1*8d67ca89SAndroid Build Coastguard Worker /*
2*8d67ca89SAndroid Build Coastguard Worker * Copyright (C) 2012 The Android Open Source Project
3*8d67ca89SAndroid Build Coastguard Worker *
4*8d67ca89SAndroid Build Coastguard Worker * Licensed under the Apache License, Version 2.0 (the "License");
5*8d67ca89SAndroid Build Coastguard Worker * you may not use this file except in compliance with the License.
6*8d67ca89SAndroid Build Coastguard Worker * You may obtain a copy of the License at
7*8d67ca89SAndroid Build Coastguard Worker *
8*8d67ca89SAndroid Build Coastguard Worker * http://www.apache.org/licenses/LICENSE-2.0
9*8d67ca89SAndroid Build Coastguard Worker *
10*8d67ca89SAndroid Build Coastguard Worker * Unless required by applicable law or agreed to in writing, software
11*8d67ca89SAndroid Build Coastguard Worker * distributed under the License is distributed on an "AS IS" BASIS,
12*8d67ca89SAndroid Build Coastguard Worker * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*8d67ca89SAndroid Build Coastguard Worker * See the License for the specific language governing permissions and
14*8d67ca89SAndroid Build Coastguard Worker * limitations under the License.
15*8d67ca89SAndroid Build Coastguard Worker */
16*8d67ca89SAndroid Build Coastguard Worker
17*8d67ca89SAndroid Build Coastguard Worker #include <gtest/gtest.h>
18*8d67ca89SAndroid Build Coastguard Worker
19*8d67ca89SAndroid Build Coastguard Worker #include "DoNotOptimize.h"
20*8d67ca89SAndroid Build Coastguard Worker #include "SignalUtils.h"
21*8d67ca89SAndroid Build Coastguard Worker #include "utils.h"
22*8d67ca89SAndroid Build Coastguard Worker
23*8d67ca89SAndroid Build Coastguard Worker #include <errno.h>
24*8d67ca89SAndroid Build Coastguard Worker #include <fcntl.h>
25*8d67ca89SAndroid Build Coastguard Worker #include <libgen.h>
26*8d67ca89SAndroid Build Coastguard Worker #include <limits.h>
27*8d67ca89SAndroid Build Coastguard Worker #include <stdint.h>
28*8d67ca89SAndroid Build Coastguard Worker #include <sys/capability.h>
29*8d67ca89SAndroid Build Coastguard Worker #include <sys/param.h>
30*8d67ca89SAndroid Build Coastguard Worker #include <sys/resource.h>
31*8d67ca89SAndroid Build Coastguard Worker #include <sys/syscall.h>
32*8d67ca89SAndroid Build Coastguard Worker #include <sys/types.h>
33*8d67ca89SAndroid Build Coastguard Worker #include <sys/utsname.h>
34*8d67ca89SAndroid Build Coastguard Worker #include <sys/wait.h>
35*8d67ca89SAndroid Build Coastguard Worker #include <unistd.h>
36*8d67ca89SAndroid Build Coastguard Worker
37*8d67ca89SAndroid Build Coastguard Worker #include <chrono>
38*8d67ca89SAndroid Build Coastguard Worker
39*8d67ca89SAndroid Build Coastguard Worker #include <android-base/file.h>
40*8d67ca89SAndroid Build Coastguard Worker #include <android-base/silent_death_test.h>
41*8d67ca89SAndroid Build Coastguard Worker #include <android-base/strings.h>
42*8d67ca89SAndroid Build Coastguard Worker
43*8d67ca89SAndroid Build Coastguard Worker #include "private/get_cpu_count_from_string.h"
44*8d67ca89SAndroid Build Coastguard Worker
45*8d67ca89SAndroid Build Coastguard Worker #if defined(__BIONIC__)
46*8d67ca89SAndroid Build Coastguard Worker #include "bionic/pthread_internal.h"
47*8d67ca89SAndroid Build Coastguard Worker #endif
48*8d67ca89SAndroid Build Coastguard Worker
49*8d67ca89SAndroid Build Coastguard Worker #if defined(NOFORTIFY)
50*8d67ca89SAndroid Build Coastguard Worker #define UNISTD_TEST unistd_nofortify
51*8d67ca89SAndroid Build Coastguard Worker #define UNISTD_DEATHTEST unistd_nofortify_DeathTest
52*8d67ca89SAndroid Build Coastguard Worker #else
53*8d67ca89SAndroid Build Coastguard Worker #define UNISTD_TEST unistd
54*8d67ca89SAndroid Build Coastguard Worker #define UNISTD_DEATHTEST unistd_DeathTest
55*8d67ca89SAndroid Build Coastguard Worker #endif
56*8d67ca89SAndroid Build Coastguard Worker
57*8d67ca89SAndroid Build Coastguard Worker using UNISTD_DEATHTEST = SilentDeathTest;
58*8d67ca89SAndroid Build Coastguard Worker
59*8d67ca89SAndroid Build Coastguard Worker using namespace std::chrono_literals;
60*8d67ca89SAndroid Build Coastguard Worker
get_brk()61*8d67ca89SAndroid Build Coastguard Worker static void* get_brk() {
62*8d67ca89SAndroid Build Coastguard Worker return sbrk(0);
63*8d67ca89SAndroid Build Coastguard Worker }
64*8d67ca89SAndroid Build Coastguard Worker
page_align(uintptr_t addr)65*8d67ca89SAndroid Build Coastguard Worker static void* page_align(uintptr_t addr) {
66*8d67ca89SAndroid Build Coastguard Worker uintptr_t mask = sysconf(_SC_PAGE_SIZE) - 1;
67*8d67ca89SAndroid Build Coastguard Worker return reinterpret_cast<void*>((addr + mask) & ~mask);
68*8d67ca89SAndroid Build Coastguard Worker }
69*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,brk)70*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, brk) {
71*8d67ca89SAndroid Build Coastguard Worker void* initial_break = get_brk();
72*8d67ca89SAndroid Build Coastguard Worker
73*8d67ca89SAndroid Build Coastguard Worker void* new_break = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(initial_break) + 1);
74*8d67ca89SAndroid Build Coastguard Worker int ret = brk(new_break);
75*8d67ca89SAndroid Build Coastguard Worker if (ret == -1) {
76*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(ENOMEM);
77*8d67ca89SAndroid Build Coastguard Worker } else {
78*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, ret);
79*8d67ca89SAndroid Build Coastguard Worker ASSERT_GE(get_brk(), new_break);
80*8d67ca89SAndroid Build Coastguard Worker }
81*8d67ca89SAndroid Build Coastguard Worker
82*8d67ca89SAndroid Build Coastguard Worker // Expand by a full page to force the mapping to expand
83*8d67ca89SAndroid Build Coastguard Worker new_break = page_align(reinterpret_cast<uintptr_t>(initial_break) + sysconf(_SC_PAGE_SIZE));
84*8d67ca89SAndroid Build Coastguard Worker ret = brk(new_break);
85*8d67ca89SAndroid Build Coastguard Worker if (ret == -1) {
86*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(ENOMEM);
87*8d67ca89SAndroid Build Coastguard Worker } else {
88*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, ret);
89*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(get_brk(), new_break);
90*8d67ca89SAndroid Build Coastguard Worker }
91*8d67ca89SAndroid Build Coastguard Worker }
92*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,brk_ENOMEM)93*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, brk_ENOMEM) {
94*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, brk(reinterpret_cast<void*>(-1)));
95*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(ENOMEM);
96*8d67ca89SAndroid Build Coastguard Worker }
97*8d67ca89SAndroid Build Coastguard Worker
98*8d67ca89SAndroid Build Coastguard Worker #if defined(__GLIBC__)
99*8d67ca89SAndroid Build Coastguard Worker #define SBRK_MIN INTPTR_MIN
100*8d67ca89SAndroid Build Coastguard Worker #define SBRK_MAX INTPTR_MAX
101*8d67ca89SAndroid Build Coastguard Worker #else
102*8d67ca89SAndroid Build Coastguard Worker #define SBRK_MIN PTRDIFF_MIN
103*8d67ca89SAndroid Build Coastguard Worker #define SBRK_MAX PTRDIFF_MAX
104*8d67ca89SAndroid Build Coastguard Worker #endif
105*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,sbrk_ENOMEM)106*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, sbrk_ENOMEM) {
107*8d67ca89SAndroid Build Coastguard Worker #if defined(__BIONIC__) && !defined(__LP64__)
108*8d67ca89SAndroid Build Coastguard Worker // There is no way to guarantee that all overflow conditions can be tested
109*8d67ca89SAndroid Build Coastguard Worker // without manipulating the underlying values of the current break.
110*8d67ca89SAndroid Build Coastguard Worker extern void* __bionic_brk;
111*8d67ca89SAndroid Build Coastguard Worker
112*8d67ca89SAndroid Build Coastguard Worker class ScopedBrk {
113*8d67ca89SAndroid Build Coastguard Worker public:
114*8d67ca89SAndroid Build Coastguard Worker ScopedBrk() : saved_brk_(__bionic_brk) {}
115*8d67ca89SAndroid Build Coastguard Worker virtual ~ScopedBrk() { __bionic_brk = saved_brk_; }
116*8d67ca89SAndroid Build Coastguard Worker
117*8d67ca89SAndroid Build Coastguard Worker private:
118*8d67ca89SAndroid Build Coastguard Worker void* saved_brk_;
119*8d67ca89SAndroid Build Coastguard Worker };
120*8d67ca89SAndroid Build Coastguard Worker
121*8d67ca89SAndroid Build Coastguard Worker ScopedBrk scope_brk;
122*8d67ca89SAndroid Build Coastguard Worker
123*8d67ca89SAndroid Build Coastguard Worker // Set the current break to a point that will cause an overflow.
124*8d67ca89SAndroid Build Coastguard Worker __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) + 2);
125*8d67ca89SAndroid Build Coastguard Worker
126*8d67ca89SAndroid Build Coastguard Worker // Can't increase by so much that we'd overflow.
127*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MAX));
128*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(ENOMEM);
129*8d67ca89SAndroid Build Coastguard Worker
130*8d67ca89SAndroid Build Coastguard Worker // Set the current break to a point that will cause an overflow.
131*8d67ca89SAndroid Build Coastguard Worker __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX));
132*8d67ca89SAndroid Build Coastguard Worker
133*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN));
134*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(ENOMEM);
135*8d67ca89SAndroid Build Coastguard Worker
136*8d67ca89SAndroid Build Coastguard Worker __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) - 1);
137*8d67ca89SAndroid Build Coastguard Worker
138*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN + 1));
139*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(ENOMEM);
140*8d67ca89SAndroid Build Coastguard Worker #else
141*8d67ca89SAndroid Build Coastguard Worker class ScopedBrk {
142*8d67ca89SAndroid Build Coastguard Worker public:
143*8d67ca89SAndroid Build Coastguard Worker ScopedBrk() : saved_brk_(get_brk()) {}
144*8d67ca89SAndroid Build Coastguard Worker virtual ~ScopedBrk() { brk(saved_brk_); }
145*8d67ca89SAndroid Build Coastguard Worker
146*8d67ca89SAndroid Build Coastguard Worker private:
147*8d67ca89SAndroid Build Coastguard Worker void* saved_brk_;
148*8d67ca89SAndroid Build Coastguard Worker };
149*8d67ca89SAndroid Build Coastguard Worker
150*8d67ca89SAndroid Build Coastguard Worker ScopedBrk scope_brk;
151*8d67ca89SAndroid Build Coastguard Worker
152*8d67ca89SAndroid Build Coastguard Worker uintptr_t cur_brk = reinterpret_cast<uintptr_t>(get_brk());
153*8d67ca89SAndroid Build Coastguard Worker if (cur_brk < static_cast<uintptr_t>(-(SBRK_MIN+1))) {
154*8d67ca89SAndroid Build Coastguard Worker // Do the overflow test for a max negative increment.
155*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MIN));
156*8d67ca89SAndroid Build Coastguard Worker #if defined(__BIONIC__)
157*8d67ca89SAndroid Build Coastguard Worker // GLIBC does not set errno in overflow case.
158*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(ENOMEM);
159*8d67ca89SAndroid Build Coastguard Worker #endif
160*8d67ca89SAndroid Build Coastguard Worker }
161*8d67ca89SAndroid Build Coastguard Worker
162*8d67ca89SAndroid Build Coastguard Worker uintptr_t overflow_brk = static_cast<uintptr_t>(SBRK_MAX) + 2;
163*8d67ca89SAndroid Build Coastguard Worker if (cur_brk < overflow_brk) {
164*8d67ca89SAndroid Build Coastguard Worker // Try and move the value to PTRDIFF_MAX + 2.
165*8d67ca89SAndroid Build Coastguard Worker cur_brk = reinterpret_cast<uintptr_t>(sbrk(overflow_brk));
166*8d67ca89SAndroid Build Coastguard Worker }
167*8d67ca89SAndroid Build Coastguard Worker if (cur_brk >= overflow_brk) {
168*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MAX));
169*8d67ca89SAndroid Build Coastguard Worker #if defined(__BIONIC__)
170*8d67ca89SAndroid Build Coastguard Worker // GLIBC does not set errno in overflow case.
