• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2012 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include <gtest/gtest.h>
18 
19 #include "DoNotOptimize.h"
20 #include "SignalUtils.h"
21 #include "utils.h"
22 
23 #include <errno.h>
24 #include <fcntl.h>
25 #include <libgen.h>
26 #include <limits.h>
27 #include <stdint.h>
28 #include <sys/capability.h>
29 #include <sys/param.h>
30 #include <sys/resource.h>
31 #include <sys/syscall.h>
32 #include <sys/types.h>
33 #include <sys/utsname.h>
34 #include <sys/wait.h>
35 #include <unistd.h>
36 
37 #include <chrono>
38 
39 #include <android-base/file.h>
40 #include <android-base/silent_death_test.h>
41 #include <android-base/strings.h>
42 
43 #include "private/get_cpu_count_from_string.h"
44 
45 #if defined(__BIONIC__)
46 #include "bionic/pthread_internal.h"
47 #endif
48 
49 #if defined(NOFORTIFY)
50 #define UNISTD_TEST unistd_nofortify
51 #define UNISTD_DEATHTEST unistd_nofortify_DeathTest
52 #else
53 #define UNISTD_TEST unistd
54 #define UNISTD_DEATHTEST unistd_DeathTest
55 #endif
56 
57 using UNISTD_DEATHTEST = SilentDeathTest;
58 
59 using namespace std::chrono_literals;
60 
get_brk()61 static void* get_brk() {
62   return sbrk(0);
63 }
64 
page_align(uintptr_t addr)65 static void* page_align(uintptr_t addr) {
66   uintptr_t mask = sysconf(_SC_PAGE_SIZE) - 1;
67   return reinterpret_cast<void*>((addr + mask) & ~mask);
68 }
69 
TEST(UNISTD_TEST,brk)70 TEST(UNISTD_TEST, brk) {
71   void* initial_break = get_brk();
72 
73   void* new_break = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(initial_break) + 1);
74   int ret = brk(new_break);
75   if (ret == -1) {
76     ASSERT_ERRNO(ENOMEM);
77   } else {
78     ASSERT_EQ(0, ret);
79     ASSERT_GE(get_brk(), new_break);
80   }
81 
82   // Expand by a full page to force the mapping to expand
83   new_break = page_align(reinterpret_cast<uintptr_t>(initial_break) + sysconf(_SC_PAGE_SIZE));
84   ret = brk(new_break);
85   if (ret == -1) {
86     ASSERT_ERRNO(ENOMEM);
87   } else {
88     ASSERT_EQ(0, ret);
89     ASSERT_EQ(get_brk(), new_break);
90   }
91 }
92 
TEST(UNISTD_TEST,brk_ENOMEM)93 TEST(UNISTD_TEST, brk_ENOMEM) {
94   ASSERT_EQ(-1, brk(reinterpret_cast<void*>(-1)));
95   ASSERT_ERRNO(ENOMEM);
96 }
97 
98 #if defined(__GLIBC__)
99 #define SBRK_MIN INTPTR_MIN
100 #define SBRK_MAX INTPTR_MAX
101 #else
102 #define SBRK_MIN PTRDIFF_MIN
103 #define SBRK_MAX PTRDIFF_MAX
104 #endif
105 
TEST(UNISTD_TEST,sbrk_ENOMEM)106 TEST(UNISTD_TEST, sbrk_ENOMEM) {
107 #if defined(__BIONIC__) && !defined(__LP64__)
108   // There is no way to guarantee that all overflow conditions can be tested
109   // without manipulating the underlying values of the current break.
110   extern void* __bionic_brk;
111 
112   class ScopedBrk {
113   public:
114     ScopedBrk() : saved_brk_(__bionic_brk) {}
115     virtual ~ScopedBrk() { __bionic_brk = saved_brk_; }
116 
117   private:
118     void* saved_brk_;
119   };
120 
121   ScopedBrk scope_brk;
122 
123   // Set the current break to a point that will cause an overflow.
124   __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) + 2);
125 
126   // Can't increase by so much that we'd overflow.
127   ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MAX));
128   ASSERT_ERRNO(ENOMEM);
129 
130   // Set the current break to a point that will cause an overflow.
131   __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX));
132 
133   ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN));
134   ASSERT_ERRNO(ENOMEM);
135 
136   __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) - 1);
137 
138   ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN + 1));
139   ASSERT_ERRNO(ENOMEM);
140 #else
141   class ScopedBrk {
142   public:
143     ScopedBrk() : saved_brk_(get_brk()) {}
144     virtual ~ScopedBrk() { brk(saved_brk_); }
145 
146   private:
147     void* saved_brk_;
148   };
149 
150   ScopedBrk scope_brk;
151 
152   uintptr_t cur_brk = reinterpret_cast<uintptr_t>(get_brk());
153   if (cur_brk < static_cast<uintptr_t>(-(SBRK_MIN+1))) {
154     // Do the overflow test for a max negative increment.
155     ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MIN));
156 #if defined(__BIONIC__)
157     // GLIBC does not set errno in overflow case.
158     ASSERT_ERRNO(ENOMEM);
159 #endif
160   }
161 
162   uintptr_t overflow_brk = static_cast<uintptr_t>(SBRK_MAX) + 2;
163   if (cur_brk < overflow_brk) {
164     // Try and move the value to PTRDIFF_MAX + 2.
165     cur_brk = reinterpret_cast<uintptr_t>(sbrk(overflow_brk));
166   }
167   if (cur_brk >= overflow_brk) {
168     ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MAX));
169 #if defined(__BIONIC__)
170     // GLIBC does not set errno in overflow case.
