xref: /aosp_15_r20/bionic/tests/fcntl_test.cpp (revision 8d67ca893c1523eb926b9080dbe4e2ffd2a27ba1)
1*8d67ca89SAndroid Build Coastguard Worker /*
2*8d67ca89SAndroid Build Coastguard Worker  * Copyright (C) 2013 The Android Open Source Project
3*8d67ca89SAndroid Build Coastguard Worker  *
4*8d67ca89SAndroid Build Coastguard Worker  * Licensed under the Apache License, Version 2.0 (the "License");
5*8d67ca89SAndroid Build Coastguard Worker  * you may not use this file except in compliance with the License.
6*8d67ca89SAndroid Build Coastguard Worker  * You may obtain a copy of the License at
7*8d67ca89SAndroid Build Coastguard Worker  *
8*8d67ca89SAndroid Build Coastguard Worker  *      http://www.apache.org/licenses/LICENSE-2.0
9*8d67ca89SAndroid Build Coastguard Worker  *
10*8d67ca89SAndroid Build Coastguard Worker  * Unless required by applicable law or agreed to in writing, software
11*8d67ca89SAndroid Build Coastguard Worker  * distributed under the License is distributed on an "AS IS" BASIS,
12*8d67ca89SAndroid Build Coastguard Worker  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*8d67ca89SAndroid Build Coastguard Worker  * See the License for the specific language governing permissions and
14*8d67ca89SAndroid Build Coastguard Worker  * limitations under the License.
15*8d67ca89SAndroid Build Coastguard Worker  */
16*8d67ca89SAndroid Build Coastguard Worker 
17*8d67ca89SAndroid Build Coastguard Worker #include <gtest/gtest.h>
18*8d67ca89SAndroid Build Coastguard Worker 
19*8d67ca89SAndroid Build Coastguard Worker #include <errno.h>
20*8d67ca89SAndroid Build Coastguard Worker #include <fcntl.h>
21*8d67ca89SAndroid Build Coastguard Worker #include <string.h>
22*8d67ca89SAndroid Build Coastguard Worker #include <sys/utsname.h>
23*8d67ca89SAndroid Build Coastguard Worker #include <sys/vfs.h>
24*8d67ca89SAndroid Build Coastguard Worker 
25*8d67ca89SAndroid Build Coastguard Worker #include <android-base/file.h>
26*8d67ca89SAndroid Build Coastguard Worker #include <android-base/silent_death_test.h>
27*8d67ca89SAndroid Build Coastguard Worker #include <android-base/stringprintf.h>
28*8d67ca89SAndroid Build Coastguard Worker 
29*8d67ca89SAndroid Build Coastguard Worker // Glibc v2.19 doesn't include these in fcntl.h so host builds will fail without.
30*8d67ca89SAndroid Build Coastguard Worker #if !defined(FALLOC_FL_PUNCH_HOLE) || !defined(FALLOC_FL_KEEP_SIZE)
31*8d67ca89SAndroid Build Coastguard Worker #include <linux/falloc.h>
32*8d67ca89SAndroid Build Coastguard Worker #endif
33*8d67ca89SAndroid Build Coastguard Worker #if !defined(EXT4_SUPER_MAGIC)
34*8d67ca89SAndroid Build Coastguard Worker #include <linux/magic.h>
35*8d67ca89SAndroid Build Coastguard Worker #endif
36*8d67ca89SAndroid Build Coastguard Worker 
37*8d67ca89SAndroid Build Coastguard Worker #include "utils.h"
38*8d67ca89SAndroid Build Coastguard Worker 
39*8d67ca89SAndroid Build Coastguard Worker using fcntl_DeathTest = SilentDeathTest;
40*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,fcntl_smoke)41*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, fcntl_smoke) {
42*8d67ca89SAndroid Build Coastguard Worker   int fd = open("/proc/version", O_RDONLY);
43*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fd != -1);
44*8d67ca89SAndroid Build Coastguard Worker 
45*8d67ca89SAndroid Build Coastguard Worker   int flags = fcntl(fd, F_GETFD);
46*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(flags != -1);
47*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, flags & FD_CLOEXEC);
48*8d67ca89SAndroid Build Coastguard Worker 
49*8d67ca89SAndroid Build Coastguard Worker   int rc = fcntl(fd, F_SETFD, FD_CLOEXEC);
50*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, rc);
51*8d67ca89SAndroid Build Coastguard Worker 
52*8d67ca89SAndroid Build Coastguard Worker   flags = fcntl(fd, F_GETFD);
53*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(flags != -1);
54*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(FD_CLOEXEC, flags & FD_CLOEXEC);
