1 /*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #include <gtest/gtest.h>
18
19 #include "DoNotOptimize.h"
20 #include "SignalUtils.h"
21 #include "utils.h"
22
23 #include <errno.h>
24 #include <fcntl.h>
25 #include <libgen.h>
26 #include <limits.h>
27 #include <stdint.h>
28 #include <sys/capability.h>
29 #include <sys/param.h>
30 #include <sys/resource.h>
31 #include <sys/syscall.h>
32 #include <sys/types.h>
33 #include <sys/utsname.h>
34 #include <sys/wait.h>
35 #include <unistd.h>
36
37 #include <chrono>
38
39 #include <android-base/file.h>
40 #include <android-base/silent_death_test.h>
41 #include <android-base/strings.h>
42
43 #include "private/get_cpu_count_from_string.h"
44
45 #if defined(__BIONIC__)
46 #include "bionic/pthread_internal.h"
47 #endif
48
49 #if defined(NOFORTIFY)
50 #define UNISTD_TEST unistd_nofortify
51 #define UNISTD_DEATHTEST unistd_nofortify_DeathTest
52 #else
53 #define UNISTD_TEST unistd
54 #define UNISTD_DEATHTEST unistd_DeathTest
55 #endif
56
57 using UNISTD_DEATHTEST = SilentDeathTest;
58
59 using namespace std::chrono_literals;
60
get_brk()61 static void* get_brk() {
62 return sbrk(0);
63 }
64
page_align(uintptr_t addr)65 static void* page_align(uintptr_t addr) {
66 uintptr_t mask = sysconf(_SC_PAGE_SIZE) - 1;
67 return reinterpret_cast<void*>((addr + mask) & ~mask);
68 }
69
TEST(UNISTD_TEST,brk)70 TEST(UNISTD_TEST, brk) {
71 void* initial_break = get_brk();
72
73 void* new_break = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(initial_break) + 1);
74 int ret = brk(new_break);
75 if (ret == -1) {
76 ASSERT_ERRNO(ENOMEM);
77 } else {
78 ASSERT_EQ(0, ret);
79 ASSERT_GE(get_brk(), new_break);
80 }
81
82 // Expand by a full page to force the mapping to expand
83 new_break = page_align(reinterpret_cast<uintptr_t>(initial_break) + sysconf(_SC_PAGE_SIZE));
84 ret = brk(new_break);
85 if (ret == -1) {
86 ASSERT_ERRNO(ENOMEM);
87 } else {
88 ASSERT_EQ(0, ret);
89 ASSERT_EQ(get_brk(), new_break);
90 }
91 }
92
TEST(UNISTD_TEST,brk_ENOMEM)93 TEST(UNISTD_TEST, brk_ENOMEM) {
94 ASSERT_EQ(-1, brk(reinterpret_cast<void*>(-1)));
95 ASSERT_ERRNO(ENOMEM);
96 }
97
98 #if defined(__GLIBC__)
99 #define SBRK_MIN INTPTR_MIN
100 #define SBRK_MAX INTPTR_MAX
101 #else
102 #define SBRK_MIN PTRDIFF_MIN
103 #define SBRK_MAX PTRDIFF_MAX
104 #endif
105
TEST(UNISTD_TEST,sbrk_ENOMEM)106 TEST(UNISTD_TEST, sbrk_ENOMEM) {
107 #if defined(__BIONIC__) && !defined(__LP64__)
108 // There is no way to guarantee that all overflow conditions can be tested
109 // without manipulating the underlying values of the current break.
110 extern void* __bionic_brk;
111
112 class ScopedBrk {
113 public:
114 ScopedBrk() : saved_brk_(__bionic_brk) {}
115 virtual ~ScopedBrk() { __bionic_brk = saved_brk_; }
116
117 private:
118 void* saved_brk_;
119 };
120
121 ScopedBrk scope_brk;
122
123 // Set the current break to a point that will cause an overflow.
124 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) + 2);
125
126 // Can't increase by so much that we'd overflow.
127 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MAX));
128 ASSERT_ERRNO(ENOMEM);
129
130 // Set the current break to a point that will cause an overflow.
131 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX));
132
133 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN));
134 ASSERT_ERRNO(ENOMEM);
135
136 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) - 1);
137
138 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN + 1));
139 ASSERT_ERRNO(ENOMEM);
140 #else
141 class ScopedBrk {
142 public:
143 ScopedBrk() : saved_brk_(get_brk()) {}
144 virtual ~ScopedBrk() { brk(saved_brk_); }
145
146 private:
147 void* saved_brk_;
148 };
149
150 ScopedBrk scope_brk;
151
152 uintptr_t cur_brk = reinterpret_cast<uintptr_t>(get_brk());
153 if (cur_brk < static_cast<uintptr_t>(-(SBRK_MIN+1))) {
154 // Do the overflow test for a max negative increment.
155 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MIN));
156 #if defined(__BIONIC__)
157 // GLIBC does not set errno in overflow case.
158 ASSERT_ERRNO(ENOMEM);
159 #endif
160 }
161
162 uintptr_t overflow_brk = static_cast<uintptr_t>(SBRK_MAX) + 2;
163 if (cur_brk < overflow_brk) {
164 // Try and move the value to PTRDIFF_MAX + 2.
165 cur_brk = reinterpret_cast<uintptr_t>(sbrk(overflow_brk));
166 }
167 if (cur_brk >= overflow_brk) {
168 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MAX));
169 #if defined(__BIONIC__)
170 // GLIBC does not set errno in overflow case.
171 ASSERT_ERRNO(ENOMEM);
172 #endif
173 }
174 #endif
175 }
176
TEST(UNISTD_TEST,truncate)177 TEST(UNISTD_TEST, truncate) {
178 TemporaryFile tf;
179 ASSERT_EQ(0, close(tf.fd));
180 ASSERT_EQ(0, truncate(tf.path, 123));
181
182 struct stat sb;
183 ASSERT_EQ(0, stat(tf.path, &sb));
184 ASSERT_EQ(123, sb.st_size);
185 }
186
TEST(UNISTD_TEST,truncate64_smoke)187 TEST(UNISTD_TEST, truncate64_smoke) {
188 TemporaryFile tf;
189 ASSERT_EQ(0, close(tf.fd));
190 ASSERT_EQ(0, truncate64(tf.path, 123));
191
192 struct stat sb;
193 ASSERT_EQ(0, stat(tf.path, &sb));
194 ASSERT_EQ(123, sb.st_size);
195 }
196
TEST(UNISTD_TEST,ftruncate)197 TEST(UNISTD_TEST, ftruncate) {
198 TemporaryFile tf;
199 ASSERT_EQ(0, ftruncate(tf.fd, 123));
200 ASSERT_EQ(0, close(tf.fd));
201
202 struct stat sb;
203 ASSERT_EQ(0, stat(tf.path, &sb));
204 ASSERT_EQ(123, sb.st_size);
205 }
206
TEST(UNISTD_TEST,ftruncate64_smoke)207 TEST(UNISTD_TEST, ftruncate64_smoke) {
208 TemporaryFile tf;
209 ASSERT_EQ(0, ftruncate64(tf.fd, 123));
210 ASSERT_EQ(0, close(tf.fd));
211
212 struct stat sb;
213 ASSERT_EQ(0, stat(tf.path, &sb));
214 ASSERT_EQ(123, sb.st_size);
215 }
216
TEST(UNISTD_TEST,ftruncate_negative)217 TEST(UNISTD_TEST, ftruncate_negative) {
218 TemporaryFile tf;
219 errno = 0;
220 ASSERT_EQ(-1, ftruncate(tf.fd, -123));
221 ASSERT_ERRNO(EINVAL);
222 }
223
224 static bool g_pause_test_flag = false;
PauseTestSignalHandler(int)225 static void PauseTestSignalHandler(int) {
226 g_pause_test_flag = true;
227 }
228
TEST(UNISTD_TEST,pause)229 TEST(UNISTD_TEST, pause) {
230 ScopedSignalHandler handler(SIGALRM, PauseTestSignalHandler);
231
232 alarm(1);
233 ASSERT_FALSE(g_pause_test_flag);
234 ASSERT_EQ(-1, pause());
235 ASSERT_TRUE(g_pause_test_flag);
236 }
237
TEST(UNISTD_TEST,read)238 TEST(UNISTD_TEST, read) {
239 int fd = open("/proc/version", O_RDONLY);
240 ASSERT_TRUE(fd != -1);
241
242 char buf[5];
243 ASSERT_EQ(5, read(fd, buf, 5));
244 ASSERT_EQ(buf[0], 'L');
245 ASSERT_EQ(buf[1], 'i');
246 ASSERT_EQ(buf[2], 'n');
247 ASSERT_EQ(buf[3], 'u');
248 ASSERT_EQ(buf[4], 'x');
249 close(fd);
250 }
251
TEST(UNISTD_TEST,read_EBADF)252 TEST(UNISTD_TEST, read_EBADF) {
253 // read returns ssize_t which is 64-bits on LP64, so it's worth explicitly checking that
254 // our syscall stubs correctly return a 64-bit -1.
255 char buf[1];
256 ASSERT_EQ(-1, read(-1, buf, sizeof(buf)));
257 ASSERT_ERRNO(EBADF);
258 }
259
TEST(UNISTD_TEST,syscall_long)260 TEST(UNISTD_TEST, syscall_long) {
261 // Check that syscall(3) correctly returns long results.
262 // https://code.google.com/p/android/issues/detail?id=73952
263 // We assume that the break is > 4GiB, but this is potentially flaky.
