blob: 8af226325979bfe646ec0ad85a39dccda210578e [file] [log] [blame]
Elliott Hughesa55f6302013-01-02 14:23:43 -08001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
Elliott Hughes33697a02016-01-26 13:04:57 -080018
Yabin Cui9df70402014-11-05 18:01:01 -080019#include "BionicDeathTest.h"
Christopher Ferris13613132013-10-28 15:24:04 -070020#include "ScopedSignalHandler.h"
Elliott Hughesb4f76162013-09-19 16:27:24 -070021#include "TemporaryFile.h"
Elliott Hughes33697a02016-01-26 13:04:57 -080022#include "utils.h"
Elliott Hughesa55f6302013-01-02 14:23:43 -080023
Elliott Hughes915fefb2014-02-18 12:34:51 -080024#include <errno.h>
Colin Cross3d19a832014-02-14 18:56:23 -080025#include <fcntl.h>
Elliott Hughes3c115902016-08-24 19:27:04 -070026#include <libgen.h>
Elliott Hughes21972b62014-07-28 12:24:22 -070027#include <limits.h>
Elliott Hughes428f5562013-02-05 16:10:59 -080028#include <stdint.h>
Greg Hackmanne2faf072016-03-03 08:37:53 -080029#include <sys/capability.h>
Yabin Cuib5e581a2014-11-08 14:58:12 -080030#include <sys/param.h>
Elliott Hughes7086ad62014-06-19 16:39:01 -070031#include <sys/syscall.h>
Elliott Hughes764a9932014-04-08 19:44:36 -070032#include <sys/types.h>
Derek Xued94e7f02014-09-25 11:12:01 +010033#include <sys/utsname.h>
Elliott Hughes764a9932014-04-08 19:44:36 -070034#include <sys/wait.h>
Yabin Cui9df70402014-11-05 18:01:01 -080035#include <unistd.h>
36
Elliott Hughes939a7e02015-12-04 15:27:46 -080037#include <android-base/file.h>
38#include <android-base/strings.h>
Yabin Cuicb6f5992015-09-29 16:11:45 -070039
40#include "private/get_cpu_count_from_string.h"
41
Christopher Ferris13f26a72016-01-13 13:47:58 -080042#if defined(NOFORTIFY)
43#define UNISTD_TEST unistd_nofortify
44#define UNISTD_DEATHTEST unistd_nofortify_DeathTest
45#else
46#define UNISTD_TEST unistd
47#define UNISTD_DEATHTEST unistd_DeathTest
48#endif
49
Elliott Hughes533dde42014-04-25 18:27:38 -070050static void* get_brk() {
51 return sbrk(0);
52}
Elliott Hughes428f5562013-02-05 16:10:59 -080053
Elliott Hughes533dde42014-04-25 18:27:38 -070054static void* page_align(uintptr_t addr) {
55 uintptr_t mask = sysconf(_SC_PAGE_SIZE) - 1;
56 return reinterpret_cast<void*>((addr + mask) & ~mask);
57}
58
Christopher Ferris13f26a72016-01-13 13:47:58 -080059TEST(UNISTD_TEST, brk) {
Elliott Hughes533dde42014-04-25 18:27:38 -070060 void* initial_break = get_brk();
61
Elliott Hughes533dde42014-04-25 18:27:38 -070062 void* new_break = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(initial_break) + 1);
Daniel Micay126ab122015-12-31 08:04:53 -050063 int ret = brk(new_break);
64 if (ret == -1) {
65 ASSERT_EQ(errno, ENOMEM);
66 } else {
67 ASSERT_EQ(0, ret);
68 ASSERT_GE(get_brk(), new_break);
69 }
Elliott Hughes428f5562013-02-05 16:10:59 -080070
Daniel Micay126ab122015-12-31 08:04:53 -050071 // Expand by a full page to force the mapping to expand
Elliott Hughes533dde42014-04-25 18:27:38 -070072 new_break = page_align(reinterpret_cast<uintptr_t>(initial_break) + sysconf(_SC_PAGE_SIZE));
Daniel Micay126ab122015-12-31 08:04:53 -050073 ret = brk(new_break);
74 if (ret == -1) {
75 ASSERT_EQ(errno, ENOMEM);
76 } else {
77 ASSERT_EQ(0, ret);
78 ASSERT_EQ(get_brk(), new_break);
79 }
Elliott Hughes533dde42014-04-25 18:27:38 -070080}
81
Christopher Ferris13f26a72016-01-13 13:47:58 -080082TEST(UNISTD_TEST, brk_ENOMEM) {
Elliott Hughes533dde42014-04-25 18:27:38 -070083 ASSERT_EQ(-1, brk(reinterpret_cast<void*>(-1)));
84 ASSERT_EQ(ENOMEM, errno);
85}
86
Christopher Ferris738b0cc2014-05-21 19:03:34 -070087#if defined(__GLIBC__)
88#define SBRK_MIN INTPTR_MIN
89#define SBRK_MAX INTPTR_MAX
90#else
91#define SBRK_MIN PTRDIFF_MIN
92#define SBRK_MAX PTRDIFF_MAX
93#endif
94
Christopher Ferris13f26a72016-01-13 13:47:58 -080095TEST(UNISTD_TEST, sbrk_ENOMEM) {
Christopher Ferris738b0cc2014-05-21 19:03:34 -070096#if defined(__BIONIC__) && !defined(__LP64__)
97 // There is no way to guarantee that all overflow conditions can be tested
98 // without manipulating the underlying values of the current break.
99 extern void* __bionic_brk;
100
101 class ScopedBrk {
102 public:
103 ScopedBrk() : saved_brk_(__bionic_brk) {}
104 virtual ~ScopedBrk() { __bionic_brk = saved_brk_; }
105
106 private:
107 void* saved_brk_;
108 };
109
110 ScopedBrk scope_brk;
111
112 // Set the current break to a point that will cause an overflow.
113 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) + 2);
Elliott Hughes533dde42014-04-25 18:27:38 -0700114
115 // Can't increase by so much that we'd overflow.
116 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MAX));
117 ASSERT_EQ(ENOMEM, errno);
118
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700119 // Set the current break to a point that will cause an overflow.
120 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX));
Elliott Hughes533dde42014-04-25 18:27:38 -0700121
Elliott Hughes533dde42014-04-25 18:27:38 -0700122 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN));
123 ASSERT_EQ(ENOMEM, errno);
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700124
125 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) - 1);
126
127 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN + 1));
128 ASSERT_EQ(ENOMEM, errno);
129#else
130 class ScopedBrk {
131 public:
132 ScopedBrk() : saved_brk_(get_brk()) {}
133 virtual ~ScopedBrk() { brk(saved_brk_); }
134
135 private:
136 void* saved_brk_;
137 };
138
139 ScopedBrk scope_brk;
140
141 uintptr_t cur_brk = reinterpret_cast<uintptr_t>(get_brk());
142 if (cur_brk < static_cast<uintptr_t>(-(SBRK_MIN+1))) {
143 // Do the overflow test for a max negative increment.
144 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MIN));
145#if defined(__BIONIC__)
146 // GLIBC does not set errno in overflow case.
147 ASSERT_EQ(ENOMEM, errno);
148#endif
149 }
150
151 uintptr_t overflow_brk = static_cast<uintptr_t>(SBRK_MAX) + 2;
152 if (cur_brk < overflow_brk) {
153 // Try and move the value to PTRDIFF_MAX + 2.
154 cur_brk = reinterpret_cast<uintptr_t>(sbrk(overflow_brk));
155 }
156 if (cur_brk >= overflow_brk) {
157 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MAX));
158#if defined(__BIONIC__)
159 // GLIBC does not set errno in overflow case.
