blob: 99d92e6fe5a79c9d010d592ad85fa9ba0c34d5e3 [file] [log] [blame]
Elliott Hughesa55f6302013-01-02 14:23:43 -08001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
Elliott Hughes33697a02016-01-26 13:04:57 -080018
Yabin Cui9df70402014-11-05 18:01:01 -080019#include "BionicDeathTest.h"
Elliott Hughes71ba5892018-02-07 12:44:45 -080020#include "SignalUtils.h"
Elliott Hughes33697a02016-01-26 13:04:57 -080021#include "utils.h"
Elliott Hughesa55f6302013-01-02 14:23:43 -080022
Elliott Hughes915fefb2014-02-18 12:34:51 -080023#include <errno.h>
Colin Cross3d19a832014-02-14 18:56:23 -080024#include <fcntl.h>
Elliott Hughes3c115902016-08-24 19:27:04 -070025#include <libgen.h>
Elliott Hughes21972b62014-07-28 12:24:22 -070026#include <limits.h>
Elliott Hughes428f5562013-02-05 16:10:59 -080027#include <stdint.h>
Greg Hackmanne2faf072016-03-03 08:37:53 -080028#include <sys/capability.h>
Yabin Cuib5e581a2014-11-08 14:58:12 -080029#include <sys/param.h>
Elliott Hughes7086ad62014-06-19 16:39:01 -070030#include <sys/syscall.h>
Elliott Hughes764a9932014-04-08 19:44:36 -070031#include <sys/types.h>
Derek Xued94e7f02014-09-25 11:12:01 +010032#include <sys/utsname.h>
Elliott Hughes764a9932014-04-08 19:44:36 -070033#include <sys/wait.h>
Yabin Cui9df70402014-11-05 18:01:01 -080034#include <unistd.h>
35
Elliott Hughesca3f8e42019-10-28 15:59:38 -070036#include <chrono>
37
Elliott Hughes939a7e02015-12-04 15:27:46 -080038#include <android-base/file.h>
39#include <android-base/strings.h>
Yabin Cuicb6f5992015-09-29 16:11:45 -070040
41#include "private/get_cpu_count_from_string.h"
42
Christopher Ferris13f26a72016-01-13 13:47:58 -080043#if defined(NOFORTIFY)
44#define UNISTD_TEST unistd_nofortify
45#define UNISTD_DEATHTEST unistd_nofortify_DeathTest
46#else
47#define UNISTD_TEST unistd
48#define UNISTD_DEATHTEST unistd_DeathTest
49#endif
50
Elliott Hughesca3f8e42019-10-28 15:59:38 -070051using namespace std::chrono_literals;
52
Elliott Hughes533dde42014-04-25 18:27:38 -070053static void* get_brk() {
54 return sbrk(0);
55}
Elliott Hughes428f5562013-02-05 16:10:59 -080056
Elliott Hughes533dde42014-04-25 18:27:38 -070057static void* page_align(uintptr_t addr) {
58 uintptr_t mask = sysconf(_SC_PAGE_SIZE) - 1;
59 return reinterpret_cast<void*>((addr + mask) & ~mask);
60}
61
Christopher Ferris13f26a72016-01-13 13:47:58 -080062TEST(UNISTD_TEST, brk) {
Elliott Hughes533dde42014-04-25 18:27:38 -070063 void* initial_break = get_brk();
64
Elliott Hughes533dde42014-04-25 18:27:38 -070065 void* new_break = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(initial_break) + 1);
Daniel Micay126ab122015-12-31 08:04:53 -050066 int ret = brk(new_break);
67 if (ret == -1) {
68 ASSERT_EQ(errno, ENOMEM);
69 } else {
70 ASSERT_EQ(0, ret);
71 ASSERT_GE(get_brk(), new_break);
72 }
Elliott Hughes428f5562013-02-05 16:10:59 -080073
Daniel Micay126ab122015-12-31 08:04:53 -050074 // Expand by a full page to force the mapping to expand
Elliott Hughes533dde42014-04-25 18:27:38 -070075 new_break = page_align(reinterpret_cast<uintptr_t>(initial_break) + sysconf(_SC_PAGE_SIZE));
Daniel Micay126ab122015-12-31 08:04:53 -050076 ret = brk(new_break);
77 if (ret == -1) {
78 ASSERT_EQ(errno, ENOMEM);
79 } else {
80 ASSERT_EQ(0, ret);
81 ASSERT_EQ(get_brk(), new_break);
82 }
Elliott Hughes533dde42014-04-25 18:27:38 -070083}
84
Christopher Ferris13f26a72016-01-13 13:47:58 -080085TEST(UNISTD_TEST, brk_ENOMEM) {
Elliott Hughes533dde42014-04-25 18:27:38 -070086 ASSERT_EQ(-1, brk(reinterpret_cast<void*>(-1)));
87 ASSERT_EQ(ENOMEM, errno);
88}
89
Christopher Ferris738b0cc2014-05-21 19:03:34 -070090#if defined(__GLIBC__)
91#define SBRK_MIN INTPTR_MIN
92#define SBRK_MAX INTPTR_MAX
93#else
94#define SBRK_MIN PTRDIFF_MIN
95#define SBRK_MAX PTRDIFF_MAX
96#endif
97
Christopher Ferris13f26a72016-01-13 13:47:58 -080098TEST(UNISTD_TEST, sbrk_ENOMEM) {
Christopher Ferris738b0cc2014-05-21 19:03:34 -070099#if defined(__BIONIC__) && !defined(__LP64__)
100 // There is no way to guarantee that all overflow conditions can be tested
101 // without manipulating the underlying values of the current break.
102 extern void* __bionic_brk;
103
104 class ScopedBrk {
105 public:
106 ScopedBrk() : saved_brk_(__bionic_brk) {}
107 virtual ~ScopedBrk() { __bionic_brk = saved_brk_; }
108
109 private:
110 void* saved_brk_;
111 };
112
113 ScopedBrk scope_brk;
114
115 // Set the current break to a point that will cause an overflow.
116 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) + 2);
Elliott Hughes533dde42014-04-25 18:27:38 -0700117
118 // Can't increase by so much that we'd overflow.
119 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MAX));
120 ASSERT_EQ(ENOMEM, errno);
121
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700122 // Set the current break to a point that will cause an overflow.
123 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX));
Elliott Hughes533dde42014-04-25 18:27:38 -0700124
Elliott Hughes533dde42014-04-25 18:27:38 -0700125 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN));
126 ASSERT_EQ(ENOMEM, errno);
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700127
128 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) - 1);
129
130 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN + 1));
131 ASSERT_EQ(ENOMEM, errno);
132#else
133 class ScopedBrk {
134 public:
135 ScopedBrk() : saved_brk_(get_brk()) {}
136 virtual ~ScopedBrk() { brk(saved_brk_); }
137
138 private:
139 void* saved_brk_;
140 };
141
142 ScopedBrk scope_brk;
143
144 uintptr_t cur_brk = reinterpret_cast<uintptr_t>(get_brk());
145 if (cur_brk < static_cast<uintptr_t>(-(SBRK_MIN+1))) {
146 // Do the overflow test for a max negative increment.
147 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MIN));
148#if defined(__BIONIC__)
149 // GLIBC does not set errno in overflow case.
150 ASSERT_EQ(ENOMEM, errno);
151#endif
152 }
153
154 uintptr_t overflow_brk = static_cast<uintptr_t>(SBRK_MAX) + 2;
155 if (cur_brk < overflow_brk) {
156 // Try and move the value to PTRDIFF_MAX + 2.
157 cur_brk = reinterpret_cast<uintptr_t>(sbrk(overflow_brk));
158 }
159 if (cur_brk >= overflow_brk) {
160 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MAX));
161#if defined(__BIONIC__)
162 // GLIBC does not set errno in overflow case.
163 ASSERT_EQ(ENOMEM, errno);
164#endif
165 }
Elliott Hughes533dde42014-04-25 18:27:38 -0700166#endif
Elliott Hughes428f5562013-02-05 16:10:59 -0800167}
Elliott Hughesb4f76162013-09-19 16:27:24 -0700168
Christopher Ferris13f26a72016-01-13 13:47:58 -0800169TEST(UNISTD_TEST, truncate) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700170 TemporaryFile tf;
171 ASSERT_EQ(0, close(tf.fd));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800172 ASSERT_EQ(0, truncate(tf.path, 123));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700173
174 struct stat sb;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800175 ASSERT_EQ(0, stat(tf.path, &sb));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700176 ASSERT_EQ(123, sb.st_size);
177}
178
Christopher Ferris13f26a72016-01-13 13:47:58 -0800179TEST(UNISTD_TEST, truncate64) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700180 TemporaryFile tf;
181 ASSERT_EQ(0, close(tf.fd));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800182 ASSERT_EQ(0, truncate64(tf.path, 123));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700183
184 struct stat sb;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800185 ASSERT_EQ(0, stat(tf.path, &sb));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700186 ASSERT_EQ(123, sb.st_size);
187}
188
Christopher Ferris13f26a72016-01-13 13:47:58 -0800189TEST(UNISTD_TEST, ftruncate) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700190 TemporaryFile tf;
191 ASSERT_EQ(0, ftruncate(tf.fd, 123));
192 ASSERT_EQ(0, close(tf.fd));
193
194 struct stat sb;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800195 ASSERT_EQ(0, stat(tf.path, &sb));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700196 ASSERT_EQ(123, sb.st_size);
197}
198
Christopher Ferris13f26a72016-01-13 13:47:58 -0800199TEST(UNISTD_TEST, ftruncate64) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700200 TemporaryFile tf;
201 ASSERT_EQ(0, ftruncate64(tf.fd, 123));
202 ASSERT_EQ(0, close(tf.fd));
203
204 struct stat sb;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800205 ASSERT_EQ(0, stat(tf.path, &sb));
Elliott Hughesb4f76162013-09-19 16:27:24 -0700206 ASSERT_EQ(123, sb.st_size);
207}
Elliott Hughes11952072013-10-24 15:15:14 -0700208
Christopher Ferris13f26a72016-01-13 13:47:58 -0800209TEST(UNISTD_TEST, ftruncate_negative) {
Dan Albertc05554e2015-05-19 18:17:31 -0700210 TemporaryFile tf;
211 errno = 0;
Dan Albert9d476a02015-06-01 11:28:31 -0700212 ASSERT_EQ(-1, ftruncate(tf.fd, -123));
213 ASSERT_EQ(EINVAL, errno);
Dan Albertc05554e2015-05-19 18:17:31 -0700214}
215
Elliott Hughes1728b232014-05-14 10:02:03 -0700216static bool g_pause_test_flag = false;
Elliott Hughes11952072013-10-24 15:15:14 -0700217static void PauseTestSignalHandler(int) {
Elliott Hughes1728b232014-05-14 10:02:03 -0700218 g_pause_test_flag = true;
Elliott Hughes11952072013-10-24 15:15:14 -0700219}
220
Christopher Ferris13f26a72016-01-13 13:47:58 -0800221TEST(UNISTD_TEST, pause) {
Christopher Ferris13613132013-10-28 15:24:04 -0700222 ScopedSignalHandler handler(SIGALRM, PauseTestSignalHandler);
223
Elliott Hughes11952072013-10-24 15:15:14 -0700224 alarm(1);
Elliott Hughes1728b232014-05-14 10:02:03 -0700225 ASSERT_FALSE(g_pause_test_flag);
Elliott Hughes11952072013-10-24 15:15:14 -0700226 ASSERT_EQ(-1, pause());
Elliott Hughes1728b232014-05-14 10:02:03 -0700227 ASSERT_TRUE(g_pause_test_flag);
Elliott Hughes11952072013-10-24 15:15:14 -0700228}
Colin Cross3d19a832014-02-14 18:56:23 -0800229
Christopher Ferris13f26a72016-01-13 13:47:58 -0800230TEST(UNISTD_TEST, read) {
Colin Cross3d19a832014-02-14 18:56:23 -0800231 int fd = open("/proc/version", O_RDONLY);
232 ASSERT_TRUE(fd != -1);
233
234 char buf[5];
235 ASSERT_EQ(5, read(fd, buf, 5));
236 ASSERT_EQ(buf[0], 'L');
237 ASSERT_EQ(buf[1], 'i');
238 ASSERT_EQ(buf[2], 'n');
239 ASSERT_EQ(buf[3], 'u');
240 ASSERT_EQ(buf[4], 'x');
241 close(fd);
242}
243
Christopher Ferris13f26a72016-01-13 13:47:58 -0800244TEST(UNISTD_TEST, read_EBADF) {
Colin Cross3d19a832014-02-14 18:56:23 -0800245 // read returns ssize_t which is 64-bits on LP64, so it's worth explicitly checking that
246 // our syscall stubs correctly return a 64-bit -1.
