blob: 79b0fa5fcec35b4fb200722b5af77e45c4201f39 [file] [log] [blame]
Elliott Hughesa55f6302013-01-02 14:23:43 -08001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
Elliott Hughes33697a02016-01-26 13:04:57 -080018
Yabin Cui9df70402014-11-05 18:01:01 -080019#include "BionicDeathTest.h"
Christopher Ferris13613132013-10-28 15:24:04 -070020#include "ScopedSignalHandler.h"
Elliott Hughesb4f76162013-09-19 16:27:24 -070021#include "TemporaryFile.h"
Elliott Hughes33697a02016-01-26 13:04:57 -080022#include "utils.h"
Elliott Hughesa55f6302013-01-02 14:23:43 -080023
Elliott Hughes915fefb2014-02-18 12:34:51 -080024#include <errno.h>
Colin Cross3d19a832014-02-14 18:56:23 -080025#include <fcntl.h>
Elliott Hughes21972b62014-07-28 12:24:22 -070026#include <limits.h>
Elliott Hughes428f5562013-02-05 16:10:59 -080027#include <stdint.h>
Greg Hackmanne2faf072016-03-03 08:37:53 -080028#include <sys/capability.h>
Yabin Cuib5e581a2014-11-08 14:58:12 -080029#include <sys/param.h>
Elliott Hughes7086ad62014-06-19 16:39:01 -070030#include <sys/syscall.h>
Elliott Hughes764a9932014-04-08 19:44:36 -070031#include <sys/types.h>
Derek Xued94e7f02014-09-25 11:12:01 +010032#include <sys/utsname.h>
Elliott Hughes764a9932014-04-08 19:44:36 -070033#include <sys/wait.h>
Yabin Cui9df70402014-11-05 18:01:01 -080034#include <unistd.h>
35
Elliott Hughes939a7e02015-12-04 15:27:46 -080036#include <android-base/file.h>
37#include <android-base/strings.h>
Yabin Cuicb6f5992015-09-29 16:11:45 -070038
39#include "private/get_cpu_count_from_string.h"
40
Christopher Ferris13f26a72016-01-13 13:47:58 -080041#if defined(NOFORTIFY)
42#define UNISTD_TEST unistd_nofortify
43#define UNISTD_DEATHTEST unistd_nofortify_DeathTest
44#else
45#define UNISTD_TEST unistd
46#define UNISTD_DEATHTEST unistd_DeathTest
47#endif
48
Elliott Hughes533dde42014-04-25 18:27:38 -070049static void* get_brk() {
50 return sbrk(0);
51}
Elliott Hughes428f5562013-02-05 16:10:59 -080052
Elliott Hughes533dde42014-04-25 18:27:38 -070053static void* page_align(uintptr_t addr) {
54 uintptr_t mask = sysconf(_SC_PAGE_SIZE) - 1;
55 return reinterpret_cast<void*>((addr + mask) & ~mask);
56}
57
Christopher Ferris13f26a72016-01-13 13:47:58 -080058TEST(UNISTD_TEST, brk) {
Elliott Hughes533dde42014-04-25 18:27:38 -070059 void* initial_break = get_brk();
60
61 // The kernel aligns the break to a page.
62 void* new_break = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(initial_break) + 1);
Elliott Hughes428f5562013-02-05 16:10:59 -080063 ASSERT_EQ(0, brk(new_break));
Elliott Hughes533dde42014-04-25 18:27:38 -070064 ASSERT_GE(get_brk(), new_break);
Elliott Hughes428f5562013-02-05 16:10:59 -080065
Elliott Hughes533dde42014-04-25 18:27:38 -070066 new_break = page_align(reinterpret_cast<uintptr_t>(initial_break) + sysconf(_SC_PAGE_SIZE));
67 ASSERT_EQ(0, brk(new_break));
68 ASSERT_EQ(get_brk(), new_break);
69}
70
Christopher Ferris13f26a72016-01-13 13:47:58 -080071TEST(UNISTD_TEST, brk_ENOMEM) {
Elliott Hughes533dde42014-04-25 18:27:38 -070072 ASSERT_EQ(-1, brk(reinterpret_cast<void*>(-1)));
73 ASSERT_EQ(ENOMEM, errno);
74}
75
Christopher Ferris738b0cc2014-05-21 19:03:34 -070076#if defined(__GLIBC__)
77#define SBRK_MIN INTPTR_MIN
78#define SBRK_MAX INTPTR_MAX
79#else
80#define SBRK_MIN PTRDIFF_MIN
81#define SBRK_MAX PTRDIFF_MAX
82#endif
83
Christopher Ferris13f26a72016-01-13 13:47:58 -080084TEST(UNISTD_TEST, sbrk_ENOMEM) {
Christopher Ferris738b0cc2014-05-21 19:03:34 -070085#if defined(__BIONIC__) && !defined(__LP64__)
86 // There is no way to guarantee that all overflow conditions can be tested
87 // without manipulating the underlying values of the current break.
88 extern void* __bionic_brk;
89
90 class ScopedBrk {
91 public:
92 ScopedBrk() : saved_brk_(__bionic_brk) {}
93 virtual ~ScopedBrk() { __bionic_brk = saved_brk_; }
94
95 private:
96 void* saved_brk_;
97 };
98
99 ScopedBrk scope_brk;
100
101 // Set the current break to a point that will cause an overflow.
102 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) + 2);
Elliott Hughes533dde42014-04-25 18:27:38 -0700103
104 // Can't increase by so much that we'd overflow.
105 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MAX));
106 ASSERT_EQ(ENOMEM, errno);
107
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700108 // Set the current break to a point that will cause an overflow.
109 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX));
Elliott Hughes533dde42014-04-25 18:27:38 -0700110
Elliott Hughes533dde42014-04-25 18:27:38 -0700111 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN));
112 ASSERT_EQ(ENOMEM, errno);
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700113
114 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) - 1);
115
116 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN + 1));
117 ASSERT_EQ(ENOMEM, errno);
118#else
119 class ScopedBrk {
120 public:
121 ScopedBrk() : saved_brk_(get_brk()) {}
122 virtual ~ScopedBrk() { brk(saved_brk_); }
123
124 private:
125 void* saved_brk_;
126 };
127
128 ScopedBrk scope_brk;
129
130 uintptr_t cur_brk = reinterpret_cast<uintptr_t>(get_brk());
131 if (cur_brk < static_cast<uintptr_t>(-(SBRK_MIN+1))) {
132 // Do the overflow test for a max negative increment.
133 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MIN));
134#if defined(__BIONIC__)
135 // GLIBC does not set errno in overflow case.
136 ASSERT_EQ(ENOMEM, errno);
137#endif
138 }
139
140 uintptr_t overflow_brk = static_cast<uintptr_t>(SBRK_MAX) + 2;
141 if (cur_brk < overflow_brk) {
142 // Try and move the value to PTRDIFF_MAX + 2.
143 cur_brk = reinterpret_cast<uintptr_t>(sbrk(overflow_brk));
144 }
145 if (cur_brk >= overflow_brk) {
146 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MAX));
147#if defined(__BIONIC__)
148 // GLIBC does not set errno in overflow case.