264 uintptr_t p = reinterpret_cast<uintptr_t>(sbrk(0));
265 ASSERT_EQ(p, static_cast<uintptr_t>(syscall(__NR_brk, 0)));
266 }
267
TEST(UNISTD_TEST,alarm)268 TEST(UNISTD_TEST, alarm) {
269 ASSERT_EQ(0U, alarm(0));
270 }
271
TEST(UNISTD_TEST,_exit)272 TEST(UNISTD_TEST, _exit) {
273 pid_t pid = fork();
274 ASSERT_NE(-1, pid) << strerror(errno);
275
276 if (pid == 0) {
277 _exit(99);
278 }
279
280 AssertChildExited(pid, 99);
281 }
282
TEST(UNISTD_TEST,getenv_unsetenv)283 TEST(UNISTD_TEST, getenv_unsetenv) {
284 ASSERT_EQ(0, setenv("test-variable", "hello", 1));
285 ASSERT_STREQ("hello", getenv("test-variable"));
286 ASSERT_EQ(0, unsetenv("test-variable"));
287 ASSERT_TRUE(getenv("test-variable") == nullptr);
288 }
289
TEST(UNISTD_TEST,unsetenv_EINVAL)290 TEST(UNISTD_TEST, unsetenv_EINVAL) {
291 EXPECT_EQ(-1, unsetenv(""));
292 EXPECT_ERRNO(EINVAL);
293 EXPECT_EQ(-1, unsetenv("a=b"));
294 EXPECT_ERRNO(EINVAL);
295 }
296
TEST(UNISTD_TEST,setenv_EINVAL)297 TEST(UNISTD_TEST, setenv_EINVAL) {
298 #pragma clang diagnostic push
299 #pragma clang diagnostic ignored "-Wnonnull"
300 EXPECT_EQ(-1, setenv(nullptr, "value", 0));
301 EXPECT_ERRNO(EINVAL);
302 EXPECT_EQ(-1, setenv(nullptr, "value", 1));
303 EXPECT_ERRNO(EINVAL);
304 #pragma clang diagnostic pop
305 EXPECT_EQ(-1, setenv("", "value", 0));
306 EXPECT_ERRNO(EINVAL);
307 EXPECT_EQ(-1, setenv("", "value", 1));
308 EXPECT_ERRNO(EINVAL);
309 EXPECT_EQ(-1, setenv("a=b", "value", 0));
310 EXPECT_ERRNO(EINVAL);
311 EXPECT_EQ(-1, setenv("a=b", "value", 1));
312 EXPECT_ERRNO(EINVAL);
313 }
314
TEST(UNISTD_TEST,setenv)315 TEST(UNISTD_TEST, setenv) {
316 ASSERT_EQ(0, unsetenv("test-variable"));
317
318 char a[] = "a";
319 char b[] = "b";
320 char c[] = "c";
321
322 // New value.
323 EXPECT_EQ(0, setenv("test-variable", a, 0));
324 EXPECT_STREQ(a, getenv("test-variable"));
325
326 // Existing value, no overwrite.
327 EXPECT_EQ(0, setenv("test-variable", b, 0));
328 EXPECT_STREQ(a, getenv("test-variable"));
329
330 // Existing value, overwrite.
331 EXPECT_EQ(0, setenv("test-variable", c, 1));
332 EXPECT_STREQ(c, getenv("test-variable"));
333 // But the arrays backing the values are unchanged.
334 EXPECT_EQ('a', a[0]);
335 EXPECT_EQ('b', b[0]);
336 EXPECT_EQ('c', c[0]);
337
338 ASSERT_EQ(0, unsetenv("test-variable"));
339 }
340
TEST(UNISTD_TEST,putenv)341 TEST(UNISTD_TEST, putenv) {
342 ASSERT_EQ(0, unsetenv("a"));
343
344 char* s1 = strdup("a=b");
345 ASSERT_EQ(0, putenv(s1));
346
347 ASSERT_STREQ("b", getenv("a"));
348 s1[2] = 'c';
349 ASSERT_STREQ("c", getenv("a"));
350
351 char* s2 = strdup("a=b");
352 ASSERT_EQ(0, putenv(s2));
353
354 ASSERT_STREQ("b", getenv("a"));
355 ASSERT_EQ('c', s1[2]);
356
357 ASSERT_EQ(0, unsetenv("a"));
358 free(s1);
359 free(s2);
360 }
361
TEST(UNISTD_TEST,clearenv)362 TEST(UNISTD_TEST, clearenv) {
363 extern char** environ;
364
365 // Guarantee that environ is not initially empty...
366 ASSERT_EQ(0, setenv("test-variable", "a", 1));
367
368 // Stash a copy.
369 std::vector<char*> old_environ;
370 for (size_t i = 0; environ[i] != nullptr; ++i) {
371 old_environ.push_back(strdup(environ[i]));
372 }
373
374 ASSERT_EQ(0, clearenv());
375
376 EXPECT_TRUE(environ == nullptr || environ[0] == nullptr);
377 EXPECT_EQ(nullptr, getenv("test-variable"));
378 EXPECT_EQ(0, setenv("test-variable", "post-clear", 1));
379 EXPECT_STREQ("post-clear", getenv("test-variable"));
380
381 // Put the old environment back.
382 for (size_t i = 0; i < old_environ.size(); ++i) {
383 EXPECT_EQ(0, putenv(old_environ[i]));
384 }
385
386 // Check it wasn't overwritten.
387 EXPECT_STREQ("a", getenv("test-variable"));
388
389 EXPECT_EQ(0, unsetenv("test-variable"));
390 }
391
TestSyncFunction(int (* fn)(int))392 static void TestSyncFunction(int (*fn)(int)) {
393 int fd;
394
395 // Can't sync an invalid fd.
396 errno = 0;
397 EXPECT_EQ(-1, fn(-1));
398 EXPECT_ERRNO(EBADF);
399
400 // It doesn't matter whether you've opened a file for write or not.
401 TemporaryFile tf;
402 ASSERT_NE(-1, tf.fd);
403
404 EXPECT_EQ(0, fn(tf.fd));
405
406 ASSERT_NE(-1, fd = open(tf.path, O_RDONLY));
407 EXPECT_EQ(0, fn(fd));
408 close(fd);
409
410 ASSERT_NE(-1, fd = open(tf.path, O_RDWR));
411 EXPECT_EQ(0, fn(fd));
412 close(fd);
413
414 // The fd can even be a directory.
415 ASSERT_NE(-1, fd = open("/data/local/tmp", O_RDONLY));
416 EXPECT_EQ(0, fn(fd));
417 close(fd);
418 }
419
TestFsyncFunction(int (* fn)(int))420 static void TestFsyncFunction(int (*fn)(int)) {
421 TestSyncFunction(fn);
422
423 // But some file systems are fussy about fsync/fdatasync...
424 errno = 0;
425 int fd = open("/proc/version", O_RDONLY);
426 ASSERT_NE(-1, fd);
427 EXPECT_EQ(-1, fn(fd));
428 EXPECT_ERRNO(EINVAL);
429 close(fd);
430 }
431
TEST(UNISTD_TEST,fdatasync)432 TEST(UNISTD_TEST, fdatasync) {
433 TestFsyncFunction(fdatasync);
434 }
435
TEST(UNISTD_TEST,fsync)436 TEST(UNISTD_TEST, fsync) {
437 TestFsyncFunction(fsync);
438 }
439
TEST(UNISTD_TEST,syncfs)440 TEST(UNISTD_TEST, syncfs) {
441 TestSyncFunction(syncfs);
442 }
443
TEST(UNISTD_TEST,_Fork)444 TEST(UNISTD_TEST, _Fork) {
445 #if defined(__BIONIC__)
446 pid_t rc = _Fork();
447 ASSERT_NE(-1, rc);
448 if (rc == 0) {
449 _exit(66);
450 }
451
452 int status;
453 pid_t wait_result = waitpid(rc, &status, 0);
454 ASSERT_EQ(wait_result, rc);
455 ASSERT_TRUE(WIFEXITED(status));
456 ASSERT_EQ(66, WEXITSTATUS(status));
457 #endif
458 }
459
TEST(UNISTD_TEST,vfork)460 TEST(UNISTD_TEST, vfork) {
461 #if defined(__BIONIC__)
462 pthread_internal_t* self = __get_thread();
463
464 pid_t cached_pid;
465 ASSERT_TRUE(self->get_cached_pid(&cached_pid));
466 ASSERT_EQ(syscall(__NR_getpid), cached_pid);
467 ASSERT_FALSE(self->is_vforked());
468
469 pid_t rc = vfork();
470 ASSERT_NE(-1, rc);
471 if (rc == 0) {
472 if (self->get_cached_pid(&cached_pid)) {
473 const char* error = "__get_thread()->cached_pid_ set after vfork\n";
474 write(STDERR_FILENO, error, strlen(error));
475 _exit(1);
476 }
477
478 if (!self->is_vforked()) {
479 const char* error = "__get_thread()->vforked_ not set after vfork\n";
480 write(STDERR_FILENO, error, strlen(error));
481 _exit(1);
482 }
483
484 _exit(0);
485 } else {
486 ASSERT_TRUE(self->get_cached_pid(&cached_pid));
487 ASSERT_EQ(syscall(__NR_getpid), cached_pid);
488 ASSERT_FALSE(self->is_vforked());
489
490 int status;
491 pid_t wait_result = waitpid(rc, &status, 0);
492 ASSERT_EQ(wait_result, rc);
493 ASSERT_TRUE(WIFEXITED(status));
494 ASSERT_EQ(0, WEXITSTATUS(status));
495 }
496 #endif
497 }
498
AssertGetPidCorrect()499 static void AssertGetPidCorrect() {
500 // The loop is just to make manual testing/debugging with strace easier.
501 pid_t getpid_syscall_result = syscall(__NR_getpid);
502 for (size_t i = 0; i < 128; ++i) {
503 ASSERT_EQ(getpid_syscall_result, getpid());
504 }
505 }
506
TestGetPidCachingWithFork(int (* fork_fn)(),void (* exit_fn)(int))507 static void TestGetPidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) {
508 pid_t parent_pid = getpid();
509 ASSERT_EQ(syscall(__NR_getpid), parent_pid);
510
511 pid_t fork_result = fork_fn();
512 ASSERT_NE(fork_result, -1);
513 if (fork_result == 0) {
514 // We're the child.
515 ASSERT_NO_FATAL_FAILURE(AssertGetPidCorrect());
516 ASSERT_EQ(parent_pid, getppid());
517 exit_fn(123);
518 } else {
519 // We're the parent.
520 ASSERT_EQ(parent_pid, getpid());
521 AssertChildExited(fork_result, 123);
522 }
523 }
524
525 // gettid() is marked as __attribute_const__, which will have the compiler
526 // optimize out multiple calls to gettid in the same function. This wrapper
527 // defeats that optimization.
GetTidForTest()528 static __attribute__((__noinline__)) pid_t GetTidForTest() {
529 __asm__("");
530 return gettid();
531 }
532
AssertGetTidCorrect()533 static void AssertGetTidCorrect() {
534 // The loop is just to make manual testing/debugging with strace easier.
535 pid_t gettid_syscall_result = syscall(__NR_gettid);
536 for (size_t i = 0; i < 128; ++i) {
537 ASSERT_EQ(gettid_syscall_result, GetTidForTest());
538 }
539 }
540
TestGetTidCachingWithFork(int (* fork_fn)(),void (* exit_fn)(int))541 static void TestGetTidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) {
542 pid_t parent_tid = GetTidForTest();
543 ASSERT_EQ(syscall(__NR_gettid), parent_tid);
544
545 pid_t fork_result = fork_fn();
546 ASSERT_NE(fork_result, -1);
547 if (fork_result == 0) {
548 // We're the child.