160 ASSERT_EQ(ENOMEM, errno);
161#endif
162 }
Elliott Hughes533dde42014-04-25 18:27:38 -0700163#endif
Elliott Hughes428f5562013-02-05 16:10:59 -0800164}
Elliott Hughesb4f76162013-09-19 16:27:24 -0700165
Christopher Ferris13f26a72016-01-13 13:47:58 -0800166TEST(UNISTD_TEST, truncate) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700167 TemporaryFile tf;
168 ASSERT_EQ(0, close(tf.fd));
169 ASSERT_EQ(0, truncate(tf.filename, 123));
170
171 struct stat sb;
172 ASSERT_EQ(0, stat(tf.filename, &sb));
173 ASSERT_EQ(123, sb.st_size);
174}
175
Christopher Ferris13f26a72016-01-13 13:47:58 -0800176TEST(UNISTD_TEST, truncate64) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700177 TemporaryFile tf;
178 ASSERT_EQ(0, close(tf.fd));
179 ASSERT_EQ(0, truncate64(tf.filename, 123));
180
181 struct stat sb;
182 ASSERT_EQ(0, stat(tf.filename, &sb));
183 ASSERT_EQ(123, sb.st_size);
184}
185
Christopher Ferris13f26a72016-01-13 13:47:58 -0800186TEST(UNISTD_TEST, ftruncate) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700187 TemporaryFile tf;
188 ASSERT_EQ(0, ftruncate(tf.fd, 123));
189 ASSERT_EQ(0, close(tf.fd));
190
191 struct stat sb;
192 ASSERT_EQ(0, stat(tf.filename, &sb));
193 ASSERT_EQ(123, sb.st_size);
194}
195
Christopher Ferris13f26a72016-01-13 13:47:58 -0800196TEST(UNISTD_TEST, ftruncate64) {
Elliott Hughesb4f76162013-09-19 16:27:24 -0700197 TemporaryFile tf;
198 ASSERT_EQ(0, ftruncate64(tf.fd, 123));
199 ASSERT_EQ(0, close(tf.fd));
200
201 struct stat sb;
202 ASSERT_EQ(0, stat(tf.filename, &sb));
203 ASSERT_EQ(123, sb.st_size);
204}
Elliott Hughes11952072013-10-24 15:15:14 -0700205
Christopher Ferris13f26a72016-01-13 13:47:58 -0800206TEST(UNISTD_TEST, ftruncate_negative) {
Dan Albertc05554e2015-05-19 18:17:31 -0700207 TemporaryFile tf;
208 errno = 0;
Dan Albert9d476a02015-06-01 11:28:31 -0700209 ASSERT_EQ(-1, ftruncate(tf.fd, -123));
210 ASSERT_EQ(EINVAL, errno);
Dan Albertc05554e2015-05-19 18:17:31 -0700211}
212
Elliott Hughes1728b232014-05-14 10:02:03 -0700213static bool g_pause_test_flag = false;
Elliott Hughes11952072013-10-24 15:15:14 -0700214static void PauseTestSignalHandler(int) {
Elliott Hughes1728b232014-05-14 10:02:03 -0700215 g_pause_test_flag = true;
Elliott Hughes11952072013-10-24 15:15:14 -0700216}
217
Christopher Ferris13f26a72016-01-13 13:47:58 -0800218TEST(UNISTD_TEST, pause) {
Christopher Ferris13613132013-10-28 15:24:04 -0700219 ScopedSignalHandler handler(SIGALRM, PauseTestSignalHandler);
220
Elliott Hughes11952072013-10-24 15:15:14 -0700221 alarm(1);
Elliott Hughes1728b232014-05-14 10:02:03 -0700222 ASSERT_FALSE(g_pause_test_flag);
Elliott Hughes11952072013-10-24 15:15:14 -0700223 ASSERT_EQ(-1, pause());
Elliott Hughes1728b232014-05-14 10:02:03 -0700224 ASSERT_TRUE(g_pause_test_flag);
Elliott Hughes11952072013-10-24 15:15:14 -0700225}
Colin Cross3d19a832014-02-14 18:56:23 -0800226
Christopher Ferris13f26a72016-01-13 13:47:58 -0800227TEST(UNISTD_TEST, read) {
Colin Cross3d19a832014-02-14 18:56:23 -0800228 int fd = open("/proc/version", O_RDONLY);
229 ASSERT_TRUE(fd != -1);
230
231 char buf[5];
232 ASSERT_EQ(5, read(fd, buf, 5));
233 ASSERT_EQ(buf[0], 'L');
234 ASSERT_EQ(buf[1], 'i');
235 ASSERT_EQ(buf[2], 'n');
236 ASSERT_EQ(buf[3], 'u');
237 ASSERT_EQ(buf[4], 'x');
238 close(fd);
239}
240
Christopher Ferris13f26a72016-01-13 13:47:58 -0800241TEST(UNISTD_TEST, read_EBADF) {
Colin Cross3d19a832014-02-14 18:56:23 -0800242 // read returns ssize_t which is 64-bits on LP64, so it's worth explicitly checking that
243 // our syscall stubs correctly return a 64-bit -1.
244 char buf[1];
245 ASSERT_EQ(-1, read(-1, buf, sizeof(buf)));
246 ASSERT_EQ(EBADF, errno);
247}
Elliott Hughesaedb00d2014-03-03 14:38:20 -0800248
Christopher Ferris13f26a72016-01-13 13:47:58 -0800249TEST(UNISTD_TEST, syscall_long) {
Elliott Hughes21972b62014-07-28 12:24:22 -0700250 // Check that syscall(3) correctly returns long results.
251 // https://code.google.com/p/android/issues/detail?id=73952
252 // We assume that the break is > 4GiB, but this is potentially flaky.
253 uintptr_t p = reinterpret_cast<uintptr_t>(sbrk(0));
254 ASSERT_EQ(p, static_cast<uintptr_t>(syscall(__NR_brk, 0)));
255}
256
Christopher Ferris13f26a72016-01-13 13:47:58 -0800257TEST(UNISTD_TEST, alarm) {
Elliott Hughesaedb00d2014-03-03 14:38:20 -0800258 ASSERT_EQ(0U, alarm(0));
259}
Elliott Hughes9f525642014-04-08 17:14:01 -0700260
Christopher Ferris13f26a72016-01-13 13:47:58 -0800261TEST(UNISTD_TEST, _exit) {
Elliott Hughes33697a02016-01-26 13:04:57 -0800262 pid_t pid = fork();
Elliott Hughes9f525642014-04-08 17:14:01 -0700263 ASSERT_NE(-1, pid) << strerror(errno);
264
265 if (pid == 0) {
266 _exit(99);
267 }
268
Elliott Hughes33697a02016-01-26 13:04:57 -0800269 AssertChildExited(pid, 99);
Elliott Hughes9f525642014-04-08 17:14:01 -0700270}
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400271
Christopher Ferris13f26a72016-01-13 13:47:58 -0800272TEST(UNISTD_TEST, getenv_unsetenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400273 ASSERT_EQ(0, setenv("test-variable", "hello", 1));
274 ASSERT_STREQ("hello", getenv("test-variable"));
275 ASSERT_EQ(0, unsetenv("test-variable"));
276 ASSERT_TRUE(getenv("test-variable") == NULL);
277}
278
Christopher Ferris13f26a72016-01-13 13:47:58 -0800279TEST(UNISTD_TEST, unsetenv_EINVAL) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400280 EXPECT_EQ(-1, unsetenv(""));
281 EXPECT_EQ(EINVAL, errno);
282 EXPECT_EQ(-1, unsetenv("a=b"));
283 EXPECT_EQ(EINVAL, errno);
284}
285
Christopher Ferris13f26a72016-01-13 13:47:58 -0800286TEST(UNISTD_TEST, setenv_EINVAL) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400287 EXPECT_EQ(-1, setenv(NULL, "value", 0));
288 EXPECT_EQ(EINVAL, errno);
289 EXPECT_EQ(-1, setenv(NULL, "value", 1));
290 EXPECT_EQ(EINVAL, errno);
291 EXPECT_EQ(-1, setenv("", "value", 0));
292 EXPECT_EQ(EINVAL, errno);
293 EXPECT_EQ(-1, setenv("", "value", 1));
294 EXPECT_EQ(EINVAL, errno);
295 EXPECT_EQ(-1, setenv("a=b", "value", 0));
296 EXPECT_EQ(EINVAL, errno);
297 EXPECT_EQ(-1, setenv("a=b", "value", 1));
298 EXPECT_EQ(EINVAL, errno);
299}
300
Christopher Ferris13f26a72016-01-13 13:47:58 -0800301TEST(UNISTD_TEST, setenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400302 ASSERT_EQ(0, unsetenv("test-variable"));
303
304 char a[] = "a";
305 char b[] = "b";
306 char c[] = "c";
307
308 // New value.
309 EXPECT_EQ(0, setenv("test-variable", a, 0));
310 EXPECT_STREQ(a, getenv("test-variable"));
311
312 // Existing value, no overwrite.
313 EXPECT_EQ(0, setenv("test-variable", b, 0));
314 EXPECT_STREQ(a, getenv("test-variable"));
315
316 // Existing value, overwrite.
317 EXPECT_EQ(0, setenv("test-variable", c, 1));
318 EXPECT_STREQ(c, getenv("test-variable"));
319 // But the arrays backing the values are unchanged.
320 EXPECT_EQ('a', a[0]);
321 EXPECT_EQ('b', b[0]);
322 EXPECT_EQ('c', c[0]);
323
324 ASSERT_EQ(0, unsetenv("test-variable"));
325}
326
Christopher Ferris13f26a72016-01-13 13:47:58 -0800327TEST(UNISTD_TEST, putenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400328 ASSERT_EQ(0, unsetenv("a"));
329
330 char* s1 = strdup("a=b");
331 ASSERT_EQ(0, putenv(s1));
332
333 ASSERT_STREQ("b", getenv("a"));
334 s1[2] = 'c';
335 ASSERT_STREQ("c", getenv("a"));
336
337 char* s2 = strdup("a=b");
338 ASSERT_EQ(0, putenv(s2));
339
340 ASSERT_STREQ("b", getenv("a"));
341 ASSERT_EQ('c', s1[2]);
342
343 ASSERT_EQ(0, unsetenv("a"));
344 free(s1);
345 free(s2);
346}
347
Christopher Ferris13f26a72016-01-13 13:47:58 -0800348TEST(UNISTD_TEST, clearenv) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400349 extern char** environ;
350
351 // Guarantee that environ is not initially empty...
352 ASSERT_EQ(0, setenv("test-variable", "a", 1));
353
354 // Stash a copy.
355 std::vector<char*> old_environ;
356 for (size_t i = 0; environ[i] != NULL; ++i) {
357 old_environ.push_back(strdup(environ[i]));
358 }
359
360 ASSERT_EQ(0, clearenv());
361
362 EXPECT_TRUE(environ == NULL || environ[0] == NULL);
363 EXPECT_EQ(NULL, getenv("test-variable"));
364 EXPECT_EQ(0, setenv("test-variable", "post-clear", 1));
365 EXPECT_STREQ("post-clear", getenv("test-variable"));
366
367 // Put the old environment back.
368 for (size_t i = 0; i < old_environ.size(); ++i) {
369 EXPECT_EQ(0, putenv(old_environ[i]));
370 }
371
372 // Check it wasn't overwritten.
373 EXPECT_STREQ("a", getenv("test-variable"));
374
375 EXPECT_EQ(0, unsetenv("test-variable"));
376}
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700377
Elliott Hughes896362e2017-08-24 16:31:49 -0700378static void TestSyncFunction(int (*fn)(int)) {
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700379 int fd;
380
381 // Can't sync an invalid fd.
382 errno = 0;
383 EXPECT_EQ(-1, fn(-1));
384 EXPECT_EQ(EBADF, errno);
385
386 // It doesn't matter whether you've opened a file for write or not.