149 ASSERT_EQ(ENOMEM, errno);
150#endif
151 }
Elliott Hughes533dde42014-04-25 18:27:38 -0700152#endif
Elliott Hughes428f5562013-02-05 16:10:59 -0800153}
Elliott Hughesb4f76162013-09-19 16:27:24 -0700154
Christopher Ferris13f26a72016-01-13 13:47:58 -0800155TEST(UNISTD_TEST, truncate) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700156 TemporaryFile tf;
157 ASSERT_EQ(0, close(tf.fd));
158 ASSERT_EQ(0, truncate(tf.filename, 123));
159
160 struct stat sb;
161 ASSERT_EQ(0, stat(tf.filename, &sb));
162 ASSERT_EQ(123, sb.st_size);
163}
164
Christopher Ferris13f26a72016-01-13 13:47:58 -0800165TEST(UNISTD_TEST, truncate64) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700166 TemporaryFile tf;
167 ASSERT_EQ(0, close(tf.fd));
168 ASSERT_EQ(0, truncate64(tf.filename, 123));
169
170 struct stat sb;
171 ASSERT_EQ(0, stat(tf.filename, &sb));
172 ASSERT_EQ(123, sb.st_size);
173}
174
Christopher Ferris13f26a72016-01-13 13:47:58 -0800175TEST(UNISTD_TEST, ftruncate) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700176 TemporaryFile tf;
177 ASSERT_EQ(0, ftruncate(tf.fd, 123));
178 ASSERT_EQ(0, close(tf.fd));
179
180 struct stat sb;
181 ASSERT_EQ(0, stat(tf.filename, &sb));
182 ASSERT_EQ(123, sb.st_size);
183}
184
Christopher Ferris13f26a72016-01-13 13:47:58 -0800185TEST(UNISTD_TEST, ftruncate64) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700186 TemporaryFile tf;
187 ASSERT_EQ(0, ftruncate64(tf.fd, 123));
188 ASSERT_EQ(0, close(tf.fd));
189
190 struct stat sb;
191 ASSERT_EQ(0, stat(tf.filename, &sb));
192 ASSERT_EQ(123, sb.st_size);
193}
Elliott Hughes11952072013-10-24 15:15:14 -0700194
Christopher Ferris13f26a72016-01-13 13:47:58 -0800195TEST(UNISTD_TEST, ftruncate_negative) {
Dan Albertc05554e2015-05-19 18:17:31 -0700196 TemporaryFile tf;
197 errno = 0;
Dan Albert9d476a02015-06-01 11:28:31 -0700198 ASSERT_EQ(-1, ftruncate(tf.fd, -123));
199 ASSERT_EQ(EINVAL, errno);
Dan Albertc05554e2015-05-19 18:17:31 -0700200}
201
Elliott Hughes1728b232014-05-14 10:02:03 -0700202static bool g_pause_test_flag = false;
Elliott Hughes11952072013-10-24 15:15:14 -0700203static void PauseTestSignalHandler(int) {
Elliott Hughes1728b232014-05-14 10:02:03 -0700204 g_pause_test_flag = true;
Elliott Hughes11952072013-10-24 15:15:14 -0700205}
206
Christopher Ferris13f26a72016-01-13 13:47:58 -0800207TEST(UNISTD_TEST, pause) {
Christopher Ferris13613132013-10-28 15:24:04 -0700208 ScopedSignalHandler handler(SIGALRM, PauseTestSignalHandler);
209
Elliott Hughes11952072013-10-24 15:15:14 -0700210 alarm(1);
Elliott Hughes1728b232014-05-14 10:02:03 -0700211 ASSERT_FALSE(g_pause_test_flag);
Elliott Hughes11952072013-10-24 15:15:14 -0700212 ASSERT_EQ(-1, pause());
Elliott Hughes1728b232014-05-14 10:02:03 -0700213 ASSERT_TRUE(g_pause_test_flag);
Elliott Hughes11952072013-10-24 15:15:14 -0700214}
Colin Cross3d19a832014-02-14 18:56:23 -0800215
Christopher Ferris13f26a72016-01-13 13:47:58 -0800216TEST(UNISTD_TEST, read) {
Colin Cross3d19a832014-02-14 18:56:23 -0800217 int fd = open("/proc/version", O_RDONLY);
218 ASSERT_TRUE(fd != -1);
219
220 char buf[5];
221 ASSERT_EQ(5, read(fd, buf, 5));
222 ASSERT_EQ(buf[0], 'L');
223 ASSERT_EQ(buf[1], 'i');
224 ASSERT_EQ(buf[2], 'n');
225 ASSERT_EQ(buf[3], 'u');
226 ASSERT_EQ(buf[4], 'x');
227 close(fd);
228}
229
Christopher Ferris13f26a72016-01-13 13:47:58 -0800230TEST(UNISTD_TEST, read_EBADF) {
Colin Cross3d19a832014-02-14 18:56:23 -0800231 // read returns ssize_t which is 64-bits on LP64, so it's worth explicitly checking that
232 // our syscall stubs correctly return a 64-bit -1.
233 char buf[1];
234 ASSERT_EQ(-1, read(-1, buf, sizeof(buf)));
235 ASSERT_EQ(EBADF, errno);
236}
Elliott Hughesaedb00d2014-03-03 14:38:20 -0800237
Christopher Ferris13f26a72016-01-13 13:47:58 -0800238TEST(UNISTD_TEST, syscall_long) {
Elliott Hughes21972b62014-07-28 12:24:22 -0700239 // Check that syscall(3) correctly returns long results.
240 // https://code.google.com/p/android/issues/detail?id=73952
241 // We assume that the break is > 4GiB, but this is potentially flaky.
242 uintptr_t p = reinterpret_cast<uintptr_t>(sbrk(0));
243 ASSERT_EQ(p, static_cast<uintptr_t>(syscall(__NR_brk, 0)));
244}
245
Christopher Ferris13f26a72016-01-13 13:47:58 -0800246TEST(UNISTD_TEST, alarm) {
Elliott Hughesaedb00d2014-03-03 14:38:20 -0800247 ASSERT_EQ(0U, alarm(0));
248}
Elliott Hughes9f525642014-04-08 17:14:01 -0700249
Christopher Ferris13f26a72016-01-13 13:47:58 -0800250TEST(UNISTD_TEST, _exit) {
Elliott Hughes33697a02016-01-26 13:04:57 -0800251 pid_t pid = fork();
Elliott Hughes9f525642014-04-08 17:14:01 -0700252 ASSERT_NE(-1, pid) << strerror(errno);
253
254 if (pid == 0) {
255 _exit(99);
256 }
257
Elliott Hughes33697a02016-01-26 13:04:57 -0800258 AssertChildExited(pid, 99);
Elliott Hughes9f525642014-04-08 17:14:01 -0700259}
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400260
Christopher Ferris13f26a72016-01-13 13:47:58 -0800261TEST(UNISTD_TEST, getenv_unsetenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400262 ASSERT_EQ(0, setenv("test-variable", "hello", 1));
263 ASSERT_STREQ("hello", getenv("test-variable"));
264 ASSERT_EQ(0, unsetenv("test-variable"));
265 ASSERT_TRUE(getenv("test-variable") == NULL);
266}
267
Christopher Ferris13f26a72016-01-13 13:47:58 -0800268TEST(UNISTD_TEST, unsetenv_EINVAL) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400269 EXPECT_EQ(-1, unsetenv(""));
270 EXPECT_EQ(EINVAL, errno);
271 EXPECT_EQ(-1, unsetenv("a=b"));
272 EXPECT_EQ(EINVAL, errno);
273}
274
Christopher Ferris13f26a72016-01-13 13:47:58 -0800275TEST(UNISTD_TEST, setenv_EINVAL) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400276 EXPECT_EQ(-1, setenv(NULL, "value", 0));
277 EXPECT_EQ(EINVAL, errno);
278 EXPECT_EQ(-1, setenv(NULL, "value", 1));
279 EXPECT_EQ(EINVAL, errno);
280 EXPECT_EQ(-1, setenv("", "value", 0));
281 EXPECT_EQ(EINVAL, errno);
282 EXPECT_EQ(-1, setenv("", "value", 1));
283 EXPECT_EQ(EINVAL, errno);
284 EXPECT_EQ(-1, setenv("a=b", "value", 0));
285 EXPECT_EQ(EINVAL, errno);
286 EXPECT_EQ(-1, setenv("a=b", "value", 1));
287 EXPECT_EQ(EINVAL, errno);
288}
289
Christopher Ferris13f26a72016-01-13 13:47:58 -0800290TEST(UNISTD_TEST, setenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400291 ASSERT_EQ(0, unsetenv("test-variable"));
292
293 char a[] = "a";
294 char b[] = "b";
295 char c[] = "c";
296
297 // New value.