549 EXPECT_EQ(syscall(__NR_getpid), syscall(__NR_gettid));
550 EXPECT_EQ(getpid(), GetTidForTest()) << "real tid is " << syscall(__NR_gettid)
551 << ", pid is " << syscall(__NR_getpid);
552 ASSERT_NO_FATAL_FAILURE(AssertGetTidCorrect());
553 exit_fn(123);
554 } else {
555 // We're the parent.
556 ASSERT_EQ(parent_tid, GetTidForTest());
557 AssertChildExited(fork_result, 123);
558 }
559 }
560
TEST(UNISTD_TEST,getpid_caching_and_fork)561 TEST(UNISTD_TEST, getpid_caching_and_fork) {
562 TestGetPidCachingWithFork(fork, exit);
563 }
564
TEST(UNISTD_TEST,gettid_caching_and_fork)565 TEST(UNISTD_TEST, gettid_caching_and_fork) {
566 TestGetTidCachingWithFork(fork, exit);
567 }
568
TEST(UNISTD_TEST,getpid_caching_and_vfork)569 TEST(UNISTD_TEST, getpid_caching_and_vfork) {
570 TestGetPidCachingWithFork(vfork, _exit);
571 }
572
CloneLikeFork()573 static int CloneLikeFork() {
574 return clone(nullptr, nullptr, SIGCHLD, nullptr);
575 }
576
TEST(UNISTD_TEST,getpid_caching_and_clone_process)577 TEST(UNISTD_TEST, getpid_caching_and_clone_process) {
578 TestGetPidCachingWithFork(CloneLikeFork, exit);
579 }
580
TEST(UNISTD_TEST,gettid_caching_and_clone_process)581 TEST(UNISTD_TEST, gettid_caching_and_clone_process) {
582 TestGetTidCachingWithFork(CloneLikeFork, exit);
583 }
584
CloneAndSetTid()585 static int CloneAndSetTid() {
586 pid_t child_tid = 0;
587 pid_t parent_tid = GetTidForTest();
588
589 int rv = clone(nullptr, nullptr, CLONE_CHILD_SETTID | SIGCHLD, nullptr, nullptr, nullptr, &child_tid);
590 EXPECT_NE(-1, rv);
591
592 if (rv == 0) {
593 // Child.
594 EXPECT_EQ(child_tid, GetTidForTest());
595 EXPECT_NE(child_tid, parent_tid);
596 } else {
597 EXPECT_NE(child_tid, GetTidForTest());
598 EXPECT_NE(child_tid, parent_tid);
599 EXPECT_EQ(GetTidForTest(), parent_tid);
600 }
601
602 return rv;
603 }
604
TEST(UNISTD_TEST,gettid_caching_and_clone_process_settid)605 TEST(UNISTD_TEST, gettid_caching_and_clone_process_settid) {
606 TestGetTidCachingWithFork(CloneAndSetTid, exit);
607 }
608
609 __attribute__((no_sanitize("hwaddress", "memtag")))
CloneStartRoutine(int (* start_routine)(void *))610 static int CloneStartRoutine(int (*start_routine)(void*)) {
611 void* child_stack[1024];
612 return clone(start_routine, &child_stack[1024], SIGCHLD, nullptr);
613 }
614
GetPidCachingCloneStartRoutine(void *)615 static int GetPidCachingCloneStartRoutine(void*) {
616 AssertGetPidCorrect();
617 return 123;
618 }
619
TEST(UNISTD_TEST,getpid_caching_and_clone)620 TEST(UNISTD_TEST, getpid_caching_and_clone) {
621 pid_t parent_pid = getpid();
622 ASSERT_EQ(syscall(__NR_getpid), parent_pid);
623
624 int clone_result = CloneStartRoutine(GetPidCachingCloneStartRoutine);
625 ASSERT_NE(clone_result, -1);
626
627 ASSERT_EQ(parent_pid, getpid());
628
629 AssertChildExited(clone_result, 123);
630 }
631
GetTidCachingCloneStartRoutine(void *)632 static int GetTidCachingCloneStartRoutine(void*) {
633 AssertGetTidCorrect();
634 return 123;
635 }
636
TEST(UNISTD_TEST,gettid_caching_and_clone)637 TEST(UNISTD_TEST, gettid_caching_and_clone) {
638 pid_t parent_tid = GetTidForTest();
639 ASSERT_EQ(syscall(__NR_gettid), parent_tid);
640
641 int clone_result = CloneStartRoutine(GetTidCachingCloneStartRoutine);
642 ASSERT_NE(clone_result, -1);
643
644 ASSERT_EQ(parent_tid, GetTidForTest());
645
646 AssertChildExited(clone_result, 123);
647 }
648
CloneChildExit(void *)649 static int CloneChildExit(void*) {
650 AssertGetPidCorrect();
651 AssertGetTidCorrect();
652 exit(33);
653 }
654
TEST(UNISTD_TEST,clone_fn_and_exit)655 TEST(UNISTD_TEST, clone_fn_and_exit) {
656 int clone_result = CloneStartRoutine(CloneChildExit);
657 ASSERT_NE(-1, clone_result);
658
659 AssertGetPidCorrect();
660 AssertGetTidCorrect();
661
662 AssertChildExited(clone_result, 33);
663 }
664
GetPidCachingPthreadStartRoutine(void *)665 static void* GetPidCachingPthreadStartRoutine(void*) {
666 AssertGetPidCorrect();
667 return nullptr;
668 }
669
TEST(UNISTD_TEST,getpid_caching_and_pthread_create)670 TEST(UNISTD_TEST, getpid_caching_and_pthread_create) {
671 pid_t parent_pid = getpid();
672
673 pthread_t t;
674 ASSERT_EQ(0, pthread_create(&t, nullptr, GetPidCachingPthreadStartRoutine, nullptr));
675
676 ASSERT_EQ(parent_pid, getpid());
677
678 void* result;
679 ASSERT_EQ(0, pthread_join(t, &result));
680 ASSERT_EQ(nullptr, result);
681 }
682
GetTidCachingPthreadStartRoutine(void *)683 static void* GetTidCachingPthreadStartRoutine(void*) {
684 AssertGetTidCorrect();
685 uint64_t tid = GetTidForTest();
686 return reinterpret_cast<void*>(tid);
687 }
688
TEST(UNISTD_TEST,gettid_caching_and_pthread_create)689 TEST(UNISTD_TEST, gettid_caching_and_pthread_create) {
690 pid_t parent_tid = GetTidForTest();
691
692 pthread_t t;
693 ASSERT_EQ(0, pthread_create(&t, nullptr, GetTidCachingPthreadStartRoutine, &parent_tid));
694
695 ASSERT_EQ(parent_tid, GetTidForTest());
696
697 void* result;
698 ASSERT_EQ(0, pthread_join(t, &result));
699 ASSERT_NE(static_cast<uint64_t>(parent_tid), reinterpret_cast<uint64_t>(result));
700 }
701
HwasanVforkTestChild()702 __attribute__((noinline)) static void HwasanVforkTestChild() {
703 // Allocate a tagged region on stack and leave it there.
704 char x[10000];
705 DoNotOptimize(x);
706 _exit(0);
707 }
708
HwasanReadMemory(const char * p,size_t size)709 __attribute__((noinline)) static void HwasanReadMemory(const char* p, size_t size) {
710 // Read memory byte-by-byte. This will blow up if the pointer tag in p does not match any memory
711 // tag in [p, p+size).
712 char z;
713 for (size_t i = 0; i < size; ++i) {
714 DoNotOptimize(z = p[i]);
715 }
716 }
717
HwasanVforkTestParent()718 __attribute__((noinline, no_sanitize("hwaddress"))) static void HwasanVforkTestParent() {
719 // Allocate a region on stack, but don't tag it (see the function attribute).
720 // This depends on unallocated stack space at current function entry being untagged.
721 char x[10000];
722 DoNotOptimize(x);
723 // Verify that contents of x[] are untagged.
724 HwasanReadMemory(x, sizeof(x));
725 }
726
TEST(UNISTD_TEST,hwasan_vfork)727 TEST(UNISTD_TEST, hwasan_vfork) {
728 // Test hwasan annotation in vfork. This test is only interesting when built with hwasan, but it
729 // is supposed to work correctly either way.
730 if (vfork()) {
731 HwasanVforkTestParent();
732 } else {
733 HwasanVforkTestChild();
734 }
735 }
736
TEST_F(UNISTD_DEATHTEST,abort)737 TEST_F(UNISTD_DEATHTEST, abort) {
738 ASSERT_EXIT(abort(), testing::KilledBySignal(SIGABRT), "");
739 }
740
TEST(UNISTD_TEST,sethostname)741 TEST(UNISTD_TEST, sethostname) {
742 // The permissions check happens before the argument check, so this will
743 // fail for a different reason if you're running as root than if you're
744 // not, but it'll fail either way. Checking that we have the symbol is about
745 // all we can do for sethostname(2).
746 ASSERT_EQ(-1, sethostname("", -1));
747 }
748
TEST(UNISTD_TEST,gethostname)749 TEST(UNISTD_TEST, gethostname) {
750 char hostname[HOST_NAME_MAX + 1];
751 memset(hostname, 0, sizeof(hostname));
752
753 // Can we get the hostname with a big buffer?
754 ASSERT_EQ(0, gethostname(hostname, HOST_NAME_MAX));
755
756 // Can we get the hostname with a right-sized buffer?
757 ASSERT_EQ(0, gethostname(hostname, strlen(hostname) + 1));
758
759 // Does uname(2) agree?
760 utsname buf;
761 ASSERT_EQ(0, uname(&buf));
762 ASSERT_EQ(0, strncmp(hostname, buf.nodename, sizeof(buf.nodename)));
763 ASSERT_GT(strlen(hostname), 0U);
764
765 // Do we correctly detect truncation?
766 errno = 0;
767 ASSERT_EQ(-1, gethostname(hostname, strlen(hostname)));
768 ASSERT_ERRNO(ENAMETOOLONG);
769 }
770
TEST(UNISTD_TEST,pathconf_fpathconf)771 TEST(UNISTD_TEST, pathconf_fpathconf) {
772 TemporaryFile tf;
773 long l;
774
775 // As a file system's block size is always power of 2, the configure values
776 // for ALLOC and XFER should be power of 2 as well.