387 TemporaryFile tf;
388 ASSERT_NE(-1, tf.fd);
389
390 EXPECT_EQ(0, fn(tf.fd));
391
392 ASSERT_NE(-1, fd = open(tf.filename, O_RDONLY));
393 EXPECT_EQ(0, fn(fd));
394 close(fd);
395
396 ASSERT_NE(-1, fd = open(tf.filename, O_RDWR));
397 EXPECT_EQ(0, fn(fd));
398 close(fd);
399
400 // The fd can even be a directory.
Christopher Ferrisa948a4e2016-05-20 15:32:47 -0700401 ASSERT_NE(-1, fd = open("/data/local/tmp", O_RDONLY));
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700402 EXPECT_EQ(0, fn(fd));
403 close(fd);
Elliott Hughes896362e2017-08-24 16:31:49 -0700404}
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700405
Elliott Hughes896362e2017-08-24 16:31:49 -0700406static void TestFsyncFunction(int (*fn)(int)) {
407 TestSyncFunction(fn);
408
409 // But some file systems are fussy about fsync/fdatasync...
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700410 errno = 0;
Elliott Hughes896362e2017-08-24 16:31:49 -0700411 int fd = open("/proc/version", O_RDONLY);
412 ASSERT_NE(-1, fd);
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700413 EXPECT_EQ(-1, fn(fd));
414 EXPECT_EQ(EINVAL, errno);
415 close(fd);
416}
417
Christopher Ferris13f26a72016-01-13 13:47:58 -0800418TEST(UNISTD_TEST, fdatasync) {
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700419 TestFsyncFunction(fdatasync);
420}
421
Christopher Ferris13f26a72016-01-13 13:47:58 -0800422TEST(UNISTD_TEST, fsync) {
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700423 TestFsyncFunction(fsync);
424}
Elliott Hughes7086ad62014-06-19 16:39:01 -0700425
Elliott Hughes896362e2017-08-24 16:31:49 -0700426TEST(UNISTD_TEST, syncfs) {
427 TestSyncFunction(syncfs);
428}
429
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700430static void AssertGetPidCorrect() {
431 // The loop is just to make manual testing/debugging with strace easier.
432 pid_t getpid_syscall_result = syscall(__NR_getpid);
433 for (size_t i = 0; i < 128; ++i) {
434 ASSERT_EQ(getpid_syscall_result, getpid());
435 }
436}
437
Robert Seseke4621172016-11-03 15:00:53 -0400438static void TestGetPidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) {
Elliott Hughes7086ad62014-06-19 16:39:01 -0700439 pid_t parent_pid = getpid();
440 ASSERT_EQ(syscall(__NR_getpid), parent_pid);
441
Elliott Hughes5891abd2015-08-07 18:27:47 -0700442 pid_t fork_result = fork_fn();
Elliott Hughes7086ad62014-06-19 16:39:01 -0700443 ASSERT_NE(fork_result, -1);
444 if (fork_result == 0) {
445 // We're the child.
Robert Seseka4edf7a2016-10-25 10:29:02 -0400446 ASSERT_NO_FATAL_FAILURE(AssertGetPidCorrect());
Elliott Hughes7086ad62014-06-19 16:39:01 -0700447 ASSERT_EQ(parent_pid, getppid());
Robert Seseke4621172016-11-03 15:00:53 -0400448 exit_fn(123);
Elliott Hughes7086ad62014-06-19 16:39:01 -0700449 } else {
450 // We're the parent.
451 ASSERT_EQ(parent_pid, getpid());
Elliott Hughes33697a02016-01-26 13:04:57 -0800452 AssertChildExited(fork_result, 123);
Elliott Hughes7086ad62014-06-19 16:39:01 -0700453 }
454}
455
Robert Seseka4edf7a2016-10-25 10:29:02 -0400456// gettid() is marked as __attribute_const__, which will have the compiler
457// optimize out multiple calls to gettid in the same function. This wrapper
458// defeats that optimization.
459static __attribute__((__noinline__)) pid_t GetTidForTest() {
460 __asm__("");
461 return gettid();
462}
463
464static void AssertGetTidCorrect() {
465 // The loop is just to make manual testing/debugging with strace easier.
466 pid_t gettid_syscall_result = syscall(__NR_gettid);
467 for (size_t i = 0; i < 128; ++i) {
468 ASSERT_EQ(gettid_syscall_result, GetTidForTest());
469 }
470}
471
Robert Seseke4621172016-11-03 15:00:53 -0400472static void TestGetTidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) {
Robert Seseka4edf7a2016-10-25 10:29:02 -0400473 pid_t parent_tid = GetTidForTest();
474 ASSERT_EQ(syscall(__NR_gettid), parent_tid);
475
476 pid_t fork_result = fork_fn();
477 ASSERT_NE(fork_result, -1);
478 if (fork_result == 0) {
479 // We're the child.
480 EXPECT_EQ(syscall(__NR_getpid), syscall(__NR_gettid));
481 EXPECT_EQ(getpid(), GetTidForTest()) << "real tid is " << syscall(__NR_gettid)
482 << ", pid is " << syscall(__NR_getpid);
483 ASSERT_NO_FATAL_FAILURE(AssertGetTidCorrect());
Robert Seseke4621172016-11-03 15:00:53 -0400484 exit_fn(123);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400485 } else {
486 // We're the parent.
487 ASSERT_EQ(parent_tid, GetTidForTest());
488 AssertChildExited(fork_result, 123);
489 }
490}
491
Christopher Ferris13f26a72016-01-13 13:47:58 -0800492TEST(UNISTD_TEST, getpid_caching_and_fork) {
Robert Seseke4621172016-11-03 15:00:53 -0400493 TestGetPidCachingWithFork(fork, exit);
Elliott Hughes5891abd2015-08-07 18:27:47 -0700494}
495
Robert Seseka4edf7a2016-10-25 10:29:02 -0400496TEST(UNISTD_TEST, gettid_caching_and_fork) {
Robert Seseke4621172016-11-03 15:00:53 -0400497 TestGetTidCachingWithFork(fork, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400498}
499
Christopher Ferris13f26a72016-01-13 13:47:58 -0800500TEST(UNISTD_TEST, getpid_caching_and_vfork) {
Robert Seseke4621172016-11-03 15:00:53 -0400501 TestGetPidCachingWithFork(vfork, _exit);
Elliott Hughes5891abd2015-08-07 18:27:47 -0700502}
503
Robert Seseka4edf7a2016-10-25 10:29:02 -0400504static int CloneLikeFork() {
505 return clone(nullptr, nullptr, SIGCHLD, nullptr);
506}
507
508TEST(UNISTD_TEST, getpid_caching_and_clone_process) {
Robert Seseke4621172016-11-03 15:00:53 -0400509 TestGetPidCachingWithFork(CloneLikeFork, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400510}
511
512TEST(UNISTD_TEST, gettid_caching_and_clone_process) {
Robert Seseke4621172016-11-03 15:00:53 -0400513 TestGetTidCachingWithFork(CloneLikeFork, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400514}
515
516static int CloneAndSetTid() {
517 pid_t child_tid = 0;
518 pid_t parent_tid = GetTidForTest();
519
520 int rv = clone(nullptr, nullptr, CLONE_CHILD_SETTID | SIGCHLD, nullptr, nullptr, nullptr, &child_tid);
521 EXPECT_NE(-1, rv);
522
523 if (rv == 0) {
524 // Child.