247 char buf[1];
248 ASSERT_EQ(-1, read(-1, buf, sizeof(buf)));
249 ASSERT_EQ(EBADF, errno);
250}
Elliott Hughesaedb00d2014-03-03 14:38:20 -0800251
Christopher Ferris13f26a72016-01-13 13:47:58 -0800252TEST(UNISTD_TEST, syscall_long) {
Elliott Hughes21972b62014-07-28 12:24:22 -0700253 // Check that syscall(3) correctly returns long results.
254 // https://code.google.com/p/android/issues/detail?id=73952
255 // We assume that the break is > 4GiB, but this is potentially flaky.
256 uintptr_t p = reinterpret_cast<uintptr_t>(sbrk(0));
257 ASSERT_EQ(p, static_cast<uintptr_t>(syscall(__NR_brk, 0)));
258}
259
Christopher Ferris13f26a72016-01-13 13:47:58 -0800260TEST(UNISTD_TEST, alarm) {
Elliott Hughesaedb00d2014-03-03 14:38:20 -0800261 ASSERT_EQ(0U, alarm(0));
262}
Elliott Hughes9f525642014-04-08 17:14:01 -0700263
Christopher Ferris13f26a72016-01-13 13:47:58 -0800264TEST(UNISTD_TEST, _exit) {
Elliott Hughes33697a02016-01-26 13:04:57 -0800265 pid_t pid = fork();
Elliott Hughes9f525642014-04-08 17:14:01 -0700266 ASSERT_NE(-1, pid) << strerror(errno);
267
268 if (pid == 0) {
269 _exit(99);
270 }
271
Elliott Hughes33697a02016-01-26 13:04:57 -0800272 AssertChildExited(pid, 99);
Elliott Hughes9f525642014-04-08 17:14:01 -0700273}
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400274
Christopher Ferris13f26a72016-01-13 13:47:58 -0800275TEST(UNISTD_TEST, getenv_unsetenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400276 ASSERT_EQ(0, setenv("test-variable", "hello", 1));
277 ASSERT_STREQ("hello", getenv("test-variable"));
278 ASSERT_EQ(0, unsetenv("test-variable"));
Yi Kong32bc0fc2018-08-02 17:31:13 -0700279 ASSERT_TRUE(getenv("test-variable") == nullptr);
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400280}
281
Christopher Ferris13f26a72016-01-13 13:47:58 -0800282TEST(UNISTD_TEST, unsetenv_EINVAL) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400283 EXPECT_EQ(-1, unsetenv(""));
284 EXPECT_EQ(EINVAL, errno);
285 EXPECT_EQ(-1, unsetenv("a=b"));
286 EXPECT_EQ(EINVAL, errno);
287}
288
Christopher Ferris13f26a72016-01-13 13:47:58 -0800289TEST(UNISTD_TEST, setenv_EINVAL) {
Yi Kong32bc0fc2018-08-02 17:31:13 -0700290 EXPECT_EQ(-1, setenv(nullptr, "value", 0));
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400291 EXPECT_EQ(EINVAL, errno);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700292 EXPECT_EQ(-1, setenv(nullptr, "value", 1));
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400293 EXPECT_EQ(EINVAL, errno);
294 EXPECT_EQ(-1, setenv("", "value", 0));
295 EXPECT_EQ(EINVAL, errno);
296 EXPECT_EQ(-1, setenv("", "value", 1));
297 EXPECT_EQ(EINVAL, errno);
298 EXPECT_EQ(-1, setenv("a=b", "value", 0));
299 EXPECT_EQ(EINVAL, errno);
300 EXPECT_EQ(-1, setenv("a=b", "value", 1));
301 EXPECT_EQ(EINVAL, errno);
302}
303
Christopher Ferris13f26a72016-01-13 13:47:58 -0800304TEST(UNISTD_TEST, setenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400305 ASSERT_EQ(0, unsetenv("test-variable"));
306
307 char a[] = "a";
308 char b[] = "b";
309 char c[] = "c";
310
311 // New value.
312 EXPECT_EQ(0, setenv("test-variable", a, 0));
313 EXPECT_STREQ(a, getenv("test-variable"));
314
315 // Existing value, no overwrite.
316 EXPECT_EQ(0, setenv("test-variable", b, 0));
317 EXPECT_STREQ(a, getenv("test-variable"));
318
319 // Existing value, overwrite.
320 EXPECT_EQ(0, setenv("test-variable", c, 1));
321 EXPECT_STREQ(c, getenv("test-variable"));
322 // But the arrays backing the values are unchanged.
323 EXPECT_EQ('a', a[0]);
324 EXPECT_EQ('b', b[0]);
325 EXPECT_EQ('c', c[0]);
326
327 ASSERT_EQ(0, unsetenv("test-variable"));
328}
329
Christopher Ferris13f26a72016-01-13 13:47:58 -0800330TEST(UNISTD_TEST, putenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400331 ASSERT_EQ(0, unsetenv("a"));
332
333 char* s1 = strdup("a=b");
334 ASSERT_EQ(0, putenv(s1));
335
336 ASSERT_STREQ("b", getenv("a"));
337 s1[2] = 'c';
338 ASSERT_STREQ("c", getenv("a"));
339
340 char* s2 = strdup("a=b");
341 ASSERT_EQ(0, putenv(s2));
342
343 ASSERT_STREQ("b", getenv("a"));
344 ASSERT_EQ('c', s1[2]);
345
346 ASSERT_EQ(0, unsetenv("a"));
347 free(s1);
348 free(s2);
349}
350
Christopher Ferris13f26a72016-01-13 13:47:58 -0800351TEST(UNISTD_TEST, clearenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400352 extern char** environ;
353
354 // Guarantee that environ is not initially empty...
355 ASSERT_EQ(0, setenv("test-variable", "a", 1));
356
357 // Stash a copy.
358 std::vector<char*> old_environ;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700359 for (size_t i = 0; environ[i] != nullptr; ++i) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400360 old_environ.push_back(strdup(environ[i]));
361 }
362
363 ASSERT_EQ(0, clearenv());
364
Yi Kong32bc0fc2018-08-02 17:31:13 -0700365 EXPECT_TRUE(environ == nullptr || environ[0] == nullptr);
366 EXPECT_EQ(nullptr, getenv("test-variable"));
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400367 EXPECT_EQ(0, setenv("test-variable", "post-clear", 1));
368 EXPECT_STREQ("post-clear", getenv("test-variable"));
369
370 // Put the old environment back.
371 for (size_t i = 0; i < old_environ.size(); ++i) {
372 EXPECT_EQ(0, putenv(old_environ[i]));
373 }
374
375 // Check it wasn't overwritten.
376 EXPECT_STREQ("a", getenv("test-variable"));
377
378 EXPECT_EQ(0, unsetenv("test-variable"));
379}
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700380
Elliott Hughes896362e2017-08-24 16:31:49 -0700381static void TestSyncFunction(int (*fn)(int)) {
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700382 int fd;
383
384 // Can't sync an invalid fd.
385 errno = 0;
386 EXPECT_EQ(-1, fn(-1));
387 EXPECT_EQ(EBADF, errno);
388
389 // It doesn't matter whether you've opened a file for write or not.
390 TemporaryFile tf;
391 ASSERT_NE(-1, tf.fd);
392
393 EXPECT_EQ(0, fn(tf.fd));
394
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800395 ASSERT_NE(-1, fd = open(tf.path, O_RDONLY));
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700396 EXPECT_EQ(0, fn(fd));
397 close(fd);
398
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800399 ASSERT_NE(-1, fd = open(tf.path, O_RDWR));
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700400 EXPECT_EQ(0, fn(fd));
401 close(fd);
402
403 // The fd can even be a directory.
Christopher Ferrisa948a4e2016-05-20 15:32:47 -0700404 ASSERT_NE(-1, fd = open("/data/local/tmp", O_RDONLY));
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700405 EXPECT_EQ(0, fn(fd));
406 close(fd);
Elliott Hughes896362e2017-08-24 16:31:49 -0700407}
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700408
Elliott Hughes896362e2017-08-24 16:31:49 -0700409static void TestFsyncFunction(int (*fn)(int)) {
410 TestSyncFunction(fn);
411
412 // But some file systems are fussy about fsync/fdatasync...
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700413 errno = 0;
Elliott Hughes896362e2017-08-24 16:31:49 -0700414 int fd = open("/proc/version", O_RDONLY);
415 ASSERT_NE(-1, fd);
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700416 EXPECT_EQ(-1, fn(fd));
417 EXPECT_EQ(EINVAL, errno);
418 close(fd);
419}
420
Christopher Ferris13f26a72016-01-13 13:47:58 -0800421TEST(UNISTD_TEST, fdatasync) {
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700422 TestFsyncFunction(fdatasync);
423}
424
Christopher Ferris13f26a72016-01-13 13:47:58 -0800425TEST(UNISTD_TEST, fsync) {
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700426 TestFsyncFunction(fsync);
427}
Elliott Hughes7086ad62014-06-19 16:39:01 -0700428
Elliott Hughes896362e2017-08-24 16:31:49 -0700429TEST(UNISTD_TEST, syncfs) {
430 TestSyncFunction(syncfs);
431}
432
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700433static void AssertGetPidCorrect() {
434 // The loop is just to make manual testing/debugging with strace easier.
