpid_caching_and_vfork) {
Robert Seseke4621172016-11-03 15:00:53 -0400553 TestGetPidCachingWithFork(vfork, _exit);
Elliott Hughes5891abd2015-08-07 18:27:47 -0700554}
555
Robert Seseka4edf7a2016-10-25 10:29:02 -0400556static int CloneLikeFork() {
557 return clone(nullptr, nullptr, SIGCHLD, nullptr);
558}
559
560TEST(UNISTD_TEST, getpid_caching_and_clone_process) {
Robert Seseke4621172016-11-03 15:00:53 -0400561 TestGetPidCachingWithFork(CloneLikeFork, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400562}
563
564TEST(UNISTD_TEST, gettid_caching_and_clone_process) {
Robert Seseke4621172016-11-03 15:00:53 -0400565 TestGetTidCachingWithFork(CloneLikeFork, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400566}
567
568static int CloneAndSetTid() {
569 pid_t child_tid = 0;
570 pid_t parent_tid = GetTidForTest();
571
572 int rv = clone(nullptr, nullptr, CLONE_CHILD_SETTID | SIGCHLD, nullptr, nullptr, nullptr, &child_tid);
573 EXPECT_NE(-1, rv);
574
575 if (rv == 0) {
576 // Child.
577 EXPECT_EQ(child_tid, GetTidForTest());
578 EXPECT_NE(child_tid, parent_tid);
579 } else {
580 EXPECT_NE(child_tid, GetTidForTest());
581 EXPECT_NE(child_tid, parent_tid);
582 EXPECT_EQ(GetTidForTest(), parent_tid);
583 }
584
585 return rv;
586}
587
588TEST(UNISTD_TEST, gettid_caching_and_clone_process_settid) {
Robert Seseke4621172016-11-03 15:00:53 -0400589 TestGetTidCachingWithFork(CloneAndSetTid, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400590}
591
Peter Collingbourne955f0442023-03-21 22:52:40 -0700592__attribute__((no_sanitize("hwaddress", "memtag")))
Robert Seseka4edf7a2016-10-25 10:29:02 -0400593static int CloneStartRoutine(int (*start_routine)(void*)) {
594 void* child_stack[1024];
Peter Collingbourne955f0442023-03-21 22:52:40 -0700595 return clone(start_routine, &child_stack[1024], SIGCHLD, nullptr);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400596}
597
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700598static int GetPidCachingCloneStartRoutine(void*) {
599 AssertGetPidCorrect();
600 return 123;
Elliott Hughes7086ad62014-06-19 16:39:01 -0700601}
602
Christopher Ferris13f26a72016-01-13 13:47:58 -0800603TEST(UNISTD_TEST, getpid_caching_and_clone) {
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700604 pid_t parent_pid = getpid();
605 ASSERT_EQ(syscall(__NR_getpid), parent_pid);
606
Robert Seseka4edf7a2016-10-25 10:29:02 -0400607 int clone_result = CloneStartRoutine(GetPidCachingCloneStartRoutine);
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700608 ASSERT_NE(clone_result, -1);
609
610 ASSERT_EQ(parent_pid, getpid());
611
Elliott Hughes33697a02016-01-26 13:04:57 -0800612 AssertChildExited(clone_result, 123);
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700613}
614
Robert Seseka4edf7a2016-10-25 10:29:02 -0400615static int GetTidCachingCloneStartRoutine(void*) {
616 AssertGetTidCorrect();
617 return 123;
618}
619
620TEST(UNISTD_TEST, gettid_caching_and_clone) {
621 pid_t parent_tid = GetTidForTest();
622 ASSERT_EQ(syscall(__NR_gettid), parent_tid);
623
624 int clone_result = CloneStartRoutine(GetTidCachingCloneStartRoutine);
625 ASSERT_NE(clone_result, -1);
626
627 ASSERT_EQ(parent_tid, GetTidForTest());
628
629 AssertChildExited(clone_result, 123);
630}
631
Robert Seseke4621172016-11-03 15:00:53 -0400632static int CloneChildExit(void*) {
633 AssertGetPidCorrect();
634 AssertGetTidCorrect();
635 exit(33);
636}
637
638TEST(UNISTD_TEST, clone_fn_and_exit) {
639 int clone_result = CloneStartRoutine(CloneChildExit);
640 ASSERT_NE(-1, clone_result);
641
642 AssertGetPidCorrect();
643 AssertGetTidCorrect();
644
645 AssertChildExited(clone_result, 33);
646}
647
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700648static void* GetPidCachingPthreadStartRoutine(void*) {
649 AssertGetPidCorrect();
Yi Kong32bc0fc2018-08-02 17:31:13 -0700650 return nullptr;
Elliott Hughes7086ad62014-06-19 16:39:01 -0700651}
652
Christopher Ferris13f26a72016-01-13 13:47:58 -0800653TEST(UNISTD_TEST, getpid_caching_and_pthread_create) {
Elliott Hughes7086ad62014-06-19 16:39:01 -0700654 pid_t parent_pid = getpid();
655
656 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700657 ASSERT_EQ(0, pthread_create(&t, nullptr, GetPidCachingPthreadStartRoutine, nullptr));
Elliott Hughes7086ad62014-06-19 16:39:01 -0700658
659 ASSERT_EQ(parent_pid, getpid());
660
661 void* result;
662 ASSERT_EQ(0, pthread_join(t, &result));
Yi Kong32bc0fc2018-08-02 17:31:13 -0700663 ASSERT_EQ(nullptr, result);
Elliott Hughes7086ad62014-06-19 16:39:01 -0700664}
Elliott Hughes60452a22014-09-22 14:41:30 -0700665
Robert Seseka4edf7a2016-10-25 10:29:02 -0400666static void* GetTidCachingPthreadStartRoutine(void*) {
667 AssertGetTidCorrect();
668 uint64_t tid = GetTidForTest();
669 return reinterpret_cast<void*>(tid);
670}
671
672TEST(UNISTD_TEST, gettid_caching_and_pthread_create) {
673 pid_t parent_tid = GetTidForTest();
674
675 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700676 ASSERT_EQ(0, pthread_create(&t, nullptr, GetTidCachingPthreadStartRoutine, &parent_tid));
Robert Seseka4edf7a2016-10-25 10:29:02 -0400677
678 ASSERT_EQ(parent_tid, GetTidForTest());
679
680 void* result;
681 ASSERT_EQ(0, pthread_join(t, &result));
682 ASSERT_NE(static_cast<uint64_t>(parent_tid), reinterpret_cast<uint64_t>(result));
683}
684
Evgenii Stepanov505168e2019-02-28 18:44:56 -0800685__attribute__((noinline)) static void HwasanVforkTestChild() {
686 // Allocate a tagged region on stack and leave it there.
687 char x[10000];
Elliott Hughes7cda75f2020-10-22 13:22:35 -0700688 DoNotOptimize(x);
Evgenii Stepanov505168e2019-02-28 18:44:56 -0800689 _exit(0);
690}
691
692__attribute__((noinline)) static void HwasanReadMemory(const char* p, size_t size) {
693 // Read memory byte-by-byte. This will blow up if the pointer tag in p does not match any memory
694 // tag in [p, p+size).
Christopher Ferris724efbb2021-12-14 06:28:40 +0000695 char z;
Evgenii Stepanov505168e2019-02-28 18:44:56 -0800696 for (size_t i = 0; i < size; ++i) {
Christopher Ferris724efbb2021-12-14 06:28:40 +0000697 DoNotOptimize(z = p[i]);
Evgenii Stepanov505168e2019-02-28 18:44:56 -0800698 }
699}
700
701__attribute__((noinline, no_sanitize("hwaddress"))) static void HwasanVforkTestParent() {
702 // Allocate a region on stack, but don't tag it (see the function attribute).
703 // This depends on unallocated stack space at current function entry being untagged.
704 char x[10000];
Elliott Hughes7cda75f2020-10-22 13:22:35 -0700705 DoNotOptimize(x);
Evgenii Stepanov505168e2019-02-28 18:44:56 -0800706 // Verify that contents of x[] are untagged.
707 HwasanReadMemory(x, sizeof(x));
708}
709
710TEST(UNISTD_TEST, hwasan_vfork) {
711 // Test hwasan annotation in vfork. This test is only interesting when built with hwasan, but it
712 // is supposed to work correctly either way.
713 if (vfork()) {
714 HwasanVforkTestParent();
715 } else {
716 HwasanVforkTestChild();
717 }
718}
719
Christopher Ferris13f26a72016-01-13 13:47:58 -0800720TEST_F(UNISTD_DEATHTEST, abort) {
Elliott Hughes60452a22014-09-22 14:41:30 -0700721 ASSERT_EXIT(abort(), testing::KilledBySignal(SIGABRT), "");
722}
Elliott Hughesb86a4c72014-11-07 16:07:13 -0800723
Christopher Ferris13f26a72016-01-13 13:47:58 -0800724TEST(UNISTD_TEST, sethostname) {
Elliott Hughesb86a4c72014-11-07 16:07:13 -0800725 // The permissions check happens before the argument check, so this will
726 // fail for a different reason if you're running as root than if you're
727 // not, but it'll fail either way. Checking that we have the symbol is about
728 // all we can do for sethostname(2).
729 ASSERT_EQ(-1, sethostname("", -1));
730}
Derek Xued94e7f02014-09-25 11:12:01 +0100731
Christopher Ferris13f26a72016-01-13 13:47:58 -0800732TEST(UNISTD_TEST, gethostname) {
Derek Xued94e7f02014-09-25 11:12:01 +0100733 char hostname[HOST_NAME_MAX + 1];
Derek Xued94e7f02014-09-25 11:12:01 +0100734 memset(hostname, 0, sizeof(hostname));
735
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800736 // Can we get the hostname with a big buffer?