298 EXPECT_EQ(0, setenv("test-variable", a, 0));
299 EXPECT_STREQ(a, getenv("test-variable"));
300
301 // Existing value, no overwrite.
302 EXPECT_EQ(0, setenv("test-variable", b, 0));
303 EXPECT_STREQ(a, getenv("test-variable"));
304
305 // Existing value, overwrite.
306 EXPECT_EQ(0, setenv("test-variable", c, 1));
307 EXPECT_STREQ(c, getenv("test-variable"));
308 // But the arrays backing the values are unchanged.
309 EXPECT_EQ('a', a[0]);
310 EXPECT_EQ('b', b[0]);
311 EXPECT_EQ('c', c[0]);
312
313 ASSERT_EQ(0, unsetenv("test-variable"));
314}
315
Christopher Ferris13f26a72016-01-13 13:47:58 -0800316TEST(UNISTD_TEST, putenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400317 ASSERT_EQ(0, unsetenv("a"));
318
319 char* s1 = strdup("a=b");
320 ASSERT_EQ(0, putenv(s1));
321
322 ASSERT_STREQ("b", getenv("a"));
323 s1[2] = 'c';
324 ASSERT_STREQ("c", getenv("a"));
325
326 char* s2 = strdup("a=b");
327 ASSERT_EQ(0, putenv(s2));
328
329 ASSERT_STREQ("b", getenv("a"));
330 ASSERT_EQ('c', s1[2]);
331
332 ASSERT_EQ(0, unsetenv("a"));
333 free(s1);
334 free(s2);
335}
336
Christopher Ferris13f26a72016-01-13 13:47:58 -0800337TEST(UNISTD_TEST, clearenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400338 extern char** environ;
339
340 // Guarantee that environ is not initially empty...
341 ASSERT_EQ(0, setenv("test-variable", "a", 1));
342
343 // Stash a copy.
344 std::vector<char*> old_environ;
345 for (size_t i = 0; environ[i] != NULL; ++i) {
346 old_environ.push_back(strdup(environ[i]));
347 }
348
349 ASSERT_EQ(0, clearenv());
350
351 EXPECT_TRUE(environ == NULL || environ[0] == NULL);
352 EXPECT_EQ(NULL, getenv("test-variable"));
353 EXPECT_EQ(0, setenv("test-variable", "post-clear", 1));
354 EXPECT_STREQ("post-clear", getenv("test-variable"));
355
356 // Put the old environment back.
357 for (size_t i = 0; i < old_environ.size(); ++i) {
358 EXPECT_EQ(0, putenv(old_environ[i]));
359 }
360
361 // Check it wasn't overwritten.
362 EXPECT_STREQ("a", getenv("test-variable"));
363
364 EXPECT_EQ(0, unsetenv("test-variable"));
365}
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700366
367static void TestFsyncFunction(int (*fn)(int)) {
368 int fd;
369
370 // Can't sync an invalid fd.
371 errno = 0;
372 EXPECT_EQ(-1, fn(-1));
373 EXPECT_EQ(EBADF, errno);
374
375 // It doesn't matter whether you've opened a file for write or not.
376 TemporaryFile tf;
377 ASSERT_NE(-1, tf.fd);
378
379 EXPECT_EQ(0, fn(tf.fd));
380
381 ASSERT_NE(-1, fd = open(tf.filename, O_RDONLY));
382 EXPECT_EQ(0, fn(fd));
383 close(fd);
384
385 ASSERT_NE(-1, fd = open(tf.filename, O_RDWR));
386 EXPECT_EQ(0, fn(fd));
387 close(fd);
388
389 // The fd can even be a directory.
390 ASSERT_NE(-1, fd = open("/", O_RDONLY));
391 EXPECT_EQ(0, fn(fd));
392 close(fd);
393
394 // But some file systems may choose to be fussy...
395 errno = 0;
396 ASSERT_NE(-1, fd = open("/proc/version", O_RDONLY));
397 EXPECT_EQ(-1, fn(fd));
398 EXPECT_EQ(EINVAL, errno);
399 close(fd);
400}
401
Christopher Ferris13f26a72016-01-13 13:47:58 -0800402TEST(UNISTD_TEST, fdatasync) {
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700403 TestFsyncFunction(fdatasync);
404}
405
Christopher Ferris13f26a72016-01-13 13:47:58 -0800406TEST(UNISTD_TEST, fsync) {
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700407 TestFsyncFunction(fsync);
408}
Elliott Hughes7086ad62014-06-19 16:39:01 -0700409
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700410static void AssertGetPidCorrect() {
411 // The loop is just to make manual testing/debugging with strace easier.
412 pid_t getpid_syscall_result = syscall(__NR_getpid);
413 for (size_t i = 0; i < 128; ++i) {
414 ASSERT_EQ(getpid_syscall_result, getpid());
415 }
416}
417
Elliott Hughes5891abd2015-08-07 18:27:47 -0700418static void TestGetPidCachingWithFork(int (*fork_fn)()) {
Elliott Hughes7086ad62014-06-19 16:39:01 -0700419 pid_t parent_pid = getpid();
420 ASSERT_EQ(syscall(__NR_getpid), parent_pid);
421
Elliott Hughes5891abd2015-08-07 18:27:47 -0700422 pid_t fork_result = fork_fn();
Elliott Hughes7086ad62014-06-19 16:39:01 -0700423 ASSERT_NE(fork_result, -1);
424 if (fork_result == 0) {
425 // We're the child.
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700426 AssertGetPidCorrect();
Elliott Hughes7086ad62014-06-19 16:39:01 -0700427 ASSERT_EQ(parent_pid, getppid());
428 _exit(123);
429 } else {
430 // We're the parent.