55*8d67ca89SAndroid Build Coastguard Worker 
56*8d67ca89SAndroid Build Coastguard Worker   close(fd);
57*8d67ca89SAndroid Build Coastguard Worker }
58*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,open_open64)59*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, open_open64) {
60*8d67ca89SAndroid Build Coastguard Worker   int fd;
61*8d67ca89SAndroid Build Coastguard Worker 
62*8d67ca89SAndroid Build Coastguard Worker   fd = open("/proc/version", O_RDONLY);
63*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fd != -1);
64*8d67ca89SAndroid Build Coastguard Worker   close(fd);
65*8d67ca89SAndroid Build Coastguard Worker 
66*8d67ca89SAndroid Build Coastguard Worker   fd = open64("/proc/version", O_RDONLY);
67*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fd != -1);
68*8d67ca89SAndroid Build Coastguard Worker   close(fd);
69*8d67ca89SAndroid Build Coastguard Worker }
70*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,openat_openat64)71*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, openat_openat64) {
72*8d67ca89SAndroid Build Coastguard Worker   int fd;
73*8d67ca89SAndroid Build Coastguard Worker 
74*8d67ca89SAndroid Build Coastguard Worker   fd = openat(AT_FDCWD, "/proc/version", O_RDONLY);
75*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fd != -1);
76*8d67ca89SAndroid Build Coastguard Worker   close(fd);
77*8d67ca89SAndroid Build Coastguard Worker 
78*8d67ca89SAndroid Build Coastguard Worker   fd = openat64(AT_FDCWD, "/proc/version", O_RDONLY);
79*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fd != -1);
80*8d67ca89SAndroid Build Coastguard Worker   close(fd);
81*8d67ca89SAndroid Build Coastguard Worker }
82*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,creat_creat64)83*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, creat_creat64) {
84*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(-1, creat("", 0666));
85*8d67ca89SAndroid Build Coastguard Worker   ASSERT_ERRNO(ENOENT);
86*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(-1, creat64("", 0666));
87*8d67ca89SAndroid Build Coastguard Worker   ASSERT_ERRNO(ENOENT);
88*8d67ca89SAndroid Build Coastguard Worker }
89*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,posix_fadvise)90*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, posix_fadvise) {
91*8d67ca89SAndroid Build Coastguard Worker   TemporaryFile tf;
92*8d67ca89SAndroid Build Coastguard Worker   errno = 0;
93*8d67ca89SAndroid Build Coastguard Worker 
94*8d67ca89SAndroid Build Coastguard Worker   EXPECT_EQ(EBADF, posix_fadvise(-1, 0, 0, POSIX_FADV_NORMAL));
95*8d67ca89SAndroid Build Coastguard Worker   EXPECT_ERRNO(0);
96*8d67ca89SAndroid Build Coastguard Worker 
97*8d67ca89SAndroid Build Coastguard Worker   EXPECT_EQ(EBADF, posix_fadvise64(-1, 0, 0, POSIX_FADV_NORMAL));
98*8d67ca89SAndroid Build Coastguard Worker   EXPECT_ERRNO(0);
99*8d67ca89SAndroid Build Coastguard Worker 
100*8d67ca89SAndroid Build Coastguard Worker   EXPECT_EQ(EINVAL, posix_fadvise(tf.fd, 0, 0, -1));
101*8d67ca89SAndroid Build Coastguard Worker   EXPECT_ERRNO(0);
102*8d67ca89SAndroid Build Coastguard Worker 
103*8d67ca89SAndroid Build Coastguard Worker   EXPECT_EQ(EINVAL, posix_fadvise64(tf.fd, 0, 0, -1));
104*8d67ca89SAndroid Build Coastguard Worker   EXPECT_ERRNO(0);
105*8d67ca89SAndroid Build Coastguard Worker 
106*8d67ca89SAndroid Build Coastguard Worker   EXPECT_EQ(0, posix_fadvise(tf.fd, 0, 0, POSIX_FADV_NORMAL));
107*8d67ca89SAndroid Build Coastguard Worker   EXPECT_EQ(0, posix_fadvise64(tf.fd, 0, 0, POSIX_FADV_NORMAL));
108*8d67ca89SAndroid Build Coastguard Worker }
109*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,fallocate_EINVAL)110*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, fallocate_EINVAL) {
111*8d67ca89SAndroid Build Coastguard Worker   TemporaryFile tf;
112*8d67ca89SAndroid Build Coastguard Worker 
113*8d67ca89SAndroid Build Coastguard Worker   // fallocate/fallocate64 set errno.