171     ASSERT_ERRNO(ENOMEM);
172 #endif
173   }
174 #endif
175 }
176 
TEST(UNISTD_TEST,truncate)177 TEST(UNISTD_TEST, truncate) {
178   TemporaryFile tf;
179   ASSERT_EQ(0, close(tf.fd));
180   ASSERT_EQ(0, truncate(tf.path, 123));
181 
182   struct stat sb;
183   ASSERT_EQ(0, stat(tf.path, &sb));
184   ASSERT_EQ(123, sb.st_size);
185 }
186 
TEST(UNISTD_TEST,truncate64_smoke)187 TEST(UNISTD_TEST, truncate64_smoke) {
188   TemporaryFile tf;
189   ASSERT_EQ(0, close(tf.fd));
190   ASSERT_EQ(0, truncate64(tf.path, 123));
191 
192   struct stat sb;
193   ASSERT_EQ(0, stat(tf.path, &sb));
194   ASSERT_EQ(123, sb.st_size);
195 }
196 
TEST(UNISTD_TEST,ftruncate)197 TEST(UNISTD_TEST, ftruncate) {
198   TemporaryFile tf;
199   ASSERT_EQ(0, ftruncate(tf.fd, 123));
200   ASSERT_EQ(0, close(tf.fd));
201 
202   struct stat sb;
203   ASSERT_EQ(0, stat(tf.path, &sb));
204   ASSERT_EQ(123, sb.st_size);
205 }
206 
TEST(UNISTD_TEST,ftruncate64_smoke)207 TEST(UNISTD_TEST, ftruncate64_smoke) {
208   TemporaryFile tf;
209   ASSERT_EQ(0, ftruncate64(tf.fd, 123));
210   ASSERT_EQ(0, close(tf.fd));
211 
212   struct stat sb;
213   ASSERT_EQ(0, stat(tf.path, &sb));
214   ASSERT_EQ(123, sb.st_size);
215 }
216 
TEST(UNISTD_TEST,ftruncate_negative)217 TEST(UNISTD_TEST, ftruncate_negative) {
218   TemporaryFile tf;
219   errno = 0;
220   ASSERT_EQ(-1, ftruncate(tf.fd, -123));
221   ASSERT_ERRNO(EINVAL);
222 }
223 
224 static bool g_pause_test_flag = false;
PauseTestSignalHandler(int)225 static void PauseTestSignalHandler(int) {
226   g_pause_test_flag = true;
227 }
228 
TEST(UNISTD_TEST,pause)229 TEST(UNISTD_TEST, pause) {
230   ScopedSignalHandler handler(SIGALRM, PauseTestSignalHandler);
231 
232   alarm(1);
233   ASSERT_FALSE(g_pause_test_flag);
234   ASSERT_EQ(-1, pause());
235   ASSERT_TRUE(g_pause_test_flag);
236 }
237 
TEST(UNISTD_TEST,read)238 TEST(UNISTD_TEST, read) {
239   int fd = open("/proc/version", O_RDONLY);
240   ASSERT_TRUE(fd != -1);
241 
242   char buf[5];
243   ASSERT_EQ(5, read(fd, buf, 5));
244   ASSERT_EQ(buf[0], 'L');
245   ASSERT_EQ(buf[1], 'i');
246   ASSERT_EQ(buf[2], 'n');
247   ASSERT_EQ(buf[3], 'u');
248   ASSERT_EQ(buf[4], 'x');
249   close(fd);
250 }
251 
TEST(UNISTD_TEST,read_EBADF)252 TEST(UNISTD_TEST, read_EBADF) {
253   // read returns ssize_t which is 64-bits on LP64, so it's worth explicitly checking that
254   // our syscall stubs correctly return a 64-bit -1.
255   char buf[1];
256   ASSERT_EQ(-1, read(-1, buf, sizeof(buf)));
257   ASSERT_ERRNO(EBADF);
258 }
259 
TEST(UNISTD_TEST,syscall_long)260 TEST(UNISTD_TEST, syscall_long) {
261   // Check that syscall(3) correctly returns long results.
262   // https://code.google.com/p/android/issues/detail?id=73952
263   // We assume that the break is > 4GiB, but this is potentially flaky.
264   uintptr_t p = reinterpret_cast<uintptr_t>(sbrk(0));
265   ASSERT_EQ(p, static_cast<uintptr_t>(syscall(__NR_brk, 0)));
266 }
267 
TEST(UNISTD_TEST,alarm)268 TEST(UNISTD_TEST, alarm) {
269   ASSERT_EQ(0U, alarm(0));
270 }
271 
TEST(UNISTD_TEST,_exit)272 TEST(UNISTD_TEST, _exit) {
273   pid_t pid = fork();
274   ASSERT_NE(-1, pid) << strerror(errno);
275 
276   if (pid == 0) {
277     _exit(99);
278   }
279 
280   AssertChildExited(pid, 99);
281 }
282 
TEST(UNISTD_TEST,getenv_unsetenv)283 TEST(UNISTD_TEST, getenv_unsetenv) {
284   ASSERT_EQ(0, setenv("test-variable", "hello", 1));
285   ASSERT_STREQ("hello", getenv("test-variable"));
286   ASSERT_EQ(0, unsetenv("test-variable"));
287   ASSERT_TRUE(getenv("test-variable") == nullptr);
288 }
289 
TEST(UNISTD_TEST,unsetenv_EINVAL)290 TEST(UNISTD_TEST, unsetenv_EINVAL) {
291   EXPECT_EQ(-1, unsetenv(""));
292   EXPECT_ERRNO(EINVAL);
293   EXPECT_EQ(-1, unsetenv("a=b"));
294   EXPECT_ERRNO(EINVAL);
295 }
296 
TEST(UNISTD_TEST,setenv_EINVAL)297 TEST(UNISTD_TEST, setenv_EINVAL) {
298 #pragma clang diagnostic push
299 #pragma clang diagnostic ignored "-Wnonnull"
300   EXPECT_EQ(-1, setenv(nullptr, "value", 0));
301   EXPECT_ERRNO(EINVAL);
302   EXPECT_EQ(-1, setenv(nullptr, "value", 1));
303   EXPECT_ERRNO(EINVAL);
304 #pragma clang diagnostic pop
305   EXPECT_EQ(-1, setenv("", "value", 0));
306   EXPECT_ERRNO(EINVAL);
307   EXPECT_EQ(-1, setenv("", "value", 1));
308   EXPECT_ERRNO(EINVAL);
309   EXPECT_EQ(-1, setenv("a=b", "value", 0));
310   EXPECT_ERRNO(EINVAL);
311   EXPECT_EQ(-1, setenv("a=b", "value", 1));
312   EXPECT_ERRNO(EINVAL);
313 }
314 
TEST(UNISTD_TEST,setenv)315 TEST(UNISTD_TEST, setenv) {
316   ASSERT_EQ(0, unsetenv("test-variable"));
317 
318   char a[] = "a";
319   char b[] = "b";
320   char c[] = "c";
321 
322   // New value.