431 ASSERT_EQ(parent_pid, getpid());
Elliott Hughes33697a02016-01-26 13:04:57 -0800432 AssertChildExited(fork_result, 123);
Elliott Hughes7086ad62014-06-19 16:39:01 -0700433 }
434}
435
Christopher Ferris13f26a72016-01-13 13:47:58 -0800436TEST(UNISTD_TEST, getpid_caching_and_fork) {
Elliott Hughes5891abd2015-08-07 18:27:47 -0700437 TestGetPidCachingWithFork(fork);
438}
439
Christopher Ferris13f26a72016-01-13 13:47:58 -0800440TEST(UNISTD_TEST, getpid_caching_and_vfork) {
Elliott Hughes5891abd2015-08-07 18:27:47 -0700441 TestGetPidCachingWithFork(vfork);
442}
443
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700444static int GetPidCachingCloneStartRoutine(void*) {
445 AssertGetPidCorrect();
446 return 123;
Elliott Hughes7086ad62014-06-19 16:39:01 -0700447}
448
Christopher Ferris13f26a72016-01-13 13:47:58 -0800449TEST(UNISTD_TEST, getpid_caching_and_clone) {
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700450 pid_t parent_pid = getpid();
451 ASSERT_EQ(syscall(__NR_getpid), parent_pid);
452
453 void* child_stack[1024];
454 int clone_result = clone(GetPidCachingCloneStartRoutine, &child_stack[1024], CLONE_NEWNS | SIGCHLD, NULL);
Elliott Hughes2b3b2ec2014-08-21 19:23:53 -0700455 if (clone_result == -1 && errno == EPERM && getuid() != 0) {
456 GTEST_LOG_(INFO) << "This test only works if you have permission to CLONE_NEWNS; try running as root.\n";
457 return;
458 }
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700459 ASSERT_NE(clone_result, -1);
460
461 ASSERT_EQ(parent_pid, getpid());
462
Elliott Hughes33697a02016-01-26 13:04:57 -0800463 AssertChildExited(clone_result, 123);
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700464}
465
466static void* GetPidCachingPthreadStartRoutine(void*) {
467 AssertGetPidCorrect();
Elliott Hughes7086ad62014-06-19 16:39:01 -0700468 return NULL;
469}
470
Christopher Ferris13f26a72016-01-13 13:47:58 -0800471TEST(UNISTD_TEST, getpid_caching_and_pthread_create) {
Elliott Hughes7086ad62014-06-19 16:39:01 -0700472 pid_t parent_pid = getpid();
473
474 pthread_t t;
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700475 ASSERT_EQ(0, pthread_create(&t, NULL, GetPidCachingPthreadStartRoutine, NULL));
Elliott Hughes7086ad62014-06-19 16:39:01 -0700476
477 ASSERT_EQ(parent_pid, getpid());
478
479 void* result;
480 ASSERT_EQ(0, pthread_join(t, &result));
481 ASSERT_EQ(NULL, result);
482}
Elliott Hughes60452a22014-09-22 14:41:30 -0700483
Christopher Ferris13f26a72016-01-13 13:47:58 -0800484class UNISTD_DEATHTEST : public BionicDeathTest {};
Yabin Cui9df70402014-11-05 18:01:01 -0800485
Christopher Ferris13f26a72016-01-13 13:47:58 -0800486TEST_F(UNISTD_DEATHTEST, abort) {
Elliott Hughes60452a22014-09-22 14:41:30 -0700487 ASSERT_EXIT(abort(), testing::KilledBySignal(SIGABRT), "");
488}
Elliott Hughesb86a4c72014-11-07 16:07:13 -0800489
Christopher Ferris13f26a72016-01-13 13:47:58 -0800490TEST(UNISTD_TEST, sethostname) {
Elliott Hughesb86a4c72014-11-07 16:07:13 -0800491 // The permissions check happens before the argument check, so this will
492 // fail for a different reason if you're running as root than if you're
493 // not, but it'll fail either way. Checking that we have the symbol is about
494 // all we can do for sethostname(2).
495 ASSERT_EQ(-1, sethostname("", -1));
496}
Derek Xued94e7f02014-09-25 11:12:01 +0100497
Christopher Ferris13f26a72016-01-13 13:47:58 -0800498TEST(UNISTD_TEST, gethostname) {
Derek Xued94e7f02014-09-25 11:12:01 +0100499 char hostname[HOST_NAME_MAX + 1];
Derek Xued94e7f02014-09-25 11:12:01 +0100500 memset(hostname, 0, sizeof(hostname));
501
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800502 // Can we get the hostname with a big buffer?
Derek Xued94e7f02014-09-25 11:12:01 +0100503 ASSERT_EQ(0, gethostname(hostname, HOST_NAME_MAX));
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800504
505 // Can we get the hostname with a right-sized buffer?
506 errno = 0;
507 ASSERT_EQ(0, gethostname(hostname, strlen(hostname) + 1));
508
509 // Does uname(2) agree?
Derek Xued94e7f02014-09-25 11:12:01 +0100510 utsname buf;
511 ASSERT_EQ(0, uname(&buf));
512 ASSERT_EQ(0, strncmp(hostname, buf.nodename, SYS_NMLN));
513 ASSERT_GT(strlen(hostname), 0U);
514
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800515 // Do we correctly detect truncation?
Derek Xued94e7f02014-09-25 11:12:01 +0100516 errno = 0;
517 ASSERT_EQ(-1, gethostname(hostname, strlen(hostname)));
518 ASSERT_EQ(ENAMETOOLONG, errno);
Derek Xued94e7f02014-09-25 11:12:01 +0100519}
Yabin Cuib5e581a2014-11-08 14:58:12 -0800520
Christopher Ferris13f26a72016-01-13 13:47:58 -0800521TEST(UNISTD_TEST, pathconf_fpathconf) {
Yabin Cuib5e581a2014-11-08 14:58:12 -0800522 TemporaryFile tf;
523 long rc = 0L;
524 // As a file system's block size is always power of 2, the configure values
525 // for ALLOC and XFER should be power of 2 as well.
526 rc = pathconf(tf.filename, _PC_ALLOC_SIZE_MIN);
527 ASSERT_TRUE(rc > 0 && powerof2(rc));
528 rc = pathconf(tf.filename, _PC_REC_MIN_XFER_SIZE);
529 ASSERT_TRUE(rc > 0 && powerof2(rc));
530 rc = pathconf(tf.filename, _PC_REC_XFER_ALIGN);
531 ASSERT_TRUE(rc > 0 && powerof2(rc));
532
533 rc = fpathconf(tf.fd, _PC_ALLOC_SIZE_MIN);
534 ASSERT_TRUE(rc > 0 && powerof2(rc));
535 rc = fpathconf(tf.fd, _PC_REC_MIN_XFER_SIZE);
536 ASSERT_TRUE(rc > 0 && powerof2(rc));
537 rc = fpathconf(tf.fd, _PC_REC_XFER_ALIGN);
538 ASSERT_TRUE(rc > 0 && powerof2(rc));
539}
Derek Xuebc644762014-09-25 10:55:34 +0100540
Yabin Cui1c191942014-11-19 19:49:14 -0800541
Christopher Ferris13f26a72016-01-13 13:47:58 -0800542TEST(UNISTD_TEST, _POSIX_macros_smoke) {
Yabin Cui1c191942014-11-19 19:49:14 -0800543 // Make a tight verification of _POSIX_* / _POSIX2_* / _XOPEN_* macros, to prevent change by mistake.
544 // Verify according to POSIX.1-2008.
545 EXPECT_EQ(200809L, _POSIX_VERSION);
546
Yabin Cui5afae642014-11-25 20:17:27 -0800547 EXPECT_EQ(_POSIX_VERSION, _POSIX_ADVISORY_INFO);
Yabin Cui1c191942014-11-19 19:49:14 -0800548 EXPECT_GT(_POSIX_AIO_LISTIO_MAX, 0);
549 EXPECT_GT(_POSIX_AIO_MAX, 0);
550 EXPECT_GT(_POSIX_ARG_MAX, 0);
551 EXPECT_GT(_POSIX_CHILD_MAX, 0);
552 EXPECT_NE(_POSIX_CHOWN_RESTRICTED, -1);
553 EXPECT_EQ(_POSIX_VERSION, _POSIX_CLOCK_SELECTION);
Yabin Cui72575602014-12-08 11:54:12 -0800554 EXPECT_EQ(0, _POSIX_CPUTIME); // Use sysconf to detect support at runtime.