525 EXPECT_EQ(child_tid, GetTidForTest());
526 EXPECT_NE(child_tid, parent_tid);
527 } else {
528 EXPECT_NE(child_tid, GetTidForTest());
529 EXPECT_NE(child_tid, parent_tid);
530 EXPECT_EQ(GetTidForTest(), parent_tid);
531 }
532
533 return rv;
534}
535
536TEST(UNISTD_TEST, gettid_caching_and_clone_process_settid) {
Robert Seseke4621172016-11-03 15:00:53 -0400537 TestGetTidCachingWithFork(CloneAndSetTid, exit);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400538}
539
540static int CloneStartRoutine(int (*start_routine)(void*)) {
541 void* child_stack[1024];
Yabin Cuifb5b9bb2016-11-22 17:18:10 -0800542 return clone(start_routine, &child_stack[1024], SIGCHLD, NULL);
Robert Seseka4edf7a2016-10-25 10:29:02 -0400543}
544
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700545static int GetPidCachingCloneStartRoutine(void*) {
546 AssertGetPidCorrect();
547 return 123;
Elliott Hughes7086ad62014-06-19 16:39:01 -0700548}
549
Christopher Ferris13f26a72016-01-13 13:47:58 -0800550TEST(UNISTD_TEST, getpid_caching_and_clone) {
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700551 pid_t parent_pid = getpid();
552 ASSERT_EQ(syscall(__NR_getpid), parent_pid);
553
Robert Seseka4edf7a2016-10-25 10:29:02 -0400554 int clone_result = CloneStartRoutine(GetPidCachingCloneStartRoutine);
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700555 ASSERT_NE(clone_result, -1);
556
557 ASSERT_EQ(parent_pid, getpid());
558
Elliott Hughes33697a02016-01-26 13:04:57 -0800559 AssertChildExited(clone_result, 123);
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700560}
561
Robert Seseka4edf7a2016-10-25 10:29:02 -0400562static int GetTidCachingCloneStartRoutine(void*) {
563 AssertGetTidCorrect();
564 return 123;
565}
566
567TEST(UNISTD_TEST, gettid_caching_and_clone) {
568 pid_t parent_tid = GetTidForTest();
569 ASSERT_EQ(syscall(__NR_gettid), parent_tid);
570
571 int clone_result = CloneStartRoutine(GetTidCachingCloneStartRoutine);
572 ASSERT_NE(clone_result, -1);
573
574 ASSERT_EQ(parent_tid, GetTidForTest());
575
576 AssertChildExited(clone_result, 123);
577}
578
Robert Seseke4621172016-11-03 15:00:53 -0400579static int CloneChildExit(void*) {
580 AssertGetPidCorrect();
581 AssertGetTidCorrect();
582 exit(33);
583}
584
585TEST(UNISTD_TEST, clone_fn_and_exit) {
586 int clone_result = CloneStartRoutine(CloneChildExit);
587 ASSERT_NE(-1, clone_result);
588
589 AssertGetPidCorrect();
590 AssertGetTidCorrect();
591
592 AssertChildExited(clone_result, 33);
593}
594
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700595static void* GetPidCachingPthreadStartRoutine(void*) {
596 AssertGetPidCorrect();
Elliott Hughes7086ad62014-06-19 16:39:01 -0700597 return NULL;
598}
599
Christopher Ferris13f26a72016-01-13 13:47:58 -0800600TEST(UNISTD_TEST, getpid_caching_and_pthread_create) {
Elliott Hughes7086ad62014-06-19 16:39:01 -0700601 pid_t parent_pid = getpid();
602
603 pthread_t t;
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700604 ASSERT_EQ(0, pthread_create(&t, NULL, GetPidCachingPthreadStartRoutine, NULL));
Elliott Hughes7086ad62014-06-19 16:39:01 -0700605
606 ASSERT_EQ(parent_pid, getpid());
607
608 void* result;
609 ASSERT_EQ(0, pthread_join(t, &result));
610 ASSERT_EQ(NULL, result);
611}
Elliott Hughes60452a22014-09-22 14:41:30 -0700612
Robert Seseka4edf7a2016-10-25 10:29:02 -0400613static void* GetTidCachingPthreadStartRoutine(void*) {
614 AssertGetTidCorrect();
615 uint64_t tid = GetTidForTest();
616 return reinterpret_cast<void*>(tid);
617}
618
619TEST(UNISTD_TEST, gettid_caching_and_pthread_create) {
620 pid_t parent_tid = GetTidForTest();
621
622 pthread_t t;
623 ASSERT_EQ(0, pthread_create(&t, NULL, GetTidCachingPthreadStartRoutine, &parent_tid));
624
625 ASSERT_EQ(parent_tid, GetTidForTest());
626
627 void* result;
628 ASSERT_EQ(0, pthread_join(t, &result));
629 ASSERT_NE(static_cast<uint64_t>(parent_tid), reinterpret_cast<uint64_t>(result));
630}
631
Christopher Ferris13f26a72016-01-13 13:47:58 -0800632class UNISTD_DEATHTEST : public BionicDeathTest {};
Yabin Cui9df70402014-11-05 18:01:01 -0800633
Christopher Ferris13f26a72016-01-13 13:47:58 -0800634TEST_F(UNISTD_DEATHTEST, abort) {
Elliott Hughes60452a22014-09-22 14:41:30 -0700635 ASSERT_EXIT(abort(), testing::KilledBySignal(SIGABRT), "");
636}
Elliott Hughesb86a4c72014-11-07 16:07:13 -0800637
Christopher Ferris13f26a72016-01-13 13:47:58 -0800638TEST(UNISTD_TEST, sethostname) {
Elliott Hughesb86a4c72014-11-07 16:07:13 -0800639 // The permissions check happens before the argument check, so this will
640 // fail for a different reason if you're running as root than if you're
641 // not, but it'll fail either way. Checking that we have the symbol is about
642 // all we can do for sethostname(2).
643 ASSERT_EQ(-1, sethostname("", -1));
644}
Derek Xued94e7f02014-09-25 11:12:01 +0100645
Christopher Ferris13f26a72016-01-13 13:47:58 -0800646TEST(UNISTD_TEST, gethostname) {
Derek Xued94e7f02014-09-25 11:12:01 +0100647 char hostname[HOST_NAME_MAX + 1];
Derek Xued94e7f02014-09-25 11:12:01 +0100648 memset(hostname, 0, sizeof(hostname));
649
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800650 // Can we get the hostname with a big buffer?
Derek Xued94e7f02014-09-25 11:12:01 +0100651 ASSERT_EQ(0, gethostname(hostname, HOST_NAME_MAX));
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800652
653 // Can we get the hostname with a right-sized buffer?
654 errno = 0;
655 ASSERT_EQ(0, gethostname(hostname, strlen(hostname) + 1));
656
657 // Does uname(2) agree?
Derek Xued94e7f02014-09-25 11:12:01 +0100658 utsname buf;
659 ASSERT_EQ(0, uname(&buf));
660 ASSERT_EQ(0, strncmp(hostname, buf.nodename, SYS_NMLN));
661 ASSERT_GT(strlen(hostname), 0U);
662
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800663 // Do we correctly detect truncation?
Derek Xued94e7f02014-09-25 11:12:01 +0100664 errno = 0;
665 ASSERT_EQ(-1, gethostname(hostname, strlen(hostname)));
666 ASSERT_EQ(ENAMETOOLONG, errno);
Derek Xued94e7f02014-09-25 11:12:01 +0100667}
Yabin Cuib5e581a2014-11-08 14:58:12 -0800668
Christopher Ferris13f26a72016-01-13 13:47:58 -0800669TEST(UNISTD_TEST, pathconf_fpathconf) {
Yabin Cuib5e581a2014-11-08 14:58:12 -0800670 TemporaryFile tf;
671 long rc = 0L;
672 // As a file system's block size is always power of 2, the configure values
673 // for ALLOC and XFER should be power of 2 as well.
674 rc = pathconf(tf.filename, _PC_ALLOC_SIZE_MIN);
675 ASSERT_TRUE(rc > 0 && powerof2(rc));
676 rc = pathconf(tf.filename, _PC_REC_MIN_XFER_SIZE);
677 ASSERT_TRUE(rc > 0 && powerof2(rc));
678 rc = pathconf(tf.filename, _PC_REC_XFER_ALIGN);
679 ASSERT_TRUE(rc > 0 && powerof2(rc));
680
681 rc = fpathconf(tf.fd, _PC_ALLOC_SIZE_MIN);
682 ASSERT_TRUE(rc > 0 && powerof2(rc));
683 rc = fpathconf(tf.fd, _PC_REC_MIN_XFER_SIZE);
684 ASSERT_TRUE(rc > 0 && powerof2(rc));
685 rc = fpathconf(tf.fd, _PC_REC_XFER_ALIGN);
686 ASSERT_TRUE(rc > 0 && powerof2(rc));
687}
Derek Xuebc644762014-09-25 10:55:34 +0100688
Yabin Cui1c191942014-11-19 19:49:14 -0800689
Christopher Ferris13f26a72016-01-13 13:47:58 -0800690TEST(UNISTD_TEST, _POSIX_macros_smoke) {
Yabin Cui1c191942014-11-19 19:49:14 -0800691 // Make a tight verification of _POSIX_* / _POSIX2_* / _XOPEN_* macros, to prevent change by mistake.
692 // Verify according to POSIX.1-2008.
693 EXPECT_EQ(200809L, _POSIX_VERSION);
694
Yabin Cui5afae642014-11-25 20:17:27 -0800695 EXPECT_EQ(_POSIX_VERSION, _POSIX_ADVISORY_INFO);
Yabin Cui1c191942014-11-19 19:49:14 -0800696 EXPECT_GT(_POSIX_AIO_LISTIO_MAX, 0);
697 EXPECT_GT(_POSIX_AIO_MAX, 0);
698 EXPECT_GT(_POSIX_ARG_MAX, 0);
Elliott Hughes73c44a42016-10-19 09:27:02 -0700699 EXPECT_GT(_POSIX_BARRIERS, 0);
700 EXPECT_GT(_POSIX_SPIN_LOCKS, 0);
Yabin Cui1c191942014-11-19 19:49:14 -0800701 EXPECT_GT(_POSIX_CHILD_MAX, 0);
702 EXPECT_NE(_POSIX_CHOWN_RESTRICTED, -1);
703 EXPECT_EQ(_POSIX_VERSION, _POSIX_CLOCK_SELECTION);
Yabin Cui72575602014-12-08 11:54:12 -0800704 EXPECT_EQ(0, _POSIX_CPUTIME); // Use sysconf to detect support at runtime.
Yabin Cui1c191942014-11-19 19:49:14 -0800705 EXPECT_GT(_POSIX_DELAYTIMER_MAX, 0);
706 EXPECT_EQ(_POSIX_VERSION, _POSIX_FSYNC);
707 EXPECT_GT(_POSIX_HOST_NAME_MAX, 0);
708 EXPECT_EQ(_POSIX_VERSION, _POSIX_IPV6);
709 EXPECT_GT(_POSIX_JOB_CONTROL, 0);
710 EXPECT_GT(_POSIX_LINK_MAX, 0);
711 EXPECT_GT(_POSIX_LOGIN_NAME_MAX, 0);
712 EXPECT_EQ(_POSIX_VERSION, _POSIX_MAPPED_FILES);
713 EXPECT_GT(_POSIX_MAX_CANON, 0);
714 EXPECT_GT(_POSIX_MAX_INPUT, 0);
715 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK);
716 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK_RANGE);
717 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMORY_PROTECTION);
718 EXPECT_EQ(0, _POSIX_MONOTONIC_CLOCK);
719 EXPECT_GT(_POSIX_MQ_OPEN_MAX, 0);
720 EXPECT_GT(_POSIX_MQ_PRIO_MAX, 0);
721 EXPECT_GT(_POSIX_NAME_MAX, 0);
722 EXPECT_GT(_POSIX_NGROUPS_MAX, 0);
723 EXPECT_GT(_POSIX_NO_TRUNC, 0);
724 EXPECT_GT(_POSIX_OPEN_MAX, 0);
725 EXPECT_GT(_POSIX_PATH_MAX, 0);
726 EXPECT_GT(_POSIX_PIPE_BUF, 0);
727 EXPECT_EQ(_POSIX_VERSION, _POSIX_PRIORITY_SCHEDULING);
728 EXPECT_EQ(_POSIX_VERSION, _POSIX_RAW_SOCKETS);
729 EXPECT_EQ(_POSIX_VERSION, _POSIX_READER_WRITER_LOCKS);
Yabin Cui63481602014-12-01 17:41:04 -0800730 EXPECT_EQ(_POSIX_VERSION, _POSIX_REALTIME_SIGNALS);
Yabin Cui1c191942014-11-19 19:49:14 -0800731 EXPECT_GT(_POSIX_REGEXP, 0);
732 EXPECT_GT(_POSIX_RE_DUP_MAX, 0);
733 EXPECT_GT(_POSIX_SAVED_IDS, 0);
734 EXPECT_EQ(_POSIX_VERSION, _POSIX_SEMAPHORES);
735 EXPECT_GT(_POSIX_SEM_NSEMS_MAX, 0);
736 EXPECT_GT(_POSIX_SEM_VALUE_MAX, 0);
737 EXPECT_GT(_POSIX_SHELL, 0);
738 EXPECT_GT(_POSIX_SIGQUEUE_MAX, 0);
739 EXPECT_EQ(-1, _POSIX_SPORADIC_SERVER);
740 EXPECT_GT(_POSIX_SSIZE_MAX, 0);
741 EXPECT_GT(_POSIX_STREAM_MAX, 0);
742 EXPECT_GT(_POSIX_SYMLINK_MAX, 0);
743 EXPECT_GT(_POSIX_SYMLOOP_MAX, 0);
744 EXPECT_EQ(_POSIX_VERSION, _POSIX_SYNCHRONIZED_IO);
745 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREADS);
746 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKADDR);
747 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKSIZE);
Yabin Cui72575602014-12-08 11:54:12 -0800748 EXPECT_EQ(0, _POSIX_THREAD_CPUTIME); // Use sysconf to detect support at runtime.