323   EXPECT_EQ(0, setenv("test-variable", a, 0));
324   EXPECT_STREQ(a, getenv("test-variable"));
325 
326   // Existing value, no overwrite.
327   EXPECT_EQ(0, setenv("test-variable", b, 0));
328   EXPECT_STREQ(a, getenv("test-variable"));
329 
330   // Existing value, overwrite.
331   EXPECT_EQ(0, setenv("test-variable", c, 1));
332   EXPECT_STREQ(c, getenv("test-variable"));
333   // But the arrays backing the values are unchanged.
334   EXPECT_EQ('a', a[0]);
335   EXPECT_EQ('b', b[0]);
336   EXPECT_EQ('c', c[0]);
337 
338   ASSERT_EQ(0, unsetenv("test-variable"));
339 }
340 
TEST(UNISTD_TEST,putenv)341 TEST(UNISTD_TEST, putenv) {
342   ASSERT_EQ(0, unsetenv("a"));
343 
344   char* s1 = strdup("a=b");
345   ASSERT_EQ(0, putenv(s1));
346 
347   ASSERT_STREQ("b", getenv("a"));
348   s1[2] = 'c';
349   ASSERT_STREQ("c", getenv("a"));
350 
351   char* s2 = strdup("a=b");
352   ASSERT_EQ(0, putenv(s2));
353 
354   ASSERT_STREQ("b", getenv("a"));
355   ASSERT_EQ('c', s1[2]);
356 
357   ASSERT_EQ(0, unsetenv("a"));
358   free(s1);
359   free(s2);
360 }
361 
TEST(UNISTD_TEST,clearenv)362 TEST(UNISTD_TEST, clearenv) {
363   extern char** environ;
364 
365   // Guarantee that environ is not initially empty...
366   ASSERT_EQ(0, setenv("test-variable", "a", 1));
367 
368   // Stash a copy.
369   std::vector<char*> old_environ;
370   for (size_t i = 0; environ[i] != nullptr; ++i) {
371     old_environ.push_back(strdup(environ[i]));
372   }
373 
374   ASSERT_EQ(0, clearenv());
375 
376   EXPECT_TRUE(environ == nullptr || environ[0] == nullptr);
377   EXPECT_EQ(nullptr, getenv("test-variable"));
378   EXPECT_EQ(0, setenv("test-variable", "post-clear", 1));
379   EXPECT_STREQ("post-clear", getenv("test-variable"));
380 
381   // Put the old environment back.
382   for (size_t i = 0; i < old_environ.size(); ++i) {
383     EXPECT_EQ(0, putenv(old_environ[i]));
384   }
385 
386   // Check it wasn't overwritten.
387   EXPECT_STREQ("a", getenv("test-variable"));
388 
389   EXPECT_EQ(0, unsetenv("test-variable"));
390 }
391 
TestSyncFunction(int (* fn)(int))392 static void TestSyncFunction(int (*fn)(int)) {
393   int fd;
394 
395   // Can't sync an invalid fd.
396   errno = 0;
397   EXPECT_EQ(-1, fn(-1));
398   EXPECT_ERRNO(EBADF);
399 
400   // It doesn't matter whether you've opened a file for write or not.
401   TemporaryFile tf;
402   ASSERT_NE(-1, tf.fd);
403 
404   EXPECT_EQ(0, fn(tf.fd));
405 
406   ASSERT_NE(-1, fd = open(tf.path, O_RDONLY));
407   EXPECT_EQ(0, fn(fd));
408   close(fd);
409 
410   ASSERT_NE(-1, fd = open(tf.path, O_RDWR));
411   EXPECT_EQ(0, fn(fd));
412   close(fd);
413 
414   // The fd can even be a directory.
415   ASSERT_NE(-1, fd = open("/data/local/tmp", O_RDONLY));
416   EXPECT_EQ(0, fn(fd));
417   close(fd);
418 }
419 
TestFsyncFunction(int (* fn)(int))420 static void TestFsyncFunction(int (*fn)(int)) {
421   TestSyncFunction(fn);
422 
423   // But some file systems are fussy about fsync/fdatasync...