Yabin Cui1c191942014-11-19 19:49:14 -0800555 EXPECT_GT(_POSIX_DELAYTIMER_MAX, 0);
556 EXPECT_EQ(_POSIX_VERSION, _POSIX_FSYNC);
557 EXPECT_GT(_POSIX_HOST_NAME_MAX, 0);
558 EXPECT_EQ(_POSIX_VERSION, _POSIX_IPV6);
559 EXPECT_GT(_POSIX_JOB_CONTROL, 0);
560 EXPECT_GT(_POSIX_LINK_MAX, 0);
561 EXPECT_GT(_POSIX_LOGIN_NAME_MAX, 0);
562 EXPECT_EQ(_POSIX_VERSION, _POSIX_MAPPED_FILES);
563 EXPECT_GT(_POSIX_MAX_CANON, 0);
564 EXPECT_GT(_POSIX_MAX_INPUT, 0);
565 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK);
566 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK_RANGE);
567 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMORY_PROTECTION);
568 EXPECT_EQ(0, _POSIX_MONOTONIC_CLOCK);
569 EXPECT_GT(_POSIX_MQ_OPEN_MAX, 0);
570 EXPECT_GT(_POSIX_MQ_PRIO_MAX, 0);
571 EXPECT_GT(_POSIX_NAME_MAX, 0);
572 EXPECT_GT(_POSIX_NGROUPS_MAX, 0);
573 EXPECT_GT(_POSIX_NO_TRUNC, 0);
574 EXPECT_GT(_POSIX_OPEN_MAX, 0);
575 EXPECT_GT(_POSIX_PATH_MAX, 0);
576 EXPECT_GT(_POSIX_PIPE_BUF, 0);
577 EXPECT_EQ(_POSIX_VERSION, _POSIX_PRIORITY_SCHEDULING);
578 EXPECT_EQ(_POSIX_VERSION, _POSIX_RAW_SOCKETS);
579 EXPECT_EQ(_POSIX_VERSION, _POSIX_READER_WRITER_LOCKS);
Yabin Cui63481602014-12-01 17:41:04 -0800580 EXPECT_EQ(_POSIX_VERSION, _POSIX_REALTIME_SIGNALS);
Yabin Cui1c191942014-11-19 19:49:14 -0800581 EXPECT_GT(_POSIX_REGEXP, 0);
582 EXPECT_GT(_POSIX_RE_DUP_MAX, 0);
583 EXPECT_GT(_POSIX_SAVED_IDS, 0);
584 EXPECT_EQ(_POSIX_VERSION, _POSIX_SEMAPHORES);
585 EXPECT_GT(_POSIX_SEM_NSEMS_MAX, 0);
586 EXPECT_GT(_POSIX_SEM_VALUE_MAX, 0);
587 EXPECT_GT(_POSIX_SHELL, 0);
588 EXPECT_GT(_POSIX_SIGQUEUE_MAX, 0);
589 EXPECT_EQ(-1, _POSIX_SPORADIC_SERVER);
590 EXPECT_GT(_POSIX_SSIZE_MAX, 0);
591 EXPECT_GT(_POSIX_STREAM_MAX, 0);
592 EXPECT_GT(_POSIX_SYMLINK_MAX, 0);
593 EXPECT_GT(_POSIX_SYMLOOP_MAX, 0);
594 EXPECT_EQ(_POSIX_VERSION, _POSIX_SYNCHRONIZED_IO);
595 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREADS);
596 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKADDR);
597 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKSIZE);
Yabin Cui72575602014-12-08 11:54:12 -0800598 EXPECT_EQ(0, _POSIX_THREAD_CPUTIME); // Use sysconf to detect support at runtime.
Yabin Cui1c191942014-11-19 19:49:14 -0800599 EXPECT_GT(_POSIX_THREAD_DESTRUCTOR_ITERATIONS, 0);
Yabin Cui6c238f22014-12-11 20:50:41 -0800600 EXPECT_EQ(_POSIX_THREAD_KEYS_MAX, 128);
Yabin Cui1c191942014-11-19 19:49:14 -0800601 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PRIORITY_SCHEDULING);
602 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PRIO_INHERIT);
603 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PRIO_PROTECT);
604 EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_PROTECT);
605 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_SAFE_FUNCTIONS);
606 EXPECT_EQ(-1, _POSIX_THREAD_SPORADIC_SERVER);
607 EXPECT_GT(_POSIX_THREAD_THREADS_MAX, 0);
608 EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMEOUTS);
609 EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMERS);
610 EXPECT_GT(_POSIX_TIMER_MAX, 0);
611 EXPECT_EQ(-1, _POSIX_TRACE);
612 EXPECT_EQ(-1, _POSIX_TRACE_EVENT_FILTER);
613 EXPECT_EQ(-1, _POSIX_TRACE_INHERIT);
614 EXPECT_EQ(-1, _POSIX_TRACE_LOG);
615 EXPECT_GT(_POSIX_TTY_NAME_MAX, 0);
616 EXPECT_EQ(-1, _POSIX_TYPED_MEMORY_OBJECTS);
617 EXPECT_GT(_POSIX_TZNAME_MAX, 0);
618 EXPECT_NE(-1, _POSIX_VDISABLE);
619
620 EXPECT_GT(_POSIX2_BC_BASE_MAX, 0);
621 EXPECT_GT(_POSIX2_BC_DIM_MAX, 0);
622 EXPECT_GT(_POSIX2_BC_SCALE_MAX, 0);
623 EXPECT_GT(_POSIX2_BC_STRING_MAX, 0);
624 EXPECT_GT(_POSIX2_CHARCLASS_NAME_MAX, 0);
625 EXPECT_GT(_POSIX2_COLL_WEIGHTS_MAX, 0);
626 EXPECT_EQ(_POSIX_VERSION, _POSIX2_C_BIND);
627 EXPECT_GT(_POSIX2_EXPR_NEST_MAX, 0);
628 EXPECT_GT(_POSIX2_LINE_MAX, 0);
629 EXPECT_GT(_POSIX2_RE_DUP_MAX, 0);
630
631 EXPECT_EQ(700, _XOPEN_VERSION);
632 EXPECT_GT(_XOPEN_IOV_MAX, 0);
633 EXPECT_GT(_XOPEN_UNIX, 0);
634
635#if defined(__BIONIC__)
636 // These tests only pass on bionic, as bionic and glibc has different support on these macros.
Yabin Cui5afae642014-11-25 20:17:27 -0800637 // Macros like _POSIX_ASYNCHRONOUS_IO are not supported on bionic yet.
Yabin Cui1c191942014-11-19 19:49:14 -0800638 EXPECT_EQ(-1, _POSIX_ASYNCHRONOUS_IO);
639 EXPECT_EQ(-1, _POSIX_BARRIERS);
Yabin Cui1c191942014-11-19 19:49:14 -0800640 EXPECT_EQ(-1, _POSIX_MESSAGE_PASSING);
641 EXPECT_EQ(-1, _POSIX_PRIORITIZED_IO);
Yabin Cui1c191942014-11-19 19:49:14 -0800642 EXPECT_EQ(-1, _POSIX_SHARED_MEMORY_OBJECTS);
643 EXPECT_EQ(-1, _POSIX_SPAWN);
644 EXPECT_EQ(-1, _POSIX_SPIN_LOCKS);
645 EXPECT_EQ(-1, _POSIX_THREAD_PROCESS_SHARED);
646 EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_INHERIT);
647
648 EXPECT_EQ(-1, _POSIX2_VERSION);
649 EXPECT_EQ(-1, _POSIX2_CHAR_TERM);
650 EXPECT_EQ(-1, _POSIX2_C_DEV);
651 EXPECT_EQ(-1, _POSIX2_LOCALEDEF);
652 EXPECT_EQ(-1, _POSIX2_SW_DEV);
653 EXPECT_EQ(-1, _POSIX2_UPE);
654
655 EXPECT_EQ(-1, _XOPEN_ENH_I18N);
656 EXPECT_EQ(-1, _XOPEN_CRYPT);
657 EXPECT_EQ(-1, _XOPEN_LEGACY);
658 EXPECT_EQ(-1, _XOPEN_REALTIME);
659 EXPECT_EQ(-1, _XOPEN_REALTIME_THREADS);
660 EXPECT_EQ(-1, _XOPEN_SHM);
661
662#endif // defined(__BIONIC__)
663}
664
665#define VERIFY_SYSCONF_NOT_SUPPORT(name) VerifySysconf(name, #name, [](long v){return v == -1;})
666
667// sysconf() means unlimited when it returns -1 with errno unchanged.