171*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(ENOMEM);
172*8d67ca89SAndroid Build Coastguard Worker #endif
173*8d67ca89SAndroid Build Coastguard Worker }
174*8d67ca89SAndroid Build Coastguard Worker #endif
175*8d67ca89SAndroid Build Coastguard Worker }
176*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,truncate)177*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, truncate) {
178*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf;
179*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, close(tf.fd));
180*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, truncate(tf.path, 123));
181*8d67ca89SAndroid Build Coastguard Worker
182*8d67ca89SAndroid Build Coastguard Worker struct stat sb;
183*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, stat(tf.path, &sb));
184*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(123, sb.st_size);
185*8d67ca89SAndroid Build Coastguard Worker }
186*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,truncate64_smoke)187*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, truncate64_smoke) {
188*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf;
189*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, close(tf.fd));
190*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, truncate64(tf.path, 123));
191*8d67ca89SAndroid Build Coastguard Worker
192*8d67ca89SAndroid Build Coastguard Worker struct stat sb;
193*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, stat(tf.path, &sb));
194*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(123, sb.st_size);
195*8d67ca89SAndroid Build Coastguard Worker }
196*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,ftruncate)197*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, ftruncate) {
198*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf;
199*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, ftruncate(tf.fd, 123));
200*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, close(tf.fd));
201*8d67ca89SAndroid Build Coastguard Worker
202*8d67ca89SAndroid Build Coastguard Worker struct stat sb;
203*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, stat(tf.path, &sb));
204*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(123, sb.st_size);
205*8d67ca89SAndroid Build Coastguard Worker }
206*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,ftruncate64_smoke)207*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, ftruncate64_smoke) {
208*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf;
209*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, ftruncate64(tf.fd, 123));
210*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, close(tf.fd));
211*8d67ca89SAndroid Build Coastguard Worker
212*8d67ca89SAndroid Build Coastguard Worker struct stat sb;
213*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, stat(tf.path, &sb));
214*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(123, sb.st_size);
215*8d67ca89SAndroid Build Coastguard Worker }
216*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,ftruncate_negative)217*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, ftruncate_negative) {
218*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf;
219*8d67ca89SAndroid Build Coastguard Worker errno = 0;
220*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, ftruncate(tf.fd, -123));
221*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EINVAL);
222*8d67ca89SAndroid Build Coastguard Worker }
223*8d67ca89SAndroid Build Coastguard Worker
224*8d67ca89SAndroid Build Coastguard Worker static bool g_pause_test_flag = false;
PauseTestSignalHandler(int)225*8d67ca89SAndroid Build Coastguard Worker static void PauseTestSignalHandler(int) {
226*8d67ca89SAndroid Build Coastguard Worker g_pause_test_flag = true;
227*8d67ca89SAndroid Build Coastguard Worker }
228*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,pause)229*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, pause) {
230*8d67ca89SAndroid Build Coastguard Worker ScopedSignalHandler handler(SIGALRM, PauseTestSignalHandler);
231*8d67ca89SAndroid Build Coastguard Worker
232*8d67ca89SAndroid Build Coastguard Worker alarm(1);
233*8d67ca89SAndroid Build Coastguard Worker ASSERT_FALSE(g_pause_test_flag);
234*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, pause());
235*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(g_pause_test_flag);
236*8d67ca89SAndroid Build Coastguard Worker }
237*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,read)238*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, read) {
239*8d67ca89SAndroid Build Coastguard Worker int fd = open("/proc/version", O_RDONLY);
240*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(fd != -1);
241*8d67ca89SAndroid Build Coastguard Worker
242*8d67ca89SAndroid Build Coastguard Worker char buf[5];
243*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(5, read(fd, buf, 5));
244*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(buf[0], 'L');
245*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(buf[1], 'i');
246*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(buf[2], 'n');
247*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(buf[3], 'u');
248*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(buf[4], 'x');
249*8d67ca89SAndroid Build Coastguard Worker close(fd);
250*8d67ca89SAndroid Build Coastguard Worker }
251*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,read_EBADF)252*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, read_EBADF) {
253*8d67ca89SAndroid Build Coastguard Worker // read returns ssize_t which is 64-bits on LP64, so it's worth explicitly checking that
254*8d67ca89SAndroid Build Coastguard Worker // our syscall stubs correctly return a 64-bit -1.
255*8d67ca89SAndroid Build Coastguard Worker char buf[1];
256*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, read(-1, buf, sizeof(buf)));
257*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EBADF);
258*8d67ca89SAndroid Build Coastguard Worker }
259*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,syscall_long)260*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, syscall_long) {
261*8d67ca89SAndroid Build Coastguard Worker // Check that syscall(3) correctly returns long results.
262*8d67ca89SAndroid Build Coastguard Worker // https://code.google.com/p/android/issues/detail?id=73952
263*8d67ca89SAndroid Build Coastguard Worker // We assume that the break is > 4GiB, but this is potentially flaky.
264*8d67ca89SAndroid Build Coastguard Worker uintptr_t p = reinterpret_cast<uintptr_t>(sbrk(0));
265*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(p, static_cast<uintptr_t>(syscall(__NR_brk, 0)));
266*8d67ca89SAndroid Build Coastguard Worker }
267*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,alarm)268*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, alarm) {
269*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0U, alarm(0));
270*8d67ca89SAndroid Build Coastguard Worker }
271*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,_exit)272*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, _exit) {
273*8d67ca89SAndroid Build Coastguard Worker pid_t pid = fork();
274*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(-1, pid) << strerror(errno);
275*8d67ca89SAndroid Build Coastguard Worker
276*8d67ca89SAndroid Build Coastguard Worker if (pid == 0) {
277*8d67ca89SAndroid Build Coastguard Worker _exit(99);
278*8d67ca89SAndroid Build Coastguard Worker }
279*8d67ca89SAndroid Build Coastguard Worker
280*8d67ca89SAndroid Build Coastguard Worker AssertChildExited(pid, 99);
281*8d67ca89SAndroid Build Coastguard Worker }
282*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,getenv_unsetenv)283*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, getenv_unsetenv) {
284*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, setenv("test-variable", "hello", 1));
285*8d67ca89SAndroid Build Coastguard Worker ASSERT_STREQ("hello", getenv("test-variable"));
286*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, unsetenv("test-variable"));
287*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(getenv("test-variable") == nullptr);
288*8d67ca89SAndroid Build Coastguard Worker }
289*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,unsetenv_EINVAL)290*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, unsetenv_EINVAL) {
291*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, unsetenv(""));
292*8d67ca89SAndroid Build Coastguard Worker EXPECT_ERRNO(EINVAL);
293*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, unsetenv("a=b"));
294*8d67ca89SAndroid Build Coastguard Worker EXPECT_ERRNO(EINVAL);
295*8d67ca89SAndroid Build Coastguard Worker }
296*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,setenv_EINVAL)297*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, setenv_EINVAL) {
298*8d67ca89SAndroid Build Coastguard Worker #pragma clang diagnostic push
299*8d67ca89SAndroid Build Coastguard Worker #pragma clang diagnostic ignored "-Wnonnull"
300*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, setenv(nullptr, "value", 0));
301*8d67ca89SAndroid Build Coastguard Worker EXPECT_ERRNO(EINVAL);
302*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, setenv(nullptr, "value", 1));
303*8d67ca89SAndroid Build Coastguard Worker EXPECT_ERRNO(EINVAL);
304*8d67ca89SAndroid Build Coastguard Worker #pragma clang diagnostic pop
305*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, setenv("", "value", 0));
306*8d67ca89SAndroid Build Coastguard Worker EXPECT_ERRNO(EINVAL);
307*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, setenv("", "value", 1));
308*8d67ca89SAndroid Build Coastguard Worker EXPECT_ERRNO(EINVAL);
309*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, setenv("a=b", "value", 0));
310*8d67ca89SAndroid Build Coastguard Worker EXPECT_ERRNO(EINVAL);
311*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, setenv("a=b", "value", 1));
312*8d67ca89SAndroid Build Coastguard Worker EXPECT_ERRNO(EINVAL);
313*8d67ca89SAndroid Build Coastguard Worker }
314*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,setenv)315*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, setenv) {
316*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, unsetenv("test-variable"));
317*8d67ca89SAndroid Build Coastguard Worker
318*8d67ca89SAndroid Build Coastguard Worker char a[] = "a";
319*8d67ca89SAndroid Build Coastguard Worker char b[] = "b";
320*8d67ca89SAndroid Build Coastguard Worker char c[] = "c";
321*8d67ca89SAndroid Build Coastguard Worker
322*8d67ca89SAndroid Build Coastguard Worker // New value.
323*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(0, setenv("test-variable", a, 0));
324*8d67ca89SAndroid Build Coastguard Worker EXPECT_STREQ(a, getenv("test-variable"));
325*8d67ca89SAndroid Build Coastguard Worker
326*8d67ca89SAndroid Build Coastguard Worker // Existing value, no overwrite.
327*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(0, setenv("test-variable", b, 0));
328*8d67ca89SAndroid Build Coastguard Worker EXPECT_STREQ(a, getenv("test-variable"));
329*8d67ca89SAndroid Build Coastguard Worker
330*8d67ca89SAndroid Build Coastguard Worker // Existing value, overwrite.
331*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(0, setenv("test-variable", c, 1));
332*8d67ca89SAndroid Build Coastguard Worker EXPECT_STREQ(c, getenv("test-variable"));
333*8d67ca89SAndroid Build Coastguard Worker // But the arrays backing the values are unchanged.
334*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ('a', a[0]);
335*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ('b', b[0]);
336*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ('c', c[0]);
337*8d67ca89SAndroid Build Coastguard Worker
338*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, unsetenv("test-variable"));
339*8d67ca89SAndroid Build Coastguard Worker }
340*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,putenv)341*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, putenv) {
342*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, unsetenv("a"));
343*8d67ca89SAndroid Build Coastguard Worker
344*8d67ca89SAndroid Build Coastguard Worker char* s1 = strdup("a=b");
345*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, putenv(s1));
346*8d67ca89SAndroid Build Coastguard Worker
347*8d67ca89SAndroid Build Coastguard Worker ASSERT_STREQ("b", getenv("a"));
348*8d67ca89SAndroid Build Coastguard Worker s1[2] = 'c';
349*8d67ca89SAndroid Build Coastguard Worker ASSERT_STREQ("c", getenv("a"));
350*8d67ca89SAndroid Build Coastguard Worker
351*8d67ca89SAndroid Build Coastguard Worker char* s2 = strdup("a=b");
352*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, putenv(s2));
353*8d67ca89SAndroid Build Coastguard Worker
354*8d67ca89SAndroid Build Coastguard Worker ASSERT_STREQ("b", getenv("a"));
355*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ('c', s1[2]);
356*8d67ca89SAndroid Build Coastguard Worker
357*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, unsetenv("a"));
358*8d67ca89SAndroid Build Coastguard Worker free(s1);
359*8d67ca89SAndroid Build Coastguard Worker free(s2);
360*8d67ca89SAndroid Build Coastguard Worker }
361*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,clearenv)362*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, clearenv) {
363*8d67ca89SAndroid Build Coastguard Worker extern char** environ;
364*8d67ca89SAndroid Build Coastguard Worker
365*8d67ca89SAndroid Build Coastguard Worker // Guarantee that environ is not initially empty...
366*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, setenv("test-variable", "a", 1));
367*8d67ca89SAndroid Build Coastguard Worker
368*8d67ca89SAndroid Build Coastguard Worker // Stash a copy.
369*8d67ca89SAndroid Build Coastguard Worker std::vector<char*> old_environ;
370*8d67ca89SAndroid Build Coastguard Worker for (size_t i = 0; environ[i] != nullptr; ++i) {
371*8d67ca89SAndroid Build Coastguard Worker old_environ.push_back(strdup(environ[i]));
372*8d67ca89SAndroid Build Coastguard Worker }
373*8d67ca89SAndroid Build Coastguard Worker
374*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, clearenv());
375*8d67ca89SAndroid Build Coastguard Worker
376*8d67ca89SAndroid Build Coastguard Worker EXPECT_TRUE(environ == nullptr || environ[0] == nullptr);
377*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(nullptr, getenv("test-variable"));
378*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(0, setenv("test-variable", "post-clear", 1));
379*8d67ca89SAndroid Build Coastguard Worker EXPECT_STREQ("post-clear", getenv("test-variable"));
380*8d67ca89SAndroid Build Coastguard Worker
381*8d67ca89SAndroid Build Coastguard Worker // Put the old environment back.
382*8d67ca89SAndroid Build Coastguard Worker for (size_t i = 0; i < old_environ.size(); ++i) {
383*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(0, putenv(old_environ[i]));
384*8d67ca89SAndroid Build Coastguard Worker }
385*8d67ca89SAndroid Build Coastguard Worker
386*8d67ca89SAndroid Build Coastguard Worker // Check it wasn't overwritten.
387*8d67ca89SAndroid Build Coastguard Worker EXPECT_STREQ("a", getenv("test-variable"));
388*8d67ca89SAndroid Build Coastguard Worker
389*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(0, unsetenv("test-variable"));
390*8d67ca89SAndroid Build Coastguard Worker }
391*8d67ca89SAndroid Build Coastguard Worker
TestSyncFunction(int (* fn)(int))392*8d67ca89SAndroid Build Coastguard Worker static void TestSyncFunction(int (*fn)(int)) {
393*8d67ca89SAndroid Build Coastguard Worker int fd;
394*8d67ca89SAndroid Build Coastguard Worker
395*8d67ca89SAndroid Build Coastguard Worker // Can't sync an invalid fd.
396*8d67ca89SAndroid Build Coastguard Worker errno = 0;
397*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, fn(-1));
398*8d67ca89SAndroid Build Coastguard Worker EXPECT_ERRNO(EBADF);
399*8d67ca89SAndroid Build Coastguard Worker
400*8d67ca89SAndroid Build Coastguard Worker // It doesn't matter whether you've opened a file for write or not.
401*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf;
402*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(-1, tf.fd);
403*8d67ca89SAndroid Build Coastguard Worker
404*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(0, fn(tf.fd));
405*8d67ca89SAndroid Build Coastguard Worker
406*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(-1, fd = open(tf.path, O_RDONLY));
407*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(0, fn(fd));
408*8d67ca89SAndroid Build Coastguard Worker close(fd);
409*8d67ca89SAndroid Build Coastguard Worker
410*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(-1, fd = open(tf.path, O_RDWR));
411*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(0, fn(fd));
412*8d67ca89SAndroid Build Coastguard Worker close(fd);
413*8d67ca89SAndroid Build Coastguard Worker
414*8d67ca89SAndroid Build Coastguard Worker // The fd can even be a directory.
415*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(-1, fd = open("/data/local/tmp", O_RDONLY));
416*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(0, fn(fd));
417*8d67ca89SAndroid Build Coastguard Worker close(fd);
418*8d67ca89SAndroid Build Coastguard Worker }
419*8d67ca89SAndroid Build Coastguard Worker
TestFsyncFunction(int (* fn)(int))420*8d67ca89SAndroid Build Coastguard Worker static void TestFsyncFunction(int (*fn)(int)) {
421*8d67ca89SAndroid Build Coastguard Worker TestSyncFunction(fn);
422*8d67ca89SAndroid Build Coastguard Worker
423*8d67ca89SAndroid Build Coastguard Worker // But some file systems are fussy about fsync/fdatasync...