Derek Xued94e7f02014-09-25 11:12:01 +0100737 ASSERT_EQ(0, gethostname(hostname, HOST_NAME_MAX));
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800738
739 // Can we get the hostname with a right-sized buffer?
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800740 ASSERT_EQ(0, gethostname(hostname, strlen(hostname) + 1));
741
742 // Does uname(2) agree?
Derek Xued94e7f02014-09-25 11:12:01 +0100743 utsname buf;
744 ASSERT_EQ(0, uname(&buf));
Colin Cross7da20342021-07-28 11:18:11 -0700745 ASSERT_EQ(0, strncmp(hostname, buf.nodename, sizeof(buf.nodename)));
Derek Xued94e7f02014-09-25 11:12:01 +0100746 ASSERT_GT(strlen(hostname), 0U);
747
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800748 // Do we correctly detect truncation?
Derek Xued94e7f02014-09-25 11:12:01 +0100749 errno = 0;
750 ASSERT_EQ(-1, gethostname(hostname, strlen(hostname)));
Elliott Hughes95646e62023-09-21 14:11:19 -0700751 ASSERT_ERRNO(ENAMETOOLONG);
Derek Xued94e7f02014-09-25 11:12:01 +0100752}
Yabin Cuib5e581a2014-11-08 14:58:12 -0800753
Christopher Ferris13f26a72016-01-13 13:47:58 -0800754TEST(UNISTD_TEST, pathconf_fpathconf) {
Yabin Cuib5e581a2014-11-08 14:58:12 -0800755 TemporaryFile tf;
756 long rc = 0L;
757 // As a file system's block size is always power of 2, the configure values
758 // for ALLOC and XFER should be power of 2 as well.
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800759 rc = pathconf(tf.path, _PC_ALLOC_SIZE_MIN);
Yabin Cuib5e581a2014-11-08 14:58:12 -0800760 ASSERT_TRUE(rc > 0 && powerof2(rc));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800761 rc = pathconf(tf.path, _PC_REC_MIN_XFER_SIZE);
Yabin Cuib5e581a2014-11-08 14:58:12 -0800762 ASSERT_TRUE(rc > 0 && powerof2(rc));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800763 rc = pathconf(tf.path, _PC_REC_XFER_ALIGN);
Yabin Cuib5e581a2014-11-08 14:58:12 -0800764 ASSERT_TRUE(rc > 0 && powerof2(rc));
765
766 rc = fpathconf(tf.fd, _PC_ALLOC_SIZE_MIN);
767 ASSERT_TRUE(rc > 0 && powerof2(rc));
768 rc = fpathconf(tf.fd, _PC_REC_MIN_XFER_SIZE);
769 ASSERT_TRUE(rc > 0 && powerof2(rc));
770 rc = fpathconf(tf.fd, _PC_REC_XFER_ALIGN);
771 ASSERT_TRUE(rc > 0 && powerof2(rc));
772}
Derek Xuebc644762014-09-25 10:55:34 +0100773
Elliott Hughes19d76852017-10-18 13:27:01 -0700774TEST(UNISTD_TEST, _POSIX_constants) {
Yabin Cui1c191942014-11-19 19:49:14 -0800775 // Make a tight verification of _POSIX_* / _POSIX2_* / _XOPEN_* macros, to prevent change by mistake.
776 // Verify according to POSIX.1-2008.
777 EXPECT_EQ(200809L, _POSIX_VERSION);
778
Elliott Hughes19d76852017-10-18 13:27:01 -0700779 EXPECT_EQ(2, _POSIX_AIO_LISTIO_MAX);
780 EXPECT_EQ(1, _POSIX_AIO_MAX);
781 EXPECT_EQ(4096, _POSIX_ARG_MAX);
782 EXPECT_EQ(25, _POSIX_CHILD_MAX);
783 EXPECT_EQ(20000000, _POSIX_CLOCKRES_MIN);
784 EXPECT_EQ(32, _POSIX_DELAYTIMER_MAX);
785 EXPECT_EQ(255, _POSIX_HOST_NAME_MAX);
786 EXPECT_EQ(8, _POSIX_LINK_MAX);
787 EXPECT_EQ(9, _POSIX_LOGIN_NAME_MAX);
788 EXPECT_EQ(255, _POSIX_MAX_CANON);
789 EXPECT_EQ(255, _POSIX_MAX_INPUT);
790 EXPECT_EQ(8, _POSIX_MQ_OPEN_MAX);
791 EXPECT_EQ(32, _POSIX_MQ_PRIO_MAX);
792 EXPECT_EQ(14, _POSIX_NAME_MAX);
793 EXPECT_EQ(8, _POSIX_NGROUPS_MAX);
794 EXPECT_EQ(20, _POSIX_OPEN_MAX);
795 EXPECT_EQ(256, _POSIX_PATH_MAX);
796 EXPECT_EQ(512, _POSIX_PIPE_BUF);
797 EXPECT_EQ(255, _POSIX_RE_DUP_MAX);
798 EXPECT_EQ(8, _POSIX_RTSIG_MAX);
799 EXPECT_EQ(256, _POSIX_SEM_NSEMS_MAX);
800 EXPECT_EQ(32767, _POSIX_SEM_VALUE_MAX);
801 EXPECT_EQ(32, _POSIX_SIGQUEUE_MAX);
802 EXPECT_EQ(32767, _POSIX_SSIZE_MAX);
803 EXPECT_EQ(8, _POSIX_STREAM_MAX);
804#if !defined(__GLIBC__)
805 EXPECT_EQ(4, _POSIX_SS_REPL_MAX);
806#endif
807 EXPECT_EQ(255, _POSIX_SYMLINK_MAX);
808 EXPECT_EQ(8, _POSIX_SYMLOOP_MAX);
809 EXPECT_EQ(4, _POSIX_THREAD_DESTRUCTOR_ITERATIONS);
810 EXPECT_EQ(128, _POSIX_THREAD_KEYS_MAX);
811 EXPECT_EQ(64, _POSIX_THREAD_THREADS_MAX);
812 EXPECT_EQ(32, _POSIX_TIMER_MAX);
813#if !defined(__GLIBC__)
814 EXPECT_EQ(30, _POSIX_TRACE_EVENT_NAME_MAX);
815 EXPECT_EQ(8, _POSIX_TRACE_NAME_MAX);
816 EXPECT_EQ(8, _POSIX_TRACE_SYS_MAX);
817 EXPECT_EQ(32, _POSIX_TRACE_USER_EVENT_MAX);
818#endif
819 EXPECT_EQ(9, _POSIX_TTY_NAME_MAX);
820 EXPECT_EQ(6, _POSIX_TZNAME_MAX);
821 EXPECT_EQ(99, _POSIX2_BC_BASE_MAX);
822 EXPECT_EQ(2048, _POSIX2_BC_DIM_MAX);
823 EXPECT_EQ(99, _POSIX2_BC_SCALE_MAX);
824 EXPECT_EQ(1000, _POSIX2_BC_STRING_MAX);
825 EXPECT_EQ(14, _POSIX2_CHARCLASS_NAME_MAX);
826 EXPECT_EQ(2, _POSIX2_COLL_WEIGHTS_MAX);
827 EXPECT_EQ(32, _POSIX2_EXPR_NEST_MAX);
828 EXPECT_EQ(2048, _POSIX2_LINE_MAX);
829 EXPECT_EQ(255, _POSIX2_RE_DUP_MAX);
830
831 EXPECT_EQ(16, _XOPEN_IOV_MAX);
832#if !defined(__GLIBC__)
833 EXPECT_EQ(255, _XOPEN_NAME_MAX);
834 EXPECT_EQ(1024, _XOPEN_PATH_MAX);
835#endif
836}
837
838TEST(UNISTD_TEST, _POSIX_options) {
Yabin Cui5afae642014-11-25 20:17:27 -0800839 EXPECT_EQ(_POSIX_VERSION, _POSIX_ADVISORY_INFO);
Elliott Hughes73c44a42016-10-19 09:27:02 -0700840 EXPECT_GT(_POSIX_BARRIERS, 0);
841 EXPECT_GT(_POSIX_SPIN_LOCKS, 0);
Yabin Cui1c191942014-11-19 19:49:14 -0800842 EXPECT_NE(_POSIX_CHOWN_RESTRICTED, -1);
843 EXPECT_EQ(_POSIX_VERSION, _POSIX_CLOCK_SELECTION);
Elliott Hughes19d76852017-10-18 13:27:01 -0700844#if !defined(__GLIBC__) // glibc supports ancient kernels.
Elliott Hughes3a8f75d2017-10-05 10:33:18 -0700845 EXPECT_EQ(_POSIX_VERSION, _POSIX_CPUTIME);
Elliott Hughes19d76852017-10-18 13:27:01 -0700846#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800847 EXPECT_EQ(_POSIX_VERSION, _POSIX_FSYNC);
Yabin Cui1c191942014-11-19 19:49:14 -0800848 EXPECT_EQ(_POSIX_VERSION, _POSIX_IPV6);
849 EXPECT_GT(_POSIX_JOB_CONTROL, 0);
Yabin Cui1c191942014-11-19 19:49:14 -0800850 EXPECT_EQ(_POSIX_VERSION, _POSIX_MAPPED_FILES);
Yabin Cui1c191942014-11-19 19:49:14 -0800851 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK);
852 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK_RANGE);
853 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMORY_PROTECTION);
Elliott Hughes19d76852017-10-18 13:27:01 -0700854#if !defined(__GLIBC__) // glibc supports ancient kernels.