Yabin Cui1c191942014-11-19 19:49:14 -0800749 EXPECT_GT(_POSIX_THREAD_DESTRUCTOR_ITERATIONS, 0);
Yabin Cui6c238f22014-12-11 20:50:41 -0800750 EXPECT_EQ(_POSIX_THREAD_KEYS_MAX, 128);
Yabin Cui1c191942014-11-19 19:49:14 -0800751 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PRIORITY_SCHEDULING);
Elliott Hughes72927252016-07-27 14:05:10 -0700752 EXPECT_EQ(-1, _POSIX_THREAD_PRIO_INHERIT);
753 EXPECT_EQ(-1, _POSIX_THREAD_PRIO_PROTECT);
Elliott Hughes468c8082017-05-20 12:47:14 -0700754 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PROCESS_SHARED);
Yabin Cui1c191942014-11-19 19:49:14 -0800755 EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_PROTECT);
756 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_SAFE_FUNCTIONS);
757 EXPECT_EQ(-1, _POSIX_THREAD_SPORADIC_SERVER);
758 EXPECT_GT(_POSIX_THREAD_THREADS_MAX, 0);
759 EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMEOUTS);
760 EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMERS);
761 EXPECT_GT(_POSIX_TIMER_MAX, 0);
762 EXPECT_EQ(-1, _POSIX_TRACE);
763 EXPECT_EQ(-1, _POSIX_TRACE_EVENT_FILTER);
764 EXPECT_EQ(-1, _POSIX_TRACE_INHERIT);
765 EXPECT_EQ(-1, _POSIX_TRACE_LOG);
766 EXPECT_GT(_POSIX_TTY_NAME_MAX, 0);
767 EXPECT_EQ(-1, _POSIX_TYPED_MEMORY_OBJECTS);
768 EXPECT_GT(_POSIX_TZNAME_MAX, 0);
769 EXPECT_NE(-1, _POSIX_VDISABLE);
770
Elliott Hughesa3529352017-07-13 10:20:41 -0700771 EXPECT_EQ(_POSIX_VERSION, _POSIX2_VERSION);
Yabin Cui1c191942014-11-19 19:49:14 -0800772 EXPECT_GT(_POSIX2_BC_BASE_MAX, 0);
773 EXPECT_GT(_POSIX2_BC_DIM_MAX, 0);
774 EXPECT_GT(_POSIX2_BC_SCALE_MAX, 0);
775 EXPECT_GT(_POSIX2_BC_STRING_MAX, 0);
776 EXPECT_GT(_POSIX2_CHARCLASS_NAME_MAX, 0);
777 EXPECT_GT(_POSIX2_COLL_WEIGHTS_MAX, 0);
778 EXPECT_EQ(_POSIX_VERSION, _POSIX2_C_BIND);
779 EXPECT_GT(_POSIX2_EXPR_NEST_MAX, 0);
780 EXPECT_GT(_POSIX2_LINE_MAX, 0);
781 EXPECT_GT(_POSIX2_RE_DUP_MAX, 0);
782
783 EXPECT_EQ(700, _XOPEN_VERSION);
784 EXPECT_GT(_XOPEN_IOV_MAX, 0);
785 EXPECT_GT(_XOPEN_UNIX, 0);
786
Elliott Hughes7b41aaf2017-07-13 10:28:21 -0700787 // In O, the headers still have -1 (even though all the functionality has
788 // been there for a long time). This was fixed in O-DR, but there isn't a
789 // separate CTS for O-DR, so we'll accept both.
790 EXPECT_TRUE(_POSIX_THREAD_PROCESS_SHARED == -1 ||
791 _POSIX_THREAD_PROCESS_SHARED == _POSIX_VERSION);
792
Yabin Cui1c191942014-11-19 19:49:14 -0800793#if defined(__BIONIC__)
794 // These tests only pass on bionic, as bionic and glibc has different support on these macros.
Yabin Cui5afae642014-11-25 20:17:27 -0800795 // Macros like _POSIX_ASYNCHRONOUS_IO are not supported on bionic yet.
Yabin Cui1c191942014-11-19 19:49:14 -0800796 EXPECT_EQ(-1, _POSIX_ASYNCHRONOUS_IO);
Yabin Cui1c191942014-11-19 19:49:14 -0800797 EXPECT_EQ(-1, _POSIX_MESSAGE_PASSING);
798 EXPECT_EQ(-1, _POSIX_PRIORITIZED_IO);
Yabin Cui1c191942014-11-19 19:49:14 -0800799 EXPECT_EQ(-1, _POSIX_SHARED_MEMORY_OBJECTS);
800 EXPECT_EQ(-1, _POSIX_SPAWN);
Yabin Cui1c191942014-11-19 19:49:14 -0800801 EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_INHERIT);
802
Yabin Cui1c191942014-11-19 19:49:14 -0800803 EXPECT_EQ(-1, _POSIX2_CHAR_TERM);
804 EXPECT_EQ(-1, _POSIX2_C_DEV);
805 EXPECT_EQ(-1, _POSIX2_LOCALEDEF);
806 EXPECT_EQ(-1, _POSIX2_SW_DEV);
807 EXPECT_EQ(-1, _POSIX2_UPE);
808
809 EXPECT_EQ(-1, _XOPEN_ENH_I18N);
810 EXPECT_EQ(-1, _XOPEN_CRYPT);
811 EXPECT_EQ(-1, _XOPEN_LEGACY);
812 EXPECT_EQ(-1, _XOPEN_REALTIME);
813 EXPECT_EQ(-1, _XOPEN_REALTIME_THREADS);
814 EXPECT_EQ(-1, _XOPEN_SHM);
815
816#endif // defined(__BIONIC__)
817}
818
Elliott Hughes72927252016-07-27 14:05:10 -0700819#define VERIFY_SYSCONF_UNSUPPORTED(name) VerifySysconf(name, #name, [](long v){return v == -1;})
Yabin Cui1c191942014-11-19 19:49:14 -0800820
821// sysconf() means unlimited when it returns -1 with errno unchanged.