114*8d67ca89SAndroid Build Coastguard Worker   // posix_fallocate/posix_fallocate64 return an errno value.
115*8d67ca89SAndroid Build Coastguard Worker 
116*8d67ca89SAndroid Build Coastguard Worker   errno = 0;
117*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(-1, fallocate(tf.fd, 0, 0, -1));
118*8d67ca89SAndroid Build Coastguard Worker   ASSERT_ERRNO(EINVAL);
119*8d67ca89SAndroid Build Coastguard Worker 
120*8d67ca89SAndroid Build Coastguard Worker   errno = 0;
121*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(-1, fallocate64(tf.fd, 0, 0, -1));
122*8d67ca89SAndroid Build Coastguard Worker   ASSERT_ERRNO(EINVAL);
123*8d67ca89SAndroid Build Coastguard Worker 
124*8d67ca89SAndroid Build Coastguard Worker   errno = 0;
125*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(EINVAL, posix_fallocate(tf.fd, 0, -1));
126*8d67ca89SAndroid Build Coastguard Worker   ASSERT_ERRNO(0);
127*8d67ca89SAndroid Build Coastguard Worker 
128*8d67ca89SAndroid Build Coastguard Worker   errno = 0;
129*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(EINVAL, posix_fallocate64(tf.fd, 0, -1));
130*8d67ca89SAndroid Build Coastguard Worker   ASSERT_ERRNO(0);
131*8d67ca89SAndroid Build Coastguard Worker }
132*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,fallocate)133*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, fallocate) {
134*8d67ca89SAndroid Build Coastguard Worker   TemporaryFile tf;
135*8d67ca89SAndroid Build Coastguard Worker   struct stat sb;
136*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, fstat(tf.fd, &sb));
137*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, sb.st_size);
138*8d67ca89SAndroid Build Coastguard Worker 
139*8d67ca89SAndroid Build Coastguard Worker #if defined(__BIONIC__)
140*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, fallocate(tf.fd, 0, 0, 1));
141*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, fstat(tf.fd, &sb));
142*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(1, sb.st_size);
143*8d67ca89SAndroid Build Coastguard Worker 
144*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, fallocate64(tf.fd, 0, 0, 2));
145*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, fstat(tf.fd, &sb));
146*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(2, sb.st_size);
147*8d67ca89SAndroid Build Coastguard Worker #endif
148*8d67ca89SAndroid Build Coastguard Worker 
149*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, posix_fallocate(tf.fd, 0, 3));
150*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, fstat(tf.fd, &sb));
151*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(3, sb.st_size);
152*8d67ca89SAndroid Build Coastguard Worker 
153*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, posix_fallocate64(tf.fd, 0, 4));
154*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, fstat(tf.fd, &sb));
155*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(4, sb.st_size);
156*8d67ca89SAndroid Build Coastguard Worker }
157*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,f_getlk)158*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, f_getlk) {
159*8d67ca89SAndroid Build Coastguard Worker   int fd = open("/proc/version", O_RDONLY);
160*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fd != -1);
161*8d67ca89SAndroid Build Coastguard Worker 
162*8d67ca89SAndroid Build Coastguard Worker   struct flock check_lock;
163*8d67ca89SAndroid Build Coastguard Worker   check_lock.l_type = F_WRLCK;
164*8d67ca89SAndroid Build Coastguard Worker   check_lock.l_start = 0;
165*8d67ca89SAndroid Build Coastguard Worker   check_lock.l_whence = SEEK_SET;
166*8d67ca89SAndroid Build Coastguard Worker   check_lock.l_len = 0;
167*8d67ca89SAndroid Build Coastguard Worker 
168*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, fcntl(fd, F_GETLK, &check_lock));
169*8d67ca89SAndroid Build Coastguard Worker   close(fd);
170*8d67ca89SAndroid Build Coastguard Worker }