Elliott Hughes3a8f75d2017-10-05 10:33:18 -0700855 EXPECT_EQ(_POSIX_VERSION, _POSIX_MONOTONIC_CLOCK);
Elliott Hughes19d76852017-10-18 13:27:01 -0700856#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800857 EXPECT_GT(_POSIX_NO_TRUNC, 0);
Colin Cross4c5595c2021-08-16 15:51:59 -0700858#if !defined(ANDROID_HOST_MUSL)
Yabin Cui1c191942014-11-19 19:49:14 -0800859 EXPECT_EQ(_POSIX_VERSION, _POSIX_PRIORITY_SCHEDULING);
Colin Cross7da20342021-07-28 11:18:11 -0700860#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800861 EXPECT_EQ(_POSIX_VERSION, _POSIX_RAW_SOCKETS);
862 EXPECT_EQ(_POSIX_VERSION, _POSIX_READER_WRITER_LOCKS);
Yabin Cui63481602014-12-01 17:41:04 -0800863 EXPECT_EQ(_POSIX_VERSION, _POSIX_REALTIME_SIGNALS);
Yabin Cui1c191942014-11-19 19:49:14 -0800864 EXPECT_GT(_POSIX_REGEXP, 0);
Yabin Cui1c191942014-11-19 19:49:14 -0800865 EXPECT_GT(_POSIX_SAVED_IDS, 0);
866 EXPECT_EQ(_POSIX_VERSION, _POSIX_SEMAPHORES);
Yabin Cui1c191942014-11-19 19:49:14 -0800867 EXPECT_GT(_POSIX_SHELL, 0);
Elliott Hughes14e3ff92017-10-06 16:58:36 -0700868 EXPECT_EQ(_POSIX_VERSION, _POSIX_SPAWN);
Colin Cross4c5595c2021-08-16 15:51:59 -0700869#if !defined(ANDROID_HOST_MUSL)
Elliott Hughes19d76852017-10-18 13:27:01 -0700870 EXPECT_EQ(-1, _POSIX_SPORADIC_SERVER);
Yabin Cui1c191942014-11-19 19:49:14 -0800871 EXPECT_EQ(_POSIX_VERSION, _POSIX_SYNCHRONIZED_IO);
Colin Cross7da20342021-07-28 11:18:11 -0700872#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800873 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREADS);
874 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKADDR);
875 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKSIZE);
Elliott Hughes19d76852017-10-18 13:27:01 -0700876#if !defined(__GLIBC__) // glibc supports ancient kernels.
Elliott Hughes3a8f75d2017-10-05 10:33:18 -0700877 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_CPUTIME);
Elliott Hughes19d76852017-10-18 13:27:01 -0700878#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800879 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PRIORITY_SCHEDULING);
Elliott Hughes468c8082017-05-20 12:47:14 -0700880 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PROCESS_SHARED);
Colin Cross4c5595c2021-08-16 15:51:59 -0700881#if !defined(ANDROID_HOST_MUSL)
Yabin Cui1c191942014-11-19 19:49:14 -0800882 EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_PROTECT);
Colin Cross7da20342021-07-28 11:18:11 -0700883#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800884 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_SAFE_FUNCTIONS);
Colin Cross4c5595c2021-08-16 15:51:59 -0700885#if !defined(ANDROID_HOST_MUSL)
Elliott Hughes19d76852017-10-18 13:27:01 -0700886 EXPECT_EQ(-1, _POSIX_THREAD_SPORADIC_SERVER);
Colin Cross7da20342021-07-28 11:18:11 -0700887#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800888 EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMEOUTS);
889 EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMERS);
Colin Cross4c5595c2021-08-16 15:51:59 -0700890#if !defined(ANDROID_HOST_MUSL)
Yabin Cui1c191942014-11-19 19:49:14 -0800891 EXPECT_EQ(-1, _POSIX_TRACE);
892 EXPECT_EQ(-1, _POSIX_TRACE_EVENT_FILTER);
893 EXPECT_EQ(-1, _POSIX_TRACE_INHERIT);
894 EXPECT_EQ(-1, _POSIX_TRACE_LOG);
Yabin Cui1c191942014-11-19 19:49:14 -0800895 EXPECT_EQ(-1, _POSIX_TYPED_MEMORY_OBJECTS);
Colin Cross7da20342021-07-28 11:18:11 -0700896#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800897 EXPECT_NE(-1, _POSIX_VDISABLE);
898
Elliott Hughesa3529352017-07-13 10:20:41 -0700899 EXPECT_EQ(_POSIX_VERSION, _POSIX2_VERSION);
Yabin Cui1c191942014-11-19 19:49:14 -0800900 EXPECT_EQ(_POSIX_VERSION, _POSIX2_C_BIND);
Colin Cross4c5595c2021-08-16 15:51:59 -0700901#if !defined(ANDROID_HOST_MUSL)
Elliott Hughes19d76852017-10-18 13:27:01 -0700902 EXPECT_EQ(_POSIX_VERSION, _POSIX2_CHAR_TERM);
Colin Cross7da20342021-07-28 11:18:11 -0700903#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800904
905 EXPECT_EQ(700, _XOPEN_VERSION);
Elliott Hughes19d76852017-10-18 13:27:01 -0700906 EXPECT_EQ(1, _XOPEN_ENH_I18N);
Colin Cross4c5595c2021-08-16 15:51:59 -0700907#if !defined(ANDROID_HOST_MUSL)
Elliott Hughes19d76852017-10-18 13:27:01 -0700908 EXPECT_EQ(1, _XOPEN_REALTIME);
909 EXPECT_EQ(1, _XOPEN_REALTIME_THREADS);
910 EXPECT_EQ(1, _XOPEN_SHM);
Colin Cross7da20342021-07-28 11:18:11 -0700911#endif
Elliott Hughes19d76852017-10-18 13:27:01 -0700912 EXPECT_EQ(1, _XOPEN_UNIX);
Yabin Cui1c191942014-11-19 19:49:14 -0800913
914#if defined(__BIONIC__)
915 // These tests only pass on bionic, as bionic and glibc has different support on these macros.
Yabin Cui5afae642014-11-25 20:17:27 -0800916 // Macros like _POSIX_ASYNCHRONOUS_IO are not supported on bionic yet.
Yabin Cui1c191942014-11-19 19:49:14 -0800917 EXPECT_EQ(-1, _POSIX_ASYNCHRONOUS_IO);
Yabin Cui1c191942014-11-19 19:49:14 -0800918 EXPECT_EQ(-1, _POSIX_MESSAGE_PASSING);
919 EXPECT_EQ(-1, _POSIX_PRIORITIZED_IO);
Yabin Cui1c191942014-11-19 19:49:14 -0800920 EXPECT_EQ(-1, _POSIX_SHARED_MEMORY_OBJECTS);
Elliott Hughes19d76852017-10-18 13:27:01 -0700921 EXPECT_EQ(-1, _POSIX_THREAD_PRIO_INHERIT);
922 EXPECT_EQ(-1, _POSIX_THREAD_PRIO_PROTECT);
Yabin Cui1c191942014-11-19 19:49:14 -0800923 EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_INHERIT);
924
Yabin Cui1c191942014-11-19 19:49:14 -0800925 EXPECT_EQ(-1, _POSIX2_C_DEV);
Elliott Hughes19d76852017-10-18 13:27:01 -0700926 EXPECT_EQ(-1, _POSIX2_FORT_DEV);
927 EXPECT_EQ(-1, _POSIX2_FORT_RUN);
Yabin Cui1c191942014-11-19 19:49:14 -0800928 EXPECT_EQ(-1, _POSIX2_LOCALEDEF);
929 EXPECT_EQ(-1, _POSIX2_SW_DEV);
930 EXPECT_EQ(-1, _POSIX2_UPE);
931
Yabin Cui1c191942014-11-19 19:49:14 -0800932 EXPECT_EQ(-1, _XOPEN_CRYPT);
933 EXPECT_EQ(-1, _XOPEN_LEGACY);
Elliott Hughes19d76852017-10-18 13:27:01 -0700934 EXPECT_EQ(-1, _XOPEN_STREAMS);
Yabin Cui1c191942014-11-19 19:49:14 -0800935#endif // defined(__BIONIC__)
936}
937
Elliott Hughesd6f57302018-04-25 22:13:14 -0700938#define VERIFY_SYSCONF_UNKNOWN(name) \
939 VerifySysconf(name, #name, [](long v){return v == -1 && errno == EINVAL;})
940
941#define VERIFY_SYSCONF_UNSUPPORTED(name) \
942 VerifySysconf(name, #name, [](long v){return v == -1 && errno == 0;})
Yabin Cui1c191942014-11-19 19:49:14 -0800943
944// sysconf() means unlimited when it returns -1 with errno unchanged.