435 pid_t getpid_syscall_result = syscall(__NR_getpid);
436 for (size_t i = 0; i < 128; ++i) {
437 ASSERT_EQ(getpid_syscall_result, getpid());
438 }
439}
440
Robert Seseke4621172016-11-03 15:00:53 -0400441static void TestGetPidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) {
Elliott Hughes7086ad62014-06-19 16:39:01 -0700442 pid_t parent_pid = getpid();
443 ASSERT_EQ(syscall(__NR_getpid), parent_pid);
444
Elliott Hughes5891abd2015-08-07 18:27:47 -0700445 pid_t fork_result = fork_fn();
Elliott Hughes7086ad62014-06-19 16:39:01 -0700446 ASSERT_NE(fork_result, -1);
447 if (fork_result == 0) {
448 // We're the child.
Robert Seseka4edf7a2016-10-25 10:29:02 -0400449 ASSERT_NO_FATAL_FAILURE(AssertGetPidCorrect());
Elliott Hughes7086ad62014-06-19 16:39:01 -0700450 ASSERT_EQ(parent_pid, getppid());
Robert Seseke4621172016-11-03 15:00:53 -0400451 exit_fn(123);
Elliott Hughes7086ad62014-06-19 16:39:01 -0700452 } else {
453 // We're the parent.
454 ASSERT_EQ(parent_pid, getpid());
Elliott Hughes33697a02016-01-26 13:04:57 -0800455 AssertChildExited(fork_result, 123);
Elliott Hughes7086ad62014-06-19 16:39:01 -0700456 }
457}
458
Robert Seseka4edf7a2016-10-25 10:29:02 -0400459// gettid() is marked as __attribute_const__, which will have the compiler
460// optimize out multiple calls to gettid in the same function. This wrapper
461// defeats that optimization.
462static __attribute__((__noinline__)) pid_t GetTidForTest() {
463 __asm__("");
464 return gettid();
465}
466
467static void AssertGetTidCorrect() {
468 // The loop is just to make manual testing/debugging with strace easier.
469 pid_t gettid_syscall_result = syscall(__NR_gettid);
470 for (size_t i = 0; i < 128; ++i) {
471 ASSERT_EQ(gettid_syscall_result, GetTidForTest());
472 }
473}
474
Robert Seseke4621172016-11-03 15:00:53 -0400475static void TestGetTidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) {
Robert Seseka4edf7a2016-10-25 10:29:02 -0400476 pid_t parent_tid = GetTidForTest();
477 ASSERT_EQ(syscall(__NR_gettid), parent_tid);
478
479 pid_t fork_result = fork_fn();
480 ASSERT_NE(fork_result, -1);
481 if (fork_result == 0) {
482 // We're the child.
483 EXPECT_EQ(syscall(__NR_getpid), syscall(__NR_gettid));
484 EXPECT_EQ(getpid(), GetTidForTest()) << "real tid is " << syscall(__NR_gettid)
485 << ", pid is " << syscall(__NR_getpid);
486 ASSERT_NO_FATAL_FAILURE(AssertGetTidCorrect());
Robert Seseke4621172016-11-03 15:00:53 -0400487 exit_fn(123);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400488 } else {
489 // We're the parent.
490 ASSERT_EQ(parent_tid, GetTidForTest());
491 AssertChildExited(fork_result, 123);
492 }
493}
494
Christopher Ferris13f26a72016-01-13 13:47:58 -0800495TEST(UNISTD_TEST, getpid_caching_and_fork) {
Robert Seseke4621172016-11-03 15:00:53 -0400496 TestGetPidCachingWithFork(fork, exit);
Elliott Hughes5891abd2015-08-07 18:27:47 -0700497}
498
Robert Seseka4edf7a2016-10-25 10:29:02 -0400499TEST(UNISTD_TEST, gettid_caching_and_fork) {
Robert Seseke4621172016-11-03 15:00:53 -0400500 TestGetTidCachingWithFork(fork, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400501}
502
Christopher Ferris13f26a72016-01-13 13:47:58 -0800503TEST(UNISTD_TEST, getpid_caching_and_vfork) {
Robert Seseke4621172016-11-03 15:00:53 -0400504 TestGetPidCachingWithFork(vfork, _exit);
Elliott Hughes5891abd2015-08-07 18:27:47 -0700505}
506
Robert Seseka4edf7a2016-10-25 10:29:02 -0400507static int CloneLikeFork() {
508 return clone(nullptr, nullptr, SIGCHLD, nullptr);
509}
510
511TEST(UNISTD_TEST, getpid_caching_and_clone_process) {
Robert Seseke4621172016-11-03 15:00:53 -0400512 TestGetPidCachingWithFork(CloneLikeFork, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400513}
514
515TEST(UNISTD_TEST, gettid_caching_and_clone_process) {
Robert Seseke4621172016-11-03 15:00:53 -0400516 TestGetTidCachingWithFork(CloneLikeFork, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400517}
518
519static int CloneAndSetTid() {
520 pid_t child_tid = 0;
521 pid_t parent_tid = GetTidForTest();
522
523 int rv = clone(nullptr, nullptr, CLONE_CHILD_SETTID | SIGCHLD, nullptr, nullptr, nullptr, &child_tid);
524 EXPECT_NE(-1, rv);
525
526 if (rv == 0) {
527 // Child.
528 EXPECT_EQ(child_tid, GetTidForTest());
529 EXPECT_NE(child_tid, parent_tid);
530 } else {
531 EXPECT_NE(child_tid, GetTidForTest());
532 EXPECT_NE(child_tid, parent_tid);
533 EXPECT_EQ(GetTidForTest(), parent_tid);
534 }
535
536 return rv;
537}
538
539TEST(UNISTD_TEST, gettid_caching_and_clone_process_settid) {
Robert Seseke4621172016-11-03 15:00:53 -0400540 TestGetTidCachingWithFork(CloneAndSetTid, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400541}
542
543static int CloneStartRoutine(int (*start_routine)(void*)) {
544 void* child_stack[1024];
Evgenii Stepanov7cc67062019-02-05 18:43:34 -0800545 return clone(start_routine, untag_address(&child_stack[1024]), SIGCHLD, nullptr);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400546}
547
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700548static int GetPidCachingCloneStartRoutine(void*) {
549 AssertGetPidCorrect();
550 return 123;
Elliott Hughes7086ad62014-06-19 16:39:01 -0700551}
552
Christopher Ferris13f26a72016-01-13 13:47:58 -0800553TEST(UNISTD_TEST, getpid_caching_and_clone) {
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700554 pid_t parent_pid = getpid();
555 ASSERT_EQ(syscall(__NR_getpid), parent_pid);
556
Robert Seseka4edf7a2016-10-25 10:29:02 -0400557 int clone_result = CloneStartRoutine(GetPidCachingCloneStartRoutine);
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700558 ASSERT_NE(clone_result, -1);
559
560 ASSERT_EQ(parent_pid, getpid());
561
Elliott Hughes33697a02016-01-26 13:04:57 -0800562 AssertChildExited(clone_result, 123);
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700563}
564
Robert Seseka4edf7a2016-10-25 10:29:02 -0400565static int GetTidCachingCloneStartRoutine(void*) {
566 AssertGetTidCorrect();
567 return 123;
568}
569
570TEST(UNISTD_TEST, gettid_caching_and_clone) {
571 pid_t parent_tid = GetTidForTest();
572 ASSERT_EQ(syscall(__NR_gettid), parent_tid);
573
574 int clone_result = CloneStartRoutine(GetTidCachingCloneStartRoutine);
575 ASSERT_NE(clone_result, -1);
576
577 ASSERT_EQ(parent_tid, GetTidForTest());
578
579 AssertChildExited(clone_result, 123);
580}
581
Robert Seseke4621172016-11-03 15:00:53 -0400582static int CloneChildExit(void*) {
583 AssertGetPidCorrect();
584 AssertGetTidCorrect();
585 exit(33);
586}
587
588TEST(UNISTD_TEST, clone_fn_and_exit) {
589 int clone_result = CloneStartRoutine(CloneChildExit);
590 ASSERT_NE(-1, clone_result);
591
592 AssertGetPidCorrect();
593 AssertGetTidCorrect();
594
595 AssertChildExited(clone_result, 33);
596}
597
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700598static void* GetPidCachingPthreadStartRoutine(void*) {
599 AssertGetPidCorrect();
Yi Kong32bc0fc2018-08-02 17:31:13 -0700600 return nullptr;
Elliott Hughes7086ad62014-06-19 16:39:01 -0700601}
602
Christopher Ferris13f26a72016-01-13 13:47:58 -0800603TEST(UNISTD_TEST, getpid_caching_and_pthread_create) {
Elliott Hughes7086ad62014-06-19 16:39:01 -0700604 pid_t parent_pid = getpid();
605
606 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700607 ASSERT_EQ(0, pthread_create(&t, nullptr, GetPidCachingPthreadStartRoutine, nullptr));
Elliott Hughes7086ad62014-06-19 16:39:01 -0700608
609 ASSERT_EQ(parent_pid, getpid());
610
611 void* result;
612 ASSERT_EQ(0, pthread_join(t, &result));
Yi Kong32bc0fc2018-08-02 17:31:13 -0700613 ASSERT_EQ(nullptr, result);
Elliott Hughes7086ad62014-06-19 16:39:01 -0700614}
Elliott Hughes60452a22014-09-22 14:41:30 -0700615
Robert Seseka4edf7a2016-10-25 10:29:02 -0400616static void* GetTidCachingPthreadStartRoutine(void*) {
617 AssertGetTidCorrect();
618 uint64_t tid = GetTidForTest();
619 return reinterpret_cast<void*>(tid);
620}
621
622TEST(UNISTD_TEST, gettid_caching_and_pthread_create) {
623 pid_t parent_tid = GetTidForTest();
624
625 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700626 ASSERT_EQ(0, pthread_create(&t, nullptr, GetTidCachingPthreadStartRoutine, &parent_tid));
Robert Seseka4edf7a2016-10-25 10:29:02 -0400627
628 ASSERT_EQ(parent_tid, GetTidForTest());
629
630 void* result;
631 ASSERT_EQ(0, pthread_join(t, &result));
632 ASSERT_NE(static_cast<uint64_t>(parent_tid), reinterpret_cast<uint64_t>(result));
633}
634
Evgenii Stepanov505168e2019-02-28 18:44:56 -0800635static void optimization_barrier(void* arg) {
636 asm volatile("" : : "r"(arg) : "memory");
637}
638
639__attribute__((noinline)) static void HwasanVforkTestChild() {
640 // Allocate a tagged region on stack and leave it there.
641 char x[10000];
642 optimization_barrier(x);
643 _exit(0);
644}
645
646__attribute__((noinline)) static void HwasanReadMemory(const char* p, size_t size) {
647 // Read memory byte-by-byte. This will blow up if the pointer tag in p does not match any memory
648 // tag in [p, p+size).
649 volatile char z;
650 for (size_t i = 0; i < size; ++i) {
651 z = p[i];
652 }
653}
654
655__attribute__((noinline, no_sanitize("hwaddress"))) static void HwasanVforkTestParent() {
656 // Allocate a region on stack, but don't tag it (see the function attribute).
657 // This depends on unallocated stack space at current function entry being untagged.
658 char x[10000];
659 optimization_barrier(x);
660 // Verify that contents of x[] are untagged.
661 HwasanReadMemory(x, sizeof(x));
662}
663
664TEST(UNISTD_TEST, hwasan_vfork) {
665 // Test hwasan annotation in vfork. This test is only interesting when built with hwasan, but it
666 // is supposed to work correctly either way.