171*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,f_getlk64)172*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, f_getlk64) {
173*8d67ca89SAndroid Build Coastguard Worker   int fd = open64("/proc/version", O_RDONLY);
174*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fd != -1);
175*8d67ca89SAndroid Build Coastguard Worker 
176*8d67ca89SAndroid Build Coastguard Worker   struct flock64 check_lock;
177*8d67ca89SAndroid Build Coastguard Worker   check_lock.l_type = F_WRLCK;
178*8d67ca89SAndroid Build Coastguard Worker   check_lock.l_start = 0;
179*8d67ca89SAndroid Build Coastguard Worker   check_lock.l_whence = SEEK_SET;
180*8d67ca89SAndroid Build Coastguard Worker   check_lock.l_len = 0;
181*8d67ca89SAndroid Build Coastguard Worker 
182*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, fcntl(fd, F_GETLK64, &check_lock));
183*8d67ca89SAndroid Build Coastguard Worker   close(fd);
184*8d67ca89SAndroid Build Coastguard Worker }
185*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,splice)186*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, splice) {
187*8d67ca89SAndroid Build Coastguard Worker   int pipe_fds[2];
188*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, pipe(pipe_fds));
189*8d67ca89SAndroid Build Coastguard Worker 
190*8d67ca89SAndroid Build Coastguard Worker   int in = open("/proc/cpuinfo", O_RDONLY);
191*8d67ca89SAndroid Build Coastguard Worker   ASSERT_NE(in, -1);
192*8d67ca89SAndroid Build Coastguard Worker 
193*8d67ca89SAndroid Build Coastguard Worker   TemporaryFile tf;
194*8d67ca89SAndroid Build Coastguard Worker 
195*8d67ca89SAndroid Build Coastguard Worker   ssize_t bytes_read = splice(in, nullptr, pipe_fds[1], nullptr, 8*1024, SPLICE_F_MORE | SPLICE_F_MOVE);
196*8d67ca89SAndroid Build Coastguard Worker   ASSERT_NE(bytes_read, -1);
197*8d67ca89SAndroid Build Coastguard Worker 
198*8d67ca89SAndroid Build Coastguard Worker   ssize_t bytes_written = splice(pipe_fds[0], nullptr, tf.fd, nullptr, bytes_read, SPLICE_F_MORE | SPLICE_F_MOVE);
199*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(bytes_read, bytes_written);
200*8d67ca89SAndroid Build Coastguard Worker 
201*8d67ca89SAndroid Build Coastguard Worker   close(pipe_fds[0]);
202*8d67ca89SAndroid Build Coastguard Worker   close(pipe_fds[1]);
203*8d67ca89SAndroid Build Coastguard Worker   close(in);
204*8d67ca89SAndroid Build Coastguard Worker }
205*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,vmsplice)206*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, vmsplice) {
207*8d67ca89SAndroid Build Coastguard Worker   int pipe_fds[2];
208*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, pipe(pipe_fds));
209*8d67ca89SAndroid Build Coastguard Worker 
210*8d67ca89SAndroid Build Coastguard Worker   iovec v[2];
211*8d67ca89SAndroid Build Coastguard Worker   v[0].iov_base = const_cast<char*>("hello ");
212*8d67ca89SAndroid Build Coastguard Worker   v[0].iov_len = 6;
213*8d67ca89SAndroid Build Coastguard Worker   v[1].iov_base = const_cast<char*>("world\n");
214*8d67ca89SAndroid Build Coastguard Worker   v[1].iov_len = 6;
215*8d67ca89SAndroid Build Coastguard Worker   ssize_t bytes_written = vmsplice(pipe_fds[1], v, sizeof(v)/sizeof(iovec), 0);
216*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(v[0].iov_len + v[1].iov_len, static_cast<size_t>(bytes_written));
217*8d67ca89SAndroid Build Coastguard Worker   close(pipe_fds[1]);
218*8d67ca89SAndroid Build Coastguard Worker 
219*8d67ca89SAndroid Build Coastguard Worker   char buf[BUFSIZ];
220*8d67ca89SAndroid Build Coastguard Worker   FILE* fp = fdopen(pipe_fds[0], "r");
221*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fp != nullptr);
222*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fgets(buf, sizeof(buf), fp) != nullptr);
223*8d67ca89SAndroid Build Coastguard Worker   fclose(fp);
224*8d67ca89SAndroid Build Coastguard Worker   ASSERT_STREQ("hello world\n", buf);