945#define VERIFY_SYSCONF_POSITIVE(name) \
Elliott Hughesd6f57302018-04-25 22:13:14 -0700946 VerifySysconf(name, #name, [](long v){return (v > 0 || v == -1) && errno == 0;})
Yabin Cui1c191942014-11-19 19:49:14 -0800947
948#define VERIFY_SYSCONF_POSIX_VERSION(name) \
Elliott Hughesd6f57302018-04-25 22:13:14 -0700949 VerifySysconf(name, #name, [](long v){return v == _POSIX_VERSION && errno == 0;})
Yabin Cui1c191942014-11-19 19:49:14 -0800950
951static void VerifySysconf(int option, const char *option_name, bool (*verify)(long)) {
952 errno = 0;
953 long ret = sysconf(option);
Elliott Hughesd6f57302018-04-25 22:13:14 -0700954 EXPECT_TRUE(verify(ret)) << "name = " << option_name << ", ret = "
Yabin Cui1c191942014-11-19 19:49:14 -0800955 << ret <<", Error Message: " << strerror(errno);
956}
Derek Xuebc644762014-09-25 10:55:34 +0100957
Christopher Ferris13f26a72016-01-13 13:47:58 -0800958TEST(UNISTD_TEST, sysconf) {
Yabin Cui5afae642014-11-25 20:17:27 -0800959 VERIFY_SYSCONF_POSIX_VERSION(_SC_ADVISORY_INFO);
Yabin Cui1c191942014-11-19 19:49:14 -0800960 VERIFY_SYSCONF_POSITIVE(_SC_ARG_MAX);
Elliott Hughes73c44a42016-10-19 09:27:02 -0700961 VERIFY_SYSCONF_POSIX_VERSION(_SC_BARRIERS);
Yabin Cui1c191942014-11-19 19:49:14 -0800962 VERIFY_SYSCONF_POSITIVE(_SC_BC_BASE_MAX);
963 VERIFY_SYSCONF_POSITIVE(_SC_BC_DIM_MAX);
964 VERIFY_SYSCONF_POSITIVE(_SC_BC_SCALE_MAX);
965 VERIFY_SYSCONF_POSITIVE(_SC_CHILD_MAX);
966 VERIFY_SYSCONF_POSITIVE(_SC_CLK_TCK);
967 VERIFY_SYSCONF_POSITIVE(_SC_COLL_WEIGHTS_MAX);
Yabin Cuid5c65272014-11-26 14:04:26 -0800968 VERIFY_SYSCONF_POSIX_VERSION(_SC_CPUTIME);
Yabin Cui1c191942014-11-19 19:49:14 -0800969 VERIFY_SYSCONF_POSITIVE(_SC_EXPR_NEST_MAX);
970 VERIFY_SYSCONF_POSITIVE(_SC_LINE_MAX);
Elliott Hughesb3877432024-02-13 16:48:30 -0800971 VerifySysconf(_SC_NGROUPS_MAX, "_SC_NGROUPS_MAX", [](long v){return v >= 0 && v <= NGROUPS_MAX;});
Yabin Cui1c191942014-11-19 19:49:14 -0800972 VERIFY_SYSCONF_POSITIVE(_SC_OPEN_MAX);
973 VERIFY_SYSCONF_POSITIVE(_SC_PASS_MAX);
974 VERIFY_SYSCONF_POSIX_VERSION(_SC_2_C_BIND);
Elliott Hughes72927252016-07-27 14:05:10 -0700975 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_DEV);
976 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_RUN);
977 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_UPE);
Elliott Hughes6c135f42017-07-28 16:53:32 -0700978 VERIFY_SYSCONF_POSIX_VERSION(_SC_2_VERSION);
Yabin Cui1c191942014-11-19 19:49:14 -0800979 VERIFY_SYSCONF_POSITIVE(_SC_JOB_CONTROL);
980 VERIFY_SYSCONF_POSITIVE(_SC_SAVED_IDS);
981 VERIFY_SYSCONF_POSIX_VERSION(_SC_VERSION);
982 VERIFY_SYSCONF_POSITIVE(_SC_RE_DUP_MAX);
983 VERIFY_SYSCONF_POSITIVE(_SC_STREAM_MAX);
984 VERIFY_SYSCONF_POSITIVE(_SC_TZNAME_MAX);
Elliott Hughesd6f57302018-04-25 22:13:14 -0700985 VerifySysconf(_SC_XOPEN_VERSION, "_SC_XOPEN_VERSION", [](long v){return v == _XOPEN_VERSION && errno == 0;});
Yabin Cui1c191942014-11-19 19:49:14 -0800986 VERIFY_SYSCONF_POSITIVE(_SC_ATEXIT_MAX);
987 VERIFY_SYSCONF_POSITIVE(_SC_IOV_MAX);
Elliott Hughes82ab4812018-10-09 13:56:06 -0700988 VERIFY_SYSCONF_POSITIVE(_SC_UIO_MAXIOV);
989 EXPECT_EQ(sysconf(_SC_IOV_MAX), sysconf(_SC_UIO_MAXIOV));
Yabin Cui1c191942014-11-19 19:49:14 -0800990 VERIFY_SYSCONF_POSITIVE(_SC_PAGESIZE);
991 VERIFY_SYSCONF_POSITIVE(_SC_PAGE_SIZE);
Elliott Hughes189394b2015-07-24 23:22:07 -0700992 VerifySysconf(_SC_PAGE_SIZE, "_SC_PAGE_SIZE",
Elliott Hughesd6f57302018-04-25 22:13:14 -0700993 [](long v){return v == sysconf(_SC_PAGESIZE) && errno == 0 && v == getpagesize();});
Yabin Cui1c191942014-11-19 19:49:14 -0800994 VERIFY_SYSCONF_POSITIVE(_SC_XOPEN_UNIX);
995 VERIFY_SYSCONF_POSITIVE(_SC_AIO_LISTIO_MAX);
996 VERIFY_SYSCONF_POSITIVE(_SC_AIO_MAX);
Elliott Hughesd6f57302018-04-25 22:13:14 -0700997 VerifySysconf(_SC_AIO_PRIO_DELTA_MAX, "_SC_AIO_PRIO_DELTA_MAX", [](long v){return v >= 0 && errno == 0;});
Yabin Cui1c191942014-11-19 19:49:14 -0800998 VERIFY_SYSCONF_POSITIVE(_SC_DELAYTIMER_MAX);
999 VERIFY_SYSCONF_POSITIVE(_SC_MQ_OPEN_MAX);
1000 VERIFY_SYSCONF_POSITIVE(_SC_MQ_PRIO_MAX);
1001 VERIFY_SYSCONF_POSITIVE(_SC_RTSIG_MAX);
1002 VERIFY_SYSCONF_POSITIVE(_SC_SEM_NSEMS_MAX);
1003 VERIFY_SYSCONF_POSITIVE(_SC_SEM_VALUE_MAX);
Elliott Hughes73c44a42016-10-19 09:27:02 -07001004 VERIFY_SYSCONF_POSIX_VERSION(_SC_SPIN_LOCKS);
Yabin Cui1c191942014-11-19 19:49:14 -08001005 VERIFY_SYSCONF_POSITIVE(_SC_TIMER_MAX);
1006 VERIFY_SYSCONF_POSIX_VERSION(_SC_FSYNC);
1007 VERIFY_SYSCONF_POSIX_VERSION(_SC_MAPPED_FILES);
1008 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK);
1009 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK_RANGE);
1010 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMORY_PROTECTION);
1011 VERIFY_SYSCONF_POSIX_VERSION(_SC_PRIORITY_SCHEDULING);
Yabin Cui63481602014-12-01 17:41:04 -08001012 VERIFY_SYSCONF_POSIX_VERSION(_SC_REALTIME_SIGNALS);
Yabin Cui1c191942014-11-19 19:49:14 -08001013 VERIFY_SYSCONF_POSIX_VERSION(_SC_SEMAPHORES);
1014 VERIFY_SYSCONF_POSIX_VERSION(_SC_SYNCHRONIZED_IO);
1015 VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMERS);
1016 VERIFY_SYSCONF_POSITIVE(_SC_GETGR_R_SIZE_MAX);
1017 VERIFY_SYSCONF_POSITIVE(_SC_GETPW_R_SIZE_MAX);
1018 VERIFY_SYSCONF_POSITIVE(_SC_LOGIN_NAME_MAX);
1019 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_DESTRUCTOR_ITERATIONS);
1020 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_KEYS_MAX);
1021 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_STACK_MIN);
1022 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_THREADS_MAX);
1023 VERIFY_SYSCONF_POSITIVE(_SC_TTY_NAME_MAX);
1024 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREADS);
1025 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKADDR);
1026 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKSIZE);
1027 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PRIORITY_SCHEDULING);
Elliott Hughes72927252016-07-27 14:05:10 -07001028 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_INHERIT);
1029 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_PROTECT);
Yabin Cui1c191942014-11-19 19:49:14 -08001030 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_SAFE_FUNCTIONS);
1031 VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_CONF);
1032 VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_ONLN);
1033 VERIFY_SYSCONF_POSITIVE(_SC_PHYS_PAGES);
1034 VERIFY_SYSCONF_POSITIVE(_SC_AVPHYS_PAGES);
1035 VERIFY_SYSCONF_POSIX_VERSION(_SC_MONOTONIC_CLOCK);
Elliott Hughes72927252016-07-27 14:05:10 -07001036 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS);
1037 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_ACCOUNTING);
1038 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_CHECKPOINT);
1039 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_LOCATE);
1040 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_MESSAGE);
1041 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_TRACK);
Yabin Cui1c191942014-11-19 19:49:14 -08001042 VERIFY_SYSCONF_POSIX_VERSION(_SC_CLOCK_SELECTION);
1043 VERIFY_SYSCONF_POSITIVE(_SC_HOST_NAME_MAX);
1044 VERIFY_SYSCONF_POSIX_VERSION(_SC_IPV6);
1045 VERIFY_SYSCONF_POSIX_VERSION(_SC_RAW_SOCKETS);
1046 VERIFY_SYSCONF_POSIX_VERSION(_SC_READER_WRITER_LOCKS);
1047 VERIFY_SYSCONF_POSITIVE(_SC_REGEXP);
1048 VERIFY_SYSCONF_POSITIVE(_SC_SHELL);
Elliott Hughes14e3ff92017-10-06 16:58:36 -07001049 VERIFY_SYSCONF_POSIX_VERSION(_SC_SPAWN);
Elliott Hughes19d76852017-10-18 13:27:01 -07001050 VERIFY_SYSCONF_UNSUPPORTED(_SC_SPORADIC_SERVER);
Yabin Cui1c191942014-11-19 19:49:14 -08001051 VERIFY_SYSCONF_POSITIVE(_SC_SYMLOOP_MAX);
1052 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_CPUTIME);
Elliott Hughes468c8082017-05-20 12:47:14 -07001053 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PROCESS_SHARED);
Elliott Hughes19d76852017-10-18 13:27:01 -07001054 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_SPORADIC_SERVER);
Yabin Cui1c191942014-11-19 19:49:14 -08001055 VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMEOUTS);
Elliott Hughes72927252016-07-27 14:05:10 -07001056 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE);
1057 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_FILTER);
1058 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_NAME_MAX);
1059 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_INHERIT);
1060 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_LOG);
1061 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_NAME_MAX);
1062 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_SYS_MAX);
1063 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_USER_EVENT_MAX);
1064 VERIFY_SYSCONF_UNSUPPORTED(_SC_TYPED_MEMORY_OBJECTS);
1065 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_STREAMS);
Derek Xuebc644762014-09-25 10:55:34 +01001066
Yabin Cui1c191942014-11-19 19:49:14 -08001067#if defined(__LP64__)
Elliott Hughes72927252016-07-27 14:05:10 -07001068 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFF32);
1069 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG);
Yabin Cui1c191942014-11-19 19:49:14 -08001070 VERIFY_SYSCONF_POSITIVE(_SC_V7_LP64_OFF64);
1071 VERIFY_SYSCONF_POSITIVE(_SC_V7_LPBIG_OFFBIG);
1072#else
1073 VERIFY_SYSCONF_POSITIVE(_SC_V7_ILP32_OFF32);
1074#if defined(__BIONIC__)
1075 // bionic does not support 64 bits off_t type on 32bit machine.