667 if (vfork()) {
668 HwasanVforkTestParent();
669 } else {
670 HwasanVforkTestChild();
671 }
672}
673
Christopher Ferris13f26a72016-01-13 13:47:58 -0800674class UNISTD_DEATHTEST : public BionicDeathTest {};
Yabin Cui9df70402014-11-05 18:01:01 -0800675
Christopher Ferris13f26a72016-01-13 13:47:58 -0800676TEST_F(UNISTD_DEATHTEST, abort) {
Elliott Hughes60452a22014-09-22 14:41:30 -0700677 ASSERT_EXIT(abort(), testing::KilledBySignal(SIGABRT), "");
678}
Elliott Hughesb86a4c72014-11-07 16:07:13 -0800679
Christopher Ferris13f26a72016-01-13 13:47:58 -0800680TEST(UNISTD_TEST, sethostname) {
Elliott Hughesb86a4c72014-11-07 16:07:13 -0800681 // The permissions check happens before the argument check, so this will
682 // fail for a different reason if you're running as root than if you're
683 // not, but it'll fail either way. Checking that we have the symbol is about
684 // all we can do for sethostname(2).
685 ASSERT_EQ(-1, sethostname("", -1));
686}
Derek Xued94e7f02014-09-25 11:12:01 +0100687
Christopher Ferris13f26a72016-01-13 13:47:58 -0800688TEST(UNISTD_TEST, gethostname) {
Derek Xued94e7f02014-09-25 11:12:01 +0100689 char hostname[HOST_NAME_MAX + 1];
Derek Xued94e7f02014-09-25 11:12:01 +0100690 memset(hostname, 0, sizeof(hostname));
691
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800692 // Can we get the hostname with a big buffer?
Derek Xued94e7f02014-09-25 11:12:01 +0100693 ASSERT_EQ(0, gethostname(hostname, HOST_NAME_MAX));
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800694
695 // Can we get the hostname with a right-sized buffer?
696 errno = 0;
697 ASSERT_EQ(0, gethostname(hostname, strlen(hostname) + 1));
698
699 // Does uname(2) agree?
Derek Xued94e7f02014-09-25 11:12:01 +0100700 utsname buf;
701 ASSERT_EQ(0, uname(&buf));
702 ASSERT_EQ(0, strncmp(hostname, buf.nodename, SYS_NMLN));
703 ASSERT_GT(strlen(hostname), 0U);
704
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800705 // Do we correctly detect truncation?
Derek Xued94e7f02014-09-25 11:12:01 +0100706 errno = 0;
707 ASSERT_EQ(-1, gethostname(hostname, strlen(hostname)));
708 ASSERT_EQ(ENAMETOOLONG, errno);
Derek Xued94e7f02014-09-25 11:12:01 +0100709}
Yabin Cuib5e581a2014-11-08 14:58:12 -0800710
Christopher Ferris13f26a72016-01-13 13:47:58 -0800711TEST(UNISTD_TEST, pathconf_fpathconf) {
Yabin Cuib5e581a2014-11-08 14:58:12 -0800712 TemporaryFile tf;
713 long rc = 0L;
714 // As a file system's block size is always power of 2, the configure values
715 // for ALLOC and XFER should be power of 2 as well.
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800716 rc = pathconf(tf.path, _PC_ALLOC_SIZE_MIN);
Yabin Cuib5e581a2014-11-08 14:58:12 -0800717 ASSERT_TRUE(rc > 0 && powerof2(rc));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800718 rc = pathconf(tf.path, _PC_REC_MIN_XFER_SIZE);
Yabin Cuib5e581a2014-11-08 14:58:12 -0800719 ASSERT_TRUE(rc > 0 && powerof2(rc));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800720 rc = pathconf(tf.path, _PC_REC_XFER_ALIGN);
Yabin Cuib5e581a2014-11-08 14:58:12 -0800721 ASSERT_TRUE(rc > 0 && powerof2(rc));
722
723 rc = fpathconf(tf.fd, _PC_ALLOC_SIZE_MIN);
724 ASSERT_TRUE(rc > 0 && powerof2(rc));
725 rc = fpathconf(tf.fd, _PC_REC_MIN_XFER_SIZE);
726 ASSERT_TRUE(rc > 0 && powerof2(rc));
727 rc = fpathconf(tf.fd, _PC_REC_XFER_ALIGN);
728 ASSERT_TRUE(rc > 0 && powerof2(rc));
729}
Derek Xuebc644762014-09-25 10:55:34 +0100730
Elliott Hughes19d76852017-10-18 13:27:01 -0700731TEST(UNISTD_TEST, _POSIX_constants) {
Yabin Cui1c191942014-11-19 19:49:14 -0800732 // Make a tight verification of _POSIX_* / _POSIX2_* / _XOPEN_* macros, to prevent change by mistake.
733 // Verify according to POSIX.1-2008.
734 EXPECT_EQ(200809L, _POSIX_VERSION);
735
Elliott Hughes19d76852017-10-18 13:27:01 -0700736 EXPECT_EQ(2, _POSIX_AIO_LISTIO_MAX);
737 EXPECT_EQ(1, _POSIX_AIO_MAX);
738 EXPECT_EQ(4096, _POSIX_ARG_MAX);
739 EXPECT_EQ(25, _POSIX_CHILD_MAX);
740 EXPECT_EQ(20000000, _POSIX_CLOCKRES_MIN);
741 EXPECT_EQ(32, _POSIX_DELAYTIMER_MAX);
742 EXPECT_EQ(255, _POSIX_HOST_NAME_MAX);
743 EXPECT_EQ(8, _POSIX_LINK_MAX);
744 EXPECT_EQ(9, _POSIX_LOGIN_NAME_MAX);
745 EXPECT_EQ(255, _POSIX_MAX_CANON);
746 EXPECT_EQ(255, _POSIX_MAX_INPUT);
747 EXPECT_EQ(8, _POSIX_MQ_OPEN_MAX);
748 EXPECT_EQ(32, _POSIX_MQ_PRIO_MAX);
749 EXPECT_EQ(14, _POSIX_NAME_MAX);
750 EXPECT_EQ(8, _POSIX_NGROUPS_MAX);
751 EXPECT_EQ(20, _POSIX_OPEN_MAX);
752 EXPECT_EQ(256, _POSIX_PATH_MAX);
753 EXPECT_EQ(512, _POSIX_PIPE_BUF);
754 EXPECT_EQ(255, _POSIX_RE_DUP_MAX);
755 EXPECT_EQ(8, _POSIX_RTSIG_MAX);
756 EXPECT_EQ(256, _POSIX_SEM_NSEMS_MAX);
757 EXPECT_EQ(32767, _POSIX_SEM_VALUE_MAX);
758 EXPECT_EQ(32, _POSIX_SIGQUEUE_MAX);
759 EXPECT_EQ(32767, _POSIX_SSIZE_MAX);
760 EXPECT_EQ(8, _POSIX_STREAM_MAX);
761#if !defined(__GLIBC__)
762 EXPECT_EQ(4, _POSIX_SS_REPL_MAX);
763#endif
764 EXPECT_EQ(255, _POSIX_SYMLINK_MAX);
765 EXPECT_EQ(8, _POSIX_SYMLOOP_MAX);
766 EXPECT_EQ(4, _POSIX_THREAD_DESTRUCTOR_ITERATIONS);
767 EXPECT_EQ(128, _POSIX_THREAD_KEYS_MAX);
768 EXPECT_EQ(64, _POSIX_THREAD_THREADS_MAX);
769 EXPECT_EQ(32, _POSIX_TIMER_MAX);
770#if !defined(__GLIBC__)
771 EXPECT_EQ(30, _POSIX_TRACE_EVENT_NAME_MAX);
772 EXPECT_EQ(8, _POSIX_TRACE_NAME_MAX);
773 EXPECT_EQ(8, _POSIX_TRACE_SYS_MAX);
774 EXPECT_EQ(32, _POSIX_TRACE_USER_EVENT_MAX);
775#endif
776 EXPECT_EQ(9, _POSIX_TTY_NAME_MAX);
777 EXPECT_EQ(6, _POSIX_TZNAME_MAX);
778 EXPECT_EQ(99, _POSIX2_BC_BASE_MAX);
779 EXPECT_EQ(2048, _POSIX2_BC_DIM_MAX);
780 EXPECT_EQ(99, _POSIX2_BC_SCALE_MAX);
781 EXPECT_EQ(1000, _POSIX2_BC_STRING_MAX);
782 EXPECT_EQ(14, _POSIX2_CHARCLASS_NAME_MAX);
783 EXPECT_EQ(2, _POSIX2_COLL_WEIGHTS_MAX);
784 EXPECT_EQ(32, _POSIX2_EXPR_NEST_MAX);
785 EXPECT_EQ(2048, _POSIX2_LINE_MAX);
786 EXPECT_EQ(255, _POSIX2_RE_DUP_MAX);
787
788 EXPECT_EQ(16, _XOPEN_IOV_MAX);
789#if !defined(__GLIBC__)
790 EXPECT_EQ(255, _XOPEN_NAME_MAX);
791 EXPECT_EQ(1024, _XOPEN_PATH_MAX);
792#endif
793}
794
795TEST(UNISTD_TEST, _POSIX_options) {
Yabin Cui5afae642014-11-25 20:17:27 -0800796 EXPECT_EQ(_POSIX_VERSION, _POSIX_ADVISORY_INFO);
Elliott Hughes73c44a42016-10-19 09:27:02 -0700797 EXPECT_GT(_POSIX_BARRIERS, 0);
798 EXPECT_GT(_POSIX_SPIN_LOCKS, 0);
Yabin Cui1c191942014-11-19 19:49:14 -0800799 EXPECT_NE(_POSIX_CHOWN_RESTRICTED, -1);
800 EXPECT_EQ(_POSIX_VERSION, _POSIX_CLOCK_SELECTION);
Elliott Hughes19d76852017-10-18 13:27:01 -0700801#if !defined(__GLIBC__) // glibc supports ancient kernels.
Elliott Hughes3a8f75d2017-10-05 10:33:18 -0700802 EXPECT_EQ(_POSIX_VERSION, _POSIX_CPUTIME);
Elliott Hughes19d76852017-10-18 13:27:01 -0700803#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800804 EXPECT_EQ(_POSIX_VERSION, _POSIX_FSYNC);
Yabin Cui1c191942014-11-19 19:49:14 -0800805 EXPECT_EQ(_POSIX_VERSION, _POSIX_IPV6);
806 EXPECT_GT(_POSIX_JOB_CONTROL, 0);
Yabin Cui1c191942014-11-19 19:49:14 -0800807 EXPECT_EQ(_POSIX_VERSION, _POSIX_MAPPED_FILES);
Yabin Cui1c191942014-11-19 19:49:14 -0800808 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK);
809 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK_RANGE);
810 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMORY_PROTECTION);
Elliott Hughes19d76852017-10-18 13:27:01 -0700811#if !defined(__GLIBC__) // glibc supports ancient kernels.