424   errno = 0;
425   int fd = open("/proc/version", O_RDONLY);
426   ASSERT_NE(-1, fd);
427   EXPECT_EQ(-1, fn(fd));
428   EXPECT_ERRNO(EINVAL);
429   close(fd);
430 }
431 
TEST(UNISTD_TEST,fdatasync)432 TEST(UNISTD_TEST, fdatasync) {
433   TestFsyncFunction(fdatasync);
434 }
435 
TEST(UNISTD_TEST,fsync)436 TEST(UNISTD_TEST, fsync) {
437   TestFsyncFunction(fsync);
438 }
439 
TEST(UNISTD_TEST,syncfs)440 TEST(UNISTD_TEST, syncfs) {
441   TestSyncFunction(syncfs);
442 }
443 
TEST(UNISTD_TEST,_Fork)444 TEST(UNISTD_TEST, _Fork) {
445 #if defined(__BIONIC__)
446   pid_t rc = _Fork();
447   ASSERT_NE(-1, rc);
448   if (rc == 0) {
449     _exit(66);
450   }
451 
452   int status;
453   pid_t wait_result = waitpid(rc, &status, 0);
454   ASSERT_EQ(wait_result, rc);
455   ASSERT_TRUE(WIFEXITED(status));
456   ASSERT_EQ(66, WEXITSTATUS(status));
457 #endif
458 }
459 
TEST(UNISTD_TEST,vfork)460 TEST(UNISTD_TEST, vfork) {
461 #if defined(__BIONIC__)
462   pthread_internal_t* self = __get_thread();
463 
464   pid_t cached_pid;
465   ASSERT_TRUE(self->get_cached_pid(&cached_pid));
466   ASSERT_EQ(syscall(__NR_getpid), cached_pid);
467   ASSERT_FALSE(self->is_vforked());
468 
469   pid_t rc = vfork();
470   ASSERT_NE(-1, rc);
471   if (rc == 0) {
472     if (self->get_cached_pid(&cached_pid)) {
473       const char* error = "__get_thread()->cached_pid_ set after vfork\n";
474       write(STDERR_FILENO, error, strlen(error));
475       _exit(1);
476     }
477 
478     if (!self->is_vforked()) {
479       const char* error = "__get_thread()->vforked_ not set after vfork\n";
480       write(STDERR_FILENO, error, strlen(error));
481       _exit(1);
482     }
483 
484     _exit(0);
485   } else {
486     ASSERT_TRUE(self->get_cached_pid(&cached_pid));
487     ASSERT_EQ(syscall(__NR_getpid), cached_pid);
488     ASSERT_FALSE(self->is_vforked());
489 
490     int status;
491     pid_t wait_result = waitpid(rc, &status, 0);
492     ASSERT_EQ(wait_result, rc);
493     ASSERT_TRUE(WIFEXITED(status));
494     ASSERT_EQ(0, WEXITSTATUS(status));
495   }
496 #endif
497 }
498 
AssertGetPidCorrect()499 static void AssertGetPidCorrect() {
500   // The loop is just to make manual testing/debugging with strace easier.
501   pid_t getpid_syscall_result = syscall(__NR_getpid);
502   for (size_t i = 0; i < 128; ++i) {
503     ASSERT_EQ(getpid_syscall_result, getpid());
504   }
505 }
506 
TestGetPidCachingWithFork(int (* fork_fn)(),void (* exit_fn)(int))507 static void TestGetPidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) {
508   pid_t parent_pid = getpid();
509   ASSERT_EQ(syscall(__NR_getpid), parent_pid);
510 
511   pid_t fork_result = fork_fn();
512   ASSERT_NE(fork_result, -1);
513   if (fork_result == 0) {
514     // We're the child.
515     ASSERT_NO_FATAL_FAILURE(AssertGetPidCorrect());
516     ASSERT_EQ(parent_pid, getppid());
517     exit_fn(123);
518   } else {
519     // We're the parent.
520     ASSERT_EQ(parent_pid, getpid());
521     AssertChildExited(fork_result, 123);
522   }
523 }
524 
525 // gettid() is marked as __attribute_const__, which will have the compiler
526 // optimize out multiple calls to gettid in the same function. This wrapper
527 // defeats that optimization.
GetTidForTest()528 static __attribute__((__noinline__)) pid_t GetTidForTest() {
529   __asm__("");
530   return gettid();
531 }
532 
AssertGetTidCorrect()533 static void AssertGetTidCorrect() {
534   // The loop is just to make manual testing/debugging with strace easier.
535   pid_t gettid_syscall_result = syscall(__NR_gettid);
536   for (size_t i = 0; i < 128; ++i) {
537     ASSERT_EQ(gettid_syscall_result, GetTidForTest());
538   }
539 }
540 
TestGetTidCachingWithFork(int (* fork_fn)(),void (* exit_fn)(int))541 static void TestGetTidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) {
542   pid_t parent_tid = GetTidForTest();
543   ASSERT_EQ(syscall(__NR_gettid), parent_tid);
544 
545   pid_t fork_result = fork_fn();
546   ASSERT_NE(fork_result, -1);
547   if (fork_result == 0) {
548     // We're the child.
549     EXPECT_EQ(syscall(__NR_getpid), syscall(__NR_gettid));
550     EXPECT_EQ(getpid(), GetTidForTest()) << "real tid is " << syscall(__NR_gettid)
551                                          << ", pid is " << syscall(__NR_getpid);
552     ASSERT_NO_FATAL_FAILURE(AssertGetTidCorrect());
553     exit_fn(123);
554   } else {
555     // We're the parent.