777 l = pathconf(tf.path, _PC_ALLOC_SIZE_MIN);
778 ASSERT_TRUE(l > 0 && powerof2(l));
779 l = pathconf(tf.path, _PC_REC_MIN_XFER_SIZE);
780 ASSERT_TRUE(l > 0 && powerof2(l));
781 l = pathconf(tf.path, _PC_REC_XFER_ALIGN);
782 ASSERT_TRUE(l > 0 && powerof2(l));
783
784 l = fpathconf(tf.fd, _PC_ALLOC_SIZE_MIN);
785 ASSERT_TRUE(l > 0 && powerof2(l));
786 l = fpathconf(tf.fd, _PC_REC_MIN_XFER_SIZE);
787 ASSERT_TRUE(l > 0 && powerof2(l));
788 l = fpathconf(tf.fd, _PC_REC_XFER_ALIGN);
789 ASSERT_TRUE(l > 0 && powerof2(l));
790
791 // Check that the "I can't answer that, you'll have to try it and see"
792 // cases don't set errno.
793 int names[] = {
794 _PC_ASYNC_IO, _PC_PRIO_IO, _PC_REC_INCR_XFER_SIZE, _PC_REC_MAX_XFER_SIZE, _PC_SYMLINK_MAX,
795 _PC_SYNC_IO, -1};
796 for (size_t i = 0; names[i] != -1; i++) {
797 errno = 0;
798 ASSERT_EQ(-1, pathconf(tf.path, names[i])) << names[i];
799 ASSERT_ERRNO(0) << names[i];
800 ASSERT_EQ(-1, fpathconf(tf.fd, names[i])) << names[i];
801 ASSERT_ERRNO(0) << names[i];
802 }
803 }
804
TEST(UNISTD_TEST,_POSIX_constants)805 TEST(UNISTD_TEST, _POSIX_constants) {
806 // Make a tight verification of _POSIX_* / _POSIX2_* / _XOPEN_* macros, to prevent change by mistake.
807 // Verify according to POSIX.1-2008.
808 EXPECT_EQ(200809L, _POSIX_VERSION);
809
810 EXPECT_EQ(2, _POSIX_AIO_LISTIO_MAX);
811 EXPECT_EQ(1, _POSIX_AIO_MAX);
812 EXPECT_EQ(4096, _POSIX_ARG_MAX);
813 EXPECT_EQ(25, _POSIX_CHILD_MAX);
814 EXPECT_EQ(20000000, _POSIX_CLOCKRES_MIN);
815 EXPECT_EQ(32, _POSIX_DELAYTIMER_MAX);
816 EXPECT_EQ(255, _POSIX_HOST_NAME_MAX);
817 EXPECT_EQ(8, _POSIX_LINK_MAX);
818 EXPECT_EQ(9, _POSIX_LOGIN_NAME_MAX);
819 EXPECT_EQ(255, _POSIX_MAX_CANON);
820 EXPECT_EQ(255, _POSIX_MAX_INPUT);
821 EXPECT_EQ(8, _POSIX_MQ_OPEN_MAX);
822 EXPECT_EQ(32, _POSIX_MQ_PRIO_MAX);
823 EXPECT_EQ(14, _POSIX_NAME_MAX);
824 EXPECT_EQ(8, _POSIX_NGROUPS_MAX);
825 EXPECT_EQ(20, _POSIX_OPEN_MAX);
826 EXPECT_EQ(256, _POSIX_PATH_MAX);
827 EXPECT_EQ(512, _POSIX_PIPE_BUF);
828 EXPECT_EQ(255, _POSIX_RE_DUP_MAX);
829 EXPECT_EQ(8, _POSIX_RTSIG_MAX);
830 EXPECT_EQ(256, _POSIX_SEM_NSEMS_MAX);
831 EXPECT_EQ(32767, _POSIX_SEM_VALUE_MAX);
832 EXPECT_EQ(32, _POSIX_SIGQUEUE_MAX);
833 EXPECT_EQ(32767, _POSIX_SSIZE_MAX);
834 EXPECT_EQ(8, _POSIX_STREAM_MAX);
835 #if !defined(__GLIBC__)
836 EXPECT_EQ(4, _POSIX_SS_REPL_MAX);
837 #endif
838 EXPECT_EQ(255, _POSIX_SYMLINK_MAX);
839 EXPECT_EQ(8, _POSIX_SYMLOOP_MAX);
840 EXPECT_EQ(4, _POSIX_THREAD_DESTRUCTOR_ITERATIONS);
841 EXPECT_EQ(128, _POSIX_THREAD_KEYS_MAX);
842 EXPECT_EQ(64, _POSIX_THREAD_THREADS_MAX);
843 EXPECT_EQ(32, _POSIX_TIMER_MAX);
844 #if !defined(__GLIBC__)
845 EXPECT_EQ(30, _POSIX_TRACE_EVENT_NAME_MAX);
846 EXPECT_EQ(8, _POSIX_TRACE_NAME_MAX);
847 EXPECT_EQ(8, _POSIX_TRACE_SYS_MAX);
848 EXPECT_EQ(32, _POSIX_TRACE_USER_EVENT_MAX);
849 #endif
850 EXPECT_EQ(9, _POSIX_TTY_NAME_MAX);
851 EXPECT_EQ(6, _POSIX_TZNAME_MAX);
852 EXPECT_EQ(99, _POSIX2_BC_BASE_MAX);
853 EXPECT_EQ(2048, _POSIX2_BC_DIM_MAX);
854 EXPECT_EQ(99, _POSIX2_BC_SCALE_MAX);
855 EXPECT_EQ(1000, _POSIX2_BC_STRING_MAX);
856 EXPECT_EQ(14, _POSIX2_CHARCLASS_NAME_MAX);
857 EXPECT_EQ(2, _POSIX2_COLL_WEIGHTS_MAX);
858 EXPECT_EQ(32, _POSIX2_EXPR_NEST_MAX);
859 EXPECT_EQ(2048, _POSIX2_LINE_MAX);
860 EXPECT_EQ(255, _POSIX2_RE_DUP_MAX);
861
862 EXPECT_EQ(16, _XOPEN_IOV_MAX);
863 #if !defined(__GLIBC__)
864 EXPECT_EQ(255, _XOPEN_NAME_MAX);
865 EXPECT_EQ(1024, _XOPEN_PATH_MAX);
866 #endif
867 }
868
TEST(UNISTD_TEST,_POSIX_options)869 TEST(UNISTD_TEST, _POSIX_options) {
870 EXPECT_EQ(_POSIX_VERSION, _POSIX_ADVISORY_INFO);
871 EXPECT_GT(_POSIX_BARRIERS, 0);
872 EXPECT_GT(_POSIX_SPIN_LOCKS, 0);
873 EXPECT_NE(_POSIX_CHOWN_RESTRICTED, -1);
874 EXPECT_EQ(_POSIX_VERSION, _POSIX_CLOCK_SELECTION);
875 #if !defined(__GLIBC__) // glibc supports ancient kernels.
876 EXPECT_EQ(_POSIX_VERSION, _POSIX_CPUTIME);
877 #endif
878 EXPECT_EQ(_POSIX_VERSION, _POSIX_FSYNC);
879 EXPECT_EQ(_POSIX_VERSION, _POSIX_IPV6);
880 EXPECT_GT(_POSIX_JOB_CONTROL, 0);
881 EXPECT_EQ(_POSIX_VERSION, _POSIX_MAPPED_FILES);
882 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK);
883 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK_RANGE);
884 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMORY_PROTECTION);
885 #if !defined(__GLIBC__) // glibc supports ancient kernels.
886 EXPECT_EQ(_POSIX_VERSION, _POSIX_MONOTONIC_CLOCK);
887 #endif
888 EXPECT_GT(_POSIX_NO_TRUNC, 0);
889 #if !defined(ANDROID_HOST_MUSL)
890 EXPECT_EQ(_POSIX_VERSION, _POSIX_PRIORITY_SCHEDULING);
891 #endif
892 EXPECT_EQ(_POSIX_VERSION, _POSIX_RAW_SOCKETS);
893 EXPECT_EQ(_POSIX_VERSION, _POSIX_READER_WRITER_LOCKS);
894 EXPECT_EQ(_POSIX_VERSION, _POSIX_REALTIME_SIGNALS);
895 EXPECT_GT(_POSIX_REGEXP, 0);
896 EXPECT_GT(_POSIX_SAVED_IDS, 0);
897 EXPECT_EQ(_POSIX_VERSION, _POSIX_SEMAPHORES);
898 EXPECT_GT(_POSIX_SHELL, 0);
899 EXPECT_EQ(_POSIX_VERSION, _POSIX_SPAWN);
900 #if !defined(ANDROID_HOST_MUSL)
901 EXPECT_EQ(-1, _POSIX_SPORADIC_SERVER);
902 EXPECT_EQ(_POSIX_VERSION, _POSIX_SYNCHRONIZED_IO);
903 #endif
904 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREADS);
905 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKADDR);
906 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKSIZE);
907 #if !defined(__GLIBC__) // glibc supports ancient kernels.
908 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_CPUTIME);
909 #endif
910 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PRIORITY_SCHEDULING);
911 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PROCESS_SHARED);
912 #if !defined(ANDROID_HOST_MUSL)
913 EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_PROTECT);
914 #endif
915 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_SAFE_FUNCTIONS);
916 #if !defined(ANDROID_HOST_MUSL)
917 EXPECT_EQ(-1, _POSIX_THREAD_SPORADIC_SERVER);
918 #endif
919 EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMEOUTS);
920 EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMERS);
921 #if !defined(ANDROID_HOST_MUSL)
922 EXPECT_EQ(-1, _POSIX_TRACE);
923 EXPECT_EQ(-1, _POSIX_TRACE_EVENT_FILTER);
924 EXPECT_EQ(-1, _POSIX_TRACE_INHERIT);
925 EXPECT_EQ(-1, _POSIX_TRACE_LOG);
926 EXPECT_EQ(-1, _POSIX_TYPED_MEMORY_OBJECTS);
927 #endif
928 EXPECT_NE(-1, _POSIX_VDISABLE);
929
930 EXPECT_EQ(_POSIX_VERSION, _POSIX2_VERSION);
931 EXPECT_EQ(_POSIX_VERSION, _POSIX2_C_BIND);
932 #if !defined(ANDROID_HOST_MUSL)
933 EXPECT_EQ(_POSIX_VERSION, _POSIX2_CHAR_TERM);
934 #endif
935
936 EXPECT_EQ(700, _XOPEN_VERSION);
937 EXPECT_EQ(1, _XOPEN_ENH_I18N);
938 #if !defined(ANDROID_HOST_MUSL)
939 EXPECT_EQ(1, _XOPEN_REALTIME);
940 EXPECT_EQ(1, _XOPEN_REALTIME_THREADS);
941 EXPECT_EQ(1, _XOPEN_SHM);
942 #endif
943 EXPECT_EQ(1, _XOPEN_UNIX);
944
945 #if defined(__BIONIC__)
946 // These tests only pass on bionic, as bionic and glibc has different support on these macros.