Elliott Hughes3a8f75d2017-10-05 10:33:18 -0700812 EXPECT_EQ(_POSIX_VERSION, _POSIX_MONOTONIC_CLOCK);
Elliott Hughes19d76852017-10-18 13:27:01 -0700813#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800814 EXPECT_GT(_POSIX_NO_TRUNC, 0);
Yabin Cui1c191942014-11-19 19:49:14 -0800815 EXPECT_EQ(_POSIX_VERSION, _POSIX_PRIORITY_SCHEDULING);
816 EXPECT_EQ(_POSIX_VERSION, _POSIX_RAW_SOCKETS);
817 EXPECT_EQ(_POSIX_VERSION, _POSIX_READER_WRITER_LOCKS);
Yabin Cui63481602014-12-01 17:41:04 -0800818 EXPECT_EQ(_POSIX_VERSION, _POSIX_REALTIME_SIGNALS);
Yabin Cui1c191942014-11-19 19:49:14 -0800819 EXPECT_GT(_POSIX_REGEXP, 0);
Yabin Cui1c191942014-11-19 19:49:14 -0800820 EXPECT_GT(_POSIX_SAVED_IDS, 0);
821 EXPECT_EQ(_POSIX_VERSION, _POSIX_SEMAPHORES);
Yabin Cui1c191942014-11-19 19:49:14 -0800822 EXPECT_GT(_POSIX_SHELL, 0);
Elliott Hughes14e3ff92017-10-06 16:58:36 -0700823 EXPECT_EQ(_POSIX_VERSION, _POSIX_SPAWN);
Elliott Hughes19d76852017-10-18 13:27:01 -0700824 EXPECT_EQ(-1, _POSIX_SPORADIC_SERVER);
Yabin Cui1c191942014-11-19 19:49:14 -0800825 EXPECT_EQ(_POSIX_VERSION, _POSIX_SYNCHRONIZED_IO);
826 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREADS);
827 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKADDR);
828 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKSIZE);
Elliott Hughes19d76852017-10-18 13:27:01 -0700829#if !defined(__GLIBC__) // glibc supports ancient kernels.
Elliott Hughes3a8f75d2017-10-05 10:33:18 -0700830 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_CPUTIME);
Elliott Hughes19d76852017-10-18 13:27:01 -0700831#endif
Yabin Cui1c191942014-11-19 19:49:14 -0800832 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PRIORITY_SCHEDULING);
Elliott Hughes468c8082017-05-20 12:47:14 -0700833 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PROCESS_SHARED);
Yabin Cui1c191942014-11-19 19:49:14 -0800834 EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_PROTECT);
835 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_SAFE_FUNCTIONS);
Elliott Hughes19d76852017-10-18 13:27:01 -0700836 EXPECT_EQ(-1, _POSIX_THREAD_SPORADIC_SERVER);
Yabin Cui1c191942014-11-19 19:49:14 -0800837 EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMEOUTS);
838 EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMERS);
Yabin Cui1c191942014-11-19 19:49:14 -0800839 EXPECT_EQ(-1, _POSIX_TRACE);
840 EXPECT_EQ(-1, _POSIX_TRACE_EVENT_FILTER);
841 EXPECT_EQ(-1, _POSIX_TRACE_INHERIT);
842 EXPECT_EQ(-1, _POSIX_TRACE_LOG);
Yabin Cui1c191942014-11-19 19:49:14 -0800843 EXPECT_EQ(-1, _POSIX_TYPED_MEMORY_OBJECTS);
Yabin Cui1c191942014-11-19 19:49:14 -0800844 EXPECT_NE(-1, _POSIX_VDISABLE);
845
Elliott Hughesa3529352017-07-13 10:20:41 -0700846 EXPECT_EQ(_POSIX_VERSION, _POSIX2_VERSION);
Yabin Cui1c191942014-11-19 19:49:14 -0800847 EXPECT_EQ(_POSIX_VERSION, _POSIX2_C_BIND);
Elliott Hughes19d76852017-10-18 13:27:01 -0700848 EXPECT_EQ(_POSIX_VERSION, _POSIX2_CHAR_TERM);
Yabin Cui1c191942014-11-19 19:49:14 -0800849
850 EXPECT_EQ(700, _XOPEN_VERSION);
Elliott Hughes19d76852017-10-18 13:27:01 -0700851 EXPECT_EQ(1, _XOPEN_ENH_I18N);
852 EXPECT_EQ(1, _XOPEN_REALTIME);
853 EXPECT_EQ(1, _XOPEN_REALTIME_THREADS);
854 EXPECT_EQ(1, _XOPEN_SHM);
855 EXPECT_EQ(1, _XOPEN_UNIX);
Yabin Cui1c191942014-11-19 19:49:14 -0800856
857#if defined(__BIONIC__)
858 // These tests only pass on bionic, as bionic and glibc has different support on these macros.
Yabin Cui5afae642014-11-25 20:17:27 -0800859 // Macros like _POSIX_ASYNCHRONOUS_IO are not supported on bionic yet.
Yabin Cui1c191942014-11-19 19:49:14 -0800860 EXPECT_EQ(-1, _POSIX_ASYNCHRONOUS_IO);
Yabin Cui1c191942014-11-19 19:49:14 -0800861 EXPECT_EQ(-1, _POSIX_MESSAGE_PASSING);
862 EXPECT_EQ(-1, _POSIX_PRIORITIZED_IO);
Yabin Cui1c191942014-11-19 19:49:14 -0800863 EXPECT_EQ(-1, _POSIX_SHARED_MEMORY_OBJECTS);
Elliott Hughes19d76852017-10-18 13:27:01 -0700864 EXPECT_EQ(-1, _POSIX_THREAD_PRIO_INHERIT);
865 EXPECT_EQ(-1, _POSIX_THREAD_PRIO_PROTECT);
Yabin Cui1c191942014-11-19 19:49:14 -0800866 EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_INHERIT);
867
Yabin Cui1c191942014-11-19 19:49:14 -0800868 EXPECT_EQ(-1, _POSIX2_C_DEV);
Elliott Hughes19d76852017-10-18 13:27:01 -0700869 EXPECT_EQ(-1, _POSIX2_FORT_DEV);
870 EXPECT_EQ(-1, _POSIX2_FORT_RUN);
Yabin Cui1c191942014-11-19 19:49:14 -0800871 EXPECT_EQ(-1, _POSIX2_LOCALEDEF);
872 EXPECT_EQ(-1, _POSIX2_SW_DEV);
873 EXPECT_EQ(-1, _POSIX2_UPE);
874
Yabin Cui1c191942014-11-19 19:49:14 -0800875 EXPECT_EQ(-1, _XOPEN_CRYPT);
876 EXPECT_EQ(-1, _XOPEN_LEGACY);
Elliott Hughes19d76852017-10-18 13:27:01 -0700877 EXPECT_EQ(-1, _XOPEN_STREAMS);
Yabin Cui1c191942014-11-19 19:49:14 -0800878#endif // defined(__BIONIC__)
879}
880
Elliott Hughesd6f57302018-04-25 22:13:14 -0700881#define VERIFY_SYSCONF_UNKNOWN(name) \
882 VerifySysconf(name, #name, [](long v){return v == -1 && errno == EINVAL;})
883
884#define VERIFY_SYSCONF_UNSUPPORTED(name) \
885 VerifySysconf(name, #name, [](long v){return v == -1 && errno == 0;})
Yabin Cui1c191942014-11-19 19:49:14 -0800886
887// sysconf() means unlimited when it returns -1 with errno unchanged.
888#define VERIFY_SYSCONF_POSITIVE(name) \
Elliott Hughesd6f57302018-04-25 22:13:14 -0700889 VerifySysconf(name, #name, [](long v){return (v > 0 || v == -1) && errno == 0;})
Yabin Cui1c191942014-11-19 19:49:14 -0800890
891#define VERIFY_SYSCONF_POSIX_VERSION(name) \
Elliott Hughesd6f57302018-04-25 22:13:14 -0700892 VerifySysconf(name, #name, [](long v){return v == _POSIX_VERSION && errno == 0;})
Yabin Cui1c191942014-11-19 19:49:14 -0800893
894static void VerifySysconf(int option, const char *option_name, bool (*verify)(long)) {
895 errno = 0;
896 long ret = sysconf(option);
Elliott Hughesd6f57302018-04-25 22:13:14 -0700897 EXPECT_TRUE(verify(ret)) << "name = " << option_name << ", ret = "
Yabin Cui1c191942014-11-19 19:49:14 -0800898 << ret <<", Error Message: " << strerror(errno);
899}
Derek Xuebc644762014-09-25 10:55:34 +0100900
Christopher Ferris13f26a72016-01-13 13:47:58 -0800901TEST(UNISTD_TEST, sysconf) {
Yabin Cui5afae642014-11-25 20:17:27 -0800902 VERIFY_SYSCONF_POSIX_VERSION(_SC_ADVISORY_INFO);
Yabin Cui1c191942014-11-19 19:49:14 -0800903 VERIFY_SYSCONF_POSITIVE(_SC_ARG_MAX);
Elliott Hughes73c44a42016-10-19 09:27:02 -0700904 VERIFY_SYSCONF_POSIX_VERSION(_SC_BARRIERS);
Yabin Cui1c191942014-11-19 19:49:14 -0800905 VERIFY_SYSCONF_POSITIVE(_SC_BC_BASE_MAX);
906 VERIFY_SYSCONF_POSITIVE(_SC_BC_DIM_MAX);
907 VERIFY_SYSCONF_POSITIVE(_SC_BC_SCALE_MAX);
908 VERIFY_SYSCONF_POSITIVE(_SC_CHILD_MAX);
909 VERIFY_SYSCONF_POSITIVE(_SC_CLK_TCK);
910 VERIFY_SYSCONF_POSITIVE(_SC_COLL_WEIGHTS_MAX);
Yabin Cuid5c65272014-11-26 14:04:26 -0800911 VERIFY_SYSCONF_POSIX_VERSION(_SC_CPUTIME);
Yabin Cui1c191942014-11-19 19:49:14 -0800912 VERIFY_SYSCONF_POSITIVE(_SC_EXPR_NEST_MAX);
913 VERIFY_SYSCONF_POSITIVE(_SC_LINE_MAX);
914 VERIFY_SYSCONF_POSITIVE(_SC_NGROUPS_MAX);
915 VERIFY_SYSCONF_POSITIVE(_SC_OPEN_MAX);
916 VERIFY_SYSCONF_POSITIVE(_SC_PASS_MAX);
917 VERIFY_SYSCONF_POSIX_VERSION(_SC_2_C_BIND);
Elliott Hughes72927252016-07-27 14:05:10 -0700918 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_DEV);
919 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_RUN);
920 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_UPE);
Elliott Hughes6c135f42017-07-28 16:53:32 -0700921 VERIFY_SYSCONF_POSIX_VERSION(_SC_2_VERSION);
Yabin Cui1c191942014-11-19 19:49:14 -0800922 VERIFY_SYSCONF_POSITIVE(_SC_JOB_CONTROL);
923 VERIFY_SYSCONF_POSITIVE(_SC_SAVED_IDS);
924 VERIFY_SYSCONF_POSIX_VERSION(_SC_VERSION);
925 VERIFY_SYSCONF_POSITIVE(_SC_RE_DUP_MAX);
926 VERIFY_SYSCONF_POSITIVE(_SC_STREAM_MAX);
927 VERIFY_SYSCONF_POSITIVE(_SC_TZNAME_MAX);
Elliott Hughesd6f57302018-04-25 22:13:14 -0700928 VerifySysconf(_SC_XOPEN_VERSION, "_SC_XOPEN_VERSION", [](long v){return v == _XOPEN_VERSION && errno == 0;});
Yabin Cui1c191942014-11-19 19:49:14 -0800929 VERIFY_SYSCONF_POSITIVE(_SC_ATEXIT_MAX);
930 VERIFY_SYSCONF_POSITIVE(_SC_IOV_MAX);
Elliott Hughes82ab4812018-10-09 13:56:06 -0700931 VERIFY_SYSCONF_POSITIVE(_SC_UIO_MAXIOV);
932 EXPECT_EQ(sysconf(_SC_IOV_MAX), sysconf(_SC_UIO_MAXIOV));
Yabin Cui1c191942014-11-19 19:49:14 -0800933 VERIFY_SYSCONF_POSITIVE(_SC_PAGESIZE);
934 VERIFY_SYSCONF_POSITIVE(_SC_PAGE_SIZE);
Elliott Hughes189394b2015-07-24 23:22:07 -0700935 VerifySysconf(_SC_PAGE_SIZE, "_SC_PAGE_SIZE",
Elliott Hughesd6f57302018-04-25 22:13:14 -0700936 [](long v){return v == sysconf(_SC_PAGESIZE) && errno == 0 && v == getpagesize();});
Yabin Cui1c191942014-11-19 19:49:14 -0800937 VERIFY_SYSCONF_POSITIVE(_SC_XOPEN_UNIX);
938 VERIFY_SYSCONF_POSITIVE(_SC_AIO_LISTIO_MAX);
939 VERIFY_SYSCONF_POSITIVE(_SC_AIO_MAX);
Elliott Hughesd6f57302018-04-25 22:13:14 -0700940 VerifySysconf(_SC_AIO_PRIO_DELTA_MAX, "_SC_AIO_PRIO_DELTA_MAX", [](long v){return v >= 0 && errno == 0;});