Elliott Hughes72927252016-07-27 14:05:10 -07001076 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG);
Yabin Cui1c191942014-11-19 19:49:14 -08001077#endif
Elliott Hughes72927252016-07-27 14:05:10 -07001078 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LP64_OFF64);
1079 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LPBIG_OFFBIG);
Yabin Cui1c191942014-11-19 19:49:14 -08001080#endif
Derek Xuebc644762014-09-25 10:55:34 +01001081
Yabin Cui1c191942014-11-19 19:49:14 -08001082#if defined(__BIONIC__)
1083 // Tests can only run on bionic, as bionic and glibc have different support for these options.
1084 // Below options are not supported on bionic yet.
Elliott Hughes72927252016-07-27 14:05:10 -07001085 VERIFY_SYSCONF_UNSUPPORTED(_SC_ASYNCHRONOUS_IO);
Elliott Hughes72927252016-07-27 14:05:10 -07001086 VERIFY_SYSCONF_UNSUPPORTED(_SC_MESSAGE_PASSING);
1087 VERIFY_SYSCONF_UNSUPPORTED(_SC_PRIORITIZED_IO);
1088 VERIFY_SYSCONF_UNSUPPORTED(_SC_SHARED_MEMORY_OBJECTS);
Elliott Hughes72927252016-07-27 14:05:10 -07001089 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_INHERIT);
1090 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_PROTECT);
Derek Xuebc644762014-09-25 10:55:34 +01001091
Elliott Hughes72927252016-07-27 14:05:10 -07001092 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_C_DEV);
Elliott Hughes72927252016-07-27 14:05:10 -07001093 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_LOCALEDEF);
1094 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_SW_DEV);
Derek Xuebc644762014-09-25 10:55:34 +01001095
Elliott Hughes72927252016-07-27 14:05:10 -07001096 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_CRYPT);
Elliott Hughes72927252016-07-27 14:05:10 -07001097 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_LEGACY);
Elliott Hughes72927252016-07-27 14:05:10 -07001098 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_UUCP);
Yabin Cui1c191942014-11-19 19:49:14 -08001099#endif // defined(__BIONIC__)
Derek Xuebc644762014-09-25 10:55:34 +01001100}
Elliott Hughesbe52e652015-02-23 18:02:29 -08001101
Christopher Ferris13f26a72016-01-13 13:47:58 -08001102TEST(UNISTD_TEST, get_cpu_count_from_string) {
Yabin Cuicb6f5992015-09-29 16:11:45 -07001103 ASSERT_EQ(0, GetCpuCountFromString(" "));
1104 ASSERT_EQ(1, GetCpuCountFromString("0"));
1105 ASSERT_EQ(40, GetCpuCountFromString("0-39"));
1106 ASSERT_EQ(4, GetCpuCountFromString("0, 1-2, 4\n"));
1107}
1108
Elliott Hughesd771a7c2022-07-28 17:52:46 +00001109TEST(UNISTD_TEST, sysconf_SC_NPROCESSORS_make_sense) {
1110 ASSERT_LE(sysconf(_SC_NPROCESSORS_ONLN), sysconf(_SC_NPROCESSORS_CONF));
1111}
1112
Christopher Ferris13f26a72016-01-13 13:47:58 -08001113TEST(UNISTD_TEST, sysconf_SC_NPROCESSORS_ONLN) {
Elliott Hughes0b2acdf2015-10-02 18:25:19 -07001114 std::string line;
1115 ASSERT_TRUE(android::base::ReadFileToString("/sys/devices/system/cpu/online", &line));
Yabin Cuicb6f5992015-09-29 16:11:45 -07001116 long online_cpus = 0;
Elliott Hughes0b2acdf2015-10-02 18:25:19 -07001117 for (const std::string& s : android::base::Split(line, ",")) {
Yabin Cuicb6f5992015-09-29 16:11:45 -07001118 std::vector<std::string> numbers = android::base::Split(s, "-");
1119 if (numbers.size() == 1u) {
1120 online_cpus++;
1121 } else {
1122 online_cpus += atoi(numbers[1].c_str()) - atoi(numbers[0].c_str()) + 1;
1123 }
1124 }
1125 ASSERT_EQ(online_cpus, sysconf(_SC_NPROCESSORS_ONLN));
1126}
1127
Elliott Hughes38dba2e2016-08-10 15:51:06 -07001128TEST(UNISTD_TEST, sysconf_SC_ARG_MAX) {
Elliott Hughesdb602e82019-11-15 09:04:27 -08001129 // Since Linux 2.6.23, ARG_MAX isn't a constant and depends on RLIMIT_STACK.
Juan Yescas2da31cf2023-12-07 11:49:11 -08001130 // See setup_arg_pages() in the kernel for the gory details:
1131 // https://elixir.bootlin.com/linux/v6.6.4/source/fs/exec.c#L749
Elliott Hughesdb602e82019-11-15 09:04:27 -08001132
1133 // Get our current limit, and set things up so we restore the limit.
1134 rlimit rl;
1135 ASSERT_EQ(0, getrlimit(RLIMIT_STACK, &rl));
1136 uint64_t original_rlim_cur = rl.rlim_cur;
1137 if (rl.rlim_cur == RLIM_INFINITY) {
1138 rl.rlim_cur = 8 * 1024 * 1024; // Bionic reports unlimited stacks as 8MiB.
1139 }
1140 auto guard = android::base::make_scope_guard([&rl, original_rlim_cur]() {
1141 rl.rlim_cur = original_rlim_cur;
1142 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1143 });
1144
1145 // _SC_ARG_MAX should be 1/4 the stack size.
1146 EXPECT_EQ(static_cast<long>(rl.rlim_cur / 4), sysconf(_SC_ARG_MAX));
1147
Juan Yescas2da31cf2023-12-07 11:49:11 -08001148 // If you have a really small stack, the kernel still guarantees a stack
1149 // expansion of 128KiB (see setup_arg_pages() in fs/exec.c).
Elliott Hughesdb602e82019-11-15 09:04:27 -08001150 rl.rlim_cur = 1024;
1151 rl.rlim_max = RLIM_INFINITY;
1152 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1153
Juan Yescas2da31cf2023-12-07 11:49:11 -08001154 // The stack expansion number is defined in fs/exec.c.
1155 // https://elixir.bootlin.com/linux/v6.6.4/source/fs/exec.c#L845
1156 constexpr long kernel_stack_expansion = 131072;
1157 EXPECT_EQ(kernel_stack_expansion, sysconf(_SC_ARG_MAX));
Elliott Hughesdb602e82019-11-15 09:04:27 -08001158
Juan Yescas2da31cf2023-12-07 11:49:11 -08001159 // If you have a large stack, the kernel will keep the stack
1160 // expansion to 128KiB (see setup_arg_pages() in fs/exec.c).
1161 rl.rlim_cur = 524288;
Elliott Hughesdb602e82019-11-15 09:04:27 -08001162 rl.rlim_max = RLIM_INFINITY;
1163 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1164
Juan Yescas2da31cf2023-12-07 11:49:11 -08001165 EXPECT_EQ(kernel_stack_expansion, sysconf(_SC_ARG_MAX));
Elliott Hughes38dba2e2016-08-10 15:51:06 -07001166}
1167
Elliott Hughesd6f57302018-04-25 22:13:14 -07001168TEST(UNISTD_TEST, sysconf_unknown) {
1169 VERIFY_SYSCONF_UNKNOWN(-1);
1170 VERIFY_SYSCONF_UNKNOWN(666);
1171}
1172
Colin Crosscb5d3c12023-09-05 13:51:51 -07001173[[maybe_unused]] static void show_cache(const char* name, long size, long assoc, long line_size) {
Elliott Hughes02df7382023-08-22 15:57:46 -07001174 printf("%s cache size: %ld bytes, line size %ld bytes, ", name, size, line_size);
1175 if (assoc == 0) {
1176 printf("fully");
1177 } else {
1178 printf("%ld-way", assoc);
1179 }
1180 printf(" associative\n");
1181}
1182
1183TEST(UNISTD_TEST, sysconf_cache) {
Colin Crosscb5d3c12023-09-05 13:51:51 -07001184#if defined(ANDROID_HOST_MUSL)
1185 GTEST_SKIP() << "musl does not have _SC_LEVEL?_?CACHE_SIZE";
1186#else
Elliott Hughes02df7382023-08-22 15:57:46 -07001187 // It's not obvious we can _test_ any of these, but we can at least
1188 // show the output for humans to inspect.