225*8d67ca89SAndroid Build Coastguard Worker }
226*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,tee)227*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, tee) {
228*8d67ca89SAndroid Build Coastguard Worker   char expected[BUFSIZ];
229*8d67ca89SAndroid Build Coastguard Worker   FILE* expected_fp = fopen("/proc/version", "r");
230*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(expected_fp != nullptr);
231*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fgets(expected, sizeof(expected), expected_fp) != nullptr);
232*8d67ca89SAndroid Build Coastguard Worker   fclose(expected_fp);
233*8d67ca89SAndroid Build Coastguard Worker 
234*8d67ca89SAndroid Build Coastguard Worker   int pipe1[2];
235*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, pipe(pipe1));
236*8d67ca89SAndroid Build Coastguard Worker 
237*8d67ca89SAndroid Build Coastguard Worker   int pipe2[2];
238*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, pipe(pipe2));
239*8d67ca89SAndroid Build Coastguard Worker 
240*8d67ca89SAndroid Build Coastguard Worker   int in = open("/proc/version", O_RDONLY);
241*8d67ca89SAndroid Build Coastguard Worker   ASSERT_NE(in, -1);
242*8d67ca89SAndroid Build Coastguard Worker 
243*8d67ca89SAndroid Build Coastguard Worker   // Write /proc/version into pipe1.
244*8d67ca89SAndroid Build Coastguard Worker   ssize_t bytes_read = splice(in, nullptr, pipe1[1], nullptr, 8*1024, SPLICE_F_MORE | SPLICE_F_MOVE);
245*8d67ca89SAndroid Build Coastguard Worker   ASSERT_NE(bytes_read, -1);
246*8d67ca89SAndroid Build Coastguard Worker   close(pipe1[1]);
247*8d67ca89SAndroid Build Coastguard Worker 
248*8d67ca89SAndroid Build Coastguard Worker   // Tee /proc/version from pipe1 into pipe2.
249*8d67ca89SAndroid Build Coastguard Worker   ssize_t bytes_teed = tee(pipe1[0], pipe2[1], SIZE_MAX, 0);
250*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(bytes_read, bytes_teed);
251*8d67ca89SAndroid Build Coastguard Worker   close(pipe2[1]);
252*8d67ca89SAndroid Build Coastguard Worker 
253*8d67ca89SAndroid Build Coastguard Worker   // The out fds of both pipe1 and pipe2 should now contain /proc/version.
254*8d67ca89SAndroid Build Coastguard Worker   char buf1[BUFSIZ];
255*8d67ca89SAndroid Build Coastguard Worker   FILE* fp1 = fdopen(pipe1[0], "r");
256*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fp1 != nullptr);
257*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fgets(buf1, sizeof(buf1), fp1) != nullptr);
258*8d67ca89SAndroid Build Coastguard Worker   fclose(fp1);
259*8d67ca89SAndroid Build Coastguard Worker 
260*8d67ca89SAndroid Build Coastguard Worker   char buf2[BUFSIZ];
261*8d67ca89SAndroid Build Coastguard Worker   FILE* fp2 = fdopen(pipe2[0], "r");
262*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fp2 != nullptr);
263*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fgets(buf2, sizeof(buf2), fp2) != nullptr);
264*8d67ca89SAndroid Build Coastguard Worker   fclose(fp2);
265*8d67ca89SAndroid Build Coastguard Worker 
266*8d67ca89SAndroid Build Coastguard Worker   ASSERT_STREQ(expected, buf1);
267*8d67ca89SAndroid Build Coastguard Worker   ASSERT_STREQ(expected, buf2);
268*8d67ca89SAndroid Build Coastguard Worker }
269*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,readahead)270*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, readahead) {
271*8d67ca89SAndroid Build Coastguard Worker   // Just check that the function is available.
272*8d67ca89SAndroid Build Coastguard Worker   errno = 0;
273*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(-1, readahead(-1, 0, 123));
274*8d67ca89SAndroid Build Coastguard Worker   ASSERT_ERRNO(EBADF);
275*8d67ca89SAndroid Build Coastguard Worker }
276*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,sync_file_range)277*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, sync_file_range) {
278*8d67ca89SAndroid Build Coastguard Worker   // Just check that the function is available.