Yabin Cui1c191942014-11-19 19:49:14 -0800941 VERIFY_SYSCONF_POSITIVE(_SC_DELAYTIMER_MAX);
942 VERIFY_SYSCONF_POSITIVE(_SC_MQ_OPEN_MAX);
943 VERIFY_SYSCONF_POSITIVE(_SC_MQ_PRIO_MAX);
944 VERIFY_SYSCONF_POSITIVE(_SC_RTSIG_MAX);
945 VERIFY_SYSCONF_POSITIVE(_SC_SEM_NSEMS_MAX);
946 VERIFY_SYSCONF_POSITIVE(_SC_SEM_VALUE_MAX);
Elliott Hughes73c44a42016-10-19 09:27:02 -0700947 VERIFY_SYSCONF_POSIX_VERSION(_SC_SPIN_LOCKS);
Yabin Cui1c191942014-11-19 19:49:14 -0800948 VERIFY_SYSCONF_POSITIVE(_SC_TIMER_MAX);
949 VERIFY_SYSCONF_POSIX_VERSION(_SC_FSYNC);
950 VERIFY_SYSCONF_POSIX_VERSION(_SC_MAPPED_FILES);
951 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK);
952 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK_RANGE);
953 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMORY_PROTECTION);
954 VERIFY_SYSCONF_POSIX_VERSION(_SC_PRIORITY_SCHEDULING);
Yabin Cui63481602014-12-01 17:41:04 -0800955 VERIFY_SYSCONF_POSIX_VERSION(_SC_REALTIME_SIGNALS);
Yabin Cui1c191942014-11-19 19:49:14 -0800956 VERIFY_SYSCONF_POSIX_VERSION(_SC_SEMAPHORES);
957 VERIFY_SYSCONF_POSIX_VERSION(_SC_SYNCHRONIZED_IO);
958 VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMERS);
959 VERIFY_SYSCONF_POSITIVE(_SC_GETGR_R_SIZE_MAX);
960 VERIFY_SYSCONF_POSITIVE(_SC_GETPW_R_SIZE_MAX);
961 VERIFY_SYSCONF_POSITIVE(_SC_LOGIN_NAME_MAX);
962 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_DESTRUCTOR_ITERATIONS);
963 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_KEYS_MAX);
964 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_STACK_MIN);
965 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_THREADS_MAX);
966 VERIFY_SYSCONF_POSITIVE(_SC_TTY_NAME_MAX);
967 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREADS);
968 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKADDR);
969 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKSIZE);
970 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PRIORITY_SCHEDULING);
Elliott Hughes72927252016-07-27 14:05:10 -0700971 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_INHERIT);
972 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_PROTECT);
Yabin Cui1c191942014-11-19 19:49:14 -0800973 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_SAFE_FUNCTIONS);
974 VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_CONF);
975 VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_ONLN);
976 VERIFY_SYSCONF_POSITIVE(_SC_PHYS_PAGES);
977 VERIFY_SYSCONF_POSITIVE(_SC_AVPHYS_PAGES);
978 VERIFY_SYSCONF_POSIX_VERSION(_SC_MONOTONIC_CLOCK);
Elliott Hughes72927252016-07-27 14:05:10 -0700979 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS);
980 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_ACCOUNTING);
981 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_CHECKPOINT);
982 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_LOCATE);
983 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_MESSAGE);
984 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_TRACK);
Yabin Cui1c191942014-11-19 19:49:14 -0800985 VERIFY_SYSCONF_POSIX_VERSION(_SC_CLOCK_SELECTION);
986 VERIFY_SYSCONF_POSITIVE(_SC_HOST_NAME_MAX);
987 VERIFY_SYSCONF_POSIX_VERSION(_SC_IPV6);
988 VERIFY_SYSCONF_POSIX_VERSION(_SC_RAW_SOCKETS);
989 VERIFY_SYSCONF_POSIX_VERSION(_SC_READER_WRITER_LOCKS);
990 VERIFY_SYSCONF_POSITIVE(_SC_REGEXP);
991 VERIFY_SYSCONF_POSITIVE(_SC_SHELL);
Elliott Hughes14e3ff92017-10-06 16:58:36 -0700992 VERIFY_SYSCONF_POSIX_VERSION(_SC_SPAWN);
Elliott Hughes19d76852017-10-18 13:27:01 -0700993 VERIFY_SYSCONF_UNSUPPORTED(_SC_SPORADIC_SERVER);
Yabin Cui1c191942014-11-19 19:49:14 -0800994 VERIFY_SYSCONF_POSITIVE(_SC_SYMLOOP_MAX);
995 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_CPUTIME);
Elliott Hughes468c8082017-05-20 12:47:14 -0700996 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PROCESS_SHARED);
Elliott Hughes19d76852017-10-18 13:27:01 -0700997 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_SPORADIC_SERVER);
Yabin Cui1c191942014-11-19 19:49:14 -0800998 VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMEOUTS);
Elliott Hughes72927252016-07-27 14:05:10 -0700999 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE);
1000 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_FILTER);
1001 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_NAME_MAX);
1002 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_INHERIT);
1003 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_LOG);
1004 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_NAME_MAX);
1005 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_SYS_MAX);
1006 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_USER_EVENT_MAX);
1007 VERIFY_SYSCONF_UNSUPPORTED(_SC_TYPED_MEMORY_OBJECTS);
1008 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_STREAMS);
Derek Xuebc644762014-09-25 10:55:34 +01001009
Yabin Cui1c191942014-11-19 19:49:14 -08001010#if defined(__LP64__)
Elliott Hughes72927252016-07-27 14:05:10 -07001011 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFF32);
1012 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG);
Yabin Cui1c191942014-11-19 19:49:14 -08001013 VERIFY_SYSCONF_POSITIVE(_SC_V7_LP64_OFF64);
1014 VERIFY_SYSCONF_POSITIVE(_SC_V7_LPBIG_OFFBIG);
1015#else
1016 VERIFY_SYSCONF_POSITIVE(_SC_V7_ILP32_OFF32);
1017#if defined(__BIONIC__)
1018 // bionic does not support 64 bits off_t type on 32bit machine.
Elliott Hughes72927252016-07-27 14:05:10 -07001019 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG);
Yabin Cui1c191942014-11-19 19:49:14 -08001020#endif
Elliott Hughes72927252016-07-27 14:05:10 -07001021 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LP64_OFF64);
1022 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LPBIG_OFFBIG);
Yabin Cui1c191942014-11-19 19:49:14 -08001023#endif
Derek Xuebc644762014-09-25 10:55:34 +01001024
Yabin Cui1c191942014-11-19 19:49:14 -08001025#if defined(__BIONIC__)
1026 // Tests can only run on bionic, as bionic and glibc have different support for these options.
1027 // Below options are not supported on bionic yet.
Elliott Hughes72927252016-07-27 14:05:10 -07001028 VERIFY_SYSCONF_UNSUPPORTED(_SC_ASYNCHRONOUS_IO);
Elliott Hughes72927252016-07-27 14:05:10 -07001029 VERIFY_SYSCONF_UNSUPPORTED(_SC_MESSAGE_PASSING);
1030 VERIFY_SYSCONF_UNSUPPORTED(_SC_PRIORITIZED_IO);
1031 VERIFY_SYSCONF_UNSUPPORTED(_SC_SHARED_MEMORY_OBJECTS);
Elliott Hughes72927252016-07-27 14:05:10 -07001032 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_INHERIT);
1033 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_PROTECT);
Derek Xuebc644762014-09-25 10:55:34 +01001034
Elliott Hughes72927252016-07-27 14:05:10 -07001035 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_C_DEV);
Elliott Hughes72927252016-07-27 14:05:10 -07001036 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_LOCALEDEF);
1037 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_SW_DEV);
Derek Xuebc644762014-09-25 10:55:34 +01001038
Elliott Hughes72927252016-07-27 14:05:10 -07001039 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_CRYPT);
Elliott Hughes72927252016-07-27 14:05:10 -07001040 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_LEGACY);
Elliott Hughes72927252016-07-27 14:05:10 -07001041 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_UUCP);
Yabin Cui1c191942014-11-19 19:49:14 -08001042#endif // defined(__BIONIC__)
Derek Xuebc644762014-09-25 10:55:34 +01001043}
Elliott Hughesbe52e652015-02-23 18:02:29 -08001044
Christopher Ferris13f26a72016-01-13 13:47:58 -08001045TEST(UNISTD_TEST, get_cpu_count_from_string) {
Yabin Cuicb6f5992015-09-29 16:11:45 -07001046 ASSERT_EQ(0, GetCpuCountFromString(" "));
1047 ASSERT_EQ(1, GetCpuCountFromString("0"));
1048 ASSERT_EQ(40, GetCpuCountFromString("0-39"));
1049 ASSERT_EQ(4, GetCpuCountFromString("0, 1-2, 4\n"));
1050}
1051
Christopher Ferris13f26a72016-01-13 13:47:58 -08001052TEST(UNISTD_TEST, sysconf_SC_NPROCESSORS_ONLN) {
Elliott Hughes0b2acdf2015-10-02 18:25:19 -07001053 std::string line;
1054 ASSERT_TRUE(android::base::ReadFileToString("/sys/devices/system/cpu/online", &line));
Yabin Cuicb6f5992015-09-29 16:11:45 -07001055 long online_cpus = 0;
Elliott Hughes0b2acdf2015-10-02 18:25:19 -07001056 for (const std::string& s : android::base::Split(line, ",")) {
Yabin Cuicb6f5992015-09-29 16:11:45 -07001057 std::vector<std::string> numbers = android::base::Split(s, "-");
1058 if (numbers.size() == 1u) {
1059 online_cpus++;
1060 } else {
1061 online_cpus += atoi(numbers[1].c_str()) - atoi(numbers[0].c_str()) + 1;
1062 }
1063 }
1064 ASSERT_EQ(online_cpus, sysconf(_SC_NPROCESSORS_ONLN));
1065}
1066
Elliott Hughes38dba2e2016-08-10 15:51:06 -07001067TEST(UNISTD_TEST, sysconf_SC_ARG_MAX) {
Elliott Hughesbaed51e2017-11-15 15:14:35 -08001068 // https://lkml.org/lkml/2017/11/15/813.