822#define VERIFY_SYSCONF_POSITIVE(name) \
823 VerifySysconf(name, #name, [](long v){return (v > 0 || v == -1);})
824
825#define VERIFY_SYSCONF_POSIX_VERSION(name) \
826 VerifySysconf(name, #name, [](long v){return v == _POSIX_VERSION;})
827
828static void VerifySysconf(int option, const char *option_name, bool (*verify)(long)) {
829 errno = 0;
830 long ret = sysconf(option);
831 EXPECT_TRUE(0 == errno && verify(ret)) << "name = " << option_name << ", ret = "
832 << ret <<", Error Message: " << strerror(errno);
833}
Derek Xuebc644762014-09-25 10:55:34 +0100834
Christopher Ferris13f26a72016-01-13 13:47:58 -0800835TEST(UNISTD_TEST, sysconf) {
Yabin Cui5afae642014-11-25 20:17:27 -0800836 VERIFY_SYSCONF_POSIX_VERSION(_SC_ADVISORY_INFO);
Yabin Cui1c191942014-11-19 19:49:14 -0800837 VERIFY_SYSCONF_POSITIVE(_SC_ARG_MAX);
Elliott Hughes73c44a42016-10-19 09:27:02 -0700838 VERIFY_SYSCONF_POSIX_VERSION(_SC_BARRIERS);
Yabin Cui1c191942014-11-19 19:49:14 -0800839 VERIFY_SYSCONF_POSITIVE(_SC_BC_BASE_MAX);
840 VERIFY_SYSCONF_POSITIVE(_SC_BC_DIM_MAX);
841 VERIFY_SYSCONF_POSITIVE(_SC_BC_SCALE_MAX);
842 VERIFY_SYSCONF_POSITIVE(_SC_CHILD_MAX);
843 VERIFY_SYSCONF_POSITIVE(_SC_CLK_TCK);
844 VERIFY_SYSCONF_POSITIVE(_SC_COLL_WEIGHTS_MAX);
Yabin Cuid5c65272014-11-26 14:04:26 -0800845 VERIFY_SYSCONF_POSIX_VERSION(_SC_CPUTIME);
Yabin Cui1c191942014-11-19 19:49:14 -0800846 VERIFY_SYSCONF_POSITIVE(_SC_EXPR_NEST_MAX);
847 VERIFY_SYSCONF_POSITIVE(_SC_LINE_MAX);
848 VERIFY_SYSCONF_POSITIVE(_SC_NGROUPS_MAX);
849 VERIFY_SYSCONF_POSITIVE(_SC_OPEN_MAX);
850 VERIFY_SYSCONF_POSITIVE(_SC_PASS_MAX);
851 VERIFY_SYSCONF_POSIX_VERSION(_SC_2_C_BIND);
Elliott Hughes72927252016-07-27 14:05:10 -0700852 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_DEV);
853 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_RUN);
854 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_UPE);
Elliott Hughes6c135f42017-07-28 16:53:32 -0700855 VERIFY_SYSCONF_POSIX_VERSION(_SC_2_VERSION);
Yabin Cui1c191942014-11-19 19:49:14 -0800856 VERIFY_SYSCONF_POSITIVE(_SC_JOB_CONTROL);
857 VERIFY_SYSCONF_POSITIVE(_SC_SAVED_IDS);
858 VERIFY_SYSCONF_POSIX_VERSION(_SC_VERSION);
859 VERIFY_SYSCONF_POSITIVE(_SC_RE_DUP_MAX);
860 VERIFY_SYSCONF_POSITIVE(_SC_STREAM_MAX);
861 VERIFY_SYSCONF_POSITIVE(_SC_TZNAME_MAX);
862 VerifySysconf(_SC_XOPEN_VERSION, "_SC_XOPEN_VERSION", [](long v){return v == _XOPEN_VERSION;});
863 VERIFY_SYSCONF_POSITIVE(_SC_ATEXIT_MAX);
864 VERIFY_SYSCONF_POSITIVE(_SC_IOV_MAX);
865 VERIFY_SYSCONF_POSITIVE(_SC_PAGESIZE);
866 VERIFY_SYSCONF_POSITIVE(_SC_PAGE_SIZE);
Elliott Hughes189394b2015-07-24 23:22:07 -0700867 VerifySysconf(_SC_PAGE_SIZE, "_SC_PAGE_SIZE",
868 [](long v){return v == sysconf(_SC_PAGESIZE) && v == getpagesize();});
Yabin Cui1c191942014-11-19 19:49:14 -0800869 VERIFY_SYSCONF_POSITIVE(_SC_XOPEN_UNIX);
870 VERIFY_SYSCONF_POSITIVE(_SC_AIO_LISTIO_MAX);
871 VERIFY_SYSCONF_POSITIVE(_SC_AIO_MAX);
872 VerifySysconf(_SC_AIO_PRIO_DELTA_MAX, "_SC_AIO_PRIO_DELTA_MAX", [](long v){return v >= 0;});
873 VERIFY_SYSCONF_POSITIVE(_SC_DELAYTIMER_MAX);
874 VERIFY_SYSCONF_POSITIVE(_SC_MQ_OPEN_MAX);
875 VERIFY_SYSCONF_POSITIVE(_SC_MQ_PRIO_MAX);
876 VERIFY_SYSCONF_POSITIVE(_SC_RTSIG_MAX);
877 VERIFY_SYSCONF_POSITIVE(_SC_SEM_NSEMS_MAX);
878 VERIFY_SYSCONF_POSITIVE(_SC_SEM_VALUE_MAX);
Elliott Hughes73c44a42016-10-19 09:27:02 -0700879 VERIFY_SYSCONF_POSIX_VERSION(_SC_SPIN_LOCKS);
Yabin Cui1c191942014-11-19 19:49:14 -0800880 VERIFY_SYSCONF_POSITIVE(_SC_TIMER_MAX);
881 VERIFY_SYSCONF_POSIX_VERSION(_SC_FSYNC);
882 VERIFY_SYSCONF_POSIX_VERSION(_SC_MAPPED_FILES);
883 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK);
884 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK_RANGE);
885 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMORY_PROTECTION);
886 VERIFY_SYSCONF_POSIX_VERSION(_SC_PRIORITY_SCHEDULING);
Yabin Cui63481602014-12-01 17:41:04 -0800887 VERIFY_SYSCONF_POSIX_VERSION(_SC_REALTIME_SIGNALS);
Yabin Cui1c191942014-11-19 19:49:14 -0800888 VERIFY_SYSCONF_POSIX_VERSION(_SC_SEMAPHORES);
889 VERIFY_SYSCONF_POSIX_VERSION(_SC_SYNCHRONIZED_IO);
890 VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMERS);
891 VERIFY_SYSCONF_POSITIVE(_SC_GETGR_R_SIZE_MAX);
892 VERIFY_SYSCONF_POSITIVE(_SC_GETPW_R_SIZE_MAX);
893 VERIFY_SYSCONF_POSITIVE(_SC_LOGIN_NAME_MAX);
894 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_DESTRUCTOR_ITERATIONS);
895 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_KEYS_MAX);
896 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_STACK_MIN);
897 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_THREADS_MAX);
898 VERIFY_SYSCONF_POSITIVE(_SC_TTY_NAME_MAX);
899 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREADS);
900 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKADDR);
901 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKSIZE);
902 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PRIORITY_SCHEDULING);
Elliott Hughes72927252016-07-27 14:05:10 -0700903 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_INHERIT);
904 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_PROTECT);
Yabin Cui1c191942014-11-19 19:49:14 -0800905 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_SAFE_FUNCTIONS);
906 VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_CONF);
907 VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_ONLN);
908 VERIFY_SYSCONF_POSITIVE(_SC_PHYS_PAGES);
909 VERIFY_SYSCONF_POSITIVE(_SC_AVPHYS_PAGES);
910 VERIFY_SYSCONF_POSIX_VERSION(_SC_MONOTONIC_CLOCK);
Elliott Hughes72927252016-07-27 14:05:10 -0700911 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS);
912 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_ACCOUNTING);
913 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_CHECKPOINT);
914 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_LOCATE);
915 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_MESSAGE);
916 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_TRACK);
Yabin Cui1c191942014-11-19 19:49:14 -0800917 VERIFY_SYSCONF_POSIX_VERSION(_SC_CLOCK_SELECTION);
918 VERIFY_SYSCONF_POSITIVE(_SC_HOST_NAME_MAX);
919 VERIFY_SYSCONF_POSIX_VERSION(_SC_IPV6);
920 VERIFY_SYSCONF_POSIX_VERSION(_SC_RAW_SOCKETS);
921 VERIFY_SYSCONF_POSIX_VERSION(_SC_READER_WRITER_LOCKS);
922 VERIFY_SYSCONF_POSITIVE(_SC_REGEXP);
923 VERIFY_SYSCONF_POSITIVE(_SC_SHELL);
Elliott Hughes72927252016-07-27 14:05:10 -0700924 VERIFY_SYSCONF_UNSUPPORTED(_SC_SPORADIC_SERVER);
Yabin Cui1c191942014-11-19 19:49:14 -0800925 VERIFY_SYSCONF_POSITIVE(_SC_SYMLOOP_MAX);
926 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_CPUTIME);
Elliott Hughes468c8082017-05-20 12:47:14 -0700927 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PROCESS_SHARED);
Elliott Hughes72927252016-07-27 14:05:10 -0700928 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_SPORADIC_SERVER);
Yabin Cui1c191942014-11-19 19:49:14 -0800929 VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMEOUTS);
Elliott Hughes72927252016-07-27 14:05:10 -0700930 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE);
931 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_FILTER);
932 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_NAME_MAX);
933 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_INHERIT);
934 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_LOG);
935 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_NAME_MAX);
936 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_SYS_MAX);
937 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_USER_EVENT_MAX);
938 VERIFY_SYSCONF_UNSUPPORTED(_SC_TYPED_MEMORY_OBJECTS);
939 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_STREAMS);
Derek Xuebc644762014-09-25 10:55:34 +0100940
Yabin Cui1c191942014-11-19 19:49:14 -0800941#if defined(__LP64__)
Elliott Hughes72927252016-07-27 14:05:10 -0700942 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFF32);
943 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG);
Yabin Cui1c191942014-11-19 19:49:14 -0800944 VERIFY_SYSCONF_POSITIVE(_SC_V7_LP64_OFF64);
945 VERIFY_SYSCONF_POSITIVE(_SC_V7_LPBIG_OFFBIG);
946#else
947 VERIFY_SYSCONF_POSITIVE(_SC_V7_ILP32_OFF32);
948#if defined(__BIONIC__)
949 // bionic does not support 64 bits off_t type on 32bit machine.
Elliott Hughes72927252016-07-27 14:05:10 -0700950 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG);
Yabin Cui1c191942014-11-19 19:49:14 -0800951#endif
Elliott Hughes72927252016-07-27 14:05:10 -0700952 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LP64_OFF64);
953 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LPBIG_OFFBIG);
Yabin Cui1c191942014-11-19 19:49:14 -0800954#endif
Derek Xuebc644762014-09-25 10:55:34 +0100955
Yabin Cui1c191942014-11-19 19:49:14 -0800956#if defined(__BIONIC__)
957 // Tests can only run on bionic, as bionic and glibc have different support for these options.
958 // Below options are not supported on bionic yet.