947 // Macros like _POSIX_ASYNCHRONOUS_IO are not supported on bionic yet.
948 EXPECT_EQ(-1, _POSIX_ASYNCHRONOUS_IO);
949 EXPECT_EQ(-1, _POSIX_MESSAGE_PASSING);
950 EXPECT_EQ(-1, _POSIX_PRIORITIZED_IO);
951 EXPECT_EQ(-1, _POSIX_SHARED_MEMORY_OBJECTS);
952 EXPECT_EQ(-1, _POSIX_THREAD_PRIO_INHERIT);
953 EXPECT_EQ(-1, _POSIX_THREAD_PRIO_PROTECT);
954 EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_INHERIT);
955
956 EXPECT_EQ(-1, _POSIX2_C_DEV);
957 EXPECT_EQ(-1, _POSIX2_FORT_DEV);
958 EXPECT_EQ(-1, _POSIX2_FORT_RUN);
959 EXPECT_EQ(-1, _POSIX2_LOCALEDEF);
960 EXPECT_EQ(-1, _POSIX2_SW_DEV);
961 EXPECT_EQ(-1, _POSIX2_UPE);
962
963 EXPECT_EQ(-1, _XOPEN_CRYPT);
964 EXPECT_EQ(-1, _XOPEN_LEGACY);
965 EXPECT_EQ(-1, _XOPEN_STREAMS);
966 #endif // defined(__BIONIC__)
967 }
968
969 #define VERIFY_SYSCONF_UNKNOWN(name) \
970 VerifySysconf(name, #name, [](long v){return v == -1 && errno == EINVAL;})
971
972 #define VERIFY_SYSCONF_UNSUPPORTED(name) \
973 VerifySysconf(name, #name, [](long v){return v == -1 && errno == 0;})
974
975 // sysconf() means unlimited when it returns -1 with errno unchanged.
976 #define VERIFY_SYSCONF_POSITIVE(name) \
977 VerifySysconf(name, #name, [](long v){return (v > 0 || v == -1) && errno == 0;})
978
979 #define VERIFY_SYSCONF_POSIX_VERSION(name) \
980 VerifySysconf(name, #name, [](long v){return v == _POSIX_VERSION && errno == 0;})
981
VerifySysconf(int option,const char * option_name,bool (* verify)(long))982 static void VerifySysconf(int option, const char *option_name, bool (*verify)(long)) {
983 errno = 0;
984 long ret = sysconf(option);
985 EXPECT_TRUE(verify(ret)) << "name = " << option_name << ", ret = "
986 << ret <<", Error Message: " << strerror(errno);
987 }
988
TEST(UNISTD_TEST,sysconf)989 TEST(UNISTD_TEST, sysconf) {
990 VERIFY_SYSCONF_POSIX_VERSION(_SC_ADVISORY_INFO);
991 VERIFY_SYSCONF_POSITIVE(_SC_ARG_MAX);
992 VERIFY_SYSCONF_POSIX_VERSION(_SC_BARRIERS);
993 VERIFY_SYSCONF_POSITIVE(_SC_BC_BASE_MAX);
994 VERIFY_SYSCONF_POSITIVE(_SC_BC_DIM_MAX);
995 VERIFY_SYSCONF_POSITIVE(_SC_BC_SCALE_MAX);
996 VERIFY_SYSCONF_POSITIVE(_SC_CHILD_MAX);
997 VERIFY_SYSCONF_POSITIVE(_SC_CLK_TCK);
998 VERIFY_SYSCONF_POSITIVE(_SC_COLL_WEIGHTS_MAX);
999 VERIFY_SYSCONF_POSIX_VERSION(_SC_CPUTIME);
1000 VERIFY_SYSCONF_POSITIVE(_SC_EXPR_NEST_MAX);
1001 VERIFY_SYSCONF_POSITIVE(_SC_LINE_MAX);
1002 VerifySysconf(_SC_NGROUPS_MAX, "_SC_NGROUPS_MAX", [](long v){return v >= 0 && v <= NGROUPS_MAX;});
1003 VERIFY_SYSCONF_POSITIVE(_SC_OPEN_MAX);
1004 VERIFY_SYSCONF_POSITIVE(_SC_PASS_MAX);
1005 VERIFY_SYSCONF_POSIX_VERSION(_SC_2_C_BIND);
1006 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_DEV);
1007 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_RUN);
1008 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_UPE);
1009 VERIFY_SYSCONF_POSIX_VERSION(_SC_2_VERSION);
1010 VERIFY_SYSCONF_POSITIVE(_SC_JOB_CONTROL);
1011 VERIFY_SYSCONF_POSITIVE(_SC_SAVED_IDS);
1012 VERIFY_SYSCONF_POSIX_VERSION(_SC_VERSION);
1013 VERIFY_SYSCONF_POSITIVE(_SC_RE_DUP_MAX);
1014 VERIFY_SYSCONF_POSITIVE(_SC_STREAM_MAX);
1015 VERIFY_SYSCONF_POSITIVE(_SC_TZNAME_MAX);
1016 VerifySysconf(_SC_XOPEN_VERSION, "_SC_XOPEN_VERSION", [](long v){return v == _XOPEN_VERSION && errno == 0;});
1017 VERIFY_SYSCONF_POSITIVE(_SC_ATEXIT_MAX);
1018 VERIFY_SYSCONF_POSITIVE(_SC_IOV_MAX);
1019 VERIFY_SYSCONF_POSITIVE(_SC_UIO_MAXIOV);
1020 EXPECT_EQ(sysconf(_SC_IOV_MAX), sysconf(_SC_UIO_MAXIOV));
1021 VERIFY_SYSCONF_POSITIVE(_SC_PAGESIZE);
1022 VERIFY_SYSCONF_POSITIVE(_SC_PAGE_SIZE);
1023 VerifySysconf(_SC_PAGE_SIZE, "_SC_PAGE_SIZE",
1024 [](long v){return v == sysconf(_SC_PAGESIZE) && errno == 0 && v == getpagesize();});
1025 VERIFY_SYSCONF_POSITIVE(_SC_XOPEN_UNIX);
1026 VERIFY_SYSCONF_POSITIVE(_SC_AIO_LISTIO_MAX);
1027 VERIFY_SYSCONF_POSITIVE(_SC_AIO_MAX);
1028 VerifySysconf(_SC_AIO_PRIO_DELTA_MAX, "_SC_AIO_PRIO_DELTA_MAX", [](long v){return v >= 0 && errno == 0;});
1029 VERIFY_SYSCONF_POSITIVE(_SC_DELAYTIMER_MAX);
1030 VERIFY_SYSCONF_POSITIVE(_SC_MQ_OPEN_MAX);
1031 VERIFY_SYSCONF_POSITIVE(_SC_MQ_PRIO_MAX);
1032 VERIFY_SYSCONF_POSITIVE(_SC_RTSIG_MAX);
1033 VERIFY_SYSCONF_POSITIVE(_SC_SEM_NSEMS_MAX);
1034 VERIFY_SYSCONF_POSITIVE(_SC_SEM_VALUE_MAX);
1035 VERIFY_SYSCONF_POSIX_VERSION(_SC_SPIN_LOCKS);
1036 VERIFY_SYSCONF_POSITIVE(_SC_TIMER_MAX);
1037 VERIFY_SYSCONF_POSIX_VERSION(_SC_FSYNC);
1038 VERIFY_SYSCONF_POSIX_VERSION(_SC_MAPPED_FILES);
1039 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK);
1040 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK_RANGE);
1041 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMORY_PROTECTION);
1042 VERIFY_SYSCONF_POSIX_VERSION(_SC_PRIORITY_SCHEDULING);
1043 VERIFY_SYSCONF_POSIX_VERSION(_SC_REALTIME_SIGNALS);
1044 VERIFY_SYSCONF_POSIX_VERSION(_SC_SEMAPHORES);
1045 VERIFY_SYSCONF_POSIX_VERSION(_SC_SYNCHRONIZED_IO);
1046 VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMERS);
1047 VERIFY_SYSCONF_POSITIVE(_SC_GETGR_R_SIZE_MAX);
1048 VERIFY_SYSCONF_POSITIVE(_SC_GETPW_R_SIZE_MAX);
1049 VERIFY_SYSCONF_POSITIVE(_SC_LOGIN_NAME_MAX);
1050 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_DESTRUCTOR_ITERATIONS);
1051 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_KEYS_MAX);
1052 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_STACK_MIN);
1053 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_THREADS_MAX);
1054 VERIFY_SYSCONF_POSITIVE(_SC_TTY_NAME_MAX);
1055 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREADS);
1056 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKADDR);
1057 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKSIZE);
1058 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PRIORITY_SCHEDULING);
1059 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_INHERIT);
1060 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_PROTECT);
1061 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_SAFE_FUNCTIONS);
1062 VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_CONF);
1063 VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_ONLN);
1064 VERIFY_SYSCONF_POSITIVE(_SC_PHYS_PAGES);
1065 VERIFY_SYSCONF_POSITIVE(_SC_AVPHYS_PAGES);
1066 VERIFY_SYSCONF_POSIX_VERSION(_SC_MONOTONIC_CLOCK);
1067 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS);
1068 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_ACCOUNTING);
1069 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_CHECKPOINT);
1070 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_LOCATE);
1071 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_MESSAGE);
1072 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_TRACK);
1073 VERIFY_SYSCONF_POSIX_VERSION(_SC_CLOCK_SELECTION);
1074 VERIFY_SYSCONF_POSITIVE(_SC_HOST_NAME_MAX);
1075 VERIFY_SYSCONF_POSIX_VERSION(_SC_IPV6);
1076 VERIFY_SYSCONF_POSIX_VERSION(_SC_RAW_SOCKETS);
1077 VERIFY_SYSCONF_POSIX_VERSION(_SC_READER_WRITER_LOCKS);
1078 VERIFY_SYSCONF_POSITIVE(_SC_REGEXP);
1079 VERIFY_SYSCONF_POSITIVE(_SC_SHELL);
1080 VERIFY_SYSCONF_POSIX_VERSION(_SC_SPAWN);
1081 VERIFY_SYSCONF_UNSUPPORTED(_SC_SPORADIC_SERVER);
1082 VERIFY_SYSCONF_POSITIVE(_SC_SYMLOOP_MAX);
1083 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_CPUTIME);
1084 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PROCESS_SHARED);
1085 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_SPORADIC_SERVER);
1086 VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMEOUTS);
1087 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE);
1088 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_FILTER);
1089 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_NAME_MAX);
1090 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_INHERIT);
1091 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_LOG);
1092 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_NAME_MAX);
1093 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_SYS_MAX);
1094 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_USER_EVENT_MAX);
1095 VERIFY_SYSCONF_UNSUPPORTED(_SC_TYPED_MEMORY_OBJECTS);
1096 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_STREAMS);
1097
1098 #if defined(__LP64__)
1099 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFF32);
1100 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG);
1101 VERIFY_SYSCONF_POSITIVE(_SC_V7_LP64_OFF64);
1102 VERIFY_SYSCONF_POSITIVE(_SC_V7_LPBIG_OFFBIG);
1103 #else
1104 VERIFY_SYSCONF_POSITIVE(_SC_V7_ILP32_OFF32);
1105 #if defined(__BIONIC__)
1106 // bionic does not support 64 bits off_t type on 32bit machine.