1189 show_cache("L1D", sysconf(_SC_LEVEL1_DCACHE_SIZE), sysconf(_SC_LEVEL1_DCACHE_ASSOC), sysconf(_SC_LEVEL1_DCACHE_LINESIZE));
1190 show_cache("L1I", sysconf(_SC_LEVEL1_ICACHE_SIZE), sysconf(_SC_LEVEL1_ICACHE_ASSOC), sysconf(_SC_LEVEL1_ICACHE_LINESIZE));
1191 show_cache("L2", sysconf(_SC_LEVEL2_CACHE_SIZE), sysconf(_SC_LEVEL2_CACHE_ASSOC), sysconf(_SC_LEVEL2_CACHE_LINESIZE));
1192 show_cache("L3", sysconf(_SC_LEVEL3_CACHE_SIZE), sysconf(_SC_LEVEL3_CACHE_ASSOC), sysconf(_SC_LEVEL3_CACHE_LINESIZE));
1193 show_cache("L4", sysconf(_SC_LEVEL4_CACHE_SIZE), sysconf(_SC_LEVEL4_CACHE_ASSOC), sysconf(_SC_LEVEL4_CACHE_LINESIZE));
Colin Crosscb5d3c12023-09-05 13:51:51 -07001194#endif
Elliott Hughes02df7382023-08-22 15:57:46 -07001195}
1196
Christopher Ferris13f26a72016-01-13 13:47:58 -08001197TEST(UNISTD_TEST, dup2_same) {
Elliott Hughesbe52e652015-02-23 18:02:29 -08001198 // POSIX says of dup2:
1199 // If fildes2 is already a valid open file descriptor ...
1200 // [and] fildes is equal to fildes2 ... dup2() shall return
1201 // fildes2 without closing it.
1202 // This isn't true of dup3(2), so we need to manually implement that.
1203
1204 // Equal and valid.
1205 int fd = open("/proc/version", O_RDONLY);
1206 ASSERT_TRUE(fd != -1);
1207 ASSERT_EQ(fd, dup2(fd, fd));
1208 ASSERT_EQ(0, close(fd)); // Check that dup2 didn't close fd.
1209
1210 // Equal, but invalid.
1211 errno = 0;
1212 ASSERT_EQ(-1, dup2(fd, fd));
Elliott Hughes95646e62023-09-21 14:11:19 -07001213 ASSERT_ERRNO(EBADF);
Elliott Hughesbe52e652015-02-23 18:02:29 -08001214}
Elliott Hughes5704c422016-01-25 18:06:24 -08001215
Elliott Hughesa7f12942017-12-15 13:55:53 -08001216TEST(UNISTD_TEST, dup3) {
1217 int fd = open("/proc/version", O_RDONLY);
1218 ASSERT_EQ(666, dup3(fd, 666, 0));
Elliott Hughesf9cfecf2021-02-04 16:58:13 -08001219 ASSERT_FALSE(CloseOnExec(666));
Elliott Hughesa7f12942017-12-15 13:55:53 -08001220 close(666);
1221 ASSERT_EQ(667, dup3(fd, 667, O_CLOEXEC));
Elliott Hughesf9cfecf2021-02-04 16:58:13 -08001222 ASSERT_TRUE(CloseOnExec(667));
Elliott Hughesa7f12942017-12-15 13:55:53 -08001223 close(667);
1224 close(fd);
1225}
1226
Elliott Hughes5704c422016-01-25 18:06:24 -08001227TEST(UNISTD_TEST, lockf_smoke) {
1228 constexpr off64_t file_size = 32*1024LL;
1229
1230 TemporaryFile tf;
1231 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1232
1233 // Lock everything.
1234 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1235 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
1236
1237 // Try-lock everything, this should succeed too.
1238 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1239 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size));
1240
1241 // Check status.
1242 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1243 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1244
1245 // Unlock file.
1246 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1247 ASSERT_EQ(0, lockf64(tf.fd, F_ULOCK, file_size));
1248}
1249
1250TEST(UNISTD_TEST, lockf_zero) {
1251 constexpr off64_t file_size = 32*1024LL;
1252
1253 TemporaryFile tf;
1254 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1255
1256 // Lock everything by specifying a size of 0 (meaning "to the end, even if it changes").
1257 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1258 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, 0));
1259
1260 // Check that it's locked.
1261 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1262 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1263
1264 // Move the end.
1265 ASSERT_EQ(0, ftruncate(tf.fd, 2*file_size));
1266
1267 // Check that the new section is locked too.
1268 ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
1269 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, 2*file_size));
1270}
1271
1272TEST(UNISTD_TEST, lockf_negative) {
1273 constexpr off64_t file_size = 32*1024LL;
1274
1275 TemporaryFile tf;
1276 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1277
1278 // Lock everything, but specifying the range in reverse.
1279 ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
1280 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, -file_size));
1281
1282 // Check that it's locked.
1283 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1284 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1285}
1286
1287TEST(UNISTD_TEST, lockf_with_child) {
1288 constexpr off64_t file_size = 32*1024LL;
1289
1290 TemporaryFile tf;
1291 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1292
1293 // Lock everything.
1294 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1295 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
1296
1297 // Fork a child process
1298 pid_t pid = fork();
1299 ASSERT_NE(-1, pid);
1300 if (pid == 0) {
1301 // Check that the child cannot lock the file.
1302 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1303 ASSERT_EQ(-1, lockf64(tf.fd, F_TLOCK, file_size));
Elliott Hughes95646e62023-09-21 14:11:19 -07001304 ASSERT_ERRNO(EAGAIN);
Elliott Hughes5704c422016-01-25 18:06:24 -08001305 // Check also that it reports itself as locked.
1306 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1307 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size));
Elliott Hughes95646e62023-09-21 14:11:19 -07001308 ASSERT_ERRNO(EACCES);
Elliott Hughes5704c422016-01-25 18:06:24 -08001309 _exit(0);
1310 }
Elliott Hughes33697a02016-01-26 13:04:57 -08001311 AssertChildExited(pid, 0);
Elliott Hughes5704c422016-01-25 18:06:24 -08001312}
1313
1314TEST(UNISTD_TEST, lockf_partial_with_child) {
1315 constexpr off64_t file_size = 32*1024LL;
1316
1317 TemporaryFile tf;
1318 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1319
1320 // Lock the first half of the file.
1321 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1322 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size/2));
1323
1324 // Fork a child process.
1325 pid_t pid = fork();
1326 ASSERT_NE(-1, pid);
1327 if (pid == 0) {
1328 // Check that the child can lock the other half.
1329 ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
1330 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
1331 // Check that the child cannot lock the first half.
1332 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1333 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
Elliott Hughes95646e62023-09-21 14:11:19 -07001334 ASSERT_ERRNO(EACCES);
Elliott Hughes5704c422016-01-25 18:06:24 -08001335 // Check also that it reports itself as locked.
1336 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1337 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
Elliott Hughes95646e62023-09-21 14:11:19 -07001338 ASSERT_ERRNO(EACCES);
Elliott Hughes5704c422016-01-25 18:06:24 -08001339 _exit(0);
1340 }
Elliott Hughes33697a02016-01-26 13:04:57 -08001341 AssertChildExited(pid, 0);
Elliott Hughes5704c422016-01-25 18:06:24 -08001342
1343 // The second half was locked by the child, but the lock disappeared
1344 // when the process exited, so check it can be locked now.
1345 ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
1346 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
1347}
Greg Hackmanne2faf072016-03-03 08:37:53 -08001348
1349TEST(UNISTD_TEST, getdomainname) {
1350 struct utsname u;
1351 ASSERT_EQ(0, uname(&u));
1352
1353 char buf[sizeof(u.domainname)];
1354 ASSERT_EQ(0, getdomainname(buf, sizeof(buf)));
1355 EXPECT_STREQ(u.domainname, buf);
1356
1357#if defined(__BIONIC__)
1358 // bionic and glibc have different behaviors when len is too small
1359 ASSERT_EQ(-1, getdomainname(buf, strlen(u.domainname)));
Elliott Hughes95646e62023-09-21 14:11:19 -07001360 EXPECT_ERRNO(EINVAL);
Greg Hackmanne2faf072016-03-03 08:37:53 -08001361#endif
1362}
1363
1364TEST(UNISTD_TEST, setdomainname) {
1365 __user_cap_header_struct header;
1366 memset(&header, 0, sizeof(header));
1367 header.version = _LINUX_CAPABILITY_VERSION_3;
1368
1369 __user_cap_data_struct old_caps[_LINUX_CAPABILITY_U32S_3];
1370 ASSERT_EQ(0, capget(&header, &old_caps[0]));
1371
1372 auto admin_idx = CAP_TO_INDEX(CAP_SYS_ADMIN);
1373 auto admin_mask = CAP_TO_MASK(CAP_SYS_ADMIN);
1374 bool has_admin = old_caps[admin_idx].effective & admin_mask;
1375 if (has_admin) {
1376 __user_cap_data_struct new_caps[_LINUX_CAPABILITY_U32S_3];
1377 memcpy(new_caps, old_caps, sizeof(new_caps));
1378 new_caps[admin_idx].effective &= ~admin_mask;
1379
1380 ASSERT_EQ(0, capset(&header, &new_caps[0])) << "failed to drop admin privileges";
1381 }
1382
1383 const char* name = "newdomainname";
1384 ASSERT_EQ(-1, setdomainname(name, strlen(name)));
Elliott Hughes95646e62023-09-21 14:11:19 -07001385 ASSERT_ERRNO(EPERM);
Greg Hackmanne2faf072016-03-03 08:37:53 -08001386
1387 if (has_admin) {
1388 ASSERT_EQ(0, capset(&header, &old_caps[0])) << "failed to restore admin privileges";
1389 }
1390}
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001391
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001392TEST(UNISTD_TEST, execve_failure) {
1393 ExecTestHelper eth;
1394 errno = 0;
1395 ASSERT_EQ(-1, execve("/", eth.GetArgs(), eth.GetEnv()));
Elliott Hughes95646e62023-09-21 14:11:19 -07001396 ASSERT_ERRNO(EACCES);
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001397}
1398
Pirama Arumuga Nainar8035caa2020-06-09 12:48:10 -07001399static void append_llvm_cov_env_var(std::string& env_str) {
1400 if (getenv("LLVM_PROFILE_FILE") != nullptr)
1401 env_str.append("__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE\n");
1402}
1403
Elliott Hughes3c115902016-08-24 19:27:04 -07001404TEST(UNISTD_TEST, execve_args) {
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001405 // int execve(const char* path, char* argv[], char* envp[]);
1406
1407 // Test basic argument passing.