556     ASSERT_EQ(parent_tid, GetTidForTest());
557     AssertChildExited(fork_result, 123);
558   }
559 }
560 
TEST(UNISTD_TEST,getpid_caching_and_fork)561 TEST(UNISTD_TEST, getpid_caching_and_fork) {
562   TestGetPidCachingWithFork(fork, exit);
563 }
564 
TEST(UNISTD_TEST,gettid_caching_and_fork)565 TEST(UNISTD_TEST, gettid_caching_and_fork) {
566   TestGetTidCachingWithFork(fork, exit);
567 }
568 
TEST(UNISTD_TEST,getpid_caching_and_vfork)569 TEST(UNISTD_TEST, getpid_caching_and_vfork) {
570   TestGetPidCachingWithFork(vfork, _exit);
571 }
572 
CloneLikeFork()573 static int CloneLikeFork() {
574   return clone(nullptr, nullptr, SIGCHLD, nullptr);
575 }
576 
TEST(UNISTD_TEST,getpid_caching_and_clone_process)577 TEST(UNISTD_TEST, getpid_caching_and_clone_process) {
578   TestGetPidCachingWithFork(CloneLikeFork, exit);
579 }
580 
TEST(UNISTD_TEST,gettid_caching_and_clone_process)581 TEST(UNISTD_TEST, gettid_caching_and_clone_process) {
582   TestGetTidCachingWithFork(CloneLikeFork, exit);
583 }
584 
CloneAndSetTid()585 static int CloneAndSetTid() {
586   pid_t child_tid = 0;
587   pid_t parent_tid = GetTidForTest();
588 
589   int rv = clone(nullptr, nullptr, CLONE_CHILD_SETTID | SIGCHLD, nullptr, nullptr, nullptr, &child_tid);
590   EXPECT_NE(-1, rv);
591 
592   if (rv == 0) {
593     // Child.
594     EXPECT_EQ(child_tid, GetTidForTest());
595     EXPECT_NE(child_tid, parent_tid);
596   } else {
597     EXPECT_NE(child_tid, GetTidForTest());
598     EXPECT_NE(child_tid, parent_tid);
599     EXPECT_EQ(GetTidForTest(), parent_tid);
600   }
601 
602   return rv;
603 }
604 
TEST(UNISTD_TEST,gettid_caching_and_clone_process_settid)605 TEST(UNISTD_TEST, gettid_caching_and_clone_process_settid) {
606   TestGetTidCachingWithFork(CloneAndSetTid, exit);
607 }
608 
609 __attribute__((no_sanitize("hwaddress", "memtag")))
CloneStartRoutine(int (* start_routine)(void *))610 static int CloneStartRoutine(int (*start_routine)(void*)) {
611   void* child_stack[1024];
612   return clone(start_routine, &child_stack[1024], SIGCHLD, nullptr);
613 }
614 
GetPidCachingCloneStartRoutine(void *)615 static int GetPidCachingCloneStartRoutine(void*) {
616   AssertGetPidCorrect();
617   return 123;
618 }
619 
TEST(UNISTD_TEST,getpid_caching_and_clone)620 TEST(UNISTD_TEST, getpid_caching_and_clone) {
621   pid_t parent_pid = getpid();
622   ASSERT_EQ(syscall(__NR_getpid), parent_pid);
623 
624   int clone_result = CloneStartRoutine(GetPidCachingCloneStartRoutine);
625   ASSERT_NE(clone_result, -1);
626 
627   ASSERT_EQ(parent_pid, getpid());
628 
629   AssertChildExited(clone_result, 123);
630 }
631 
GetTidCachingCloneStartRoutine(void *)632 static int GetTidCachingCloneStartRoutine(void*) {
633   AssertGetTidCorrect();
634   return 123;
635 }
636 
TEST(UNISTD_TEST,gettid_caching_and_clone)637 TEST(UNISTD_TEST, gettid_caching_and_clone) {
638   pid_t parent_tid = GetTidForTest();
639   ASSERT_EQ(syscall(__NR_gettid), parent_tid);
640 
641   int clone_result = CloneStartRoutine(GetTidCachingCloneStartRoutine);
642   ASSERT_NE(clone_result, -1);
643 
644   ASSERT_EQ(parent_tid, GetTidForTest());
645 
646   AssertChildExited(clone_result, 123);
647 }
648 
CloneChildExit(void *)649 static int CloneChildExit(void*) {
650   AssertGetPidCorrect();
651   AssertGetTidCorrect();
652   exit(33);
653 }
654 
TEST(UNISTD_TEST,clone_fn_and_exit)655 TEST(UNISTD_TEST, clone_fn_and_exit) {
656   int clone_result = CloneStartRoutine(CloneChildExit);
657   ASSERT_NE(-1, clone_result);
658 
659   AssertGetPidCorrect();
660   AssertGetTidCorrect();
661 
662   AssertChildExited(clone_result, 33);
663 }
664 
GetPidCachingPthreadStartRoutine(void *)665 static void* GetPidCachingPthreadStartRoutine(void*) {
666   AssertGetPidCorrect();
667   return nullptr;
668 }
669 
TEST(UNISTD_TEST,getpid_caching_and_pthread_create)670 TEST(UNISTD_TEST, getpid_caching_and_pthread_create) {
671   pid_t parent_pid = getpid();
672 
673   pthread_t t;
674   ASSERT_EQ(0, pthread_create(&t, nullptr, GetPidCachingPthreadStartRoutine, nullptr));
675 
676   ASSERT_EQ(parent_pid, getpid());
677 
678   void* result;
679   ASSERT_EQ(0, pthread_join(t, &result));
680   ASSERT_EQ(nullptr, result);
681 }
682 
GetTidCachingPthreadStartRoutine(void *)683 static void* GetTidCachingPthreadStartRoutine(void*) {
684   AssertGetTidCorrect();
685   uint64_t tid = GetTidForTest();
686   return reinterpret_cast<void*>(tid);
687 }
688 
TEST(UNISTD_TEST,gettid_caching_and_pthread_create)689 TEST(UNISTD_TEST, gettid_caching_and_pthread_create) {
690   pid_t parent_tid = GetTidForTest();
691 
692   pthread_t t;
693   ASSERT_EQ(0, pthread_create(&t, nullptr, GetTidCachingPthreadStartRoutine, &parent_tid));
694 
695   ASSERT_EQ(parent_tid, GetTidForTest());
696 
697   void* result;
698   ASSERT_EQ(0, pthread_join(t, &result));
699   ASSERT_NE(static_cast<uint64_t>(parent_tid), reinterpret_cast<uint64_t>(result));
700 }
701 
HwasanVforkTestChild()702 __attribute__((noinline)) static void HwasanVforkTestChild() {
703   // Allocate a tagged region on stack and leave it there.