1107 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG);
1108 #endif
1109 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LP64_OFF64);
1110 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LPBIG_OFFBIG);
1111 #endif
1112
1113 #if defined(__BIONIC__)
1114 // Tests can only run on bionic, as bionic and glibc have different support for these options.
1115 // Below options are not supported on bionic yet.
1116 VERIFY_SYSCONF_UNSUPPORTED(_SC_ASYNCHRONOUS_IO);
1117 VERIFY_SYSCONF_UNSUPPORTED(_SC_MESSAGE_PASSING);
1118 VERIFY_SYSCONF_UNSUPPORTED(_SC_PRIORITIZED_IO);
1119 VERIFY_SYSCONF_UNSUPPORTED(_SC_SHARED_MEMORY_OBJECTS);
1120 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_INHERIT);
1121 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_PROTECT);
1122
1123 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_C_DEV);
1124 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_LOCALEDEF);
1125 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_SW_DEV);
1126
1127 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_CRYPT);
1128 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_LEGACY);
1129 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_UUCP);
1130 #endif // defined(__BIONIC__)
1131 }
1132
TEST(UNISTD_TEST,get_cpu_count_from_string)1133 TEST(UNISTD_TEST, get_cpu_count_from_string) {
1134 ASSERT_EQ(0, GetCpuCountFromString(" "));
1135 ASSERT_EQ(1, GetCpuCountFromString("0"));
1136 ASSERT_EQ(40, GetCpuCountFromString("0-39"));
1137 ASSERT_EQ(4, GetCpuCountFromString("0, 1-2, 4\n"));
1138 }
1139
TEST(UNISTD_TEST,sysconf_SC_NPROCESSORS_make_sense)1140 TEST(UNISTD_TEST, sysconf_SC_NPROCESSORS_make_sense) {
1141 ASSERT_LE(sysconf(_SC_NPROCESSORS_ONLN), sysconf(_SC_NPROCESSORS_CONF));
1142 }
1143
TEST(UNISTD_TEST,sysconf_SC_NPROCESSORS_ONLN)1144 TEST(UNISTD_TEST, sysconf_SC_NPROCESSORS_ONLN) {
1145 std::string line;
1146 ASSERT_TRUE(android::base::ReadFileToString("/sys/devices/system/cpu/online", &line));
1147 long online_cpus = 0;
1148 for (const std::string& s : android::base::Split(line, ",")) {
1149 std::vector<std::string> numbers = android::base::Split(s, "-");
1150 if (numbers.size() == 1u) {
1151 online_cpus++;
1152 } else {
1153 online_cpus += atoi(numbers[1].c_str()) - atoi(numbers[0].c_str()) + 1;
1154 }
1155 }
1156 ASSERT_EQ(online_cpus, sysconf(_SC_NPROCESSORS_ONLN));
1157 }
1158
TEST(UNISTD_TEST,sysconf_SC_ARG_MAX)1159 TEST(UNISTD_TEST, sysconf_SC_ARG_MAX) {
1160 // Since Linux 2.6.23, ARG_MAX isn't a constant and depends on RLIMIT_STACK.
1161 // See setup_arg_pages() in the kernel for the gory details:
1162 // https://elixir.bootlin.com/linux/v6.6.4/source/fs/exec.c#L749
1163
1164 // Get our current limit, and set things up so we restore the limit.
1165 rlimit rl;
1166 ASSERT_EQ(0, getrlimit(RLIMIT_STACK, &rl));
1167 uint64_t original_rlim_cur = rl.rlim_cur;
1168 if (rl.rlim_cur == RLIM_INFINITY) {
1169 rl.rlim_cur = 8 * 1024 * 1024; // Bionic reports unlimited stacks as 8MiB.
1170 }
1171 auto guard = android::base::make_scope_guard([&rl, original_rlim_cur]() {
1172 rl.rlim_cur = original_rlim_cur;
1173 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1174 });
1175
1176 // _SC_ARG_MAX should be 1/4 the stack size.
1177 EXPECT_EQ(static_cast<long>(rl.rlim_cur / 4), sysconf(_SC_ARG_MAX));
1178
1179 // If you have a really small stack, the kernel still guarantees a stack
1180 // expansion of 128KiB (see setup_arg_pages() in fs/exec.c).
1181 rl.rlim_cur = 1024;
1182 rl.rlim_max = RLIM_INFINITY;
1183 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1184
1185 // The stack expansion number is defined in fs/exec.c.
1186 // https://elixir.bootlin.com/linux/v6.6.4/source/fs/exec.c#L845
1187 constexpr long kernel_stack_expansion = 131072;
1188 EXPECT_EQ(kernel_stack_expansion, sysconf(_SC_ARG_MAX));
1189
1190 // If you have a large stack, the kernel will keep the stack
1191 // expansion to 128KiB (see setup_arg_pages() in fs/exec.c).
1192 rl.rlim_cur = 524288;
1193 rl.rlim_max = RLIM_INFINITY;
1194 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1195
1196 EXPECT_EQ(kernel_stack_expansion, sysconf(_SC_ARG_MAX));
1197 }
1198
TEST(UNISTD_TEST,sysconf_unknown)1199 TEST(UNISTD_TEST, sysconf_unknown) {
1200 VERIFY_SYSCONF_UNKNOWN(-1);
1201 VERIFY_SYSCONF_UNKNOWN(666);
1202 }
1203
show_cache(const char * name,long size,long assoc,long line_size)1204 [[maybe_unused]] static void show_cache(const char* name, long size, long assoc, long line_size) {
1205 printf("%s cache size: %ld bytes, line size %ld bytes, ", name, size, line_size);
1206 if (assoc == 0) {
1207 printf("fully");
1208 } else {
1209 printf("%ld-way", assoc);
1210 }
1211 printf(" associative\n");
1212 }
1213
TEST(UNISTD_TEST,sysconf_cache)1214 TEST(UNISTD_TEST, sysconf_cache) {
1215 #if defined(ANDROID_HOST_MUSL)
1216 GTEST_SKIP() << "musl does not have _SC_LEVEL?_?CACHE_SIZE";
1217 #else
1218 // It's not obvious we can _test_ any of these, but we can at least
1219 // show the output for humans to inspect.
1220 show_cache("L1D", sysconf(_SC_LEVEL1_DCACHE_SIZE), sysconf(_SC_LEVEL1_DCACHE_ASSOC), sysconf(_SC_LEVEL1_DCACHE_LINESIZE));
1221 show_cache("L1I", sysconf(_SC_LEVEL1_ICACHE_SIZE), sysconf(_SC_LEVEL1_ICACHE_ASSOC), sysconf(_SC_LEVEL1_ICACHE_LINESIZE));
1222 show_cache("L2", sysconf(_SC_LEVEL2_CACHE_SIZE), sysconf(_SC_LEVEL2_CACHE_ASSOC), sysconf(_SC_LEVEL2_CACHE_LINESIZE));
1223 show_cache("L3", sysconf(_SC_LEVEL3_CACHE_SIZE), sysconf(_SC_LEVEL3_CACHE_ASSOC), sysconf(_SC_LEVEL3_CACHE_LINESIZE));
1224 show_cache("L4", sysconf(_SC_LEVEL4_CACHE_SIZE), sysconf(_SC_LEVEL4_CACHE_ASSOC), sysconf(_SC_LEVEL4_CACHE_LINESIZE));
1225 #endif
1226 }
1227
TEST(UNISTD_TEST,dup2_same)1228 TEST(UNISTD_TEST, dup2_same) {
1229 // POSIX says of dup2:
1230 // If fildes2 is already a valid open file descriptor ...
1231 // [and] fildes is equal to fildes2 ... dup2() shall return
1232 // fildes2 without closing it.
1233 // This isn't true of dup3(2), so we need to manually implement that.
1234
1235 // Equal and valid.
1236 int fd = open("/proc/version", O_RDONLY);
1237 ASSERT_TRUE(fd != -1);
1238 ASSERT_EQ(fd, dup2(fd, fd));
1239 ASSERT_EQ(0, close(fd)); // Check that dup2 didn't close fd.
1240
1241 // Equal, but invalid.
1242 errno = 0;
1243 ASSERT_EQ(-1, dup2(fd, fd));
1244 ASSERT_ERRNO(EBADF);
1245 }
1246
TEST(UNISTD_TEST,dup3)1247 TEST(UNISTD_TEST, dup3) {
1248 int fd = open("/proc/version", O_RDONLY);
1249 ASSERT_EQ(666, dup3(fd, 666, 0));
1250 ASSERT_FALSE(CloseOnExec(666));
1251 close(666);
1252 ASSERT_EQ(667, dup3(fd, 667, O_CLOEXEC));
1253 ASSERT_TRUE(CloseOnExec(667));
1254 close(667);
1255 close(fd);
1256 }
1257
TEST(UNISTD_TEST,lockf_smoke)1258 TEST(UNISTD_TEST, lockf_smoke) {
1259 constexpr off64_t file_size = 32*1024LL;
1260
1261 TemporaryFile tf;
1262 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1263
1264 // Lock everything.
1265 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1266 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
1267
1268 // Try-lock everything, this should succeed too.
1269 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1270 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size));
1271
1272 // Check status.
1273 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1274 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1275
1276 // Unlock file.
1277 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1278 ASSERT_EQ(0, lockf64(tf.fd, F_ULOCK, file_size));
1279 }
1280
TEST(UNISTD_TEST,lockf_zero)1281 TEST(UNISTD_TEST, lockf_zero) {
1282 constexpr off64_t file_size = 32*1024LL;
1283
1284 TemporaryFile tf;
1285 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1286
1287 // Lock everything by specifying a size of 0 (meaning "to the end, even if it changes").
1288 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1289 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, 0));
1290
1291 // Check that it's locked.
1292 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1293 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1294
1295 // Move the end.