1408 ExecTestHelper eth;
1409 eth.SetArgs({"echo", "hello", "world", nullptr});
1410 eth.Run([&]() { execve(BIN_DIR "echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1411
1412 // Test environment variable setting too.
1413 eth.SetArgs({"printenv", nullptr});
1414 eth.SetEnv({"A=B", nullptr});
Pirama Arumuga Nainar8035caa2020-06-09 12:48:10 -07001415
1416 std::string expected_output("A=B\n");
1417 append_llvm_cov_env_var(expected_output);
1418
1419 eth.Run([&]() { execve(BIN_DIR "printenv", eth.GetArgs(), eth.GetEnv()); }, 0,
1420 expected_output.c_str());
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001421}
1422
1423TEST(UNISTD_TEST, execl_failure) {
1424 errno = 0;
1425 ASSERT_EQ(-1, execl("/", "/", nullptr));
Elliott Hughes95646e62023-09-21 14:11:19 -07001426 ASSERT_ERRNO(EACCES);
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001427}
1428
1429TEST(UNISTD_TEST, execl) {
1430 ExecTestHelper eth;
1431 // int execl(const char* path, const char* arg, ...);
1432 eth.Run([&]() { execl(BIN_DIR "echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n");
1433}
1434
1435TEST(UNISTD_TEST, execle_failure) {
1436 ExecTestHelper eth;
1437 errno = 0;
1438 ASSERT_EQ(-1, execle("/", "/", nullptr, eth.GetEnv()));
Elliott Hughes95646e62023-09-21 14:11:19 -07001439 ASSERT_ERRNO(EACCES);
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001440}
1441
1442TEST(UNISTD_TEST, execle) {
1443 ExecTestHelper eth;
1444 eth.SetEnv({"A=B", nullptr});
Pirama Arumuga Nainar8035caa2020-06-09 12:48:10 -07001445
1446 std::string expected_output("A=B\n");
1447 append_llvm_cov_env_var(expected_output);
1448
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001449 // int execle(const char* path, const char* arg, ..., char* envp[]);
Pirama Arumuga Nainar8035caa2020-06-09 12:48:10 -07001450 eth.Run([&]() { execle(BIN_DIR "printenv", "printenv", nullptr, eth.GetEnv()); }, 0,
1451 expected_output.c_str());
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001452}
1453
1454TEST(UNISTD_TEST, execv_failure) {
1455 ExecTestHelper eth;
1456 errno = 0;
1457 ASSERT_EQ(-1, execv("/", eth.GetArgs()));
Elliott Hughes95646e62023-09-21 14:11:19 -07001458 ASSERT_ERRNO(EACCES);
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001459}
1460
1461TEST(UNISTD_TEST, execv) {
1462 ExecTestHelper eth;
1463 eth.SetArgs({"echo", "hello", "world", nullptr});
1464 // int execv(const char* path, char* argv[]);
1465 eth.Run([&]() { execv(BIN_DIR "echo", eth.GetArgs()); }, 0, "hello world\n");
1466}
1467
1468TEST(UNISTD_TEST, execlp_failure) {
1469 errno = 0;
1470 ASSERT_EQ(-1, execlp("/", "/", nullptr));
Elliott Hughes95646e62023-09-21 14:11:19 -07001471 ASSERT_ERRNO(EACCES);
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001472}
1473
1474TEST(UNISTD_TEST, execlp) {
1475 ExecTestHelper eth;
1476 // int execlp(const char* file, const char* arg, ...);
1477 eth.Run([&]() { execlp("echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n");
1478}
1479
1480TEST(UNISTD_TEST, execvp_failure) {
1481 ExecTestHelper eth;
Elliott Hughes3c115902016-08-24 19:27:04 -07001482 eth.SetArgs({nullptr});
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001483 errno = 0;
1484 ASSERT_EQ(-1, execvp("/", eth.GetArgs()));
Elliott Hughes95646e62023-09-21 14:11:19 -07001485 ASSERT_ERRNO(EACCES);
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001486}
1487
1488TEST(UNISTD_TEST, execvp) {
1489 ExecTestHelper eth;
1490 eth.SetArgs({"echo", "hello", "world", nullptr});
1491 // int execvp(const char* file, char* argv[]);
1492 eth.Run([&]() { execvp("echo", eth.GetArgs()); }, 0, "hello world\n");
1493}
1494
1495TEST(UNISTD_TEST, execvpe_failure) {
1496 ExecTestHelper eth;
1497 errno = 0;
1498 ASSERT_EQ(-1, execvpe("this-does-not-exist", eth.GetArgs(), eth.GetEnv()));
Elliott Hughes5965bf02016-12-01 17:12:49 -08001499 // Running in CTS we might not even be able to search all directories in $PATH.
Elliott Hughes95646e62023-09-21 14:11:19 -07001500 ASSERT_TRUE(errno == ENOENT || errno == EACCES) << strerror(errno);
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001501}
1502
1503TEST(UNISTD_TEST, execvpe) {
1504 // int execvpe(const char* file, char* argv[], char* envp[]);
1505
1506 // Test basic argument passing.
1507 ExecTestHelper eth;
1508 eth.SetArgs({"echo", "hello", "world", nullptr});
1509 eth.Run([&]() { execvpe("echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1510
1511 // Test environment variable setting too.
1512 eth.SetArgs({"printenv", nullptr});
1513 eth.SetEnv({"A=B", nullptr});
Pirama Arumuga Nainar8035caa2020-06-09 12:48:10 -07001514
1515 std::string expected_output("A=B\n");
1516 append_llvm_cov_env_var(expected_output);
1517
1518 eth.Run([&]() { execvpe("printenv", eth.GetArgs(), eth.GetEnv()); }, 0, expected_output.c_str());
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001519}
Elliott Hughes3c115902016-08-24 19:27:04 -07001520
1521TEST(UNISTD_TEST, execvpe_ENOEXEC) {
1522 // Create a shell script with #!.
1523 TemporaryFile tf;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001524 ASSERT_TRUE(android::base::WriteStringToFile("#!" BIN_DIR "sh\necho script\n", tf.path));
Elliott Hughes3c115902016-08-24 19:27:04 -07001525
1526 // Set $PATH so we can find it.
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001527 setenv("PATH", dirname(tf.path), 1);
Elliott Hughes3c115902016-08-24 19:27:04 -07001528
1529 ExecTestHelper eth;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001530 eth.SetArgs({basename(tf.path), nullptr});
Elliott Hughes3c115902016-08-24 19:27:04 -07001531
1532 // It's not inherently executable.
1533 errno = 0;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001534 ASSERT_EQ(-1, execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()));
Elliott Hughes95646e62023-09-21 14:11:19 -07001535 ASSERT_ERRNO(EACCES);
Elliott Hughes3c115902016-08-24 19:27:04 -07001536
Elliott Hughes5965bf02016-12-01 17:12:49 -08001537 // Make it executable (and keep it writable because we're going to rewrite it below).
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001538 ASSERT_EQ(0, chmod(tf.path, 0777));
Elliott Hughes3c115902016-08-24 19:27:04 -07001539
1540 // TemporaryFile will have a writable fd, so we can test ETXTBSY while we're here...
1541 errno = 0;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001542 ASSERT_EQ(-1, execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()));
Elliott Hughes95646e62023-09-21 14:11:19 -07001543 ASSERT_ERRNO(ETXTBSY);
Elliott Hughes3c115902016-08-24 19:27:04 -07001544
1545 // 1. The simplest test: the kernel should handle this.
1546 ASSERT_EQ(0, close(tf.fd));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001547 eth.Run([&]() { execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
Elliott Hughes3c115902016-08-24 19:27:04 -07001548
1549 // 2. Try again without a #!. We should have to handle this ourselves.
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001550 ASSERT_TRUE(android::base::WriteStringToFile("echo script\n", tf.path));
1551 eth.Run([&]() { execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
Elliott Hughes3c115902016-08-24 19:27:04 -07001552
1553 // 3. Again without a #!, but also with a leading '/', since that's a special case in the
1554 // implementation.