Elliott Hughes72927252016-07-27 14:05:10 -0700959 VERIFY_SYSCONF_UNSUPPORTED(_SC_ASYNCHRONOUS_IO);
Elliott Hughes72927252016-07-27 14:05:10 -0700960 VERIFY_SYSCONF_UNSUPPORTED(_SC_MESSAGE_PASSING);
961 VERIFY_SYSCONF_UNSUPPORTED(_SC_PRIORITIZED_IO);
962 VERIFY_SYSCONF_UNSUPPORTED(_SC_SHARED_MEMORY_OBJECTS);
963 VERIFY_SYSCONF_UNSUPPORTED(_SC_SPAWN);
Elliott Hughes72927252016-07-27 14:05:10 -0700964 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_INHERIT);
965 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_PROTECT);
Derek Xuebc644762014-09-25 10:55:34 +0100966
Elliott Hughes72927252016-07-27 14:05:10 -0700967 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_C_DEV);
968 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_CHAR_TERM);
969 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_LOCALEDEF);
970 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_SW_DEV);
Derek Xuebc644762014-09-25 10:55:34 +0100971
Elliott Hughes72927252016-07-27 14:05:10 -0700972 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_CRYPT);
973 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_ENH_I18N);
974 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_LEGACY);
975 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_REALTIME);
976 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_REALTIME_THREADS);
977 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_SHM);
978 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_UUCP);
Yabin Cui1c191942014-11-19 19:49:14 -0800979#endif // defined(__BIONIC__)
Derek Xuebc644762014-09-25 10:55:34 +0100980}
Elliott Hughesbe52e652015-02-23 18:02:29 -0800981
Christopher Ferris13f26a72016-01-13 13:47:58 -0800982TEST(UNISTD_TEST, get_cpu_count_from_string) {
Yabin Cuicb6f5992015-09-29 16:11:45 -0700983 ASSERT_EQ(0, GetCpuCountFromString(" "));
984 ASSERT_EQ(1, GetCpuCountFromString("0"));
985 ASSERT_EQ(40, GetCpuCountFromString("0-39"));
986 ASSERT_EQ(4, GetCpuCountFromString("0, 1-2, 4\n"));
987}
988
Christopher Ferris13f26a72016-01-13 13:47:58 -0800989TEST(UNISTD_TEST, sysconf_SC_NPROCESSORS_ONLN) {
Elliott Hughes0b2acdf2015-10-02 18:25:19 -0700990 std::string line;
991 ASSERT_TRUE(android::base::ReadFileToString("/sys/devices/system/cpu/online", &line));
Yabin Cuicb6f5992015-09-29 16:11:45 -0700992 long online_cpus = 0;
Elliott Hughes0b2acdf2015-10-02 18:25:19 -0700993 for (const std::string& s : android::base::Split(line, ",")) {
Yabin Cuicb6f5992015-09-29 16:11:45 -0700994 std::vector<std::string> numbers = android::base::Split(s, "-");
995 if (numbers.size() == 1u) {
996 online_cpus++;
997 } else {
998 online_cpus += atoi(numbers[1].c_str()) - atoi(numbers[0].c_str()) + 1;
999 }
1000 }
1001 ASSERT_EQ(online_cpus, sysconf(_SC_NPROCESSORS_ONLN));
1002}
1003
Elliott Hughes38dba2e2016-08-10 15:51:06 -07001004TEST(UNISTD_TEST, sysconf_SC_ARG_MAX) {
1005 // Since Linux 2.6.23, ARG_MAX isn't a constant and depends on RLIMIT_STACK.
1006
1007 // Get our current limit, and set things up so we restore the limit.
1008 rlimit rl;
1009 ASSERT_EQ(0, getrlimit(RLIMIT_STACK, &rl));
1010 uint64_t original_rlim_cur = rl.rlim_cur;
1011 if (rl.rlim_cur == RLIM_INFINITY) {
1012 rl.rlim_cur = 8 * 1024 * 1024; // Bionic reports unlimited stacks as 8MiB.
1013 }
Tom Cherryb8ab6182017-04-05 16:20:29 -07001014 auto guard = android::base::make_scope_guard([&rl, original_rlim_cur]() {
Elliott Hughes38dba2e2016-08-10 15:51:06 -07001015 rl.rlim_cur = original_rlim_cur;
1016 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1017 });
1018
1019 // _SC_ARG_MAX should be 1/4 the stack size.
1020 EXPECT_EQ(static_cast<long>(rl.rlim_cur / 4), sysconf(_SC_ARG_MAX));
1021
1022 // If you have a really small stack, the kernel still guarantees "32 pages" (fs/exec.c).
1023 rl.rlim_cur = 1024;
1024 rl.rlim_max = RLIM_INFINITY;
1025 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1026
1027 EXPECT_EQ(static_cast<long>(32 * sysconf(_SC_PAGE_SIZE)), sysconf(_SC_ARG_MAX));
1028
1029 // With a 128-page stack limit, we know exactly what _SC_ARG_MAX should be...
1030 rl.rlim_cur = 128 * sysconf(_SC_PAGE_SIZE);
1031 rl.rlim_max = RLIM_INFINITY;
1032 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1033
1034 EXPECT_EQ(static_cast<long>((128 * sysconf(_SC_PAGE_SIZE)) / 4), sysconf(_SC_ARG_MAX));
1035}
1036
Christopher Ferris13f26a72016-01-13 13:47:58 -08001037TEST(UNISTD_TEST, dup2_same) {
Elliott Hughesbe52e652015-02-23 18:02:29 -08001038 // POSIX says of dup2:
1039 // If fildes2 is already a valid open file descriptor ...
1040 // [and] fildes is equal to fildes2 ... dup2() shall return
1041 // fildes2 without closing it.
1042 // This isn't true of dup3(2), so we need to manually implement that.
1043
1044 // Equal and valid.
1045 int fd = open("/proc/version", O_RDONLY);
1046 ASSERT_TRUE(fd != -1);
1047 ASSERT_EQ(fd, dup2(fd, fd));
1048 ASSERT_EQ(0, close(fd)); // Check that dup2 didn't close fd.
1049
1050 // Equal, but invalid.
1051 errno = 0;
1052 ASSERT_EQ(-1, dup2(fd, fd));
1053 ASSERT_EQ(EBADF, errno);
1054}
Elliott Hughes5704c422016-01-25 18:06:24 -08001055
Elliott Hughes5704c422016-01-25 18:06:24 -08001056TEST(UNISTD_TEST, lockf_smoke) {
1057 constexpr off64_t file_size = 32*1024LL;
1058
1059 TemporaryFile tf;
1060 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1061
1062 // Lock everything.
1063 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1064 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
1065
1066 // Try-lock everything, this should succeed too.
1067 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1068 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size));
1069
1070 // Check status.
1071 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1072 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1073
1074 // Unlock file.
1075 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1076 ASSERT_EQ(0, lockf64(tf.fd, F_ULOCK, file_size));
1077}
1078
1079TEST(UNISTD_TEST, lockf_zero) {
1080 constexpr off64_t file_size = 32*1024LL;
1081
1082 TemporaryFile tf;
1083 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1084
1085 // Lock everything by specifying a size of 0 (meaning "to the end, even if it changes").
1086 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1087 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, 0));
1088
1089 // Check that it's locked.
1090 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1091 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1092
1093 // Move the end.
1094 ASSERT_EQ(0, ftruncate(tf.fd, 2*file_size));
1095
1096 // Check that the new section is locked too.
1097 ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
1098 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, 2*file_size));
1099}
1100
1101TEST(UNISTD_TEST, lockf_negative) {
1102 constexpr off64_t file_size = 32*1024LL;
1103
1104 TemporaryFile tf;
1105 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1106
1107 // Lock everything, but specifying the range in reverse.
1108 ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
1109 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, -file_size));
1110
1111 // Check that it's locked.
1112 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1113 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1114}
1115
1116TEST(UNISTD_TEST, lockf_with_child) {
1117 constexpr off64_t file_size = 32*1024LL;
1118
1119 TemporaryFile tf;
1120 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1121
1122 // Lock everything.
1123 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1124 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
1125
1126 // Fork a child process
1127 pid_t pid = fork();
1128 ASSERT_NE(-1, pid);
1129 if (pid == 0) {
1130 // Check that the child cannot lock the file.
1131 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1132 ASSERT_EQ(-1, lockf64(tf.fd, F_TLOCK, file_size));
1133 ASSERT_EQ(EAGAIN, errno);
1134 // Check also that it reports itself as locked.
1135 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1136 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size));
1137 ASSERT_EQ(EACCES, errno);
1138 _exit(0);
1139 }
Elliott Hughes33697a02016-01-26 13:04:57 -08001140 AssertChildExited(pid, 0);
Elliott Hughes5704c422016-01-25 18:06:24 -08001141}
1142
1143TEST(UNISTD_TEST, lockf_partial_with_child) {
1144 constexpr off64_t file_size = 32*1024LL;
1145
1146 TemporaryFile tf;
1147 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1148
1149 // Lock the first half of the file.
1150 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1151 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size/2));
1152
1153 // Fork a child process.
1154 pid_t pid = fork();
1155 ASSERT_NE(-1, pid);
1156 if (pid == 0) {
1157 // Check that the child can lock the other half.
1158 ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
1159 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
1160 // Check that the child cannot lock the first half.
1161 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1162 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
1163 ASSERT_EQ(EACCES, errno);
1164 // Check also that it reports itself as locked.
1165 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1166 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
1167 ASSERT_EQ(EACCES, errno);
1168 _exit(0);
1169 }
Elliott Hughes33697a02016-01-26 13:04:57 -08001170 AssertChildExited(pid, 0);
Elliott Hughes5704c422016-01-25 18:06:24 -08001171
1172 // The second half was locked by the child, but the lock disappeared
1173 // when the process exited, so check it can be locked now.