1069#if !defined(ARG_MAX)
1070#define ARG_MAX 131072
1071#endif
1072 ASSERT_EQ(ARG_MAX, sysconf(_SC_ARG_MAX));
Elliott Hughes38dba2e2016-08-10 15:51:06 -07001073}
1074
Elliott Hughesd6f57302018-04-25 22:13:14 -07001075TEST(UNISTD_TEST, sysconf_unknown) {
1076 VERIFY_SYSCONF_UNKNOWN(-1);
1077 VERIFY_SYSCONF_UNKNOWN(666);
1078}
1079
Christopher Ferris13f26a72016-01-13 13:47:58 -08001080TEST(UNISTD_TEST, dup2_same) {
Elliott Hughesbe52e652015-02-23 18:02:29 -08001081 // POSIX says of dup2:
1082 // If fildes2 is already a valid open file descriptor ...
1083 // [and] fildes is equal to fildes2 ... dup2() shall return
1084 // fildes2 without closing it.
1085 // This isn't true of dup3(2), so we need to manually implement that.
1086
1087 // Equal and valid.
1088 int fd = open("/proc/version", O_RDONLY);
1089 ASSERT_TRUE(fd != -1);
1090 ASSERT_EQ(fd, dup2(fd, fd));
1091 ASSERT_EQ(0, close(fd)); // Check that dup2 didn't close fd.
1092
1093 // Equal, but invalid.
1094 errno = 0;
1095 ASSERT_EQ(-1, dup2(fd, fd));
1096 ASSERT_EQ(EBADF, errno);
1097}
Elliott Hughes5704c422016-01-25 18:06:24 -08001098
Elliott Hughesa7f12942017-12-15 13:55:53 -08001099TEST(UNISTD_TEST, dup3) {
1100 int fd = open("/proc/version", O_RDONLY);
1101 ASSERT_EQ(666, dup3(fd, 666, 0));
1102 AssertCloseOnExec(666, false);
1103 close(666);
1104 ASSERT_EQ(667, dup3(fd, 667, O_CLOEXEC));
1105 AssertCloseOnExec(667, true);
1106 close(667);
1107 close(fd);
1108}
1109
Elliott Hughes5704c422016-01-25 18:06:24 -08001110TEST(UNISTD_TEST, lockf_smoke) {
1111 constexpr off64_t file_size = 32*1024LL;
1112
1113 TemporaryFile tf;
1114 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1115
1116 // Lock everything.
1117 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1118 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
1119
1120 // Try-lock everything, this should succeed too.
1121 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1122 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size));
1123
1124 // Check status.
1125 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1126 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1127
1128 // Unlock file.
1129 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1130 ASSERT_EQ(0, lockf64(tf.fd, F_ULOCK, file_size));
1131}
1132
1133TEST(UNISTD_TEST, lockf_zero) {
1134 constexpr off64_t file_size = 32*1024LL;
1135
1136 TemporaryFile tf;
1137 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1138
1139 // Lock everything by specifying a size of 0 (meaning "to the end, even if it changes").
1140 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1141 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, 0));
1142
1143 // Check that it's locked.
1144 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1145 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1146
1147 // Move the end.
1148 ASSERT_EQ(0, ftruncate(tf.fd, 2*file_size));
1149
1150 // Check that the new section is locked too.
1151 ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
1152 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, 2*file_size));
1153}
1154
1155TEST(UNISTD_TEST, lockf_negative) {
1156 constexpr off64_t file_size = 32*1024LL;
1157
1158 TemporaryFile tf;
1159 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1160
1161 // Lock everything, but specifying the range in reverse.
1162 ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
1163 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, -file_size));
1164
1165 // Check that it's locked.
1166 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1167 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1168}
1169
1170TEST(UNISTD_TEST, lockf_with_child) {
1171 constexpr off64_t file_size = 32*1024LL;
1172
1173 TemporaryFile tf;
1174 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1175
1176 // Lock everything.
1177 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1178 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
1179
1180 // Fork a child process
1181 pid_t pid = fork();
1182 ASSERT_NE(-1, pid);
1183 if (pid == 0) {
1184 // Check that the child cannot lock the file.
1185 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1186 ASSERT_EQ(-1, lockf64(tf.fd, F_TLOCK, file_size));
1187 ASSERT_EQ(EAGAIN, errno);
1188 // Check also that it reports itself as locked.
1189 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1190 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size));
1191 ASSERT_EQ(EACCES, errno);
1192 _exit(0);
1193 }
Elliott Hughes33697a02016-01-26 13:04:57 -08001194 AssertChildExited(pid, 0);
Elliott Hughes5704c422016-01-25 18:06:24 -08001195}
1196
1197TEST(UNISTD_TEST, lockf_partial_with_child) {
1198 constexpr off64_t file_size = 32*1024LL;
1199
1200 TemporaryFile tf;
1201 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1202
1203 // Lock the first half of the file.
1204 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1205 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size/2));
1206
1207 // Fork a child process.
1208 pid_t pid = fork();
1209 ASSERT_NE(-1, pid);
1210 if (pid == 0) {
1211 // Check that the child can lock the other half.
1212 ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
1213 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
1214 // Check that the child cannot lock the first half.
1215 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1216 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
1217 ASSERT_EQ(EACCES, errno);
1218 // Check also that it reports itself as locked.
1219 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1220 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
1221 ASSERT_EQ(EACCES, errno);
1222 _exit(0);
1223 }
Elliott Hughes33697a02016-01-26 13:04:57 -08001224 AssertChildExited(pid, 0);
Elliott Hughes5704c422016-01-25 18:06:24 -08001225
1226 // The second half was locked by the child, but the lock disappeared
1227 // when the process exited, so check it can be locked now.
1228 ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
1229 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
1230}
Greg Hackmanne2faf072016-03-03 08:37:53 -08001231
1232TEST(UNISTD_TEST, getdomainname) {
1233 struct utsname u;
1234 ASSERT_EQ(0, uname(&u));
1235
1236 char buf[sizeof(u.domainname)];
1237 ASSERT_EQ(0, getdomainname(buf, sizeof(buf)));
1238 EXPECT_STREQ(u.domainname, buf);
1239
1240#if defined(__BIONIC__)
1241 // bionic and glibc have different behaviors when len is too small
1242 ASSERT_EQ(-1, getdomainname(buf, strlen(u.domainname)));
1243 EXPECT_EQ(EINVAL, errno);
1244#endif
1245}
1246
1247TEST(UNISTD_TEST, setdomainname) {
1248 __user_cap_header_struct header;
1249 memset(&header, 0, sizeof(header));
1250 header.version = _LINUX_CAPABILITY_VERSION_3;
1251
1252 __user_cap_data_struct old_caps[_LINUX_CAPABILITY_U32S_3];
1253 ASSERT_EQ(0, capget(&header, &old_caps[0]));
1254
1255 auto admin_idx = CAP_TO_INDEX(CAP_SYS_ADMIN);
1256 auto admin_mask = CAP_TO_MASK(CAP_SYS_ADMIN);
1257 bool has_admin = old_caps[admin_idx].effective & admin_mask;
1258 if (has_admin) {
1259 __user_cap_data_struct new_caps[_LINUX_CAPABILITY_U32S_3];
1260 memcpy(new_caps, old_caps, sizeof(new_caps));
1261 new_caps[admin_idx].effective &= ~admin_mask;
1262
1263 ASSERT_EQ(0, capset(&header, &new_caps[0])) << "failed to drop admin privileges";
1264 }
1265
1266 const char* name = "newdomainname";
1267 ASSERT_EQ(-1, setdomainname(name, strlen(name)));
1268 ASSERT_EQ(EPERM, errno);
1269
1270 if (has_admin) {
1271 ASSERT_EQ(0, capset(&header, &old_caps[0])) << "failed to restore admin privileges";
1272 }
1273}
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001274
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001275TEST(UNISTD_TEST, execve_failure) {
1276 ExecTestHelper eth;
1277 errno = 0;
1278 ASSERT_EQ(-1, execve("/", eth.GetArgs(), eth.GetEnv()));
1279 ASSERT_EQ(EACCES, errno);
1280}
1281
Elliott Hughes3c115902016-08-24 19:27:04 -07001282TEST(UNISTD_TEST, execve_args) {
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001283 // int execve(const char* path, char* argv[], char* envp[]);
1284
1285 // Test basic argument passing.
1286 ExecTestHelper eth;
1287 eth.SetArgs({"echo", "hello", "world", nullptr});
1288 eth.Run([&]() { execve(BIN_DIR "echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1289
1290 // Test environment variable setting too.