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001555 eth.Run([&]() { execvpe(tf.path, eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
Elliott Hughes3c115902016-08-24 19:27:04 -07001556}
Elliott Hughes63615062016-08-25 17:40:27 -07001557
1558TEST(UNISTD_TEST, execvp_libcore_test_55017) {
1559 ExecTestHelper eth;
1560 eth.SetArgs({"/system/bin/does-not-exist", nullptr});
1561
1562 errno = 0;
1563 ASSERT_EQ(-1, execvp("/system/bin/does-not-exist", eth.GetArgs()));
Elliott Hughes95646e62023-09-21 14:11:19 -07001564 ASSERT_ERRNO(ENOENT);
Elliott Hughes63615062016-08-25 17:40:27 -07001565}
Elliott Hughes30a36272017-02-22 17:31:41 -08001566
1567TEST(UNISTD_TEST, exec_argv0_null) {
Elliott Hughesbb1cc5a2022-04-01 11:12:36 -07001568 // http://b/33276926 and http://b/227498625.
1569 //
1570 // With old kernels, bionic will see the null pointer and use "<unknown>" but
1571 // with new (5.18+) kernels, the kernel will already have substituted the
1572 // empty string, so we don't make any assertion here about what (if anything)
1573 // comes before the first ':'.
1574 //
1575 // If this ever causes trouble, we could change bionic to replace _either_ the
1576 // null pointer or the empty string. We could also use the actual name from
1577 // readlink() on /proc/self/exe if we ever had reason to disallow programs
1578 // from trying to hide like this.
Elliott Hughes30a36272017-02-22 17:31:41 -08001579 char* args[] = {nullptr};
1580 char* envs[] = {nullptr};
1581 ASSERT_EXIT(execve("/system/bin/run-as", args, envs), testing::ExitedWithCode(1),
Elliott Hughesbb1cc5a2022-04-01 11:12:36 -07001582 ": usage: run-as");
Elliott Hughes30a36272017-02-22 17:31:41 -08001583}
Elliott Hughes06bd5862017-07-28 16:27:49 -07001584
Elliott Hughes4d215aa2017-10-18 15:54:56 -07001585TEST(UNISTD_TEST, fexecve_failure) {
1586 ExecTestHelper eth;
1587 errno = 0;
1588 int fd = open("/", O_RDONLY);
1589 ASSERT_NE(-1, fd);
1590 ASSERT_EQ(-1, fexecve(fd, eth.GetArgs(), eth.GetEnv()));
Elliott Hughes95646e62023-09-21 14:11:19 -07001591 ASSERT_ERRNO(EACCES);
Elliott Hughes4d215aa2017-10-18 15:54:56 -07001592 close(fd);
1593}
1594
1595TEST(UNISTD_TEST, fexecve_bad_fd) {
1596 ExecTestHelper eth;
1597 errno = 0;
1598 ASSERT_EQ(-1, fexecve(-1, eth.GetArgs(), eth.GetEnv()));
Elliott Hughes95646e62023-09-21 14:11:19 -07001599 ASSERT_ERRNO(EBADF);
Elliott Hughes4d215aa2017-10-18 15:54:56 -07001600}
1601
1602TEST(UNISTD_TEST, fexecve_args) {
1603 // Test basic argument passing.
1604 int echo_fd = open(BIN_DIR "echo", O_RDONLY | O_CLOEXEC);
1605 ASSERT_NE(-1, echo_fd);
1606 ExecTestHelper eth;
1607 eth.SetArgs({"echo", "hello", "world", nullptr});
1608 eth.Run([&]() { fexecve(echo_fd, eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1609 close(echo_fd);
1610
1611 // Test environment variable setting too.
1612 int printenv_fd = open(BIN_DIR "printenv", O_RDONLY | O_CLOEXEC);
1613 ASSERT_NE(-1, printenv_fd);
1614 eth.SetArgs({"printenv", nullptr});
1615 eth.SetEnv({"A=B", nullptr});
Pirama Arumuga Nainar8035caa2020-06-09 12:48:10 -07001616
1617 std::string expected_output("A=B\n");
1618 append_llvm_cov_env_var(expected_output);
1619
1620 eth.Run([&]() { fexecve(printenv_fd, eth.GetArgs(), eth.GetEnv()); }, 0, expected_output.c_str());
Elliott Hughes4d215aa2017-10-18 15:54:56 -07001621 close(printenv_fd);
1622}
1623
Elliott Hughes06bd5862017-07-28 16:27:49 -07001624TEST(UNISTD_TEST, getlogin_r) {
1625 char buf[LOGIN_NAME_MAX] = {};
1626 EXPECT_EQ(ERANGE, getlogin_r(buf, 0));
1627 EXPECT_EQ(0, getlogin_r(buf, sizeof(buf)));
1628 EXPECT_STREQ(getlogin(), buf);
1629}
Elliott Hughesfa386e02017-10-18 13:34:32 -07001630
1631TEST(UNISTD_TEST, swab) {
1632 // POSIX: "The swab() function shall copy nbytes bytes, which are pointed to by src,
1633 // to the object pointed to by dest, exchanging adjacent bytes."
1634 char buf[BUFSIZ];
1635 memset(buf, 'x', sizeof(buf));
1636 swab("ehll oowlr\0d", buf, 12);
1637 ASSERT_STREQ("hello world", buf);
1638}
1639
1640TEST(UNISTD_TEST, swab_odd_byte_count) {
1641 // POSIX: "If nbytes is odd, swab() copies and exchanges nbytes-1 bytes and the disposition
1642 // of the last byte is unspecified."
1643 // ...but it seems unreasonable to not just leave the last byte alone.
1644 char buf[BUFSIZ];
1645 memset(buf, 'x', sizeof(buf));
1646 swab("012345", buf, 3);
1647 ASSERT_EQ('1', buf[0]);
1648 ASSERT_EQ('0', buf[1]);
1649 ASSERT_EQ('x', buf[2]);
1650}
1651
1652TEST(UNISTD_TEST, swab_overlap) {
1653 // POSIX: "If copying takes place between objects that overlap, the behavior is undefined."
1654 // ...but it seems unreasonable to not just do the right thing.
1655 char buf[] = "012345";
1656 swab(buf, buf, 4);
1657 ASSERT_EQ('1', buf[0]);
1658 ASSERT_EQ('0', buf[1]);
1659 ASSERT_EQ('3', buf[2]);
1660 ASSERT_EQ('2', buf[3]);
1661 ASSERT_EQ('4', buf[4]);
1662 ASSERT_EQ('5', buf[5]);
1663 ASSERT_EQ(0, buf[6]);
1664}
1665
1666TEST(UNISTD_TEST, swab_negative_byte_count) {
1667 // POSIX: "If nbytes is negative, swab() does nothing."
1668 char buf[BUFSIZ];
1669 memset(buf, 'x', sizeof(buf));
1670 swab("hello", buf, -1);
1671 ASSERT_EQ('x', buf[0]);
1672}
Elliott Hughesca3f8e42019-10-28 15:59:38 -07001673
1674TEST(UNISTD_TEST, usleep) {
1675 auto t0 = std::chrono::steady_clock::now();
1676 ASSERT_EQ(0, usleep(5000));
1677 auto t1 = std::chrono::steady_clock::now();
1678 ASSERT_GE(t1-t0, 5000us);
1679}
1680
1681TEST(UNISTD_TEST, sleep) {
1682 auto t0 = std::chrono::steady_clock::now();
1683 ASSERT_EQ(0U, sleep(1));
1684 auto t1 = std::chrono::steady_clock::now();
1685 ASSERT_GE(t1-t0, 1s);
1686}
Maciej Żenczykowskib65e1052022-01-21 11:19:55 -08001687
1688TEST(UNISTD_TEST, close_range) {
1689#if defined(__GLIBC__)
1690 GTEST_SKIP() << "glibc too old";
Colin Cross1b8ebea2022-05-23 16:07:22 -07001691#elif defined(ANDROID_HOST_MUSL)
1692 GTEST_SKIP() << "musl does not have close_range";
Maciej Żenczykowskib65e1052022-01-21 11:19:55 -08001693#else // __GLIBC__
1694 int fd = open("/proc/version", O_RDONLY);
1695 ASSERT_GE(fd, 0);
1696
Elliott Hughes4ae4be92023-09-22 17:15:25 -07001697 int rc = close_range(fd, fd, 0);
1698 if (rc == -1 && errno == ENOSYS) GTEST_SKIP() << "no close_range() in this kernel";
1699 ASSERT_EQ(0, rc) << strerror(errno);
1700
1701 // Check the fd is actually closed.
1702 ASSERT_EQ(close(fd), -1);
1703 ASSERT_ERRNO(EBADF);
Maciej Żenczykowskib65e1052022-01-21 11:19:55 -08001704#endif // __GLIBC__
1705}
zijunzhaoc2e412e2022-04-22 18:08:09 +00001706
1707TEST(UNISTD_TEST, copy_file_range) {
1708#if defined(__GLIBC__)
1709 GTEST_SKIP() << "glibc too old";
1710#else // __GLIBC__
1711 TemporaryFile tf;
1712 ASSERT_TRUE(android::base::WriteStringToFd("hello world", tf.fd));
1713 ASSERT_EQ(0, lseek(tf.fd, SEEK_SET, 0));
1714 TemporaryFile tf2;
1715 ASSERT_EQ(11, copy_file_range(tf.fd, NULL, tf2.fd, NULL, 11, 0));
1716 ASSERT_EQ(0, lseek(tf2.fd, SEEK_SET, 0));
1717 std::string content;
1718 ASSERT_TRUE(android::base::ReadFdToString(tf2.fd, &content));
1719 ASSERT_EQ("hello world", content);
1720#endif // __GLIBC__
Colin Cross1b8ebea2022-05-23 16:07:22 -07001721}