279*8d67ca89SAndroid Build Coastguard Worker   errno = 0;
280*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(-1, sync_file_range(-1, 0, 0, 0));
281*8d67ca89SAndroid Build Coastguard Worker   ASSERT_ERRNO(EBADF);
282*8d67ca89SAndroid Build Coastguard Worker 
283*8d67ca89SAndroid Build Coastguard Worker   TemporaryFile tf;
284*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, sync_file_range(tf.fd, 0, 0, 0));
285*8d67ca89SAndroid Build Coastguard Worker 
286*8d67ca89SAndroid Build Coastguard Worker   // The arguments to the underlying system call are in a different order on 32-bit ARM.
287*8d67ca89SAndroid Build Coastguard Worker   // Check that the `flags` argument gets passed to the kernel correctly.
288*8d67ca89SAndroid Build Coastguard Worker   errno = 0;
289*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(-1, sync_file_range(tf.fd, 0, 0, ~0));
290*8d67ca89SAndroid Build Coastguard Worker   ASSERT_ERRNO(EINVAL);
291*8d67ca89SAndroid Build Coastguard Worker }
292*8d67ca89SAndroid Build Coastguard Worker 
parse_kernel_release(long * const major,long * const minor)293*8d67ca89SAndroid Build Coastguard Worker static bool parse_kernel_release(long* const major, long* const minor) {
294*8d67ca89SAndroid Build Coastguard Worker   struct utsname buf;
295*8d67ca89SAndroid Build Coastguard Worker   if (uname(&buf) == -1) {
296*8d67ca89SAndroid Build Coastguard Worker     return false;
297*8d67ca89SAndroid Build Coastguard Worker   }
298*8d67ca89SAndroid Build Coastguard Worker   return sscanf(buf.release, "%ld.%ld", major, minor) == 2;
299*8d67ca89SAndroid Build Coastguard Worker }
300*8d67ca89SAndroid Build Coastguard Worker 
301*8d67ca89SAndroid Build Coastguard Worker /*
302*8d67ca89SAndroid Build Coastguard Worker  * b/28760453:
303*8d67ca89SAndroid Build Coastguard Worker  * Kernels older than 4.1 should have ext4 FALLOC_FL_PUNCH_HOLE disabled due to CVE-2015-8839.
304*8d67ca89SAndroid Build Coastguard Worker  * Devices that fail this test should cherry-pick the following commit:
305*8d67ca89SAndroid Build Coastguard Worker  * https://android.googlesource.com/kernel/msm/+/bdba352e898cbf57c8620ad68c8abf749c784d1f
306*8d67ca89SAndroid Build Coastguard Worker  */
TEST(fcntl,falloc_punch)307*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, falloc_punch) {
308*8d67ca89SAndroid Build Coastguard Worker   long major = 0, minor = 0;
309*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(parse_kernel_release(&major, &minor));
310*8d67ca89SAndroid Build Coastguard Worker 
311*8d67ca89SAndroid Build Coastguard Worker   if (major < 4 || (major == 4 && minor < 1)) {
312*8d67ca89SAndroid Build Coastguard Worker     TemporaryFile tf;
313*8d67ca89SAndroid Build Coastguard Worker     struct statfs sfs;
314*8d67ca89SAndroid Build Coastguard Worker     ASSERT_EQ(0, fstatfs(tf.fd, &sfs));
315*8d67ca89SAndroid Build Coastguard Worker     if (sfs.f_type == EXT4_SUPER_MAGIC) {
316*8d67ca89SAndroid Build Coastguard Worker       ASSERT_EQ(-1, fallocate(tf.fd, FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE, 0, 1));
317*8d67ca89SAndroid Build Coastguard Worker       ASSERT_ERRNO(EOPNOTSUPP);
318*8d67ca89SAndroid Build Coastguard Worker     }
319*8d67ca89SAndroid Build Coastguard Worker   }
320*8d67ca89SAndroid Build Coastguard Worker }
321*8d67ca89SAndroid Build Coastguard Worker 
TEST(fcntl,open_O_TMPFILE_mode)322*8d67ca89SAndroid Build Coastguard Worker TEST(fcntl, open_O_TMPFILE_mode) {
323*8d67ca89SAndroid Build Coastguard Worker   TemporaryDir dir;
324*8d67ca89SAndroid Build Coastguard Worker   // Without O_EXCL, we're allowed to give this a name later.