424*8d67ca89SAndroid Build Coastguard Worker errno = 0;
425*8d67ca89SAndroid Build Coastguard Worker int fd = open("/proc/version", O_RDONLY);
426*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(-1, fd);
427*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, fn(fd));
428*8d67ca89SAndroid Build Coastguard Worker EXPECT_ERRNO(EINVAL);
429*8d67ca89SAndroid Build Coastguard Worker close(fd);
430*8d67ca89SAndroid Build Coastguard Worker }
431*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,fdatasync)432*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, fdatasync) {
433*8d67ca89SAndroid Build Coastguard Worker TestFsyncFunction(fdatasync);
434*8d67ca89SAndroid Build Coastguard Worker }
435*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,fsync)436*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, fsync) {
437*8d67ca89SAndroid Build Coastguard Worker TestFsyncFunction(fsync);
438*8d67ca89SAndroid Build Coastguard Worker }
439*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,syncfs)440*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, syncfs) {
441*8d67ca89SAndroid Build Coastguard Worker TestSyncFunction(syncfs);
442*8d67ca89SAndroid Build Coastguard Worker }
443*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,_Fork)444*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, _Fork) {
445*8d67ca89SAndroid Build Coastguard Worker #if defined(__BIONIC__)
446*8d67ca89SAndroid Build Coastguard Worker pid_t rc = _Fork();
447*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(-1, rc);
448*8d67ca89SAndroid Build Coastguard Worker if (rc == 0) {
449*8d67ca89SAndroid Build Coastguard Worker _exit(66);
450*8d67ca89SAndroid Build Coastguard Worker }
451*8d67ca89SAndroid Build Coastguard Worker
452*8d67ca89SAndroid Build Coastguard Worker int status;
453*8d67ca89SAndroid Build Coastguard Worker pid_t wait_result = waitpid(rc, &status, 0);
454*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(wait_result, rc);
455*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(WIFEXITED(status));
456*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(66, WEXITSTATUS(status));
457*8d67ca89SAndroid Build Coastguard Worker #endif
458*8d67ca89SAndroid Build Coastguard Worker }
459*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,vfork)460*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, vfork) {
461*8d67ca89SAndroid Build Coastguard Worker #if defined(__BIONIC__)
462*8d67ca89SAndroid Build Coastguard Worker pthread_internal_t* self = __get_thread();
463*8d67ca89SAndroid Build Coastguard Worker
464*8d67ca89SAndroid Build Coastguard Worker pid_t cached_pid;
465*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(self->get_cached_pid(&cached_pid));
466*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(syscall(__NR_getpid), cached_pid);
467*8d67ca89SAndroid Build Coastguard Worker ASSERT_FALSE(self->is_vforked());
468*8d67ca89SAndroid Build Coastguard Worker
469*8d67ca89SAndroid Build Coastguard Worker pid_t rc = vfork();
470*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(-1, rc);
471*8d67ca89SAndroid Build Coastguard Worker if (rc == 0) {
472*8d67ca89SAndroid Build Coastguard Worker if (self->get_cached_pid(&cached_pid)) {
473*8d67ca89SAndroid Build Coastguard Worker const char* error = "__get_thread()->cached_pid_ set after vfork\n";
474*8d67ca89SAndroid Build Coastguard Worker write(STDERR_FILENO, error, strlen(error));
475*8d67ca89SAndroid Build Coastguard Worker _exit(1);
476*8d67ca89SAndroid Build Coastguard Worker }
477*8d67ca89SAndroid Build Coastguard Worker
478*8d67ca89SAndroid Build Coastguard Worker if (!self->is_vforked()) {
479*8d67ca89SAndroid Build Coastguard Worker const char* error = "__get_thread()->vforked_ not set after vfork\n";
480*8d67ca89SAndroid Build Coastguard Worker write(STDERR_FILENO, error, strlen(error));
481*8d67ca89SAndroid Build Coastguard Worker _exit(1);
482*8d67ca89SAndroid Build Coastguard Worker }
483*8d67ca89SAndroid Build Coastguard Worker
484*8d67ca89SAndroid Build Coastguard Worker _exit(0);
485*8d67ca89SAndroid Build Coastguard Worker } else {
486*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(self->get_cached_pid(&cached_pid));
487*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(syscall(__NR_getpid), cached_pid);
488*8d67ca89SAndroid Build Coastguard Worker ASSERT_FALSE(self->is_vforked());
489*8d67ca89SAndroid Build Coastguard Worker
490*8d67ca89SAndroid Build Coastguard Worker int status;
491*8d67ca89SAndroid Build Coastguard Worker pid_t wait_result = waitpid(rc, &status, 0);
492*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(wait_result, rc);
493*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(WIFEXITED(status));
494*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, WEXITSTATUS(status));
495*8d67ca89SAndroid Build Coastguard Worker }
496*8d67ca89SAndroid Build Coastguard Worker #endif
497*8d67ca89SAndroid Build Coastguard Worker }
498*8d67ca89SAndroid Build Coastguard Worker
AssertGetPidCorrect()499*8d67ca89SAndroid Build Coastguard Worker static void AssertGetPidCorrect() {
500*8d67ca89SAndroid Build Coastguard Worker // The loop is just to make manual testing/debugging with strace easier.
501*8d67ca89SAndroid Build Coastguard Worker pid_t getpid_syscall_result = syscall(__NR_getpid);
502*8d67ca89SAndroid Build Coastguard Worker for (size_t i = 0; i < 128; ++i) {
503*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(getpid_syscall_result, getpid());
504*8d67ca89SAndroid Build Coastguard Worker }
505*8d67ca89SAndroid Build Coastguard Worker }
506*8d67ca89SAndroid Build Coastguard Worker
TestGetPidCachingWithFork(int (* fork_fn)(),void (* exit_fn)(int))507*8d67ca89SAndroid Build Coastguard Worker static void TestGetPidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) {
508*8d67ca89SAndroid Build Coastguard Worker pid_t parent_pid = getpid();
509*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(syscall(__NR_getpid), parent_pid);
510*8d67ca89SAndroid Build Coastguard Worker
511*8d67ca89SAndroid Build Coastguard Worker pid_t fork_result = fork_fn();
512*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(fork_result, -1);
513*8d67ca89SAndroid Build Coastguard Worker if (fork_result == 0) {
514*8d67ca89SAndroid Build Coastguard Worker // We're the child.
515*8d67ca89SAndroid Build Coastguard Worker ASSERT_NO_FATAL_FAILURE(AssertGetPidCorrect());
516*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(parent_pid, getppid());
517*8d67ca89SAndroid Build Coastguard Worker exit_fn(123);
518*8d67ca89SAndroid Build Coastguard Worker } else {
519*8d67ca89SAndroid Build Coastguard Worker // We're the parent.
520*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(parent_pid, getpid());
521*8d67ca89SAndroid Build Coastguard Worker AssertChildExited(fork_result, 123);
522*8d67ca89SAndroid Build Coastguard Worker }
523*8d67ca89SAndroid Build Coastguard Worker }
524*8d67ca89SAndroid Build Coastguard Worker
525*8d67ca89SAndroid Build Coastguard Worker // gettid() is marked as __attribute_const__, which will have the compiler
526*8d67ca89SAndroid Build Coastguard Worker // optimize out multiple calls to gettid in the same function. This wrapper
527*8d67ca89SAndroid Build Coastguard Worker // defeats that optimization.
GetTidForTest()528*8d67ca89SAndroid Build Coastguard Worker static __attribute__((__noinline__)) pid_t GetTidForTest() {
529*8d67ca89SAndroid Build Coastguard Worker __asm__("");
530*8d67ca89SAndroid Build Coastguard Worker return gettid();
531*8d67ca89SAndroid Build Coastguard Worker }
532*8d67ca89SAndroid Build Coastguard Worker
AssertGetTidCorrect()533*8d67ca89SAndroid Build Coastguard Worker static void AssertGetTidCorrect() {
534*8d67ca89SAndroid Build Coastguard Worker // The loop is just to make manual testing/debugging with strace easier.
535*8d67ca89SAndroid Build Coastguard Worker pid_t gettid_syscall_result = syscall(__NR_gettid);
536*8d67ca89SAndroid Build Coastguard Worker for (size_t i = 0; i < 128; ++i) {
537*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(gettid_syscall_result, GetTidForTest());
538*8d67ca89SAndroid Build Coastguard Worker }
539*8d67ca89SAndroid Build Coastguard Worker }
540*8d67ca89SAndroid Build Coastguard Worker
TestGetTidCachingWithFork(int (* fork_fn)(),void (* exit_fn)(int))541*8d67ca89SAndroid Build Coastguard Worker static void TestGetTidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) {
542*8d67ca89SAndroid Build Coastguard Worker pid_t parent_tid = GetTidForTest();
543*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(syscall(__NR_gettid), parent_tid);
544*8d67ca89SAndroid Build Coastguard Worker
545*8d67ca89SAndroid Build Coastguard Worker pid_t fork_result = fork_fn();
546*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(fork_result, -1);
547*8d67ca89SAndroid Build Coastguard Worker if (fork_result == 0) {
548*8d67ca89SAndroid Build Coastguard Worker // We're the child.
549*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(syscall(__NR_getpid), syscall(__NR_gettid));
550*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(getpid(), GetTidForTest()) << "real tid is " << syscall(__NR_gettid)
551*8d67ca89SAndroid Build Coastguard Worker << ", pid is " << syscall(__NR_getpid);
552*8d67ca89SAndroid Build Coastguard Worker ASSERT_NO_FATAL_FAILURE(AssertGetTidCorrect());
553*8d67ca89SAndroid Build Coastguard Worker exit_fn(123);
554*8d67ca89SAndroid Build Coastguard Worker } else {
555*8d67ca89SAndroid Build Coastguard Worker // We're the parent.
556*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(parent_tid, GetTidForTest());
557*8d67ca89SAndroid Build Coastguard Worker AssertChildExited(fork_result, 123);
558*8d67ca89SAndroid Build Coastguard Worker }
559*8d67ca89SAndroid Build Coastguard Worker }
560*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,getpid_caching_and_fork)561*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, getpid_caching_and_fork) {
562*8d67ca89SAndroid Build Coastguard Worker TestGetPidCachingWithFork(fork, exit);
563*8d67ca89SAndroid Build Coastguard Worker }
564*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,gettid_caching_and_fork)565*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, gettid_caching_and_fork) {
566*8d67ca89SAndroid Build Coastguard Worker TestGetTidCachingWithFork(fork, exit);
567*8d67ca89SAndroid Build Coastguard Worker }
568*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,getpid_caching_and_vfork)569*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, getpid_caching_and_vfork) {
570*8d67ca89SAndroid Build Coastguard Worker TestGetPidCachingWithFork(vfork, _exit);
571*8d67ca89SAndroid Build Coastguard Worker }
572*8d67ca89SAndroid Build Coastguard Worker
CloneLikeFork()573*8d67ca89SAndroid Build Coastguard Worker static int CloneLikeFork() {
574*8d67ca89SAndroid Build Coastguard Worker return clone(nullptr, nullptr, SIGCHLD, nullptr);
575*8d67ca89SAndroid Build Coastguard Worker }
576*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,getpid_caching_and_clone_process)577*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, getpid_caching_and_clone_process) {
578*8d67ca89SAndroid Build Coastguard Worker TestGetPidCachingWithFork(CloneLikeFork, exit);
579*8d67ca89SAndroid Build Coastguard Worker }
580*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,gettid_caching_and_clone_process)581*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, gettid_caching_and_clone_process) {
582*8d67ca89SAndroid Build Coastguard Worker TestGetTidCachingWithFork(CloneLikeFork, exit);
583*8d67ca89SAndroid Build Coastguard Worker }
584*8d67ca89SAndroid Build Coastguard Worker
CloneAndSetTid()585*8d67ca89SAndroid Build Coastguard Worker static int CloneAndSetTid() {
586*8d67ca89SAndroid Build Coastguard Worker pid_t child_tid = 0;
587*8d67ca89SAndroid Build Coastguard Worker pid_t parent_tid = GetTidForTest();
588*8d67ca89SAndroid Build Coastguard Worker
589*8d67ca89SAndroid Build Coastguard Worker int rv = clone(nullptr, nullptr, CLONE_CHILD_SETTID | SIGCHLD, nullptr, nullptr, nullptr, &child_tid);
590*8d67ca89SAndroid Build Coastguard Worker EXPECT_NE(-1, rv);
591*8d67ca89SAndroid Build Coastguard Worker
592*8d67ca89SAndroid Build Coastguard Worker if (rv == 0) {
593*8d67ca89SAndroid Build Coastguard Worker // Child.
594*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(child_tid, GetTidForTest());
595*8d67ca89SAndroid Build Coastguard Worker EXPECT_NE(child_tid, parent_tid);
596*8d67ca89SAndroid Build Coastguard Worker } else {
597*8d67ca89SAndroid Build Coastguard Worker EXPECT_NE(child_tid, GetTidForTest());
598*8d67ca89SAndroid Build Coastguard Worker EXPECT_NE(child_tid, parent_tid);
599*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(GetTidForTest(), parent_tid);
600*8d67ca89SAndroid Build Coastguard Worker }
601*8d67ca89SAndroid Build Coastguard Worker
602*8d67ca89SAndroid Build Coastguard Worker return rv;
603*8d67ca89SAndroid Build Coastguard Worker }
604*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,gettid_caching_and_clone_process_settid)605*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, gettid_caching_and_clone_process_settid) {
606*8d67ca89SAndroid Build Coastguard Worker TestGetTidCachingWithFork(CloneAndSetTid, exit);
607*8d67ca89SAndroid Build Coastguard Worker }
608*8d67ca89SAndroid Build Coastguard Worker
609*8d67ca89SAndroid Build Coastguard Worker __attribute__((no_sanitize("hwaddress", "memtag")))
CloneStartRoutine(int (* start_routine)(void *))610*8d67ca89SAndroid Build Coastguard Worker static int CloneStartRoutine(int (*start_routine)(void*)) {
611*8d67ca89SAndroid Build Coastguard Worker void* child_stack[1024];
612*8d67ca89SAndroid Build Coastguard Worker return clone(start_routine, &child_stack[1024], SIGCHLD, nullptr);
613*8d67ca89SAndroid Build Coastguard Worker }
614*8d67ca89SAndroid Build Coastguard Worker
GetPidCachingCloneStartRoutine(void *)615*8d67ca89SAndroid Build Coastguard Worker static int GetPidCachingCloneStartRoutine(void*) {
616*8d67ca89SAndroid Build Coastguard Worker AssertGetPidCorrect();
617*8d67ca89SAndroid Build Coastguard Worker return 123;
618*8d67ca89SAndroid Build Coastguard Worker }
619*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,getpid_caching_and_clone)620*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, getpid_caching_and_clone) {
621*8d67ca89SAndroid Build Coastguard Worker pid_t parent_pid = getpid();
622*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(syscall(__NR_getpid), parent_pid);
623*8d67ca89SAndroid Build Coastguard Worker
624*8d67ca89SAndroid Build Coastguard Worker int clone_result = CloneStartRoutine(GetPidCachingCloneStartRoutine);
625*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(clone_result, -1);
626*8d67ca89SAndroid Build Coastguard Worker
627*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(parent_pid, getpid());
628*8d67ca89SAndroid Build Coastguard Worker
629*8d67ca89SAndroid Build Coastguard Worker AssertChildExited(clone_result, 123);
630*8d67ca89SAndroid Build Coastguard Worker }
631*8d67ca89SAndroid Build Coastguard Worker
GetTidCachingCloneStartRoutine(void *)632*8d67ca89SAndroid Build Coastguard Worker static int GetTidCachingCloneStartRoutine(void*) {
633*8d67ca89SAndroid Build Coastguard Worker AssertGetTidCorrect();
634*8d67ca89SAndroid Build Coastguard Worker return 123;
635*8d67ca89SAndroid Build Coastguard Worker }
636*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,gettid_caching_and_clone)637*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, gettid_caching_and_clone) {
638*8d67ca89SAndroid Build Coastguard Worker pid_t parent_tid = GetTidForTest();
639*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(syscall(__NR_gettid), parent_tid);
640*8d67ca89SAndroid Build Coastguard Worker
641*8d67ca89SAndroid Build Coastguard Worker int clone_result = CloneStartRoutine(GetTidCachingCloneStartRoutine);
642*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(clone_result, -1);
643*8d67ca89SAndroid Build Coastguard Worker
644*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(parent_tid, GetTidForTest());
645*8d67ca89SAndroid Build Coastguard Worker
646*8d67ca89SAndroid Build Coastguard Worker AssertChildExited(clone_result, 123);
647*8d67ca89SAndroid Build Coastguard Worker }
648*8d67ca89SAndroid Build Coastguard Worker
CloneChildExit(void *)649*8d67ca89SAndroid Build Coastguard Worker static int CloneChildExit(void*) {
650*8d67ca89SAndroid Build Coastguard Worker AssertGetPidCorrect();
651*8d67ca89SAndroid Build Coastguard Worker AssertGetTidCorrect();
652*8d67ca89SAndroid Build Coastguard Worker exit(33);
653*8d67ca89SAndroid Build Coastguard Worker }
654*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,clone_fn_and_exit)655*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, clone_fn_and_exit) {
656*8d67ca89SAndroid Build Coastguard Worker int clone_result = CloneStartRoutine(CloneChildExit);
657*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(-1, clone_result);
658*8d67ca89SAndroid Build Coastguard Worker
659*8d67ca89SAndroid Build Coastguard Worker AssertGetPidCorrect();
660*8d67ca89SAndroid Build Coastguard Worker AssertGetTidCorrect();
661*8d67ca89SAndroid Build Coastguard Worker
662*8d67ca89SAndroid Build Coastguard Worker AssertChildExited(clone_result, 33);
663*8d67ca89SAndroid Build Coastguard Worker }
664*8d67ca89SAndroid Build Coastguard Worker
GetPidCachingPthreadStartRoutine(void *)665*8d67ca89SAndroid Build Coastguard Worker static void* GetPidCachingPthreadStartRoutine(void*) {
666*8d67ca89SAndroid Build Coastguard Worker AssertGetPidCorrect();
667*8d67ca89SAndroid Build Coastguard Worker return nullptr;
668*8d67ca89SAndroid Build Coastguard Worker }
669*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,getpid_caching_and_pthread_create)670*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, getpid_caching_and_pthread_create) {
671*8d67ca89SAndroid Build Coastguard Worker pid_t parent_pid = getpid();
672*8d67ca89SAndroid Build Coastguard Worker
673*8d67ca89SAndroid Build Coastguard Worker pthread_t t;
674*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, pthread_create(&t, nullptr, GetPidCachingPthreadStartRoutine, nullptr));
675*8d67ca89SAndroid Build Coastguard Worker
676*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(parent_pid, getpid());
677*8d67ca89SAndroid Build Coastguard Worker
678*8d67ca89SAndroid Build Coastguard Worker void* result;
679*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, pthread_join(t, &result));
680*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(nullptr, result);
681*8d67ca89SAndroid Build Coastguard Worker }
682*8d67ca89SAndroid Build Coastguard Worker
GetTidCachingPthreadStartRoutine(void *)683*8d67ca89SAndroid Build Coastguard Worker static void* GetTidCachingPthreadStartRoutine(void*) {
684*8d67ca89SAndroid Build Coastguard Worker AssertGetTidCorrect();
685*8d67ca89SAndroid Build Coastguard Worker uint64_t tid = GetTidForTest();
686*8d67ca89SAndroid Build Coastguard Worker return reinterpret_cast<void*>(tid);
687*8d67ca89SAndroid Build Coastguard Worker }
688*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,gettid_caching_and_pthread_create)689*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, gettid_caching_and_pthread_create) {
690*8d67ca89SAndroid Build Coastguard Worker pid_t parent_tid = GetTidForTest();
691*8d67ca89SAndroid Build Coastguard Worker
692*8d67ca89SAndroid Build Coastguard Worker pthread_t t;
693*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, pthread_create(&t, nullptr, GetTidCachingPthreadStartRoutine, &parent_tid));
694*8d67ca89SAndroid Build Coastguard Worker
695*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(parent_tid, GetTidForTest());
696*8d67ca89SAndroid Build Coastguard Worker
697*8d67ca89SAndroid Build Coastguard Worker void* result;
698*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, pthread_join(t, &result));
699*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(static_cast<uint64_t>(parent_tid), reinterpret_cast<uint64_t>(result));
700*8d67ca89SAndroid Build Coastguard Worker }
701*8d67ca89SAndroid Build Coastguard Worker
HwasanVforkTestChild()702*8d67ca89SAndroid Build Coastguard Worker __attribute__((noinline)) static void HwasanVforkTestChild() {
703*8d67ca89SAndroid Build Coastguard Worker // Allocate a tagged region on stack and leave it there.