1296 ASSERT_EQ(0, ftruncate(tf.fd, 2*file_size));
1297
1298 // Check that the new section is locked too.
1299 ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
1300 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, 2*file_size));
1301 }
1302
TEST(UNISTD_TEST,lockf_negative)1303 TEST(UNISTD_TEST, lockf_negative) {
1304 constexpr off64_t file_size = 32*1024LL;
1305
1306 TemporaryFile tf;
1307 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1308
1309 // Lock everything, but specifying the range in reverse.
1310 ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
1311 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, -file_size));
1312
1313 // Check that it's locked.
1314 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1315 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1316 }
1317
TEST(UNISTD_TEST,lockf_with_child)1318 TEST(UNISTD_TEST, lockf_with_child) {
1319 constexpr off64_t file_size = 32*1024LL;
1320
1321 TemporaryFile tf;
1322 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1323
1324 // Lock everything.
1325 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1326 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
1327
1328 // Fork a child process
1329 pid_t pid = fork();
1330 ASSERT_NE(-1, pid);
1331 if (pid == 0) {
1332 // Check that the child cannot lock the file.
1333 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1334 ASSERT_EQ(-1, lockf64(tf.fd, F_TLOCK, file_size));
1335 ASSERT_ERRNO(EAGAIN);
1336 // Check also that it reports itself as locked.
1337 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1338 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size));
1339 ASSERT_ERRNO(EACCES);
1340 _exit(0);
1341 }
1342 AssertChildExited(pid, 0);
1343 }
1344
TEST(UNISTD_TEST,lockf_partial_with_child)1345 TEST(UNISTD_TEST, lockf_partial_with_child) {
1346 constexpr off64_t file_size = 32*1024LL;
1347
1348 TemporaryFile tf;
1349 ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1350
1351 // Lock the first half of the file.
1352 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1353 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size/2));
1354
1355 // Fork a child process.
1356 pid_t pid = fork();
1357 ASSERT_NE(-1, pid);
1358 if (pid == 0) {
1359 // Check that the child can lock the other half.
1360 ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
1361 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
1362 // Check that the child cannot lock the first half.
1363 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1364 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
1365 ASSERT_ERRNO(EACCES);
1366 // Check also that it reports itself as locked.
1367 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1368 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
1369 ASSERT_ERRNO(EACCES);
1370 _exit(0);
1371 }
1372 AssertChildExited(pid, 0);
1373
1374 // The second half was locked by the child, but the lock disappeared
1375 // when the process exited, so check it can be locked now.
1376 ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
1377 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
1378 }
1379
TEST(UNISTD_TEST,getdomainname)1380 TEST(UNISTD_TEST, getdomainname) {
1381 struct utsname u;
1382 ASSERT_EQ(0, uname(&u));
1383
1384 char buf[sizeof(u.domainname)];
1385 ASSERT_EQ(0, getdomainname(buf, sizeof(buf)));
1386 EXPECT_STREQ(u.domainname, buf);
1387
1388 #if defined(__BIONIC__)
1389 // bionic and glibc have different behaviors when len is too small
1390 ASSERT_EQ(-1, getdomainname(buf, strlen(u.domainname)));
1391 EXPECT_ERRNO(EINVAL);
1392 #endif
1393 }
1394
TEST(UNISTD_TEST,setdomainname)1395 TEST(UNISTD_TEST, setdomainname) {
1396 __user_cap_header_struct header;
1397 memset(&header, 0, sizeof(header));
1398 header.version = _LINUX_CAPABILITY_VERSION_3;
1399
1400 __user_cap_data_struct old_caps[_LINUX_CAPABILITY_U32S_3];
1401 ASSERT_EQ(0, capget(&header, &old_caps[0]));
1402
1403 auto admin_idx = CAP_TO_INDEX(CAP_SYS_ADMIN);
1404 auto admin_mask = CAP_TO_MASK(CAP_SYS_ADMIN);
1405 bool has_admin = old_caps[admin_idx].effective & admin_mask;
1406 if (has_admin) {
1407 __user_cap_data_struct new_caps[_LINUX_CAPABILITY_U32S_3];
1408 memcpy(new_caps, old_caps, sizeof(new_caps));
1409 new_caps[admin_idx].effective &= ~admin_mask;
1410
1411 ASSERT_EQ(0, capset(&header, &new_caps[0])) << "failed to drop admin privileges";
1412 }
1413
1414 const char* name = "newdomainname";
1415 ASSERT_EQ(-1, setdomainname(name, strlen(name)));
1416 ASSERT_ERRNO(EPERM);
1417
1418 if (has_admin) {
1419 ASSERT_EQ(0, capset(&header, &old_caps[0])) << "failed to restore admin privileges";
1420 }
1421 }
1422
TEST(UNISTD_TEST,execve_failure)1423 TEST(UNISTD_TEST, execve_failure) {
1424 ExecTestHelper eth;
1425 errno = 0;
1426 ASSERT_EQ(-1, execve("/", eth.GetArgs(), eth.GetEnv()));
1427 ASSERT_ERRNO(EACCES);
1428 }
1429
append_llvm_cov_env_var(std::string & env_str)1430 static void append_llvm_cov_env_var(std::string& env_str) {
1431 if (getenv("LLVM_PROFILE_FILE") != nullptr)
1432 env_str.append("__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE\n");
1433 }
1434
TEST(UNISTD_TEST,execve_args)1435 TEST(UNISTD_TEST, execve_args) {
1436 // int execve(const char* path, char* argv[], char* envp[]);
1437
1438 // Test basic argument passing.
1439 ExecTestHelper eth;
1440 eth.SetArgs({"echo", "hello", "world", nullptr});
1441 eth.Run([&]() { execve(BIN_DIR "echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1442
1443 // Test environment variable setting too.
1444 eth.SetArgs({"printenv", nullptr});
1445 eth.SetEnv({"A=B", nullptr});
1446
1447 std::string expected_output("A=B\n");
1448 append_llvm_cov_env_var(expected_output);
1449
1450 eth.Run([&]() { execve(BIN_DIR "printenv", eth.GetArgs(), eth.GetEnv()); }, 0,
1451 expected_output.c_str());
1452 }
1453
TEST(UNISTD_TEST,execl_failure)1454 TEST(UNISTD_TEST, execl_failure) {
1455 errno = 0;
1456 ASSERT_EQ(-1, execl("/", "/", nullptr));
1457 ASSERT_ERRNO(EACCES);
1458 }
1459
TEST(UNISTD_TEST,execl)1460 TEST(UNISTD_TEST, execl) {
1461 ExecTestHelper eth;
1462 // int execl(const char* path, const char* arg, ...);
1463 eth.Run([&]() { execl(BIN_DIR "echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n");
1464 }
1465
TEST(UNISTD_TEST,execle_failure)1466 TEST(UNISTD_TEST, execle_failure) {
1467 ExecTestHelper eth;
1468 errno = 0;
1469 ASSERT_EQ(-1, execle("/", "/", nullptr, eth.GetEnv()));
1470 ASSERT_ERRNO(EACCES);
1471 }
1472
TEST(UNISTD_TEST,execle)1473 TEST(UNISTD_TEST, execle) {
1474 ExecTestHelper eth;
1475 eth.SetEnv({"A=B", nullptr});
1476
1477 std::string expected_output("A=B\n");
1478 append_llvm_cov_env_var(expected_output);
1479
1480 // int execle(const char* path, const char* arg, ..., char* envp[]);
1481 eth.Run([&]() { execle(BIN_DIR "printenv", "printenv", nullptr, eth.GetEnv()); }, 0,
1482 expected_output.c_str());
1483 }
1484
TEST(UNISTD_TEST,execv_failure)1485 TEST(UNISTD_TEST, execv_failure) {
1486 ExecTestHelper eth;
1487 errno = 0;
1488 ASSERT_EQ(-1, execv("/", eth.GetArgs()));
1489 ASSERT_ERRNO(EACCES);
1490 }
1491
TEST(UNISTD_TEST,execv)1492 TEST(UNISTD_TEST, execv) {
1493 ExecTestHelper eth;
1494 eth.SetArgs({"echo", "hello", "world", nullptr});
1495 // int execv(const char* path, char* argv[]);
1496 eth.Run([&]() { execv(BIN_DIR "echo", eth.GetArgs()); }, 0, "hello world\n");
1497 }
1498
TEST(UNISTD_TEST,execlp_failure)1499 TEST(UNISTD_TEST, execlp_failure) {
1500 errno = 0;
1501 ASSERT_EQ(-1, execlp("/", "/", nullptr));
1502 ASSERT_ERRNO(EACCES);
1503 }
1504
TEST(UNISTD_TEST,execlp)1505 TEST(UNISTD_TEST, execlp) {
1506 ExecTestHelper eth;
1507 // int execlp(const char* file, const char* arg, ...);
1508 eth.Run([&]() { execlp("echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n");
1509 }
1510
TEST(UNISTD_TEST,execvp_failure)1511 TEST(UNISTD_TEST, execvp_failure) {
1512 ExecTestHelper eth;
1513 eth.SetArgs({nullptr});
1514 errno = 0;
1515 ASSERT_EQ(-1, execvp("/", eth.GetArgs()));
1516 ASSERT_ERRNO(EACCES);
1517 }
1518
TEST(UNISTD_TEST,execvp)1519 TEST(UNISTD_TEST, execvp) {
1520 ExecTestHelper eth;
1521 eth.SetArgs({"echo", "hello", "world", nullptr});
1522 // int execvp(const char* file, char* argv[]);
1523 eth.Run([&]() { execvp("echo", eth.GetArgs()); }, 0, "hello world\n");
1524 }
1525
TEST(UNISTD_TEST,execvpe_failure)1526 TEST(UNISTD_TEST, execvpe_failure) {
1527 ExecTestHelper eth;
1528 errno = 0;
1529 ASSERT_EQ(-1, execvpe("this-does-not-exist", eth.GetArgs(), eth.GetEnv()));
1530 // Running in CTS we might not even be able to search all directories in $PATH.
1531 ASSERT_TRUE(errno == ENOENT || errno == EACCES) << strerror(errno);
1532 }
1533
TEST(UNISTD_TEST,execvpe)1534 TEST(UNISTD_TEST, execvpe) {
1535 // int execvpe(const char* file, char* argv[], char* envp[]);
1536
1537 // Test basic argument passing.
1538 ExecTestHelper eth;
1539 eth.SetArgs({"echo", "hello", "world", nullptr});
1540 eth.Run([&]() { execvpe("echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1541
1542 // Test environment variable setting too.