1174 ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
1175 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
1176}
Greg Hackmanne2faf072016-03-03 08:37:53 -08001177
1178TEST(UNISTD_TEST, getdomainname) {
1179 struct utsname u;
1180 ASSERT_EQ(0, uname(&u));
1181
1182 char buf[sizeof(u.domainname)];
1183 ASSERT_EQ(0, getdomainname(buf, sizeof(buf)));
1184 EXPECT_STREQ(u.domainname, buf);
1185
1186#if defined(__BIONIC__)
1187 // bionic and glibc have different behaviors when len is too small
1188 ASSERT_EQ(-1, getdomainname(buf, strlen(u.domainname)));
1189 EXPECT_EQ(EINVAL, errno);
1190#endif
1191}
1192
1193TEST(UNISTD_TEST, setdomainname) {
1194 __user_cap_header_struct header;
1195 memset(&header, 0, sizeof(header));
1196 header.version = _LINUX_CAPABILITY_VERSION_3;
1197
1198 __user_cap_data_struct old_caps[_LINUX_CAPABILITY_U32S_3];
1199 ASSERT_EQ(0, capget(&header, &old_caps[0]));
1200
1201 auto admin_idx = CAP_TO_INDEX(CAP_SYS_ADMIN);
1202 auto admin_mask = CAP_TO_MASK(CAP_SYS_ADMIN);
1203 bool has_admin = old_caps[admin_idx].effective & admin_mask;
1204 if (has_admin) {
1205 __user_cap_data_struct new_caps[_LINUX_CAPABILITY_U32S_3];
1206 memcpy(new_caps, old_caps, sizeof(new_caps));
1207 new_caps[admin_idx].effective &= ~admin_mask;
1208
1209 ASSERT_EQ(0, capset(&header, &new_caps[0])) << "failed to drop admin privileges";
1210 }
1211
1212 const char* name = "newdomainname";
1213 ASSERT_EQ(-1, setdomainname(name, strlen(name)));
1214 ASSERT_EQ(EPERM, errno);
1215
1216 if (has_admin) {
1217 ASSERT_EQ(0, capset(&header, &old_caps[0])) << "failed to restore admin privileges";
1218 }
1219}
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001220
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001221#if defined(__GLIBC__)
1222#define BIN_DIR "/bin/"
1223#else
1224#define BIN_DIR "/system/bin/"
1225#endif
1226
1227TEST(UNISTD_TEST, execve_failure) {
1228 ExecTestHelper eth;
1229 errno = 0;
1230 ASSERT_EQ(-1, execve("/", eth.GetArgs(), eth.GetEnv()));
1231 ASSERT_EQ(EACCES, errno);
1232}
1233
Elliott Hughes3c115902016-08-24 19:27:04 -07001234TEST(UNISTD_TEST, execve_args) {
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001235 // int execve(const char* path, char* argv[], char* envp[]);
1236
1237 // Test basic argument passing.
1238 ExecTestHelper eth;
1239 eth.SetArgs({"echo", "hello", "world", nullptr});
1240 eth.Run([&]() { execve(BIN_DIR "echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1241
1242 // Test environment variable setting too.
1243 eth.SetArgs({"printenv", nullptr});
1244 eth.SetEnv({"A=B", nullptr});
1245 eth.Run([&]() { execve(BIN_DIR "printenv", eth.GetArgs(), eth.GetEnv()); }, 0, "A=B\n");
1246}
1247
1248TEST(UNISTD_TEST, execl_failure) {
1249 errno = 0;
1250 ASSERT_EQ(-1, execl("/", "/", nullptr));
1251 ASSERT_EQ(EACCES, errno);
1252}
1253
1254TEST(UNISTD_TEST, execl) {
1255 ExecTestHelper eth;
1256 // int execl(const char* path, const char* arg, ...);
1257 eth.Run([&]() { execl(BIN_DIR "echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n");
1258}
1259
1260TEST(UNISTD_TEST, execle_failure) {
1261 ExecTestHelper eth;
1262 errno = 0;
1263 ASSERT_EQ(-1, execle("/", "/", nullptr, eth.GetEnv()));
1264 ASSERT_EQ(EACCES, errno);
1265}
1266
1267TEST(UNISTD_TEST, execle) {
1268 ExecTestHelper eth;
1269 eth.SetEnv({"A=B", nullptr});
1270 // int execle(const char* path, const char* arg, ..., char* envp[]);
1271 eth.Run([&]() { execle(BIN_DIR "printenv", "printenv", nullptr, eth.GetEnv()); }, 0, "A=B\n");
1272}
1273
1274TEST(UNISTD_TEST, execv_failure) {
1275 ExecTestHelper eth;
1276 errno = 0;
1277 ASSERT_EQ(-1, execv("/", eth.GetArgs()));
1278 ASSERT_EQ(EACCES, errno);
1279}
1280
1281TEST(UNISTD_TEST, execv) {
1282 ExecTestHelper eth;
1283 eth.SetArgs({"echo", "hello", "world", nullptr});
1284 // int execv(const char* path, char* argv[]);
1285 eth.Run([&]() { execv(BIN_DIR "echo", eth.GetArgs()); }, 0, "hello world\n");
1286}
1287
1288TEST(UNISTD_TEST, execlp_failure) {
1289 errno = 0;
1290 ASSERT_EQ(-1, execlp("/", "/", nullptr));
1291 ASSERT_EQ(EACCES, errno);
1292}
1293
1294TEST(UNISTD_TEST, execlp) {
1295 ExecTestHelper eth;
1296 // int execlp(const char* file, const char* arg, ...);
1297 eth.Run([&]() { execlp("echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n");
1298}
1299
1300TEST(UNISTD_TEST, execvp_failure) {
1301 ExecTestHelper eth;
Elliott Hughes3c115902016-08-24 19:27:04 -07001302 eth.SetArgs({nullptr});
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001303 errno = 0;
1304 ASSERT_EQ(-1, execvp("/", eth.GetArgs()));
1305 ASSERT_EQ(EACCES, errno);
1306}
1307
1308TEST(UNISTD_TEST, execvp) {
1309 ExecTestHelper eth;
1310 eth.SetArgs({"echo", "hello", "world", nullptr});
1311 // int execvp(const char* file, char* argv[]);
1312 eth.Run([&]() { execvp("echo", eth.GetArgs()); }, 0, "hello world\n");
1313}
1314
1315TEST(UNISTD_TEST, execvpe_failure) {
1316 ExecTestHelper eth;
1317 errno = 0;
1318 ASSERT_EQ(-1, execvpe("this-does-not-exist", eth.GetArgs(), eth.GetEnv()));
Elliott Hughes5965bf02016-12-01 17:12:49 -08001319 // Running in CTS we might not even be able to search all directories in $PATH.
1320 ASSERT_TRUE(errno == ENOENT || errno == EACCES);
Elliott Hughes1b40aaf2016-08-18 10:11:36 -07001321}
1322
1323TEST(UNISTD_TEST, execvpe) {
1324 // int execvpe(const char* file, char* argv[], char* envp[]);
1325
1326 // Test basic argument passing.
1327 ExecTestHelper eth;
1328 eth.SetArgs({"echo", "hello", "world", nullptr});
1329 eth.Run([&]() { execvpe("echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1330
1331 // Test environment variable setting too.
1332 eth.SetArgs({"printenv", nullptr});
1333 eth.SetEnv({"A=B", nullptr});
1334 eth.Run([&]() { execvpe("printenv", eth.GetArgs(), eth.GetEnv()); }, 0, "A=B\n");
1335}
Elliott Hughes3c115902016-08-24 19:27:04 -07001336
1337TEST(UNISTD_TEST, execvpe_ENOEXEC) {
1338 // Create a shell script with #!.
1339 TemporaryFile tf;
1340 ASSERT_TRUE(android::base::WriteStringToFile("#!" BIN_DIR "sh\necho script\n", tf.filename));
1341
1342 // Set $PATH so we can find it.
1343 setenv("PATH", dirname(tf.filename), 1);
1344
1345 ExecTestHelper eth;
1346 eth.SetArgs({basename(tf.filename), nullptr});
1347
1348 // It's not inherently executable.
1349 errno = 0;
1350 ASSERT_EQ(-1, execvpe(basename(tf.filename), eth.GetArgs(), eth.GetEnv()));
1351 ASSERT_EQ(EACCES, errno);
1352
Elliott Hughes5965bf02016-12-01 17:12:49 -08001353 // Make it executable (and keep it writable because we're going to rewrite it below).
1354 ASSERT_EQ(0, chmod(tf.filename, 0777));
Elliott Hughes3c115902016-08-24 19:27:04 -07001355
1356 // TemporaryFile will have a writable fd, so we can test ETXTBSY while we're here...
1357 errno = 0;
1358 ASSERT_EQ(-1, execvpe(basename(tf.filename), eth.GetArgs(), eth.GetEnv()));
1359 ASSERT_EQ(ETXTBSY, errno);
1360
1361 // 1. The simplest test: the kernel should handle this.
1362 ASSERT_EQ(0, close(tf.fd));
1363 eth.Run([&]() { execvpe(basename(tf.filename), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
1364
1365 // 2. Try again without a #!. We should have to handle this ourselves.
1366 ASSERT_TRUE(android::base::WriteStringToFile("echo script\n", tf.filename));
1367 eth.Run([&]() { execvpe(basename(tf.filename), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
1368
1369 // 3. Again without a #!, but also with a leading '/', since that's a special case in the
1370 // implementation.
1371 eth.Run([&]() { execvpe(tf.filename, eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
1372}
Elliott Hughes63615062016-08-25 17:40:27 -07001373
1374TEST(UNISTD_TEST, execvp_libcore_test_55017) {
1375 ExecTestHelper eth;
1376 eth.SetArgs({"/system/bin/does-not-exist", nullptr});
1377
1378 errno = 0;
1379 ASSERT_EQ(-1, execvp("/system/bin/does-not-exist", eth.GetArgs()));
1380 ASSERT_EQ(ENOENT, errno);
1381}
Elliott Hughes30a36272017-02-22 17:31:41 -08001382
1383TEST(UNISTD_TEST, exec_argv0_null) {
1384 // http://b/33276926
1385 char* args[] = {nullptr};
1386 char* envs[] = {nullptr};
1387 ASSERT_EXIT(execve("/system/bin/run-as", args, envs), testing::ExitedWithCode(1),
1388 "<unknown>: usage: run-as");
1389}
Elliott Hughes06bd5862017-07-28 16:27:49 -07001390
1391TEST(UNISTD_TEST, getlogin_r) {
1392 char buf[LOGIN_NAME_MAX] = {};
1393 EXPECT_EQ(ERANGE, getlogin_r(buf, 0));
1394 EXPECT_EQ(0, getlogin_r(buf, sizeof(buf)));
1395 EXPECT_STREQ(getlogin(), buf);
1396}