668#define VERIFY_SYSCONF_POSITIVE(name) \
669 VerifySysconf(name, #name, [](long v){return (v > 0 || v == -1);})
670
671#define VERIFY_SYSCONF_POSIX_VERSION(name) \
672 VerifySysconf(name, #name, [](long v){return v == _POSIX_VERSION;})
673
674static void VerifySysconf(int option, const char *option_name, bool (*verify)(long)) {
675 errno = 0;
676 long ret = sysconf(option);
677 EXPECT_TRUE(0 == errno && verify(ret)) << "name = " << option_name << ", ret = "
678 << ret <<", Error Message: " << strerror(errno);
679}
Derek Xuebc644762014-09-25 10:55:34 +0100680
Christopher Ferris13f26a72016-01-13 13:47:58 -0800681TEST(UNISTD_TEST, sysconf) {
Yabin Cui5afae642014-11-25 20:17:27 -0800682 VERIFY_SYSCONF_POSIX_VERSION(_SC_ADVISORY_INFO);
Yabin Cui1c191942014-11-19 19:49:14 -0800683 VERIFY_SYSCONF_POSITIVE(_SC_ARG_MAX);
684 VERIFY_SYSCONF_POSITIVE(_SC_BC_BASE_MAX);
685 VERIFY_SYSCONF_POSITIVE(_SC_BC_DIM_MAX);
686 VERIFY_SYSCONF_POSITIVE(_SC_BC_SCALE_MAX);
687 VERIFY_SYSCONF_POSITIVE(_SC_CHILD_MAX);
688 VERIFY_SYSCONF_POSITIVE(_SC_CLK_TCK);
689 VERIFY_SYSCONF_POSITIVE(_SC_COLL_WEIGHTS_MAX);
Yabin Cuid5c65272014-11-26 14:04:26 -0800690 VERIFY_SYSCONF_POSIX_VERSION(_SC_CPUTIME);
Yabin Cui1c191942014-11-19 19:49:14 -0800691 VERIFY_SYSCONF_POSITIVE(_SC_EXPR_NEST_MAX);
692 VERIFY_SYSCONF_POSITIVE(_SC_LINE_MAX);
693 VERIFY_SYSCONF_POSITIVE(_SC_NGROUPS_MAX);
694 VERIFY_SYSCONF_POSITIVE(_SC_OPEN_MAX);
695 VERIFY_SYSCONF_POSITIVE(_SC_PASS_MAX);
696 VERIFY_SYSCONF_POSIX_VERSION(_SC_2_C_BIND);
697 VERIFY_SYSCONF_NOT_SUPPORT(_SC_2_FORT_DEV);
698 VERIFY_SYSCONF_NOT_SUPPORT(_SC_2_FORT_RUN);
699 VERIFY_SYSCONF_NOT_SUPPORT(_SC_2_UPE);
700 VERIFY_SYSCONF_POSITIVE(_SC_JOB_CONTROL);
701 VERIFY_SYSCONF_POSITIVE(_SC_SAVED_IDS);
702 VERIFY_SYSCONF_POSIX_VERSION(_SC_VERSION);
703 VERIFY_SYSCONF_POSITIVE(_SC_RE_DUP_MAX);
704 VERIFY_SYSCONF_POSITIVE(_SC_STREAM_MAX);
705 VERIFY_SYSCONF_POSITIVE(_SC_TZNAME_MAX);
706 VerifySysconf(_SC_XOPEN_VERSION, "_SC_XOPEN_VERSION", [](long v){return v == _XOPEN_VERSION;});
707 VERIFY_SYSCONF_POSITIVE(_SC_ATEXIT_MAX);
708 VERIFY_SYSCONF_POSITIVE(_SC_IOV_MAX);
709 VERIFY_SYSCONF_POSITIVE(_SC_PAGESIZE);
710 VERIFY_SYSCONF_POSITIVE(_SC_PAGE_SIZE);
Elliott Hughes189394b2015-07-24 23:22:07 -0700711 VerifySysconf(_SC_PAGE_SIZE, "_SC_PAGE_SIZE",
712 [](long v){return v == sysconf(_SC_PAGESIZE) && v == getpagesize();});
Yabin Cui1c191942014-11-19 19:49:14 -0800713 VERIFY_SYSCONF_POSITIVE(_SC_XOPEN_UNIX);
714 VERIFY_SYSCONF_POSITIVE(_SC_AIO_LISTIO_MAX);
715 VERIFY_SYSCONF_POSITIVE(_SC_AIO_MAX);
716 VerifySysconf(_SC_AIO_PRIO_DELTA_MAX, "_SC_AIO_PRIO_DELTA_MAX", [](long v){return v >= 0;});
717 VERIFY_SYSCONF_POSITIVE(_SC_DELAYTIMER_MAX);
718 VERIFY_SYSCONF_POSITIVE(_SC_MQ_OPEN_MAX);
719 VERIFY_SYSCONF_POSITIVE(_SC_MQ_PRIO_MAX);
720 VERIFY_SYSCONF_POSITIVE(_SC_RTSIG_MAX);
721 VERIFY_SYSCONF_POSITIVE(_SC_SEM_NSEMS_MAX);
722 VERIFY_SYSCONF_POSITIVE(_SC_SEM_VALUE_MAX);
723 VERIFY_SYSCONF_POSITIVE(_SC_TIMER_MAX);
724 VERIFY_SYSCONF_POSIX_VERSION(_SC_FSYNC);
725 VERIFY_SYSCONF_POSIX_VERSION(_SC_MAPPED_FILES);
726 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK);
727 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK_RANGE);
728 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMORY_PROTECTION);
729 VERIFY_SYSCONF_POSIX_VERSION(_SC_PRIORITY_SCHEDULING);
Yabin Cui63481602014-12-01 17:41:04 -0800730 VERIFY_SYSCONF_POSIX_VERSION(_SC_REALTIME_SIGNALS);
Yabin Cui1c191942014-11-19 19:49:14 -0800731 VERIFY_SYSCONF_POSIX_VERSION(_SC_SEMAPHORES);
732 VERIFY_SYSCONF_POSIX_VERSION(_SC_SYNCHRONIZED_IO);
733 VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMERS);
734 VERIFY_SYSCONF_POSITIVE(_SC_GETGR_R_SIZE_MAX);
735 VERIFY_SYSCONF_POSITIVE(_SC_GETPW_R_SIZE_MAX);
736 VERIFY_SYSCONF_POSITIVE(_SC_LOGIN_NAME_MAX);
737 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_DESTRUCTOR_ITERATIONS);
738 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_KEYS_MAX);
739 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_STACK_MIN);
740 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_THREADS_MAX);
741 VERIFY_SYSCONF_POSITIVE(_SC_TTY_NAME_MAX);
742 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREADS);
743 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKADDR);
744 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKSIZE);
745 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PRIORITY_SCHEDULING);
746 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PRIO_INHERIT);
747 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PRIO_PROTECT);
748 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_SAFE_FUNCTIONS);
749 VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_CONF);
750 VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_ONLN);
751 VERIFY_SYSCONF_POSITIVE(_SC_PHYS_PAGES);
752 VERIFY_SYSCONF_POSITIVE(_SC_AVPHYS_PAGES);
753 VERIFY_SYSCONF_POSIX_VERSION(_SC_MONOTONIC_CLOCK);
754 VERIFY_SYSCONF_NOT_SUPPORT(_SC_2_PBS);
755 VERIFY_SYSCONF_NOT_SUPPORT(_SC_2_PBS_ACCOUNTING);
756 VERIFY_SYSCONF_NOT_SUPPORT(_SC_2_PBS_CHECKPOINT);
757 VERIFY_SYSCONF_NOT_SUPPORT(_SC_2_PBS_LOCATE);