704*8d67ca89SAndroid Build Coastguard Worker char x[10000];
705*8d67ca89SAndroid Build Coastguard Worker DoNotOptimize(x);
706*8d67ca89SAndroid Build Coastguard Worker _exit(0);
707*8d67ca89SAndroid Build Coastguard Worker }
708*8d67ca89SAndroid Build Coastguard Worker
HwasanReadMemory(const char * p,size_t size)709*8d67ca89SAndroid Build Coastguard Worker __attribute__((noinline)) static void HwasanReadMemory(const char* p, size_t size) {
710*8d67ca89SAndroid Build Coastguard Worker // Read memory byte-by-byte. This will blow up if the pointer tag in p does not match any memory
711*8d67ca89SAndroid Build Coastguard Worker // tag in [p, p+size).
712*8d67ca89SAndroid Build Coastguard Worker char z;
713*8d67ca89SAndroid Build Coastguard Worker for (size_t i = 0; i < size; ++i) {
714*8d67ca89SAndroid Build Coastguard Worker DoNotOptimize(z = p[i]);
715*8d67ca89SAndroid Build Coastguard Worker }
716*8d67ca89SAndroid Build Coastguard Worker }
717*8d67ca89SAndroid Build Coastguard Worker
HwasanVforkTestParent()718*8d67ca89SAndroid Build Coastguard Worker __attribute__((noinline, no_sanitize("hwaddress"))) static void HwasanVforkTestParent() {
719*8d67ca89SAndroid Build Coastguard Worker // Allocate a region on stack, but don't tag it (see the function attribute).
720*8d67ca89SAndroid Build Coastguard Worker // This depends on unallocated stack space at current function entry being untagged.
721*8d67ca89SAndroid Build Coastguard Worker char x[10000];
722*8d67ca89SAndroid Build Coastguard Worker DoNotOptimize(x);
723*8d67ca89SAndroid Build Coastguard Worker // Verify that contents of x[] are untagged.
724*8d67ca89SAndroid Build Coastguard Worker HwasanReadMemory(x, sizeof(x));
725*8d67ca89SAndroid Build Coastguard Worker }
726*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,hwasan_vfork)727*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, hwasan_vfork) {
728*8d67ca89SAndroid Build Coastguard Worker // Test hwasan annotation in vfork. This test is only interesting when built with hwasan, but it
729*8d67ca89SAndroid Build Coastguard Worker // is supposed to work correctly either way.
730*8d67ca89SAndroid Build Coastguard Worker if (vfork()) {
731*8d67ca89SAndroid Build Coastguard Worker HwasanVforkTestParent();
732*8d67ca89SAndroid Build Coastguard Worker } else {
733*8d67ca89SAndroid Build Coastguard Worker HwasanVforkTestChild();
734*8d67ca89SAndroid Build Coastguard Worker }
735*8d67ca89SAndroid Build Coastguard Worker }
736*8d67ca89SAndroid Build Coastguard Worker
TEST_F(UNISTD_DEATHTEST,abort)737*8d67ca89SAndroid Build Coastguard Worker TEST_F(UNISTD_DEATHTEST, abort) {
738*8d67ca89SAndroid Build Coastguard Worker ASSERT_EXIT(abort(), testing::KilledBySignal(SIGABRT), "");
739*8d67ca89SAndroid Build Coastguard Worker }
740*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,sethostname)741*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, sethostname) {
742*8d67ca89SAndroid Build Coastguard Worker // The permissions check happens before the argument check, so this will
743*8d67ca89SAndroid Build Coastguard Worker // fail for a different reason if you're running as root than if you're
744*8d67ca89SAndroid Build Coastguard Worker // not, but it'll fail either way. Checking that we have the symbol is about
745*8d67ca89SAndroid Build Coastguard Worker // all we can do for sethostname(2).
746*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, sethostname("", -1));
747*8d67ca89SAndroid Build Coastguard Worker }
748*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,gethostname)749*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, gethostname) {
750*8d67ca89SAndroid Build Coastguard Worker char hostname[HOST_NAME_MAX + 1];
751*8d67ca89SAndroid Build Coastguard Worker memset(hostname, 0, sizeof(hostname));
752*8d67ca89SAndroid Build Coastguard Worker
753*8d67ca89SAndroid Build Coastguard Worker // Can we get the hostname with a big buffer?
754*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, gethostname(hostname, HOST_NAME_MAX));
755*8d67ca89SAndroid Build Coastguard Worker
756*8d67ca89SAndroid Build Coastguard Worker // Can we get the hostname with a right-sized buffer?
757*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, gethostname(hostname, strlen(hostname) + 1));
758*8d67ca89SAndroid Build Coastguard Worker
759*8d67ca89SAndroid Build Coastguard Worker // Does uname(2) agree?
760*8d67ca89SAndroid Build Coastguard Worker utsname buf;
761*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, uname(&buf));
762*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, strncmp(hostname, buf.nodename, sizeof(buf.nodename)));
763*8d67ca89SAndroid Build Coastguard Worker ASSERT_GT(strlen(hostname), 0U);
764*8d67ca89SAndroid Build Coastguard Worker
765*8d67ca89SAndroid Build Coastguard Worker // Do we correctly detect truncation?
766*8d67ca89SAndroid Build Coastguard Worker errno = 0;
767*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, gethostname(hostname, strlen(hostname)));
768*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(ENAMETOOLONG);
769*8d67ca89SAndroid Build Coastguard Worker }
770*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,pathconf_fpathconf)771*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, pathconf_fpathconf) {
772*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf;
773*8d67ca89SAndroid Build Coastguard Worker long l;
774*8d67ca89SAndroid Build Coastguard Worker
775*8d67ca89SAndroid Build Coastguard Worker // As a file system's block size is always power of 2, the configure values
776*8d67ca89SAndroid Build Coastguard Worker // for ALLOC and XFER should be power of 2 as well.
777*8d67ca89SAndroid Build Coastguard Worker l = pathconf(tf.path, _PC_ALLOC_SIZE_MIN);
778*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(l > 0 && powerof2(l));
779*8d67ca89SAndroid Build Coastguard Worker l = pathconf(tf.path, _PC_REC_MIN_XFER_SIZE);
780*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(l > 0 && powerof2(l));
781*8d67ca89SAndroid Build Coastguard Worker l = pathconf(tf.path, _PC_REC_XFER_ALIGN);
782*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(l > 0 && powerof2(l));
783*8d67ca89SAndroid Build Coastguard Worker
784*8d67ca89SAndroid Build Coastguard Worker l = fpathconf(tf.fd, _PC_ALLOC_SIZE_MIN);
785*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(l > 0 && powerof2(l));
786*8d67ca89SAndroid Build Coastguard Worker l = fpathconf(tf.fd, _PC_REC_MIN_XFER_SIZE);
787*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(l > 0 && powerof2(l));
788*8d67ca89SAndroid Build Coastguard Worker l = fpathconf(tf.fd, _PC_REC_XFER_ALIGN);
789*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(l > 0 && powerof2(l));
790*8d67ca89SAndroid Build Coastguard Worker
791*8d67ca89SAndroid Build Coastguard Worker // Check that the "I can't answer that, you'll have to try it and see"
792*8d67ca89SAndroid Build Coastguard Worker // cases don't set errno.
793*8d67ca89SAndroid Build Coastguard Worker int names[] = {
794*8d67ca89SAndroid Build Coastguard Worker _PC_ASYNC_IO, _PC_PRIO_IO, _PC_REC_INCR_XFER_SIZE, _PC_REC_MAX_XFER_SIZE, _PC_SYMLINK_MAX,
795*8d67ca89SAndroid Build Coastguard Worker _PC_SYNC_IO, -1};
796*8d67ca89SAndroid Build Coastguard Worker for (size_t i = 0; names[i] != -1; i++) {
797*8d67ca89SAndroid Build Coastguard Worker errno = 0;
798*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, pathconf(tf.path, names[i])) << names[i];
799*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(0) << names[i];
800*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, fpathconf(tf.fd, names[i])) << names[i];
801*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(0) << names[i];
802*8d67ca89SAndroid Build Coastguard Worker }
803*8d67ca89SAndroid Build Coastguard Worker }
804*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,_POSIX_constants)805*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, _POSIX_constants) {
806*8d67ca89SAndroid Build Coastguard Worker // Make a tight verification of _POSIX_* / _POSIX2_* / _XOPEN_* macros, to prevent change by mistake.
807*8d67ca89SAndroid Build Coastguard Worker // Verify according to POSIX.1-2008.
808*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(200809L, _POSIX_VERSION);
809*8d67ca89SAndroid Build Coastguard Worker
810*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(2, _POSIX_AIO_LISTIO_MAX);
811*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(1, _POSIX_AIO_MAX);
812*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(4096, _POSIX_ARG_MAX);
813*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(25, _POSIX_CHILD_MAX);
814*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(20000000, _POSIX_CLOCKRES_MIN);
815*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(32, _POSIX_DELAYTIMER_MAX);
816*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(255, _POSIX_HOST_NAME_MAX);
817*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(8, _POSIX_LINK_MAX);
818*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(9, _POSIX_LOGIN_NAME_MAX);
819*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(255, _POSIX_MAX_CANON);
820*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(255, _POSIX_MAX_INPUT);
821*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(8, _POSIX_MQ_OPEN_MAX);
822*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(32, _POSIX_MQ_PRIO_MAX);
823*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(14, _POSIX_NAME_MAX);
824*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(8, _POSIX_NGROUPS_MAX);
825*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(20, _POSIX_OPEN_MAX);
826*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(256, _POSIX_PATH_MAX);
827*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(512, _POSIX_PIPE_BUF);
828*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(255, _POSIX_RE_DUP_MAX);
829*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(8, _POSIX_RTSIG_MAX);
830*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(256, _POSIX_SEM_NSEMS_MAX);
831*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(32767, _POSIX_SEM_VALUE_MAX);
832*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(32, _POSIX_SIGQUEUE_MAX);
833*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(32767, _POSIX_SSIZE_MAX);
834*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(8, _POSIX_STREAM_MAX);
835*8d67ca89SAndroid Build Coastguard Worker #if !defined(__GLIBC__)
836*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(4, _POSIX_SS_REPL_MAX);
837*8d67ca89SAndroid Build Coastguard Worker #endif
838*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(255, _POSIX_SYMLINK_MAX);
839*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(8, _POSIX_SYMLOOP_MAX);
840*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(4, _POSIX_THREAD_DESTRUCTOR_ITERATIONS);
841*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(128, _POSIX_THREAD_KEYS_MAX);
842*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(64, _POSIX_THREAD_THREADS_MAX);
843*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(32, _POSIX_TIMER_MAX);
844*8d67ca89SAndroid Build Coastguard Worker #if !defined(__GLIBC__)
845*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(30, _POSIX_TRACE_EVENT_NAME_MAX);
846*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(8, _POSIX_TRACE_NAME_MAX);
847*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(8, _POSIX_TRACE_SYS_MAX);
848*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(32, _POSIX_TRACE_USER_EVENT_MAX);
849*8d67ca89SAndroid Build Coastguard Worker #endif
850*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(9, _POSIX_TTY_NAME_MAX);
851*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(6, _POSIX_TZNAME_MAX);
852*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(99, _POSIX2_BC_BASE_MAX);
853*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(2048, _POSIX2_BC_DIM_MAX);
854*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(99, _POSIX2_BC_SCALE_MAX);
855*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(1000, _POSIX2_BC_STRING_MAX);
856*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(14, _POSIX2_CHARCLASS_NAME_MAX);
857*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(2, _POSIX2_COLL_WEIGHTS_MAX);
858*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(32, _POSIX2_EXPR_NEST_MAX);
859*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(2048, _POSIX2_LINE_MAX);
860*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(255, _POSIX2_RE_DUP_MAX);
861*8d67ca89SAndroid Build Coastguard Worker
862*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(16, _XOPEN_IOV_MAX);
863*8d67ca89SAndroid Build Coastguard Worker #if !defined(__GLIBC__)
864*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(255, _XOPEN_NAME_MAX);
865*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(1024, _XOPEN_PATH_MAX);
866*8d67ca89SAndroid Build Coastguard Worker #endif
867*8d67ca89SAndroid Build Coastguard Worker }
868*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,_POSIX_options)869*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, _POSIX_options) {
870*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_ADVISORY_INFO);
871*8d67ca89SAndroid Build Coastguard Worker EXPECT_GT(_POSIX_BARRIERS, 0);
872*8d67ca89SAndroid Build Coastguard Worker EXPECT_GT(_POSIX_SPIN_LOCKS, 0);
873*8d67ca89SAndroid Build Coastguard Worker EXPECT_NE(_POSIX_CHOWN_RESTRICTED, -1);
874*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_CLOCK_SELECTION);
875*8d67ca89SAndroid Build Coastguard Worker #if !defined(__GLIBC__) // glibc supports ancient kernels.