325*8d67ca89SAndroid Build Coastguard Worker   // (This is unrelated to the O_CREAT interaction with O_EXCL.)
326*8d67ca89SAndroid Build Coastguard Worker   const mode_t perms = S_IRUSR | S_IWUSR;
327*8d67ca89SAndroid Build Coastguard Worker   int fd = open(dir.path, O_TMPFILE | O_RDWR, perms);
328*8d67ca89SAndroid Build Coastguard Worker 
329*8d67ca89SAndroid Build Coastguard Worker   // Ignore kernels without O_TMPFILE support (< 3.11).
330*8d67ca89SAndroid Build Coastguard Worker   if (fd == -1 && (errno == EISDIR || errno == EINVAL || errno == EOPNOTSUPP)) return;
331*8d67ca89SAndroid Build Coastguard Worker 
332*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fd != -1) << strerror(errno);
333*8d67ca89SAndroid Build Coastguard Worker 
334*8d67ca89SAndroid Build Coastguard Worker   // Does the fd claim to have the mode we set?
335*8d67ca89SAndroid Build Coastguard Worker   struct stat sb = {};
336*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, fstat(fd, &sb));
337*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(perms, (sb.st_mode & ~S_IFMT));
338*8d67ca89SAndroid Build Coastguard Worker 
339*8d67ca89SAndroid Build Coastguard Worker   // On Android if we're not root, we won't be able to create links anyway...
340*8d67ca89SAndroid Build Coastguard Worker   if (getuid() != 0) return;
341*8d67ca89SAndroid Build Coastguard Worker 
342*8d67ca89SAndroid Build Coastguard Worker   std::string final_path = android::base::StringPrintf("%s/named_now", dir.path);
343*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, linkat(AT_FDCWD, android::base::StringPrintf("/proc/self/fd/%d", fd).c_str(),
344*8d67ca89SAndroid Build Coastguard Worker                       AT_FDCWD, final_path.c_str(),
345*8d67ca89SAndroid Build Coastguard Worker                       AT_SYMLINK_FOLLOW));
346*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, close(fd));
347*8d67ca89SAndroid Build Coastguard Worker 
348*8d67ca89SAndroid Build Coastguard Worker   // Does the resulting file claim to have the mode we set?
349*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, stat(final_path.c_str(), &sb));
350*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(perms, (sb.st_mode & ~S_IFMT));
351*8d67ca89SAndroid Build Coastguard Worker 
352*8d67ca89SAndroid Build Coastguard Worker   // With O_EXCL, you're not allowed to add a name later.
353*8d67ca89SAndroid Build Coastguard Worker   fd = open(dir.path, O_TMPFILE | O_RDWR | O_EXCL, S_IRUSR | S_IWUSR);
354*8d67ca89SAndroid Build Coastguard Worker   ASSERT_TRUE(fd != -1) << strerror(errno);
355*8d67ca89SAndroid Build Coastguard Worker   errno = 0;
356*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(-1, linkat(AT_FDCWD, android::base::StringPrintf("/proc/self/fd/%d", fd).c_str(),
357*8d67ca89SAndroid Build Coastguard Worker                        AT_FDCWD, android::base::StringPrintf("%s/no_chance", dir.path).c_str(),
358*8d67ca89SAndroid Build Coastguard Worker                        AT_SYMLINK_FOLLOW));
359*8d67ca89SAndroid Build Coastguard Worker   ASSERT_ERRNO(ENOENT);
360*8d67ca89SAndroid Build Coastguard Worker   ASSERT_EQ(0, close(fd));
361*8d67ca89SAndroid Build Coastguard Worker }
362*8d67ca89SAndroid Build Coastguard Worker 
TEST_F(fcntl_DeathTest,fcntl_F_SETFD)363*8d67ca89SAndroid Build Coastguard Worker TEST_F(fcntl_DeathTest, fcntl_F_SETFD) {
364*8d67ca89SAndroid Build Coastguard Worker   EXPECT_DEATH(fcntl(0, F_SETFD, O_NONBLOCK), "only supports FD_CLOEXEC");
365*8d67ca89SAndroid Build Coastguard Worker }
366