758 VERIFY_SYSCONF_NOT_SUPPORT(_SC_2_PBS_MESSAGE);
759 VERIFY_SYSCONF_NOT_SUPPORT(_SC_2_PBS_TRACK);
760 VERIFY_SYSCONF_POSIX_VERSION(_SC_CLOCK_SELECTION);
761 VERIFY_SYSCONF_POSITIVE(_SC_HOST_NAME_MAX);
762 VERIFY_SYSCONF_POSIX_VERSION(_SC_IPV6);
763 VERIFY_SYSCONF_POSIX_VERSION(_SC_RAW_SOCKETS);
764 VERIFY_SYSCONF_POSIX_VERSION(_SC_READER_WRITER_LOCKS);
765 VERIFY_SYSCONF_POSITIVE(_SC_REGEXP);
766 VERIFY_SYSCONF_POSITIVE(_SC_SHELL);
767 VERIFY_SYSCONF_NOT_SUPPORT(_SC_SPORADIC_SERVER);
768 VERIFY_SYSCONF_POSITIVE(_SC_SYMLOOP_MAX);
769 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_CPUTIME);
770 VERIFY_SYSCONF_NOT_SUPPORT(_SC_THREAD_SPORADIC_SERVER);
771 VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMEOUTS);
772 VERIFY_SYSCONF_NOT_SUPPORT(_SC_TRACE);
773 VERIFY_SYSCONF_NOT_SUPPORT(_SC_TRACE_EVENT_FILTER);
774 VERIFY_SYSCONF_NOT_SUPPORT(_SC_TRACE_EVENT_NAME_MAX);
775 VERIFY_SYSCONF_NOT_SUPPORT(_SC_TRACE_INHERIT);
776 VERIFY_SYSCONF_NOT_SUPPORT(_SC_TRACE_LOG);
777 VERIFY_SYSCONF_NOT_SUPPORT(_SC_TRACE_NAME_MAX);
778 VERIFY_SYSCONF_NOT_SUPPORT(_SC_TRACE_SYS_MAX);
779 VERIFY_SYSCONF_NOT_SUPPORT(_SC_TRACE_USER_EVENT_MAX);
780 VERIFY_SYSCONF_NOT_SUPPORT(_SC_TYPED_MEMORY_OBJECTS);
781 VERIFY_SYSCONF_NOT_SUPPORT(_SC_XOPEN_STREAMS);
Derek Xuebc644762014-09-25 10:55:34 +0100782
Yabin Cui1c191942014-11-19 19:49:14 -0800783#if defined(__LP64__)
784 VERIFY_SYSCONF_NOT_SUPPORT(_SC_V7_ILP32_OFF32);
785 VERIFY_SYSCONF_NOT_SUPPORT(_SC_V7_ILP32_OFFBIG);
786 VERIFY_SYSCONF_POSITIVE(_SC_V7_LP64_OFF64);
787 VERIFY_SYSCONF_POSITIVE(_SC_V7_LPBIG_OFFBIG);
788#else
789 VERIFY_SYSCONF_POSITIVE(_SC_V7_ILP32_OFF32);
790#if defined(__BIONIC__)
791 // bionic does not support 64 bits off_t type on 32bit machine.
792 VERIFY_SYSCONF_NOT_SUPPORT(_SC_V7_ILP32_OFFBIG);
793#endif
794 VERIFY_SYSCONF_NOT_SUPPORT(_SC_V7_LP64_OFF64);
795 VERIFY_SYSCONF_NOT_SUPPORT(_SC_V7_LPBIG_OFFBIG);
796#endif
Derek Xuebc644762014-09-25 10:55:34 +0100797
Yabin Cui1c191942014-11-19 19:49:14 -0800798#if defined(__BIONIC__)
799 // Tests can only run on bionic, as bionic and glibc have different support for these options.
800 // Below options are not supported on bionic yet.
Yabin Cui1c191942014-11-19 19:49:14 -0800801 VERIFY_SYSCONF_NOT_SUPPORT(_SC_ASYNCHRONOUS_IO);
802 VERIFY_SYSCONF_NOT_SUPPORT(_SC_BARRIERS);
Yabin Cui1c191942014-11-19 19:49:14 -0800803 VERIFY_SYSCONF_NOT_SUPPORT(_SC_MESSAGE_PASSING);
804 VERIFY_SYSCONF_NOT_SUPPORT(_SC_PRIORITIZED_IO);
Yabin Cui1c191942014-11-19 19:49:14 -0800805 VERIFY_SYSCONF_NOT_SUPPORT(_SC_SHARED_MEMORY_OBJECTS);
806 VERIFY_SYSCONF_NOT_SUPPORT(_SC_SPAWN);
807 VERIFY_SYSCONF_NOT_SUPPORT(_SC_SPIN_LOCKS);
808 VERIFY_SYSCONF_NOT_SUPPORT(_SC_THREAD_PROCESS_SHARED);
809 VERIFY_SYSCONF_NOT_SUPPORT(_SC_THREAD_ROBUST_PRIO_INHERIT);
810 VERIFY_SYSCONF_NOT_SUPPORT(_SC_THREAD_ROBUST_PRIO_PROTECT);
Derek Xuebc644762014-09-25 10:55:34 +0100811
Yabin Cui1c191942014-11-19 19:49:14 -0800812 VERIFY_SYSCONF_NOT_SUPPORT(_SC_2_C_DEV);
813 VERIFY_SYSCONF_NOT_SUPPORT(_SC_2_CHAR_TERM);
814 VERIFY_SYSCONF_NOT_SUPPORT(_SC_2_LOCALEDEF);
815 VERIFY_SYSCONF_NOT_SUPPORT(_SC_2_SW_DEV);
816 VERIFY_SYSCONF_NOT_SUPPORT(_SC_2_VERSION);
Derek Xuebc644762014-09-25 10:55:34 +0100817
Yabin Cui1c191942014-11-19 19:49:14 -0800818 VERIFY_SYSCONF_NOT_SUPPORT(_SC_XOPEN_CRYPT);
819 VERIFY_SYSCONF_NOT_SUPPORT(_SC_XOPEN_ENH_I18N);
820 VERIFY_SYSCONF_NOT_SUPPORT(_SC_XOPEN_LEGACY);
821 VERIFY_SYSCONF_NOT_SUPPORT(_SC_XOPEN_REALTIME);
822 VERIFY_SYSCONF_NOT_SUPPORT(_SC_XOPEN_REALTIME_THREADS);
823 VERIFY_SYSCONF_NOT_SUPPORT(_SC_XOPEN_SHM);
824 VERIFY_SYSCONF_NOT_SUPPORT(_SC_XOPEN_UUCP);
825#endif // defined(__BIONIC__)
Derek Xuebc644762014-09-25 10:55:34 +0100826}
Elliott Hughesbe52e652015-02-23 18:02:29 -0800827
Christopher Ferris13f26a72016-01-13 13:47:58 -0800828TEST(UNISTD_TEST, get_cpu_count_from_string) {
Yabin Cuicb6f5992015-09-29 16:11:45 -0700829 ASSERT_EQ(0, GetCpuCountFromString(" "));
830 ASSERT_EQ(1, GetCpuCountFromString("0"));
831 ASSERT_EQ(40, GetCpuCountFromString("0-39"));
832 ASSERT_EQ(4, GetCpuCountFromString("0, 1-2, 4\n"));
833}
834
Christopher Ferris13f26a72016-01-13 13:47:58 -0800835TEST(UNISTD_TEST, sysconf_SC_NPROCESSORS_ONLN) {
Elliott Hughes0b2acdf2015-10-02 18:25:19 -0700836 std::string line;
837 ASSERT_TRUE(android::base::ReadFileToString("/sys/devices/system/cpu/online", &line));
Yabin Cuicb6f5992015-09-29 16:11:45 -0700838 long online_cpus = 0;
Elliott Hughes0b2acdf2015-10-02 18:25:19 -0700839 for (const std::string& s : android::base::Split(line, ",")) {
Yabin Cuicb6f5992015-09-29 16:11:45 -0700840 std::vector<std::string> numbers = android::base::Split(s, "-");
841 if (numbers.size() == 1u) {
842 online_cpus++;
843 } else {
844 online_cpus += atoi(numbers[1].c_str()) - atoi(numbers[0].c_str()) + 1;
845 }
846 }
847 ASSERT_EQ(online_cpus, sysconf(_SC_NPROCESSORS_ONLN));
848}
849
Christopher Ferris13f26a72016-01-13 13:47:58 -0800850TEST(UNISTD_TEST, dup2_same) {
Elliott Hughesbe52e652015-02-23 18:02:29 -0800851 // POSIX says of dup2:
852 // If fildes2 is already a valid open file descriptor ...