704   char x[10000];
705   DoNotOptimize(x);
706   _exit(0);
707 }
708 
HwasanReadMemory(const char * p,size_t size)709 __attribute__((noinline)) static void HwasanReadMemory(const char* p, size_t size) {
710   // Read memory byte-by-byte. This will blow up if the pointer tag in p does not match any memory
711   // tag in [p, p+size).
712   char z;
713   for (size_t i = 0; i < size; ++i) {
714     DoNotOptimize(z = p[i]);
715   }
716 }
717 
HwasanVforkTestParent()718 __attribute__((noinline, no_sanitize("hwaddress"))) static void HwasanVforkTestParent() {
719   // Allocate a region on stack, but don't tag it (see the function attribute).
720   // This depends on unallocated stack space at current function entry being untagged.
721   char x[10000];
722   DoNotOptimize(x);
723   // Verify that contents of x[] are untagged.
724   HwasanReadMemory(x, sizeof(x));
725 }
726 
TEST(UNISTD_TEST,hwasan_vfork)727 TEST(UNISTD_TEST, hwasan_vfork) {
728   // Test hwasan annotation in vfork. This test is only interesting when built with hwasan, but it
729   // is supposed to work correctly either way.
730   if (vfork()) {
731     HwasanVforkTestParent();
732   } else {
733     HwasanVforkTestChild();
734   }
735 }
736 
TEST_F(UNISTD_DEATHTEST,abort)737 TEST_F(UNISTD_DEATHTEST, abort) {
738   ASSERT_EXIT(abort(), testing::KilledBySignal(SIGABRT), "");
739 }
740 
TEST(UNISTD_TEST,sethostname)741 TEST(UNISTD_TEST, sethostname) {
742   // The permissions check happens before the argument check, so this will
743   // fail for a different reason if you're running as root than if you're
744   // not, but it'll fail either way. Checking that we have the symbol is about
745   // all we can do for sethostname(2).
746   ASSERT_EQ(-1, sethostname("", -1));
747 }
748 
TEST(UNISTD_TEST,gethostname)749 TEST(UNISTD_TEST, gethostname) {
750   char hostname[HOST_NAME_MAX + 1];
751   memset(hostname, 0, sizeof(hostname));
752 
753   // Can we get the hostname with a big buffer?
754   ASSERT_EQ(0, gethostname(hostname, HOST_NAME_MAX));
755 
756   // Can we get the hostname with a right-sized buffer?
757   ASSERT_EQ(0, gethostname(hostname, strlen(hostname) + 1));
758 
759   // Does uname(2) agree?
760   utsname buf;
761   ASSERT_EQ(0, uname(&buf));
762   ASSERT_EQ(0, strncmp(hostname, buf.nodename, sizeof(buf.nodename)));
763   ASSERT_GT(strlen(hostname), 0U);
764 
765   // Do we correctly detect truncation?
766   errno = 0;
767   ASSERT_EQ(-1, gethostname(hostname, strlen(hostname)));
768   ASSERT_ERRNO(ENAMETOOLONG);
769 }
770 
TEST(UNISTD_TEST,pathconf_fpathconf)771 TEST(UNISTD_TEST, pathconf_fpathconf) {
772   TemporaryFile tf;
773   long l;
774 
775   // As a file system's block size is always power of 2, the configure values
776   // for ALLOC and XFER should be power of 2 as well.
777   l = pathconf(tf.path, _PC_ALLOC_SIZE_MIN);
778   ASSERT_TRUE(l > 0 && powerof2(l));
779   l = pathconf(tf.path, _PC_REC_MIN_XFER_SIZE);
780   ASSERT_TRUE(l > 0 && powerof2(l));
781   l = pathconf(tf.path, _PC_REC_XFER_ALIGN);
782   ASSERT_TRUE(l > 0 && powerof2(l));
783 
784   l = fpathconf(tf.fd, _PC_ALLOC_SIZE_MIN);
785   ASSERT_TRUE(l > 0 && powerof2(l));
786   l = fpathconf(tf.fd, _PC_REC_MIN_XFER_SIZE);
787   ASSERT_TRUE(l > 0 && powerof2(l));
788   l = fpathconf(tf.fd, _PC_REC_XFER_ALIGN);
789   ASSERT_TRUE(l > 0 && powerof2(l));
790 
791   // Check that the "I can't answer that, you'll have to try it and see"
792   // cases don't set errno.
793   int names[] = {
794       _PC_ASYNC_IO, _PC_PRIO_IO, _PC_REC_INCR_XFER_SIZE, _PC_REC_MAX_XFER_SIZE, _PC_SYMLINK_MAX,
795       _PC_SYNC_IO,  -1};
796   for (size_t i = 0; names[i] != -1; i++) {
797     errno = 0;
798     ASSERT_EQ(-1, pathconf(tf.path, names[i])) << names[i];
799     ASSERT_ERRNO(0) << names[i];
800     ASSERT_EQ(-1, fpathconf(tf.fd, names[i])) << names[i];
801     ASSERT_ERRNO(0) << names[i];
802   }
803 }
804 
TEST(UNISTD_TEST,_POSIX_constants)805 TEST(UNISTD_TEST, _POSIX_constants) {
806   // Make a tight verification of _POSIX_* / _POSIX2_* / _XOPEN_* macros, to prevent change by mistake.