876*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_CPUTIME);
877*8d67ca89SAndroid Build Coastguard Worker #endif
878*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_FSYNC);
879*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_IPV6);
880*8d67ca89SAndroid Build Coastguard Worker EXPECT_GT(_POSIX_JOB_CONTROL, 0);
881*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_MAPPED_FILES);
882*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK);
883*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK_RANGE);
884*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMORY_PROTECTION);
885*8d67ca89SAndroid Build Coastguard Worker #if !defined(__GLIBC__) // glibc supports ancient kernels.
886*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_MONOTONIC_CLOCK);
887*8d67ca89SAndroid Build Coastguard Worker #endif
888*8d67ca89SAndroid Build Coastguard Worker EXPECT_GT(_POSIX_NO_TRUNC, 0);
889*8d67ca89SAndroid Build Coastguard Worker #if !defined(ANDROID_HOST_MUSL)
890*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_PRIORITY_SCHEDULING);
891*8d67ca89SAndroid Build Coastguard Worker #endif
892*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_RAW_SOCKETS);
893*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_READER_WRITER_LOCKS);
894*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_REALTIME_SIGNALS);
895*8d67ca89SAndroid Build Coastguard Worker EXPECT_GT(_POSIX_REGEXP, 0);
896*8d67ca89SAndroid Build Coastguard Worker EXPECT_GT(_POSIX_SAVED_IDS, 0);
897*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_SEMAPHORES);
898*8d67ca89SAndroid Build Coastguard Worker EXPECT_GT(_POSIX_SHELL, 0);
899*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_SPAWN);
900*8d67ca89SAndroid Build Coastguard Worker #if !defined(ANDROID_HOST_MUSL)
901*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_SPORADIC_SERVER);
902*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_SYNCHRONIZED_IO);
903*8d67ca89SAndroid Build Coastguard Worker #endif
904*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_THREADS);
905*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKADDR);
906*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKSIZE);
907*8d67ca89SAndroid Build Coastguard Worker #if !defined(__GLIBC__) // glibc supports ancient kernels.
908*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_CPUTIME);
909*8d67ca89SAndroid Build Coastguard Worker #endif
910*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PRIORITY_SCHEDULING);
911*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PROCESS_SHARED);
912*8d67ca89SAndroid Build Coastguard Worker #if !defined(ANDROID_HOST_MUSL)
913*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_PROTECT);
914*8d67ca89SAndroid Build Coastguard Worker #endif
915*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_SAFE_FUNCTIONS);
916*8d67ca89SAndroid Build Coastguard Worker #if !defined(ANDROID_HOST_MUSL)
917*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_THREAD_SPORADIC_SERVER);
918*8d67ca89SAndroid Build Coastguard Worker #endif
919*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMEOUTS);
920*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMERS);
921*8d67ca89SAndroid Build Coastguard Worker #if !defined(ANDROID_HOST_MUSL)
922*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_TRACE);
923*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_TRACE_EVENT_FILTER);
924*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_TRACE_INHERIT);
925*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_TRACE_LOG);
926*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_TYPED_MEMORY_OBJECTS);
927*8d67ca89SAndroid Build Coastguard Worker #endif
928*8d67ca89SAndroid Build Coastguard Worker EXPECT_NE(-1, _POSIX_VDISABLE);
929*8d67ca89SAndroid Build Coastguard Worker
930*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX2_VERSION);
931*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX2_C_BIND);
932*8d67ca89SAndroid Build Coastguard Worker #if !defined(ANDROID_HOST_MUSL)
933*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(_POSIX_VERSION, _POSIX2_CHAR_TERM);
934*8d67ca89SAndroid Build Coastguard Worker #endif
935*8d67ca89SAndroid Build Coastguard Worker
936*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(700, _XOPEN_VERSION);
937*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(1, _XOPEN_ENH_I18N);
938*8d67ca89SAndroid Build Coastguard Worker #if !defined(ANDROID_HOST_MUSL)
939*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(1, _XOPEN_REALTIME);
940*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(1, _XOPEN_REALTIME_THREADS);
941*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(1, _XOPEN_SHM);
942*8d67ca89SAndroid Build Coastguard Worker #endif
943*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(1, _XOPEN_UNIX);
944*8d67ca89SAndroid Build Coastguard Worker
945*8d67ca89SAndroid Build Coastguard Worker #if defined(__BIONIC__)
946*8d67ca89SAndroid Build Coastguard Worker // These tests only pass on bionic, as bionic and glibc has different support on these macros.
947*8d67ca89SAndroid Build Coastguard Worker // Macros like _POSIX_ASYNCHRONOUS_IO are not supported on bionic yet.
948*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_ASYNCHRONOUS_IO);
949*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_MESSAGE_PASSING);
950*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_PRIORITIZED_IO);
951*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_SHARED_MEMORY_OBJECTS);
952*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_THREAD_PRIO_INHERIT);
953*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_THREAD_PRIO_PROTECT);
954*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_INHERIT);
955*8d67ca89SAndroid Build Coastguard Worker
956*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX2_C_DEV);
957*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX2_FORT_DEV);
958*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX2_FORT_RUN);
959*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX2_LOCALEDEF);
960*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX2_SW_DEV);
961*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _POSIX2_UPE);
962*8d67ca89SAndroid Build Coastguard Worker
963*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _XOPEN_CRYPT);
964*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _XOPEN_LEGACY);
965*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(-1, _XOPEN_STREAMS);
966*8d67ca89SAndroid Build Coastguard Worker #endif // defined(__BIONIC__)
967*8d67ca89SAndroid Build Coastguard Worker }
968*8d67ca89SAndroid Build Coastguard Worker
969*8d67ca89SAndroid Build Coastguard Worker #define VERIFY_SYSCONF_UNKNOWN(name) \
970*8d67ca89SAndroid Build Coastguard Worker VerifySysconf(name, #name, [](long v){return v == -1 && errno == EINVAL;})
971*8d67ca89SAndroid Build Coastguard Worker
972*8d67ca89SAndroid Build Coastguard Worker #define VERIFY_SYSCONF_UNSUPPORTED(name) \
973*8d67ca89SAndroid Build Coastguard Worker VerifySysconf(name, #name, [](long v){return v == -1 && errno == 0;})
974*8d67ca89SAndroid Build Coastguard Worker
975*8d67ca89SAndroid Build Coastguard Worker // sysconf() means unlimited when it returns -1 with errno unchanged.
976*8d67ca89SAndroid Build Coastguard Worker #define VERIFY_SYSCONF_POSITIVE(name) \
977*8d67ca89SAndroid Build Coastguard Worker VerifySysconf(name, #name, [](long v){return (v > 0 || v == -1) && errno == 0;})
978*8d67ca89SAndroid Build Coastguard Worker
979*8d67ca89SAndroid Build Coastguard Worker #define VERIFY_SYSCONF_POSIX_VERSION(name) \
980*8d67ca89SAndroid Build Coastguard Worker VerifySysconf(name, #name, [](long v){return v == _POSIX_VERSION && errno == 0;})
981*8d67ca89SAndroid Build Coastguard Worker
VerifySysconf(int option,const char * option_name,bool (* verify)(long))982*8d67ca89SAndroid Build Coastguard Worker static void VerifySysconf(int option, const char *option_name, bool (*verify)(long)) {
983*8d67ca89SAndroid Build Coastguard Worker errno = 0;
984*8d67ca89SAndroid Build Coastguard Worker long ret = sysconf(option);
985*8d67ca89SAndroid Build Coastguard Worker EXPECT_TRUE(verify(ret)) << "name = " << option_name << ", ret = "
986*8d67ca89SAndroid Build Coastguard Worker << ret <<", Error Message: " << strerror(errno);
987*8d67ca89SAndroid Build Coastguard Worker }
988*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,sysconf)989*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, sysconf) {
990*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_ADVISORY_INFO);
991*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_ARG_MAX);
992*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_BARRIERS);
993*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_BC_BASE_MAX);
994*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_BC_DIM_MAX);
995*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_BC_SCALE_MAX);
996*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_CHILD_MAX);
997*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_CLK_TCK);
998*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_COLL_WEIGHTS_MAX);
999*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_CPUTIME);
1000*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_EXPR_NEST_MAX);
1001*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_LINE_MAX);
1002*8d67ca89SAndroid Build Coastguard Worker VerifySysconf(_SC_NGROUPS_MAX, "_SC_NGROUPS_MAX", [](long v){return v >= 0 && v <= NGROUPS_MAX;});
1003*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_OPEN_MAX);
1004*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_PASS_MAX);
1005*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_2_C_BIND);
1006*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_DEV);
1007*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_RUN);
1008*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_2_UPE);
1009*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_2_VERSION);
1010*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_JOB_CONTROL);
1011*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_SAVED_IDS);
1012*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_VERSION);
1013*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_RE_DUP_MAX);
1014*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_STREAM_MAX);
1015*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_TZNAME_MAX);
1016*8d67ca89SAndroid Build Coastguard Worker VerifySysconf(_SC_XOPEN_VERSION, "_SC_XOPEN_VERSION", [](long v){return v == _XOPEN_VERSION && errno == 0;});
1017*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_ATEXIT_MAX);
1018*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_IOV_MAX);
1019*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_UIO_MAXIOV);
1020*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(sysconf(_SC_IOV_MAX), sysconf(_SC_UIO_MAXIOV));
1021*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_PAGESIZE);
1022*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_PAGE_SIZE);
1023*8d67ca89SAndroid Build Coastguard Worker VerifySysconf(_SC_PAGE_SIZE, "_SC_PAGE_SIZE",
1024*8d67ca89SAndroid Build Coastguard Worker [](long v){return v == sysconf(_SC_PAGESIZE) && errno == 0 && v == getpagesize();});
1025*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_XOPEN_UNIX);
1026*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_AIO_LISTIO_MAX);
1027*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_AIO_MAX);
1028*8d67ca89SAndroid Build Coastguard Worker VerifySysconf(_SC_AIO_PRIO_DELTA_MAX, "_SC_AIO_PRIO_DELTA_MAX", [](long v){return v >= 0 && errno == 0;});
1029*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_DELAYTIMER_MAX);
1030*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_MQ_OPEN_MAX);
1031*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_MQ_PRIO_MAX);
1032*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_RTSIG_MAX);
1033*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_SEM_NSEMS_MAX);
1034*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_SEM_VALUE_MAX);
1035*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_SPIN_LOCKS);
1036*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_TIMER_MAX);
1037*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_FSYNC);
1038*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_MAPPED_FILES);
1039*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK);
1040*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK_RANGE);
1041*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMORY_PROTECTION);
1042*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_PRIORITY_SCHEDULING);
1043*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_REALTIME_SIGNALS);
1044*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_SEMAPHORES);
1045*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_SYNCHRONIZED_IO);
1046*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMERS);
1047*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_GETGR_R_SIZE_MAX);
1048*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_GETPW_R_SIZE_MAX);
1049*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_LOGIN_NAME_MAX);
1050*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_THREAD_DESTRUCTOR_ITERATIONS);
1051*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_THREAD_KEYS_MAX);
1052*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_THREAD_STACK_MIN);
1053*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_THREAD_THREADS_MAX);
1054*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_TTY_NAME_MAX);
1055*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_THREADS);
1056*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKADDR);
1057*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKSIZE);
1058*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PRIORITY_SCHEDULING);
1059*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_INHERIT);
1060*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_PROTECT);
1061*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_SAFE_FUNCTIONS);
1062*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_CONF);
1063*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_ONLN);
1064*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_PHYS_PAGES);
1065*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_AVPHYS_PAGES);
1066*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_MONOTONIC_CLOCK);
1067*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS);
1068*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_ACCOUNTING);
1069*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_CHECKPOINT);
1070*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_LOCATE);
1071*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_MESSAGE);
1072*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_TRACK);
1073*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_CLOCK_SELECTION);
1074*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_HOST_NAME_MAX);
1075*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_IPV6);
1076*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_RAW_SOCKETS);
1077*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_READER_WRITER_LOCKS);
1078*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_REGEXP);
1079*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_SHELL);
1080*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_SPAWN);
1081*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_SPORADIC_SERVER);
1082*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_SYMLOOP_MAX);
1083*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_CPUTIME);
1084*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PROCESS_SHARED);
1085*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_SPORADIC_SERVER);
1086*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMEOUTS);
1087*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE);
1088*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_FILTER);
1089*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_NAME_MAX);
1090*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_INHERIT);
1091*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_LOG);
1092*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_NAME_MAX);
1093*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_SYS_MAX);
1094*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_USER_EVENT_MAX);
1095*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_TYPED_MEMORY_OBJECTS);
1096*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_STREAMS);
1097*8d67ca89SAndroid Build Coastguard Worker
1098*8d67ca89SAndroid Build Coastguard Worker #if defined(__LP64__)
1099*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFF32);
1100*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG);
1101*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_V7_LP64_OFF64);
1102*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_V7_LPBIG_OFFBIG);
1103*8d67ca89SAndroid Build Coastguard Worker #else
1104*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_POSITIVE(_SC_V7_ILP32_OFF32);
1105*8d67ca89SAndroid Build Coastguard Worker #if defined(__BIONIC__)
1106*8d67ca89SAndroid Build Coastguard Worker // bionic does not support 64 bits off_t type on 32bit machine.
1107*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG);
1108*8d67ca89SAndroid Build Coastguard Worker #endif
1109*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LP64_OFF64);
1110*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LPBIG_OFFBIG);
1111*8d67ca89SAndroid Build Coastguard Worker #endif
1112*8d67ca89SAndroid Build Coastguard Worker
1113*8d67ca89SAndroid Build Coastguard Worker #if defined(__BIONIC__)
1114*8d67ca89SAndroid Build Coastguard Worker // Tests can only run on bionic, as bionic and glibc have different support for these options.