853 // [and] fildes is equal to fildes2 ... dup2() shall return
854 // fildes2 without closing it.
855 // This isn't true of dup3(2), so we need to manually implement that.
856
857 // Equal and valid.
858 int fd = open("/proc/version", O_RDONLY);
859 ASSERT_TRUE(fd != -1);
860 ASSERT_EQ(fd, dup2(fd, fd));
861 ASSERT_EQ(0, close(fd)); // Check that dup2 didn't close fd.
862
863 // Equal, but invalid.
864 errno = 0;
865 ASSERT_EQ(-1, dup2(fd, fd));
866 ASSERT_EQ(EBADF, errno);
867}
Elliott Hughes5704c422016-01-25 18:06:24 -0800868
Elliott Hughes5704c422016-01-25 18:06:24 -0800869TEST(UNISTD_TEST, lockf_smoke) {
870 constexpr off64_t file_size = 32*1024LL;
871
872 TemporaryFile tf;
873 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
874
875 // Lock everything.
876 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
877 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
878
879 // Try-lock everything, this should succeed too.
880 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
881 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size));
882
883 // Check status.
884 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
885 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
886
887 // Unlock file.
888 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
889 ASSERT_EQ(0, lockf64(tf.fd, F_ULOCK, file_size));
890}
891
892TEST(UNISTD_TEST, lockf_zero) {
893 constexpr off64_t file_size = 32*1024LL;
894
895 TemporaryFile tf;
896 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
897
898 // Lock everything by specifying a size of 0 (meaning "to the end, even if it changes").
899 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
900 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, 0));
901
902 // Check that it's locked.
903 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
904 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
905
906 // Move the end.
907 ASSERT_EQ(0, ftruncate(tf.fd, 2*file_size));
908
909 // Check that the new section is locked too.
910 ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
911 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, 2*file_size));
912}
913
914TEST(UNISTD_TEST, lockf_negative) {
915 constexpr off64_t file_size = 32*1024LL;
916
917 TemporaryFile tf;
918 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
919
920 // Lock everything, but specifying the range in reverse.
921 ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
922 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, -file_size));
923
924 // Check that it's locked.
925 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
926 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
927}
928
929TEST(UNISTD_TEST, lockf_with_child) {
930 constexpr off64_t file_size = 32*1024LL;
931
932 TemporaryFile tf;
933 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
934
935 // Lock everything.
936 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
937 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
938
939 // Fork a child process
940 pid_t pid = fork();
941 ASSERT_NE(-1, pid);
942 if (pid == 0) {
943 // Check that the child cannot lock the file.
944 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
945 ASSERT_EQ(-1, lockf64(tf.fd, F_TLOCK, file_size));
946 ASSERT_EQ(EAGAIN, errno);
947 // Check also that it reports itself as locked.
948 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
949 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size));
950 ASSERT_EQ(EACCES, errno);
951 _exit(0);
952 }
Elliott Hughes33697a02016-01-26 13:04:57 -0800953 AssertChildExited(pid, 0);
Elliott Hughes5704c422016-01-25 18:06:24 -0800954}
955
956TEST(UNISTD_TEST, lockf_partial_with_child) {
957 constexpr off64_t file_size = 32*1024LL;
958
959 TemporaryFile tf;
960 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
961
962 // Lock the first half of the file.
963 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
964 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size/2));
965
966 // Fork a child process.
967 pid_t pid = fork();
968 ASSERT_NE(-1, pid);
969 if (pid == 0) {
970 // Check that the child can lock the other half.
971 ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
972 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
973 // Check that the child cannot lock the first half.
974 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
975 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
976 ASSERT_EQ(EACCES, errno);
977 // Check also that it reports itself as locked.
978 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
979 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
980 ASSERT_EQ(EACCES, errno);
981 _exit(0);
982 }
Elliott Hughes33697a02016-01-26 13:04:57 -0800983 AssertChildExited(pid, 0);
Elliott Hughes5704c422016-01-25 18:06:24 -0800984
985 // The second half was locked by the child, but the lock disappeared
986 // when the process exited, so check it can be locked now.
987 ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
988 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
989}
Greg Hackmanne2faf072016-03-03 08:37:53 -0800990
991TEST(UNISTD_TEST, getdomainname) {
992 struct utsname u;
993 ASSERT_EQ(0, uname(&u));
994
995 char buf[sizeof(u.domainname)];
996 ASSERT_EQ(0, getdomainname(buf, sizeof(buf)));
997 EXPECT_STREQ(u.domainname, buf);
998
999#if defined(__BIONIC__)
1000 // bionic and glibc have different behaviors when len is too small
1001 ASSERT_EQ(-1, getdomainname(buf, strlen(u.domainname)));
1002 EXPECT_EQ(EINVAL, errno);
1003#endif
1004}
1005
1006TEST(UNISTD_TEST, setdomainname) {
1007 __user_cap_header_struct header;
1008 memset(&header, 0, sizeof(header));
1009 header.version = _LINUX_CAPABILITY_VERSION_3;
1010
1011 __user_cap_data_struct old_caps[_LINUX_CAPABILITY_U32S_3];
1012 ASSERT_EQ(0, capget(&header, &old_caps[0]));
1013
1014 auto admin_idx = CAP_TO_INDEX(CAP_SYS_ADMIN);
1015 auto admin_mask = CAP_TO_MASK(CAP_SYS_ADMIN);
1016 bool has_admin = old_caps[admin_idx].effective & admin_mask;
1017 if (has_admin) {
1018 __user_cap_data_struct new_caps[_LINUX_CAPABILITY_U32S_3];
1019 memcpy(new_caps, old_caps, sizeof(new_caps));
1020 new_caps[admin_idx].effective &= ~admin_mask;
1021
1022 ASSERT_EQ(0, capset(&header, &new_caps[0])) << "failed to drop admin privileges";
1023 }
1024
1025 const char* name = "newdomainname";
1026 ASSERT_EQ(-1, setdomainname(name, strlen(name)));
1027 ASSERT_EQ(EPERM, errno);
1028
1029 if (has_admin) {
1030 ASSERT_EQ(0, capset(&header, &old_caps[0])) << "failed to restore admin privileges";
1031 }
1032}