1291 eth.SetArgs({"printenv", nullptr});
1292 eth.SetEnv({"A=B", nullptr});
1293 eth.Run([&]() { execve(BIN_DIR "printenv", eth.GetArgs(), eth.GetEnv()); }, 0, "A=B\n");
1294}
1295
1296TEST(UNISTD_TEST, execl_failure) {
1297 errno = 0;
1298 ASSERT_EQ(-1, execl("/", "/", nullptr));
1299 ASSERT_EQ(EACCES, errno);
1300}
1301
1302TEST(UNISTD_TEST, execl) {
1303 ExecTestHelper eth;
1304 // int execl(const char* path, const char* arg, ...);
1305 eth.Run([&]() { execl(BIN_DIR "echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n");
1306}
1307
1308TEST(UNISTD_TEST, execle_failure) {
1309 ExecTestHelper eth;
1310 errno = 0;
1311 ASSERT_EQ(-1, execle("/", "/", nullptr, eth.GetEnv()));
1312 ASSERT_EQ(EACCES, errno);
1313}
1314
1315TEST(UNISTD_TEST, execle) {
1316 ExecTestHelper eth;
1317 eth.SetEnv({"A=B", nullptr});
1318 // int execle(const char* path, const char* arg, ..., char* envp[]);
1319 eth.Run([&]() { execle(BIN_DIR "printenv", "printenv", nullptr, eth.GetEnv()); }, 0, "A=B\n");
1320}
1321
1322TEST(UNISTD_TEST, execv_failure) {
1323 ExecTestHelper eth;
1324 errno = 0;
1325 ASSERT_EQ(-1, execv("/", eth.GetArgs()));
1326 ASSERT_EQ(EACCES, errno);
1327}
1328
1329TEST(UNISTD_TEST, execv) {
1330 ExecTestHelper eth;
1331 eth.SetArgs({"echo", "hello", "world", nullptr});
1332 // int execv(const char* path, char* argv[]);
1333 eth.Run([&]() { execv(BIN_DIR "echo", eth.GetArgs()); }, 0, "hello world\n");
1334}
1335
1336TEST(UNISTD_TEST, execlp_failure) {
1337 errno = 0;
1338 ASSERT_EQ(-1, execlp("/", "/", nullptr));
1339 ASSERT_EQ(EACCES, errno);
1340}
1341
1342TEST(UNISTD_TEST, execlp) {
1343 ExecTestHelper eth;
1344 // int execlp(const char* file, const char* arg, ...);
1345 eth.Run([&]() { execlp("echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n");
1346}
1347
1348TEST(UNISTD_TEST, execvp_failure) {
1349 ExecTestHelper eth;
Elliott Hughes3c115902016-08-24 19:27:04 -07001350 eth.SetArgs({nullptr});
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001351 errno = 0;
1352 ASSERT_EQ(-1, execvp("/", eth.GetArgs()));
1353 ASSERT_EQ(EACCES, errno);
1354}
1355
1356TEST(UNISTD_TEST, execvp) {
1357 ExecTestHelper eth;
1358 eth.SetArgs({"echo", "hello", "world", nullptr});
1359 // int execvp(const char* file, char* argv[]);
1360 eth.Run([&]() { execvp("echo", eth.GetArgs()); }, 0, "hello world\n");
1361}
1362
1363TEST(UNISTD_TEST, execvpe_failure) {
1364 ExecTestHelper eth;
1365 errno = 0;
1366 ASSERT_EQ(-1, execvpe("this-does-not-exist", eth.GetArgs(), eth.GetEnv()));
Elliott Hughes5965bf02016-12-01 17:12:49 -08001367 // Running in CTS we might not even be able to search all directories in $PATH.
1368 ASSERT_TRUE(errno == ENOENT || errno == EACCES);
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001369}
1370
1371TEST(UNISTD_TEST, execvpe) {
1372 // int execvpe(const char* file, char* argv[], char* envp[]);
1373
1374 // Test basic argument passing.
1375 ExecTestHelper eth;
1376 eth.SetArgs({"echo", "hello", "world", nullptr});
1377 eth.Run([&]() { execvpe("echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1378
1379 // Test environment variable setting too.
1380 eth.SetArgs({"printenv", nullptr});
1381 eth.SetEnv({"A=B", nullptr});
1382 eth.Run([&]() { execvpe("printenv", eth.GetArgs(), eth.GetEnv()); }, 0, "A=B\n");
1383}
Elliott Hughes3c115902016-08-24 19:27:04 -07001384
1385TEST(UNISTD_TEST, execvpe_ENOEXEC) {
1386 // Create a shell script with #!.
1387 TemporaryFile tf;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001388 ASSERT_TRUE(android::base::WriteStringToFile("#!" BIN_DIR "sh\necho script\n", tf.path));
Elliott Hughes3c115902016-08-24 19:27:04 -07001389
1390 // Set $PATH so we can find it.
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001391 setenv("PATH", dirname(tf.path), 1);
Elliott Hughes3c115902016-08-24 19:27:04 -07001392
1393 ExecTestHelper eth;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001394 eth.SetArgs({basename(tf.path), nullptr});
Elliott Hughes3c115902016-08-24 19:27:04 -07001395
1396 // It's not inherently executable.
1397 errno = 0;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001398 ASSERT_EQ(-1, execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()));
Elliott Hughes3c115902016-08-24 19:27:04 -07001399 ASSERT_EQ(EACCES, errno);
1400
Elliott Hughes5965bf02016-12-01 17:12:49 -08001401 // Make it executable (and keep it writable because we're going to rewrite it below).
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001402 ASSERT_EQ(0, chmod(tf.path, 0777));
Elliott Hughes3c115902016-08-24 19:27:04 -07001403
1404 // TemporaryFile will have a writable fd, so we can test ETXTBSY while we're here...
1405 errno = 0;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001406 ASSERT_EQ(-1, execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()));
Elliott Hughes3c115902016-08-24 19:27:04 -07001407 ASSERT_EQ(ETXTBSY, errno);
1408
1409 // 1. The simplest test: the kernel should handle this.
1410 ASSERT_EQ(0, close(tf.fd));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001411 eth.Run([&]() { execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
Elliott Hughes3c115902016-08-24 19:27:04 -07001412
1413 // 2. Try again without a #!. We should have to handle this ourselves.
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001414 ASSERT_TRUE(android::base::WriteStringToFile("echo script\n", tf.path));
1415 eth.Run([&]() { execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
Elliott Hughes3c115902016-08-24 19:27:04 -07001416
1417 // 3. Again without a #!, but also with a leading '/', since that's a special case in the
1418 // implementation.
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -08001419 eth.Run([&]() { execvpe(tf.path, eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
Elliott Hughes3c115902016-08-24 19:27:04 -07001420}
Elliott Hughes63615062016-08-25 17:40:27 -07001421
1422TEST(UNISTD_TEST, execvp_libcore_test_55017) {
1423 ExecTestHelper eth;
1424 eth.SetArgs({"/system/bin/does-not-exist", nullptr});
1425
1426 errno = 0;
1427 ASSERT_EQ(-1, execvp("/system/bin/does-not-exist", eth.GetArgs()));
1428 ASSERT_EQ(ENOENT, errno);
1429}
Elliott Hughes30a36272017-02-22 17:31:41 -08001430
1431TEST(UNISTD_TEST, exec_argv0_null) {
1432 // http://b/33276926
1433 char* args[] = {nullptr};
1434 char* envs[] = {nullptr};
1435 ASSERT_EXIT(execve("/system/bin/run-as", args, envs), testing::ExitedWithCode(1),
1436 "<unknown>: usage: run-as");
1437}
Elliott Hughes06bd5862017-07-28 16:27:49 -07001438
Elliott Hughes4d215aa2017-10-18 15:54:56 -07001439TEST(UNISTD_TEST, fexecve_failure) {
1440 ExecTestHelper eth;
1441 errno = 0;
1442 int fd = open("/", O_RDONLY);
1443 ASSERT_NE(-1, fd);
1444 ASSERT_EQ(-1, fexecve(fd, eth.GetArgs(), eth.GetEnv()));
1445 ASSERT_EQ(EACCES, errno);
1446 close(fd);
1447}
1448
1449TEST(UNISTD_TEST, fexecve_bad_fd) {
1450 ExecTestHelper eth;
1451 errno = 0;
1452 ASSERT_EQ(-1, fexecve(-1, eth.GetArgs(), eth.GetEnv()));
1453 ASSERT_EQ(EBADF, errno);
1454}
1455
1456TEST(UNISTD_TEST, fexecve_args) {
1457 // Test basic argument passing.
1458 int echo_fd = open(BIN_DIR "echo", O_RDONLY | O_CLOEXEC);
1459 ASSERT_NE(-1, echo_fd);
1460 ExecTestHelper eth;
1461 eth.SetArgs({"echo", "hello", "world", nullptr});
1462 eth.Run([&]() { fexecve(echo_fd, eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1463 close(echo_fd);
1464
1465 // Test environment variable setting too.
1466 int printenv_fd = open(BIN_DIR "printenv", O_RDONLY | O_CLOEXEC);
1467 ASSERT_NE(-1, printenv_fd);
1468 eth.SetArgs({"printenv", nullptr});
1469 eth.SetEnv({"A=B", nullptr});
1470 eth.Run([&]() { fexecve(printenv_fd, eth.GetArgs(), eth.GetEnv()); }, 0, "A=B\n");
1471 close(printenv_fd);
1472}
1473
Elliott Hughes06bd5862017-07-28 16:27:49 -07001474TEST(UNISTD_TEST, getlogin_r) {
1475 char buf[LOGIN_NAME_MAX] = {};
1476 EXPECT_EQ(ERANGE, getlogin_r(buf, 0));
1477 EXPECT_EQ(0, getlogin_r(buf, sizeof(buf)));
1478 EXPECT_STREQ(getlogin(), buf);
1479}
Elliott Hughesfa386e02017-10-18 13:34:32 -07001480
1481TEST(UNISTD_TEST, swab) {
1482 // POSIX: "The swab() function shall copy nbytes bytes, which are pointed to by src,
1483 // to the object pointed to by dest, exchanging adjacent bytes."
1484 char buf[BUFSIZ];
1485 memset(buf, 'x', sizeof(buf));
1486 swab("ehll oowlr\0d", buf, 12);
1487 ASSERT_STREQ("hello world", buf);
1488}
1489
1490TEST(UNISTD_TEST, swab_odd_byte_count) {
1491 // POSIX: "If nbytes is odd, swab() copies and exchanges nbytes-1 bytes and the disposition
1492 // of the last byte is unspecified."
1493 // ...but it seems unreasonable to not just leave the last byte alone.
1494 char buf[BUFSIZ];
1495 memset(buf, 'x', sizeof(buf));
1496 swab("012345", buf, 3);
1497 ASSERT_EQ('1', buf[0]);
1498 ASSERT_EQ('0', buf[1]);
1499 ASSERT_EQ('x', buf[2]);
1500}
1501
1502TEST(UNISTD_TEST, swab_overlap) {
1503 // POSIX: "If copying takes place between objects that overlap, the behavior is undefined."
1504 // ...but it seems unreasonable to not just do the right thing.
1505 char buf[] = "012345";
1506 swab(buf, buf, 4);
1507 ASSERT_EQ('1', buf[0]);
1508 ASSERT_EQ('0', buf[1]);
1509 ASSERT_EQ('3', buf[2]);
1510 ASSERT_EQ('2', buf[3]);
1511 ASSERT_EQ('4', buf[4]);
1512 ASSERT_EQ('5', buf[5]);
1513 ASSERT_EQ(0, buf[6]);
1514}
1515
1516TEST(UNISTD_TEST, swab_negative_byte_count) {
1517 // POSIX: "If nbytes is negative, swab() does nothing."
1518 char buf[BUFSIZ];
1519 memset(buf, 'x', sizeof(buf));
1520 swab("hello", buf, -1);
1521 ASSERT_EQ('x', buf[0]);
1522}
Elliott Hughesca3f8e42019-10-28 15:59:38 -07001523
1524TEST(UNISTD_TEST, usleep) {
1525 auto t0 = std::chrono::steady_clock::now();
1526 ASSERT_EQ(0, usleep(5000));
1527 auto t1 = std::chrono::steady_clock::now();
1528 ASSERT_GE(t1-t0, 5000us);
1529}
1530
1531TEST(UNISTD_TEST, sleep) {
1532 auto t0 = std::chrono::steady_clock::now();
1533 ASSERT_EQ(0U, sleep(1));
1534 auto t1 = std::chrono::steady_clock::now();
1535 ASSERT_GE(t1-t0, 1s);
1536}