1115*8d67ca89SAndroid Build Coastguard Worker // Below options are not supported on bionic yet.
1116*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_ASYNCHRONOUS_IO);
1117*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_MESSAGE_PASSING);
1118*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_PRIORITIZED_IO);
1119*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_SHARED_MEMORY_OBJECTS);
1120*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_INHERIT);
1121*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_PROTECT);
1122*8d67ca89SAndroid Build Coastguard Worker
1123*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_2_C_DEV);
1124*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_2_LOCALEDEF);
1125*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_2_SW_DEV);
1126*8d67ca89SAndroid Build Coastguard Worker
1127*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_CRYPT);
1128*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_LEGACY);
1129*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_UUCP);
1130*8d67ca89SAndroid Build Coastguard Worker #endif // defined(__BIONIC__)
1131*8d67ca89SAndroid Build Coastguard Worker }
1132*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,get_cpu_count_from_string)1133*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, get_cpu_count_from_string) {
1134*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, GetCpuCountFromString(" "));
1135*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(1, GetCpuCountFromString("0"));
1136*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(40, GetCpuCountFromString("0-39"));
1137*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(4, GetCpuCountFromString("0, 1-2, 4\n"));
1138*8d67ca89SAndroid Build Coastguard Worker }
1139*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,sysconf_SC_NPROCESSORS_make_sense)1140*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, sysconf_SC_NPROCESSORS_make_sense) {
1141*8d67ca89SAndroid Build Coastguard Worker ASSERT_LE(sysconf(_SC_NPROCESSORS_ONLN), sysconf(_SC_NPROCESSORS_CONF));
1142*8d67ca89SAndroid Build Coastguard Worker }
1143*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,sysconf_SC_NPROCESSORS_ONLN)1144*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, sysconf_SC_NPROCESSORS_ONLN) {
1145*8d67ca89SAndroid Build Coastguard Worker std::string line;
1146*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(android::base::ReadFileToString("/sys/devices/system/cpu/online", &line));
1147*8d67ca89SAndroid Build Coastguard Worker long online_cpus = 0;
1148*8d67ca89SAndroid Build Coastguard Worker for (const std::string& s : android::base::Split(line, ",")) {
1149*8d67ca89SAndroid Build Coastguard Worker std::vector<std::string> numbers = android::base::Split(s, "-");
1150*8d67ca89SAndroid Build Coastguard Worker if (numbers.size() == 1u) {
1151*8d67ca89SAndroid Build Coastguard Worker online_cpus++;
1152*8d67ca89SAndroid Build Coastguard Worker } else {
1153*8d67ca89SAndroid Build Coastguard Worker online_cpus += atoi(numbers[1].c_str()) - atoi(numbers[0].c_str()) + 1;
1154*8d67ca89SAndroid Build Coastguard Worker }
1155*8d67ca89SAndroid Build Coastguard Worker }
1156*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(online_cpus, sysconf(_SC_NPROCESSORS_ONLN));
1157*8d67ca89SAndroid Build Coastguard Worker }
1158*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,sysconf_SC_ARG_MAX)1159*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, sysconf_SC_ARG_MAX) {
1160*8d67ca89SAndroid Build Coastguard Worker // Since Linux 2.6.23, ARG_MAX isn't a constant and depends on RLIMIT_STACK.
1161*8d67ca89SAndroid Build Coastguard Worker // See setup_arg_pages() in the kernel for the gory details:
1162*8d67ca89SAndroid Build Coastguard Worker // https://elixir.bootlin.com/linux/v6.6.4/source/fs/exec.c#L749
1163*8d67ca89SAndroid Build Coastguard Worker
1164*8d67ca89SAndroid Build Coastguard Worker // Get our current limit, and set things up so we restore the limit.
1165*8d67ca89SAndroid Build Coastguard Worker rlimit rl;
1166*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, getrlimit(RLIMIT_STACK, &rl));
1167*8d67ca89SAndroid Build Coastguard Worker uint64_t original_rlim_cur = rl.rlim_cur;
1168*8d67ca89SAndroid Build Coastguard Worker if (rl.rlim_cur == RLIM_INFINITY) {
1169*8d67ca89SAndroid Build Coastguard Worker rl.rlim_cur = 8 * 1024 * 1024; // Bionic reports unlimited stacks as 8MiB.
1170*8d67ca89SAndroid Build Coastguard Worker }
1171*8d67ca89SAndroid Build Coastguard Worker auto guard = android::base::make_scope_guard([&rl, original_rlim_cur]() {
1172*8d67ca89SAndroid Build Coastguard Worker rl.rlim_cur = original_rlim_cur;
1173*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1174*8d67ca89SAndroid Build Coastguard Worker });
1175*8d67ca89SAndroid Build Coastguard Worker
1176*8d67ca89SAndroid Build Coastguard Worker // _SC_ARG_MAX should be 1/4 the stack size.
1177*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(static_cast<long>(rl.rlim_cur / 4), sysconf(_SC_ARG_MAX));
1178*8d67ca89SAndroid Build Coastguard Worker
1179*8d67ca89SAndroid Build Coastguard Worker // If you have a really small stack, the kernel still guarantees a stack
1180*8d67ca89SAndroid Build Coastguard Worker // expansion of 128KiB (see setup_arg_pages() in fs/exec.c).
1181*8d67ca89SAndroid Build Coastguard Worker rl.rlim_cur = 1024;
1182*8d67ca89SAndroid Build Coastguard Worker rl.rlim_max = RLIM_INFINITY;
1183*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1184*8d67ca89SAndroid Build Coastguard Worker
1185*8d67ca89SAndroid Build Coastguard Worker // The stack expansion number is defined in fs/exec.c.
1186*8d67ca89SAndroid Build Coastguard Worker // https://elixir.bootlin.com/linux/v6.6.4/source/fs/exec.c#L845
1187*8d67ca89SAndroid Build Coastguard Worker constexpr long kernel_stack_expansion = 131072;
1188*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(kernel_stack_expansion, sysconf(_SC_ARG_MAX));
1189*8d67ca89SAndroid Build Coastguard Worker
1190*8d67ca89SAndroid Build Coastguard Worker // If you have a large stack, the kernel will keep the stack
1191*8d67ca89SAndroid Build Coastguard Worker // expansion to 128KiB (see setup_arg_pages() in fs/exec.c).
1192*8d67ca89SAndroid Build Coastguard Worker rl.rlim_cur = 524288;
1193*8d67ca89SAndroid Build Coastguard Worker rl.rlim_max = RLIM_INFINITY;
1194*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1195*8d67ca89SAndroid Build Coastguard Worker
1196*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(kernel_stack_expansion, sysconf(_SC_ARG_MAX));
1197*8d67ca89SAndroid Build Coastguard Worker }
1198*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,sysconf_unknown)1199*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, sysconf_unknown) {
1200*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNKNOWN(-1);
1201*8d67ca89SAndroid Build Coastguard Worker VERIFY_SYSCONF_UNKNOWN(666);
1202*8d67ca89SAndroid Build Coastguard Worker }
1203*8d67ca89SAndroid Build Coastguard Worker
show_cache(const char * name,long size,long assoc,long line_size)1204*8d67ca89SAndroid Build Coastguard Worker [[maybe_unused]] static void show_cache(const char* name, long size, long assoc, long line_size) {
1205*8d67ca89SAndroid Build Coastguard Worker printf("%s cache size: %ld bytes, line size %ld bytes, ", name, size, line_size);
1206*8d67ca89SAndroid Build Coastguard Worker if (assoc == 0) {
1207*8d67ca89SAndroid Build Coastguard Worker printf("fully");
1208*8d67ca89SAndroid Build Coastguard Worker } else {
1209*8d67ca89SAndroid Build Coastguard Worker printf("%ld-way", assoc);
1210*8d67ca89SAndroid Build Coastguard Worker }
1211*8d67ca89SAndroid Build Coastguard Worker printf(" associative\n");
1212*8d67ca89SAndroid Build Coastguard Worker }
1213*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,sysconf_cache)1214*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, sysconf_cache) {
1215*8d67ca89SAndroid Build Coastguard Worker #if defined(ANDROID_HOST_MUSL)
1216*8d67ca89SAndroid Build Coastguard Worker GTEST_SKIP() << "musl does not have _SC_LEVEL?_?CACHE_SIZE";
1217*8d67ca89SAndroid Build Coastguard Worker #else
1218*8d67ca89SAndroid Build Coastguard Worker // It's not obvious we can _test_ any of these, but we can at least
1219*8d67ca89SAndroid Build Coastguard Worker // show the output for humans to inspect.
1220*8d67ca89SAndroid Build Coastguard Worker show_cache("L1D", sysconf(_SC_LEVEL1_DCACHE_SIZE), sysconf(_SC_LEVEL1_DCACHE_ASSOC), sysconf(_SC_LEVEL1_DCACHE_LINESIZE));
1221*8d67ca89SAndroid Build Coastguard Worker show_cache("L1I", sysconf(_SC_LEVEL1_ICACHE_SIZE), sysconf(_SC_LEVEL1_ICACHE_ASSOC), sysconf(_SC_LEVEL1_ICACHE_LINESIZE));
1222*8d67ca89SAndroid Build Coastguard Worker show_cache("L2", sysconf(_SC_LEVEL2_CACHE_SIZE), sysconf(_SC_LEVEL2_CACHE_ASSOC), sysconf(_SC_LEVEL2_CACHE_LINESIZE));
1223*8d67ca89SAndroid Build Coastguard Worker show_cache("L3", sysconf(_SC_LEVEL3_CACHE_SIZE), sysconf(_SC_LEVEL3_CACHE_ASSOC), sysconf(_SC_LEVEL3_CACHE_LINESIZE));
1224*8d67ca89SAndroid Build Coastguard Worker show_cache("L4", sysconf(_SC_LEVEL4_CACHE_SIZE), sysconf(_SC_LEVEL4_CACHE_ASSOC), sysconf(_SC_LEVEL4_CACHE_LINESIZE));
1225*8d67ca89SAndroid Build Coastguard Worker #endif
1226*8d67ca89SAndroid Build Coastguard Worker }
1227*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,dup2_same)1228*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, dup2_same) {
1229*8d67ca89SAndroid Build Coastguard Worker // POSIX says of dup2:
1230*8d67ca89SAndroid Build Coastguard Worker // If fildes2 is already a valid open file descriptor ...
1231*8d67ca89SAndroid Build Coastguard Worker // [and] fildes is equal to fildes2 ... dup2() shall return
1232*8d67ca89SAndroid Build Coastguard Worker // fildes2 without closing it.
1233*8d67ca89SAndroid Build Coastguard Worker // This isn't true of dup3(2), so we need to manually implement that.
1234*8d67ca89SAndroid Build Coastguard Worker
1235*8d67ca89SAndroid Build Coastguard Worker // Equal and valid.
1236*8d67ca89SAndroid Build Coastguard Worker int fd = open("/proc/version", O_RDONLY);
1237*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(fd != -1);
1238*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(fd, dup2(fd, fd));
1239*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, close(fd)); // Check that dup2 didn't close fd.
1240*8d67ca89SAndroid Build Coastguard Worker
1241*8d67ca89SAndroid Build Coastguard Worker // Equal, but invalid.
1242*8d67ca89SAndroid Build Coastguard Worker errno = 0;
1243*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, dup2(fd, fd));
1244*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EBADF);
1245*8d67ca89SAndroid Build Coastguard Worker }
1246*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,dup3)1247*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, dup3) {
1248*8d67ca89SAndroid Build Coastguard Worker int fd = open("/proc/version", O_RDONLY);
1249*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(666, dup3(fd, 666, 0));
1250*8d67ca89SAndroid Build Coastguard Worker ASSERT_FALSE(CloseOnExec(666));
1251*8d67ca89SAndroid Build Coastguard Worker close(666);
1252*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(667, dup3(fd, 667, O_CLOEXEC));
1253*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(CloseOnExec(667));
1254*8d67ca89SAndroid Build Coastguard Worker close(667);
1255*8d67ca89SAndroid Build Coastguard Worker close(fd);
1256*8d67ca89SAndroid Build Coastguard Worker }
1257*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,lockf_smoke)1258*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, lockf_smoke) {
1259*8d67ca89SAndroid Build Coastguard Worker constexpr off64_t file_size = 32*1024LL;
1260*8d67ca89SAndroid Build Coastguard Worker
1261*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf;
1262*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1263*8d67ca89SAndroid Build Coastguard Worker
1264*8d67ca89SAndroid Build Coastguard Worker // Lock everything.
1265*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1266*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
1267*8d67ca89SAndroid Build Coastguard Worker
1268*8d67ca89SAndroid Build Coastguard Worker // Try-lock everything, this should succeed too.
1269*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1270*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size));
1271*8d67ca89SAndroid Build Coastguard Worker
1272*8d67ca89SAndroid Build Coastguard Worker // Check status.
1273*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1274*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1275*8d67ca89SAndroid Build Coastguard Worker
1276*8d67ca89SAndroid Build Coastguard Worker // Unlock file.
1277*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1278*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lockf64(tf.fd, F_ULOCK, file_size));
1279*8d67ca89SAndroid Build Coastguard Worker }
1280*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,lockf_zero)1281*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, lockf_zero) {
1282*8d67ca89SAndroid Build Coastguard Worker constexpr off64_t file_size = 32*1024LL;
1283*8d67ca89SAndroid Build Coastguard Worker
1284*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf;
1285*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1286*8d67ca89SAndroid Build Coastguard Worker
1287*8d67ca89SAndroid Build Coastguard Worker // Lock everything by specifying a size of 0 (meaning "to the end, even if it changes").
1288*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1289*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, 0));
1290*8d67ca89SAndroid Build Coastguard Worker
1291*8d67ca89SAndroid Build Coastguard Worker // Check that it's locked.
1292*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1293*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1294*8d67ca89SAndroid Build Coastguard Worker
1295*8d67ca89SAndroid Build Coastguard Worker // Move the end.
1296*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, ftruncate(tf.fd, 2*file_size));
1297*8d67ca89SAndroid Build Coastguard Worker
1298*8d67ca89SAndroid Build Coastguard Worker // Check that the new section is locked too.
1299*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
1300*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lockf64(tf.fd, F_TEST, 2*file_size));
1301*8d67ca89SAndroid Build Coastguard Worker }
1302*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,lockf_negative)1303*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, lockf_negative) {
1304*8d67ca89SAndroid Build Coastguard Worker constexpr off64_t file_size = 32*1024LL;
1305*8d67ca89SAndroid Build Coastguard Worker
1306*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf;
1307*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1308*8d67ca89SAndroid Build Coastguard Worker
1309*8d67ca89SAndroid Build Coastguard Worker // Lock everything, but specifying the range in reverse.
1310*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
1311*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, -file_size));
1312*8d67ca89SAndroid Build Coastguard Worker
1313*8d67ca89SAndroid Build Coastguard Worker // Check that it's locked.