807   // Verify according to POSIX.1-2008.
808   EXPECT_EQ(200809L, _POSIX_VERSION);
809 
810   EXPECT_EQ(2, _POSIX_AIO_LISTIO_MAX);
811   EXPECT_EQ(1, _POSIX_AIO_MAX);
812   EXPECT_EQ(4096, _POSIX_ARG_MAX);
813   EXPECT_EQ(25, _POSIX_CHILD_MAX);
814   EXPECT_EQ(20000000, _POSIX_CLOCKRES_MIN);
815   EXPECT_EQ(32, _POSIX_DELAYTIMER_MAX);
816   EXPECT_EQ(255, _POSIX_HOST_NAME_MAX);
817   EXPECT_EQ(8, _POSIX_LINK_MAX);
818   EXPECT_EQ(9, _POSIX_LOGIN_NAME_MAX);
819   EXPECT_EQ(255, _POSIX_MAX_CANON);
820   EXPECT_EQ(255, _POSIX_MAX_INPUT);
821   EXPECT_EQ(8, _POSIX_MQ_OPEN_MAX);
822   EXPECT_EQ(32, _POSIX_MQ_PRIO_MAX);
823   EXPECT_EQ(14, _POSIX_NAME_MAX);
824   EXPECT_EQ(8, _POSIX_NGROUPS_MAX);
825   EXPECT_EQ(20, _POSIX_OPEN_MAX);
826   EXPECT_EQ(256, _POSIX_PATH_MAX);
827   EXPECT_EQ(512, _POSIX_PIPE_BUF);
828   EXPECT_EQ(255, _POSIX_RE_DUP_MAX);
829   EXPECT_EQ(8, _POSIX_RTSIG_MAX);
830   EXPECT_EQ(256, _POSIX_SEM_NSEMS_MAX);
831   EXPECT_EQ(32767, _POSIX_SEM_VALUE_MAX);
832   EXPECT_EQ(32, _POSIX_SIGQUEUE_MAX);
833   EXPECT_EQ(32767, _POSIX_SSIZE_MAX);
834   EXPECT_EQ(8, _POSIX_STREAM_MAX);
835 #if !defined(__GLIBC__)
836   EXPECT_EQ(4, _POSIX_SS_REPL_MAX);
837 #endif
838   EXPECT_EQ(255, _POSIX_SYMLINK_MAX);
839   EXPECT_EQ(8, _POSIX_SYMLOOP_MAX);
840   EXPECT_EQ(4, _POSIX_THREAD_DESTRUCTOR_ITERATIONS);
841   EXPECT_EQ(128, _POSIX_THREAD_KEYS_MAX);
842   EXPECT_EQ(64, _POSIX_THREAD_THREADS_MAX);
843   EXPECT_EQ(32, _POSIX_TIMER_MAX);
844 #if !defined(__GLIBC__)
845   EXPECT_EQ(30, _POSIX_TRACE_EVENT_NAME_MAX);
846   EXPECT_EQ(8, _POSIX_TRACE_NAME_MAX);
847   EXPECT_EQ(8, _POSIX_TRACE_SYS_MAX);
848   EXPECT_EQ(32, _POSIX_TRACE_USER_EVENT_MAX);
849 #endif
850   EXPECT_EQ(9, _POSIX_TTY_NAME_MAX);
851   EXPECT_EQ(6, _POSIX_TZNAME_MAX);
852   EXPECT_EQ(99, _POSIX2_BC_BASE_MAX);
853   EXPECT_EQ(2048, _POSIX2_BC_DIM_MAX);
854   EXPECT_EQ(99, _POSIX2_BC_SCALE_MAX);
855   EXPECT_EQ(1000, _POSIX2_BC_STRING_MAX);
856   EXPECT_EQ(14, _POSIX2_CHARCLASS_NAME_MAX);
857   EXPECT_EQ(2, _POSIX2_COLL_WEIGHTS_MAX);
858   EXPECT_EQ(32, _POSIX2_EXPR_NEST_MAX);
859   EXPECT_EQ(2048, _POSIX2_LINE_MAX);
860   EXPECT_EQ(255, _POSIX2_RE_DUP_MAX);
861 
862   EXPECT_EQ(16, _XOPEN_IOV_MAX);
863 #if !defined(__GLIBC__)
864   EXPECT_EQ(255, _XOPEN_NAME_MAX);
865   EXPECT_EQ(1024, _XOPEN_PATH_MAX);
866 #endif
867 }
868 
TEST(UNISTD_TEST,_POSIX_options)869 TEST(UNISTD_TEST, _POSIX_options) {
870   EXPECT_EQ(_POSIX_VERSION, _POSIX_ADVISORY_INFO);
871   EXPECT_GT(_POSIX_BARRIERS, 0);
872   EXPECT_GT(_POSIX_SPIN_LOCKS, 0);
873   EXPECT_NE(_POSIX_CHOWN_RESTRICTED, -1);
874   EXPECT_EQ(_POSIX_VERSION, _POSIX_CLOCK_SELECTION);
875 #if !defined(__GLIBC__) // glibc supports ancient kernels.
876   EXPECT_EQ(_POSIX_VERSION, _POSIX_CPUTIME);
877 #endif
878   EXPECT_EQ(_POSIX_VERSION, _POSIX_FSYNC);
879   EXPECT_EQ(_POSIX_VERSION, _POSIX_IPV6);
880   EXPECT_GT(_POSIX_JOB_CONTROL, 0);
881   EXPECT_EQ(_POSIX_VERSION, _POSIX_MAPPED_FILES);
882   EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK);
883   EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK_RANGE);
884   EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMORY_PROTECTION);
885 #if !defined(__GLIBC__) // glibc supports ancient kernels.