1543 eth.SetArgs({"printenv", nullptr});
1544 eth.SetEnv({"A=B", nullptr});
1545
1546 std::string expected_output("A=B\n");
1547 append_llvm_cov_env_var(expected_output);
1548
1549 eth.Run([&]() { execvpe("printenv", eth.GetArgs(), eth.GetEnv()); }, 0, expected_output.c_str());
1550 }
1551
TEST(UNISTD_TEST,execvpe_ENOEXEC)1552 TEST(UNISTD_TEST, execvpe_ENOEXEC) {
1553 // Create a shell script with #!.
1554 TemporaryFile tf;
1555 ASSERT_TRUE(android::base::WriteStringToFile("#!" BIN_DIR "sh\necho script\n", tf.path));
1556
1557 // Set $PATH so we can find it.
1558 setenv("PATH", dirname(tf.path), 1);
1559
1560 ExecTestHelper eth;
1561 eth.SetArgs({basename(tf.path), nullptr});
1562
1563 // It's not inherently executable.
1564 errno = 0;
1565 ASSERT_EQ(-1, execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()));
1566 ASSERT_ERRNO(EACCES);
1567
1568 // Make it executable (and keep it writable because we're going to rewrite it below).
1569 ASSERT_EQ(0, chmod(tf.path, 0777));
1570
1571 // TemporaryFile will have a writable fd, so we can test ETXTBSY while we're here...
1572 errno = 0;
1573 ASSERT_EQ(-1, execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()));
1574 ASSERT_ERRNO(ETXTBSY);
1575
1576 // 1. The simplest test: the kernel should handle this.
1577 ASSERT_EQ(0, close(tf.fd));
1578 eth.Run([&]() { execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
1579
1580 // 2. Try again without a #!. We should have to handle this ourselves.
1581 ASSERT_TRUE(android::base::WriteStringToFile("echo script\n", tf.path));
1582 eth.Run([&]() { execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
1583
1584 // 3. Again without a #!, but also with a leading '/', since that's a special case in the
1585 // implementation.
1586 eth.Run([&]() { execvpe(tf.path, eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
1587 }
1588
TEST(UNISTD_TEST,execvp_libcore_test_55017)1589 TEST(UNISTD_TEST, execvp_libcore_test_55017) {
1590 ExecTestHelper eth;
1591 eth.SetArgs({"/system/bin/does-not-exist", nullptr});
1592
1593 errno = 0;
1594 ASSERT_EQ(-1, execvp("/system/bin/does-not-exist", eth.GetArgs()));
1595 ASSERT_ERRNO(ENOENT);
1596 }
1597
TEST(UNISTD_TEST,exec_argv0_null)1598 TEST(UNISTD_TEST, exec_argv0_null) {
1599 // http://b/33276926 and http://b/227498625.
1600 //
1601 // With old kernels, bionic will see the null pointer and use "<unknown>" but
1602 // with new (5.18+) kernels, the kernel will already have substituted the
1603 // empty string, so we don't make any assertion here about what (if anything)
1604 // comes before the first ':'.
1605 //
1606 // If this ever causes trouble, we could change bionic to replace _either_ the
1607 // null pointer or the empty string. We could also use the actual name from
1608 // readlink() on /proc/self/exe if we ever had reason to disallow programs
1609 // from trying to hide like this.
1610 char* args[] = {nullptr};
1611 char* envs[] = {nullptr};
1612 ASSERT_EXIT(execve("/system/bin/run-as", args, envs), testing::ExitedWithCode(1),
1613 ": usage: run-as");
1614 }
1615
TEST(UNISTD_TEST,fexecve_failure)1616 TEST(UNISTD_TEST, fexecve_failure) {
1617 ExecTestHelper eth;
1618 errno = 0;
1619 int fd = open("/", O_RDONLY);
1620 ASSERT_NE(-1, fd);
1621 ASSERT_EQ(-1, fexecve(fd, eth.GetArgs(), eth.GetEnv()));
1622 ASSERT_ERRNO(EACCES);
1623 close(fd);
1624 }
1625
TEST(UNISTD_TEST,fexecve_bad_fd)1626 TEST(UNISTD_TEST, fexecve_bad_fd) {
1627 ExecTestHelper eth;
1628 errno = 0;
1629 ASSERT_EQ(-1, fexecve(-1, eth.GetArgs(), eth.GetEnv()));
1630 ASSERT_ERRNO(EBADF);
1631 }
1632
TEST(UNISTD_TEST,fexecve_args)1633 TEST(UNISTD_TEST, fexecve_args) {
1634 // Test basic argument passing.
1635 int echo_fd = open(BIN_DIR "echo", O_RDONLY | O_CLOEXEC);
1636 ASSERT_NE(-1, echo_fd);
1637 ExecTestHelper eth;
1638 eth.SetArgs({"echo", "hello", "world", nullptr});
1639 eth.Run([&]() { fexecve(echo_fd, eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1640 close(echo_fd);
1641
1642 // Test environment variable setting too.
1643 int printenv_fd = open(BIN_DIR "printenv", O_RDONLY | O_CLOEXEC);
1644 ASSERT_NE(-1, printenv_fd);
1645 eth.SetArgs({"printenv", nullptr});
1646 eth.SetEnv({"A=B", nullptr});
1647
1648 std::string expected_output("A=B\n");
1649 append_llvm_cov_env_var(expected_output);
1650
1651 eth.Run([&]() { fexecve(printenv_fd, eth.GetArgs(), eth.GetEnv()); }, 0, expected_output.c_str());
1652 close(printenv_fd);
1653 }
1654
TEST(UNISTD_TEST,getlogin_r)1655 TEST(UNISTD_TEST, getlogin_r) {
1656 char buf[LOGIN_NAME_MAX] = {};
1657 EXPECT_EQ(ERANGE, getlogin_r(buf, 0));
1658 EXPECT_EQ(0, getlogin_r(buf, sizeof(buf)));
1659 EXPECT_STREQ(getlogin(), buf);
1660 }
1661
TEST(UNISTD_TEST,swab)1662 TEST(UNISTD_TEST, swab) {
1663 // POSIX: "The swab() function shall copy nbytes bytes, which are pointed to by src,
1664 // to the object pointed to by dest, exchanging adjacent bytes."
1665 char buf[BUFSIZ];
1666 memset(buf, 'x', sizeof(buf));
1667 swab("ehll oowlr\0d", buf, 12);
1668 ASSERT_STREQ("hello world", buf);
1669 }
1670
TEST(UNISTD_TEST,swab_odd_byte_count)1671 TEST(UNISTD_TEST, swab_odd_byte_count) {
1672 // POSIX: "If nbytes is odd, swab() copies and exchanges nbytes-1 bytes and the disposition
1673 // of the last byte is unspecified."
1674 // ...but it seems unreasonable to not just leave the last byte alone.
1675 char buf[BUFSIZ];
1676 memset(buf, 'x', sizeof(buf));
1677 swab("012345", buf, 3);
1678 ASSERT_EQ('1', buf[0]);
1679 ASSERT_EQ('0', buf[1]);
1680 ASSERT_EQ('x', buf[2]);
1681 }
1682
TEST(UNISTD_TEST,swab_overlap)1683 TEST(UNISTD_TEST, swab_overlap) {
1684 // POSIX: "If copying takes place between objects that overlap, the behavior is undefined."
1685 // ...but it seems unreasonable to not just do the right thing.
1686 char buf[] = "012345";
1687 swab(buf, buf, 4);
1688 ASSERT_EQ('1', buf[0]);
1689 ASSERT_EQ('0', buf[1]);
1690 ASSERT_EQ('3', buf[2]);
1691 ASSERT_EQ('2', buf[3]);
1692 ASSERT_EQ('4', buf[4]);
1693 ASSERT_EQ('5', buf[5]);
1694 ASSERT_EQ(0, buf[6]);
1695 }
1696
TEST(UNISTD_TEST,swab_negative_byte_count)1697 TEST(UNISTD_TEST, swab_negative_byte_count) {
1698 // POSIX: "If nbytes is negative, swab() does nothing."
1699 char buf[BUFSIZ];
1700 memset(buf, 'x', sizeof(buf));
1701 swab("hello", buf, -1);
1702 ASSERT_EQ('x', buf[0]);
1703 }
1704
TEST(UNISTD_TEST,usleep)1705 TEST(UNISTD_TEST, usleep) {
1706 auto t0 = std::chrono::steady_clock::now();
1707 ASSERT_EQ(0, usleep(5000));
1708 auto t1 = std::chrono::steady_clock::now();
1709 ASSERT_GE(t1-t0, 5000us);
1710 }
1711
TEST(UNISTD_TEST,sleep)1712 TEST(UNISTD_TEST, sleep) {
1713 auto t0 = std::chrono::steady_clock::now();
1714 ASSERT_EQ(0U, sleep(1));
1715 auto t1 = std::chrono::steady_clock::now();
1716 ASSERT_GE(t1-t0, 1s);
1717 }
1718
TEST(UNISTD_TEST,close_range)1719 TEST(UNISTD_TEST, close_range) {
1720 #if defined(__GLIBC__)
1721 GTEST_SKIP() << "glibc too old";
1722 #elif defined(ANDROID_HOST_MUSL)
1723 GTEST_SKIP() << "musl does not have close_range";
1724 #else // __GLIBC__
1725 int fd = open("/proc/version", O_RDONLY);
1726 ASSERT_GE(fd, 0);
1727
1728 int rc = close_range(fd, fd, 0);
1729 if (rc == -1 && errno == ENOSYS) GTEST_SKIP() << "no close_range() in this kernel";
1730 ASSERT_EQ(0, rc) << strerror(errno);
1731
1732 // Check the fd is actually closed.
1733 ASSERT_EQ(close(fd), -1);
1734 ASSERT_ERRNO(EBADF);
1735 #endif // __GLIBC__
1736 }
1737
TEST(UNISTD_TEST,copy_file_range)1738 TEST(UNISTD_TEST, copy_file_range) {
1739 #if defined(__GLIBC__)
1740 GTEST_SKIP() << "glibc too old";
1741 #else // __GLIBC__
1742 TemporaryFile tf;
1743 ASSERT_TRUE(android::base::WriteStringToFd("hello world", tf.fd));
1744 ASSERT_EQ(0, lseek(tf.fd, SEEK_SET, 0));
1745 TemporaryFile tf2;
1746 ASSERT_EQ(11, copy_file_range(tf.fd, NULL, tf2.fd, NULL, 11, 0));
1747 ASSERT_EQ(0, lseek(tf2.fd, SEEK_SET, 0));
1748 std::string content;
1749 ASSERT_TRUE(android::base::ReadFdToString(tf2.fd, &content));
1750 ASSERT_EQ("hello world", content);
1751 #endif // __GLIBC__
1752 }
1753