1314*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1315*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1316*8d67ca89SAndroid Build Coastguard Worker }
1317*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,lockf_with_child)1318*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, lockf_with_child) {
1319*8d67ca89SAndroid Build Coastguard Worker constexpr off64_t file_size = 32*1024LL;
1320*8d67ca89SAndroid Build Coastguard Worker
1321*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf;
1322*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1323*8d67ca89SAndroid Build Coastguard Worker
1324*8d67ca89SAndroid Build Coastguard Worker // Lock everything.
1325*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1326*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
1327*8d67ca89SAndroid Build Coastguard Worker
1328*8d67ca89SAndroid Build Coastguard Worker // Fork a child process
1329*8d67ca89SAndroid Build Coastguard Worker pid_t pid = fork();
1330*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(-1, pid);
1331*8d67ca89SAndroid Build Coastguard Worker if (pid == 0) {
1332*8d67ca89SAndroid Build Coastguard Worker // Check that the child cannot lock the file.
1333*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1334*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, lockf64(tf.fd, F_TLOCK, file_size));
1335*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EAGAIN);
1336*8d67ca89SAndroid Build Coastguard Worker // Check also that it reports itself as locked.
1337*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1338*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size));
1339*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EACCES);
1340*8d67ca89SAndroid Build Coastguard Worker _exit(0);
1341*8d67ca89SAndroid Build Coastguard Worker }
1342*8d67ca89SAndroid Build Coastguard Worker AssertChildExited(pid, 0);
1343*8d67ca89SAndroid Build Coastguard Worker }
1344*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,lockf_partial_with_child)1345*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, lockf_partial_with_child) {
1346*8d67ca89SAndroid Build Coastguard Worker constexpr off64_t file_size = 32*1024LL;
1347*8d67ca89SAndroid Build Coastguard Worker
1348*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf;
1349*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1350*8d67ca89SAndroid Build Coastguard Worker
1351*8d67ca89SAndroid Build Coastguard Worker // Lock the first half of the file.
1352*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1353*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size/2));
1354*8d67ca89SAndroid Build Coastguard Worker
1355*8d67ca89SAndroid Build Coastguard Worker // Fork a child process.
1356*8d67ca89SAndroid Build Coastguard Worker pid_t pid = fork();
1357*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(-1, pid);
1358*8d67ca89SAndroid Build Coastguard Worker if (pid == 0) {
1359*8d67ca89SAndroid Build Coastguard Worker // Check that the child can lock the other half.
1360*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
1361*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
1362*8d67ca89SAndroid Build Coastguard Worker // Check that the child cannot lock the first half.
1363*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1364*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
1365*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EACCES);
1366*8d67ca89SAndroid Build Coastguard Worker // Check also that it reports itself as locked.
1367*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1368*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
1369*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EACCES);
1370*8d67ca89SAndroid Build Coastguard Worker _exit(0);
1371*8d67ca89SAndroid Build Coastguard Worker }
1372*8d67ca89SAndroid Build Coastguard Worker AssertChildExited(pid, 0);
1373*8d67ca89SAndroid Build Coastguard Worker
1374*8d67ca89SAndroid Build Coastguard Worker // The second half was locked by the child, but the lock disappeared
1375*8d67ca89SAndroid Build Coastguard Worker // when the process exited, so check it can be locked now.
1376*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
1377*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
1378*8d67ca89SAndroid Build Coastguard Worker }
1379*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,getdomainname)1380*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, getdomainname) {
1381*8d67ca89SAndroid Build Coastguard Worker struct utsname u;
1382*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, uname(&u));
1383*8d67ca89SAndroid Build Coastguard Worker
1384*8d67ca89SAndroid Build Coastguard Worker char buf[sizeof(u.domainname)];
1385*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, getdomainname(buf, sizeof(buf)));
1386*8d67ca89SAndroid Build Coastguard Worker EXPECT_STREQ(u.domainname, buf);
1387*8d67ca89SAndroid Build Coastguard Worker
1388*8d67ca89SAndroid Build Coastguard Worker #if defined(__BIONIC__)
1389*8d67ca89SAndroid Build Coastguard Worker // bionic and glibc have different behaviors when len is too small
1390*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, getdomainname(buf, strlen(u.domainname)));
1391*8d67ca89SAndroid Build Coastguard Worker EXPECT_ERRNO(EINVAL);
1392*8d67ca89SAndroid Build Coastguard Worker #endif
1393*8d67ca89SAndroid Build Coastguard Worker }
1394*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,setdomainname)1395*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, setdomainname) {
1396*8d67ca89SAndroid Build Coastguard Worker __user_cap_header_struct header;
1397*8d67ca89SAndroid Build Coastguard Worker memset(&header, 0, sizeof(header));
1398*8d67ca89SAndroid Build Coastguard Worker header.version = _LINUX_CAPABILITY_VERSION_3;
1399*8d67ca89SAndroid Build Coastguard Worker
1400*8d67ca89SAndroid Build Coastguard Worker __user_cap_data_struct old_caps[_LINUX_CAPABILITY_U32S_3];
1401*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, capget(&header, &old_caps[0]));
1402*8d67ca89SAndroid Build Coastguard Worker
1403*8d67ca89SAndroid Build Coastguard Worker auto admin_idx = CAP_TO_INDEX(CAP_SYS_ADMIN);
1404*8d67ca89SAndroid Build Coastguard Worker auto admin_mask = CAP_TO_MASK(CAP_SYS_ADMIN);
1405*8d67ca89SAndroid Build Coastguard Worker bool has_admin = old_caps[admin_idx].effective & admin_mask;
1406*8d67ca89SAndroid Build Coastguard Worker if (has_admin) {
1407*8d67ca89SAndroid Build Coastguard Worker __user_cap_data_struct new_caps[_LINUX_CAPABILITY_U32S_3];
1408*8d67ca89SAndroid Build Coastguard Worker memcpy(new_caps, old_caps, sizeof(new_caps));
1409*8d67ca89SAndroid Build Coastguard Worker new_caps[admin_idx].effective &= ~admin_mask;
1410*8d67ca89SAndroid Build Coastguard Worker
1411*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, capset(&header, &new_caps[0])) << "failed to drop admin privileges";
1412*8d67ca89SAndroid Build Coastguard Worker }
1413*8d67ca89SAndroid Build Coastguard Worker
1414*8d67ca89SAndroid Build Coastguard Worker const char* name = "newdomainname";
1415*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, setdomainname(name, strlen(name)));
1416*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EPERM);
1417*8d67ca89SAndroid Build Coastguard Worker
1418*8d67ca89SAndroid Build Coastguard Worker if (has_admin) {
1419*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, capset(&header, &old_caps[0])) << "failed to restore admin privileges";
1420*8d67ca89SAndroid Build Coastguard Worker }
1421*8d67ca89SAndroid Build Coastguard Worker }
1422*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execve_failure)1423*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execve_failure) {
1424*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1425*8d67ca89SAndroid Build Coastguard Worker errno = 0;
1426*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, execve("/", eth.GetArgs(), eth.GetEnv()));
1427*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EACCES);
1428*8d67ca89SAndroid Build Coastguard Worker }
1429*8d67ca89SAndroid Build Coastguard Worker
append_llvm_cov_env_var(std::string & env_str)1430*8d67ca89SAndroid Build Coastguard Worker static void append_llvm_cov_env_var(std::string& env_str) {
1431*8d67ca89SAndroid Build Coastguard Worker if (getenv("LLVM_PROFILE_FILE") != nullptr)
1432*8d67ca89SAndroid Build Coastguard Worker env_str.append("__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE\n");
1433*8d67ca89SAndroid Build Coastguard Worker }
1434*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execve_args)1435*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execve_args) {
1436*8d67ca89SAndroid Build Coastguard Worker // int execve(const char* path, char* argv[], char* envp[]);
1437*8d67ca89SAndroid Build Coastguard Worker
1438*8d67ca89SAndroid Build Coastguard Worker // Test basic argument passing.
1439*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1440*8d67ca89SAndroid Build Coastguard Worker eth.SetArgs({"echo", "hello", "world", nullptr});
1441*8d67ca89SAndroid Build Coastguard Worker eth.Run([&]() { execve(BIN_DIR "echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1442*8d67ca89SAndroid Build Coastguard Worker
1443*8d67ca89SAndroid Build Coastguard Worker // Test environment variable setting too.
1444*8d67ca89SAndroid Build Coastguard Worker eth.SetArgs({"printenv", nullptr});
1445*8d67ca89SAndroid Build Coastguard Worker eth.SetEnv({"A=B", nullptr});
1446*8d67ca89SAndroid Build Coastguard Worker
1447*8d67ca89SAndroid Build Coastguard Worker std::string expected_output("A=B\n");
1448*8d67ca89SAndroid Build Coastguard Worker append_llvm_cov_env_var(expected_output);
1449*8d67ca89SAndroid Build Coastguard Worker
1450*8d67ca89SAndroid Build Coastguard Worker eth.Run([&]() { execve(BIN_DIR "printenv", eth.GetArgs(), eth.GetEnv()); }, 0,
1451*8d67ca89SAndroid Build Coastguard Worker expected_output.c_str());
1452*8d67ca89SAndroid Build Coastguard Worker }
1453*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execl_failure)1454*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execl_failure) {
1455*8d67ca89SAndroid Build Coastguard Worker errno = 0;
1456*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, execl("/", "/", nullptr));
1457*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EACCES);
1458*8d67ca89SAndroid Build Coastguard Worker }
1459*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execl)1460*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execl) {
1461*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1462*8d67ca89SAndroid Build Coastguard Worker // int execl(const char* path, const char* arg, ...);
1463*8d67ca89SAndroid Build Coastguard Worker eth.Run([&]() { execl(BIN_DIR "echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n");
1464*8d67ca89SAndroid Build Coastguard Worker }
1465*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execle_failure)1466*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execle_failure) {
1467*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1468*8d67ca89SAndroid Build Coastguard Worker errno = 0;
1469*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, execle("/", "/", nullptr, eth.GetEnv()));
1470*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EACCES);
1471*8d67ca89SAndroid Build Coastguard Worker }
1472*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execle)1473*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execle) {
1474*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1475*8d67ca89SAndroid Build Coastguard Worker eth.SetEnv({"A=B", nullptr});
1476*8d67ca89SAndroid Build Coastguard Worker
1477*8d67ca89SAndroid Build Coastguard Worker std::string expected_output("A=B\n");
1478*8d67ca89SAndroid Build Coastguard Worker append_llvm_cov_env_var(expected_output);
1479*8d67ca89SAndroid Build Coastguard Worker
1480*8d67ca89SAndroid Build Coastguard Worker // int execle(const char* path, const char* arg, ..., char* envp[]);
1481*8d67ca89SAndroid Build Coastguard Worker eth.Run([&]() { execle(BIN_DIR "printenv", "printenv", nullptr, eth.GetEnv()); }, 0,
1482*8d67ca89SAndroid Build Coastguard Worker expected_output.c_str());
1483*8d67ca89SAndroid Build Coastguard Worker }
1484*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execv_failure)1485*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execv_failure) {
1486*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1487*8d67ca89SAndroid Build Coastguard Worker errno = 0;
1488*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, execv("/", eth.GetArgs()));
1489*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EACCES);
1490*8d67ca89SAndroid Build Coastguard Worker }
1491*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execv)1492*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execv) {
1493*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1494*8d67ca89SAndroid Build Coastguard Worker eth.SetArgs({"echo", "hello", "world", nullptr});
1495*8d67ca89SAndroid Build Coastguard Worker // int execv(const char* path, char* argv[]);
1496*8d67ca89SAndroid Build Coastguard Worker eth.Run([&]() { execv(BIN_DIR "echo", eth.GetArgs()); }, 0, "hello world\n");
1497*8d67ca89SAndroid Build Coastguard Worker }
1498*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execlp_failure)1499*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execlp_failure) {
1500*8d67ca89SAndroid Build Coastguard Worker errno = 0;
1501*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, execlp("/", "/", nullptr));
1502*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EACCES);
1503*8d67ca89SAndroid Build Coastguard Worker }
1504*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execlp)1505*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execlp) {
1506*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1507*8d67ca89SAndroid Build Coastguard Worker // int execlp(const char* file, const char* arg, ...);
1508*8d67ca89SAndroid Build Coastguard Worker eth.Run([&]() { execlp("echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n");
1509*8d67ca89SAndroid Build Coastguard Worker }
1510*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execvp_failure)1511*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execvp_failure) {
1512*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1513*8d67ca89SAndroid Build Coastguard Worker eth.SetArgs({nullptr});
1514*8d67ca89SAndroid Build Coastguard Worker errno = 0;
1515*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, execvp("/", eth.GetArgs()));
1516*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EACCES);
1517*8d67ca89SAndroid Build Coastguard Worker }
1518*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execvp)1519*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execvp) {
1520*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1521*8d67ca89SAndroid Build Coastguard Worker eth.SetArgs({"echo", "hello", "world", nullptr});
1522*8d67ca89SAndroid Build Coastguard Worker // int execvp(const char* file, char* argv[]);
1523*8d67ca89SAndroid Build Coastguard Worker eth.Run([&]() { execvp("echo", eth.GetArgs()); }, 0, "hello world\n");
1524*8d67ca89SAndroid Build Coastguard Worker }
1525*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execvpe_failure)1526*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execvpe_failure) {
1527*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1528*8d67ca89SAndroid Build Coastguard Worker errno = 0;
1529*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, execvpe("this-does-not-exist", eth.GetArgs(), eth.GetEnv()));
1530*8d67ca89SAndroid Build Coastguard Worker // Running in CTS we might not even be able to search all directories in $PATH.
1531*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(errno == ENOENT || errno == EACCES) << strerror(errno);
1532*8d67ca89SAndroid Build Coastguard Worker }
1533*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execvpe)1534*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execvpe) {
1535*8d67ca89SAndroid Build Coastguard Worker // int execvpe(const char* file, char* argv[], char* envp[]);
1536*8d67ca89SAndroid Build Coastguard Worker
1537*8d67ca89SAndroid Build Coastguard Worker // Test basic argument passing.
1538*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1539*8d67ca89SAndroid Build Coastguard Worker eth.SetArgs({"echo", "hello", "world", nullptr});
1540*8d67ca89SAndroid Build Coastguard Worker eth.Run([&]() { execvpe("echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1541*8d67ca89SAndroid Build Coastguard Worker
1542*8d67ca89SAndroid Build Coastguard Worker // Test environment variable setting too.
1543*8d67ca89SAndroid Build Coastguard Worker eth.SetArgs({"printenv", nullptr});
1544*8d67ca89SAndroid Build Coastguard Worker eth.SetEnv({"A=B", nullptr});
1545*8d67ca89SAndroid Build Coastguard Worker
1546*8d67ca89SAndroid Build Coastguard Worker std::string expected_output("A=B\n");
1547*8d67ca89SAndroid Build Coastguard Worker append_llvm_cov_env_var(expected_output);
1548*8d67ca89SAndroid Build Coastguard Worker
1549*8d67ca89SAndroid Build Coastguard Worker eth.Run([&]() { execvpe("printenv", eth.GetArgs(), eth.GetEnv()); }, 0, expected_output.c_str());
1550*8d67ca89SAndroid Build Coastguard Worker }
1551*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execvpe_ENOEXEC)1552*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execvpe_ENOEXEC) {
1553*8d67ca89SAndroid Build Coastguard Worker // Create a shell script with #!.
1554*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf;
1555*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(android::base::WriteStringToFile("#!" BIN_DIR "sh\necho script\n", tf.path));
1556*8d67ca89SAndroid Build Coastguard Worker
1557*8d67ca89SAndroid Build Coastguard Worker // Set $PATH so we can find it.
1558*8d67ca89SAndroid Build Coastguard Worker setenv("PATH", dirname(tf.path), 1);
1559*8d67ca89SAndroid Build Coastguard Worker
1560*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1561*8d67ca89SAndroid Build Coastguard Worker eth.SetArgs({basename(tf.path), nullptr});
1562*8d67ca89SAndroid Build Coastguard Worker
1563*8d67ca89SAndroid Build Coastguard Worker // It's not inherently executable.
1564*8d67ca89SAndroid Build Coastguard Worker errno = 0;
1565*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()));
1566*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EACCES);
1567*8d67ca89SAndroid Build Coastguard Worker
1568*8d67ca89SAndroid Build Coastguard Worker // Make it executable (and keep it writable because we're going to rewrite it below).
1569*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, chmod(tf.path, 0777));
1570*8d67ca89SAndroid Build Coastguard Worker
1571*8d67ca89SAndroid Build Coastguard Worker // TemporaryFile will have a writable fd, so we can test ETXTBSY while we're here...
1572*8d67ca89SAndroid Build Coastguard Worker errno = 0;
1573*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()));
1574*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(ETXTBSY);
1575*8d67ca89SAndroid Build Coastguard Worker
1576*8d67ca89SAndroid Build Coastguard Worker // 1. The simplest test: the kernel should handle this.
1577*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, close(tf.fd));
1578*8d67ca89SAndroid Build Coastguard Worker eth.Run([&]() { execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
1579*8d67ca89SAndroid Build Coastguard Worker
1580*8d67ca89SAndroid Build Coastguard Worker // 2. Try again without a #!. We should have to handle this ourselves.
1581*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(android::base::WriteStringToFile("echo script\n", tf.path));
1582*8d67ca89SAndroid Build Coastguard Worker eth.Run([&]() { execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
1583*8d67ca89SAndroid Build Coastguard Worker
1584*8d67ca89SAndroid Build Coastguard Worker // 3. Again without a #!, but also with a leading '/', since that's a special case in the
1585*8d67ca89SAndroid Build Coastguard Worker // implementation.
1586*8d67ca89SAndroid Build Coastguard Worker eth.Run([&]() { execvpe(tf.path, eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
1587*8d67ca89SAndroid Build Coastguard Worker }
1588*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,execvp_libcore_test_55017)1589*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, execvp_libcore_test_55017) {
1590*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1591*8d67ca89SAndroid Build Coastguard Worker eth.SetArgs({"/system/bin/does-not-exist", nullptr});
1592*8d67ca89SAndroid Build Coastguard Worker
1593*8d67ca89SAndroid Build Coastguard Worker errno = 0;
1594*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, execvp("/system/bin/does-not-exist", eth.GetArgs()));
1595*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(ENOENT);
1596*8d67ca89SAndroid Build Coastguard Worker }
1597*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,exec_argv0_null)1598*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, exec_argv0_null) {
1599*8d67ca89SAndroid Build Coastguard Worker // http://b/33276926 and http://b/227498625.
1600*8d67ca89SAndroid Build Coastguard Worker //
1601*8d67ca89SAndroid Build Coastguard Worker // With old kernels, bionic will see the null pointer and use "<unknown>" but
1602*8d67ca89SAndroid Build Coastguard Worker // with new (5.18+) kernels, the kernel will already have substituted the
1603*8d67ca89SAndroid Build Coastguard Worker // empty string, so we don't make any assertion here about what (if anything)
1604*8d67ca89SAndroid Build Coastguard Worker // comes before the first ':'.
1605*8d67ca89SAndroid Build Coastguard Worker //
1606*8d67ca89SAndroid Build Coastguard Worker // If this ever causes trouble, we could change bionic to replace _either_ the
1607*8d67ca89SAndroid Build Coastguard Worker // null pointer or the empty string. We could also use the actual name from
1608*8d67ca89SAndroid Build Coastguard Worker // readlink() on /proc/self/exe if we ever had reason to disallow programs
1609*8d67ca89SAndroid Build Coastguard Worker // from trying to hide like this.
1610*8d67ca89SAndroid Build Coastguard Worker char* args[] = {nullptr};
1611*8d67ca89SAndroid Build Coastguard Worker char* envs[] = {nullptr};
1612*8d67ca89SAndroid Build Coastguard Worker ASSERT_EXIT(execve("/system/bin/run-as", args, envs), testing::ExitedWithCode(1),
1613*8d67ca89SAndroid Build Coastguard Worker ": usage: run-as");
1614*8d67ca89SAndroid Build Coastguard Worker }
1615*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,fexecve_failure)1616*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, fexecve_failure) {
1617*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1618*8d67ca89SAndroid Build Coastguard Worker errno = 0;
1619*8d67ca89SAndroid Build Coastguard Worker int fd = open("/", O_RDONLY);
1620*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(-1, fd);
1621*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, fexecve(fd, eth.GetArgs(), eth.GetEnv()));
1622*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EACCES);
1623*8d67ca89SAndroid Build Coastguard Worker close(fd);
1624*8d67ca89SAndroid Build Coastguard Worker }
1625*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,fexecve_bad_fd)1626*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, fexecve_bad_fd) {
1627*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1628*8d67ca89SAndroid Build Coastguard Worker errno = 0;
1629*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(-1, fexecve(-1, eth.GetArgs(), eth.GetEnv()));
1630*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EBADF);
1631*8d67ca89SAndroid Build Coastguard Worker }
1632*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,fexecve_args)1633*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, fexecve_args) {
1634*8d67ca89SAndroid Build Coastguard Worker // Test basic argument passing.
1635*8d67ca89SAndroid Build Coastguard Worker int echo_fd = open(BIN_DIR "echo", O_RDONLY | O_CLOEXEC);
1636*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(-1, echo_fd);
1637*8d67ca89SAndroid Build Coastguard Worker ExecTestHelper eth;
1638*8d67ca89SAndroid Build Coastguard Worker eth.SetArgs({"echo", "hello", "world", nullptr});
1639*8d67ca89SAndroid Build Coastguard Worker eth.Run([&]() { fexecve(echo_fd, eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1640*8d67ca89SAndroid Build Coastguard Worker close(echo_fd);
1641*8d67ca89SAndroid Build Coastguard Worker
1642*8d67ca89SAndroid Build Coastguard Worker // Test environment variable setting too.
1643*8d67ca89SAndroid Build Coastguard Worker int printenv_fd = open(BIN_DIR "printenv", O_RDONLY | O_CLOEXEC);
1644*8d67ca89SAndroid Build Coastguard Worker ASSERT_NE(-1, printenv_fd);
1645*8d67ca89SAndroid Build Coastguard Worker eth.SetArgs({"printenv", nullptr});
1646*8d67ca89SAndroid Build Coastguard Worker eth.SetEnv({"A=B", nullptr});
1647*8d67ca89SAndroid Build Coastguard Worker
1648*8d67ca89SAndroid Build Coastguard Worker std::string expected_output("A=B\n");
1649*8d67ca89SAndroid Build Coastguard Worker append_llvm_cov_env_var(expected_output);
1650*8d67ca89SAndroid Build Coastguard Worker
1651*8d67ca89SAndroid Build Coastguard Worker eth.Run([&]() { fexecve(printenv_fd, eth.GetArgs(), eth.GetEnv()); }, 0, expected_output.c_str());
1652*8d67ca89SAndroid Build Coastguard Worker close(printenv_fd);
1653*8d67ca89SAndroid Build Coastguard Worker }
1654*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,getlogin_r)1655*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, getlogin_r) {
1656*8d67ca89SAndroid Build Coastguard Worker char buf[LOGIN_NAME_MAX] = {};
1657*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(ERANGE, getlogin_r(buf, 0));
1658*8d67ca89SAndroid Build Coastguard Worker EXPECT_EQ(0, getlogin_r(buf, sizeof(buf)));
1659*8d67ca89SAndroid Build Coastguard Worker EXPECT_STREQ(getlogin(), buf);
1660*8d67ca89SAndroid Build Coastguard Worker }
1661*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,swab)1662*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, swab) {
1663*8d67ca89SAndroid Build Coastguard Worker // POSIX: "The swab() function shall copy nbytes bytes, which are pointed to by src,
1664*8d67ca89SAndroid Build Coastguard Worker // to the object pointed to by dest, exchanging adjacent bytes."
1665*8d67ca89SAndroid Build Coastguard Worker char buf[BUFSIZ];
1666*8d67ca89SAndroid Build Coastguard Worker memset(buf, 'x', sizeof(buf));
1667*8d67ca89SAndroid Build Coastguard Worker swab("ehll oowlr\0d", buf, 12);
1668*8d67ca89SAndroid Build Coastguard Worker ASSERT_STREQ("hello world", buf);
1669*8d67ca89SAndroid Build Coastguard Worker }
1670*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,swab_odd_byte_count)1671*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, swab_odd_byte_count) {
1672*8d67ca89SAndroid Build Coastguard Worker // POSIX: "If nbytes is odd, swab() copies and exchanges nbytes-1 bytes and the disposition
1673*8d67ca89SAndroid Build Coastguard Worker // of the last byte is unspecified."
1674*8d67ca89SAndroid Build Coastguard Worker // ...but it seems unreasonable to not just leave the last byte alone.
1675*8d67ca89SAndroid Build Coastguard Worker char buf[BUFSIZ];
1676*8d67ca89SAndroid Build Coastguard Worker memset(buf, 'x', sizeof(buf));
1677*8d67ca89SAndroid Build Coastguard Worker swab("012345", buf, 3);
1678*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ('1', buf[0]);
1679*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ('0', buf[1]);
1680*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ('x', buf[2]);
1681*8d67ca89SAndroid Build Coastguard Worker }
1682*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,swab_overlap)1683*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, swab_overlap) {
1684*8d67ca89SAndroid Build Coastguard Worker // POSIX: "If copying takes place between objects that overlap, the behavior is undefined."
1685*8d67ca89SAndroid Build Coastguard Worker // ...but it seems unreasonable to not just do the right thing.
1686*8d67ca89SAndroid Build Coastguard Worker char buf[] = "012345";
1687*8d67ca89SAndroid Build Coastguard Worker swab(buf, buf, 4);
1688*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ('1', buf[0]);
1689*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ('0', buf[1]);
1690*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ('3', buf[2]);
1691*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ('2', buf[3]);
1692*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ('4', buf[4]);
1693*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ('5', buf[5]);
1694*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, buf[6]);
1695*8d67ca89SAndroid Build Coastguard Worker }
1696*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,swab_negative_byte_count)1697*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, swab_negative_byte_count) {
1698*8d67ca89SAndroid Build Coastguard Worker // POSIX: "If nbytes is negative, swab() does nothing."
1699*8d67ca89SAndroid Build Coastguard Worker char buf[BUFSIZ];
1700*8d67ca89SAndroid Build Coastguard Worker memset(buf, 'x', sizeof(buf));
1701*8d67ca89SAndroid Build Coastguard Worker swab("hello", buf, -1);
1702*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ('x', buf[0]);
1703*8d67ca89SAndroid Build Coastguard Worker }
1704*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,usleep)1705*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, usleep) {
1706*8d67ca89SAndroid Build Coastguard Worker auto t0 = std::chrono::steady_clock::now();
1707*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, usleep(5000));
1708*8d67ca89SAndroid Build Coastguard Worker auto t1 = std::chrono::steady_clock::now();
1709*8d67ca89SAndroid Build Coastguard Worker ASSERT_GE(t1-t0, 5000us);
1710*8d67ca89SAndroid Build Coastguard Worker }
1711*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,sleep)1712*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, sleep) {
1713*8d67ca89SAndroid Build Coastguard Worker auto t0 = std::chrono::steady_clock::now();
1714*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0U, sleep(1));
1715*8d67ca89SAndroid Build Coastguard Worker auto t1 = std::chrono::steady_clock::now();
1716*8d67ca89SAndroid Build Coastguard Worker ASSERT_GE(t1-t0, 1s);
1717*8d67ca89SAndroid Build Coastguard Worker }
1718*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,close_range)1719*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, close_range) {
1720*8d67ca89SAndroid Build Coastguard Worker #if defined(__GLIBC__)
1721*8d67ca89SAndroid Build Coastguard Worker GTEST_SKIP() << "glibc too old";
1722*8d67ca89SAndroid Build Coastguard Worker #elif defined(ANDROID_HOST_MUSL)
1723*8d67ca89SAndroid Build Coastguard Worker GTEST_SKIP() << "musl does not have close_range";
1724*8d67ca89SAndroid Build Coastguard Worker #else // __GLIBC__
1725*8d67ca89SAndroid Build Coastguard Worker int fd = open("/proc/version", O_RDONLY);
1726*8d67ca89SAndroid Build Coastguard Worker ASSERT_GE(fd, 0);
1727*8d67ca89SAndroid Build Coastguard Worker
1728*8d67ca89SAndroid Build Coastguard Worker int rc = close_range(fd, fd, 0);
1729*8d67ca89SAndroid Build Coastguard Worker if (rc == -1 && errno == ENOSYS) GTEST_SKIP() << "no close_range() in this kernel";
1730*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, rc) << strerror(errno);
1731*8d67ca89SAndroid Build Coastguard Worker
1732*8d67ca89SAndroid Build Coastguard Worker // Check the fd is actually closed.
1733*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(close(fd), -1);
1734*8d67ca89SAndroid Build Coastguard Worker ASSERT_ERRNO(EBADF);
1735*8d67ca89SAndroid Build Coastguard Worker #endif // __GLIBC__
1736*8d67ca89SAndroid Build Coastguard Worker }
1737*8d67ca89SAndroid Build Coastguard Worker
TEST(UNISTD_TEST,copy_file_range)1738*8d67ca89SAndroid Build Coastguard Worker TEST(UNISTD_TEST, copy_file_range) {
1739*8d67ca89SAndroid Build Coastguard Worker #if defined(__GLIBC__)
1740*8d67ca89SAndroid Build Coastguard Worker GTEST_SKIP() << "glibc too old";
1741*8d67ca89SAndroid Build Coastguard Worker #else // __GLIBC__
1742*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf;
1743*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(android::base::WriteStringToFd("hello world", tf.fd));
1744*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek(tf.fd, SEEK_SET, 0));
1745*8d67ca89SAndroid Build Coastguard Worker TemporaryFile tf2;
1746*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(11, copy_file_range(tf.fd, NULL, tf2.fd, NULL, 11, 0));
1747*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ(0, lseek(tf2.fd, SEEK_SET, 0));
1748*8d67ca89SAndroid Build Coastguard Worker std::string content;
1749*8d67ca89SAndroid Build Coastguard Worker ASSERT_TRUE(android::base::ReadFdToString(tf2.fd, &content));
1750*8d67ca89SAndroid Build Coastguard Worker ASSERT_EQ("hello world", content);
1751*8d67ca89SAndroid Build Coastguard Worker #endif // __GLIBC__
1752*8d67ca89SAndroid Build Coastguard Worker }
1753