886   EXPECT_EQ(_POSIX_VERSION, _POSIX_MONOTONIC_CLOCK);
887 #endif
888   EXPECT_GT(_POSIX_NO_TRUNC, 0);
889 #if !defined(ANDROID_HOST_MUSL)
890   EXPECT_EQ(_POSIX_VERSION, _POSIX_PRIORITY_SCHEDULING);
891 #endif
892   EXPECT_EQ(_POSIX_VERSION, _POSIX_RAW_SOCKETS);
893   EXPECT_EQ(_POSIX_VERSION, _POSIX_READER_WRITER_LOCKS);
894   EXPECT_EQ(_POSIX_VERSION, _POSIX_REALTIME_SIGNALS);
895   EXPECT_GT(_POSIX_REGEXP, 0);
896   EXPECT_GT(_POSIX_SAVED_IDS, 0);
897   EXPECT_EQ(_POSIX_VERSION, _POSIX_SEMAPHORES);
898   EXPECT_GT(_POSIX_SHELL, 0);
899   EXPECT_EQ(_POSIX_VERSION, _POSIX_SPAWN);
900 #if !defined(ANDROID_HOST_MUSL)
901   EXPECT_EQ(-1, _POSIX_SPORADIC_SERVER);
902   EXPECT_EQ(_POSIX_VERSION, _POSIX_SYNCHRONIZED_IO);
903 #endif
904   EXPECT_EQ(_POSIX_VERSION, _POSIX_THREADS);
905   EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKADDR);
906   EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKSIZE);
907 #if !defined(__GLIBC__) // glibc supports ancient kernels.
908   EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_CPUTIME);
909 #endif
910   EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PRIORITY_SCHEDULING);
911   EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PROCESS_SHARED);
912 #if !defined(ANDROID_HOST_MUSL)
913   EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_PROTECT);
914 #endif
915   EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_SAFE_FUNCTIONS);
916 #if !defined(ANDROID_HOST_MUSL)
917   EXPECT_EQ(-1, _POSIX_THREAD_SPORADIC_SERVER);
918 #endif
919   EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMEOUTS);
920   EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMERS);
921 #if !defined(ANDROID_HOST_MUSL)
922   EXPECT_EQ(-1, _POSIX_TRACE);
923   EXPECT_EQ(-1, _POSIX_TRACE_EVENT_FILTER);
924   EXPECT_EQ(-1, _POSIX_TRACE_INHERIT);
925   EXPECT_EQ(-1, _POSIX_TRACE_LOG);
926   EXPECT_EQ(-1, _POSIX_TYPED_MEMORY_OBJECTS);
927 #endif
928   EXPECT_NE(-1, _POSIX_VDISABLE);
929 
930   EXPECT_EQ(_POSIX_VERSION, _POSIX2_VERSION);
931   EXPECT_EQ(_POSIX_VERSION, _POSIX2_C_BIND);
932 #if !defined(ANDROID_HOST_MUSL)
933   EXPECT_EQ(_POSIX_VERSION, _POSIX2_CHAR_TERM);
934 #endif
935 
936   EXPECT_EQ(700, _XOPEN_VERSION);
937   EXPECT_EQ(1, _XOPEN_ENH_I18N);
938 #if !defined(ANDROID_HOST_MUSL)
939   EXPECT_EQ(1, _XOPEN_REALTIME);
940   EXPECT_EQ(1, _XOPEN_REALTIME_THREADS);
941   EXPECT_EQ(1, _XOPEN_SHM);
942 #endif
943   EXPECT_EQ(1, _XOPEN_UNIX);
944 
945 #if defined(__BIONIC__)
946   // These tests only pass on bionic, as bionic and glibc has different support on these macros.
947   // Macros like _POSIX_ASYNCHRONOUS_IO are not supported on bionic yet.
948   EXPECT_EQ(-1, _POSIX_ASYNCHRONOUS_IO);
949   EXPECT_EQ(-1, _POSIX_MESSAGE_PASSING);
950   EXPECT_EQ(-1, _POSIX_PRIORITIZED_IO);
951   EXPECT_EQ(-1, _POSIX_SHARED_MEMORY_OBJECTS);
952   EXPECT_EQ(-1, _POSIX_THREAD_PRIO_INHERIT);
953   EXPECT_EQ(-1, _POSIX_THREAD_PRIO_PROTECT);
954   EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_INHERIT);
955 
956   EXPECT_EQ(-1, _POSIX2_C_DEV);
957   EXPECT_EQ(-1, _POSIX2_FORT_DEV);
958   EXPECT_EQ(-1, _POSIX2_FORT_RUN);
959   EXPECT_EQ(-1, _POSIX2_LOCALEDEF);
960   EXPECT_EQ(-1, _POSIX2_SW_DEV);
961   EXPECT_EQ(-1, _POSIX2_UPE);
962 
963   EXPECT_EQ(-1, _XOPEN_CRYPT);
964   EXPECT_EQ(-1, _XOPEN_LEGACY);
965   EXPECT_EQ(-1, _XOPEN_STREAMS);
966 #endif // defined(__BIONIC__)
967 }
968 
969 #define VERIFY_SYSCONF_UNKNOWN(name) \
970   VerifySysconf(name, #name, [](long v){return v == -1 && errno == EINVAL;})
971 
972 #define VERIFY_SYSCONF_UNSUPPORTED(name) \
973   VerifySysconf(name, #name, [](long v){return v == -1 && errno == 0;})
974 
975 // sysconf() means unlimited when it returns -1 with errno unchanged.
976 #define VERIFY_SYSCONF_POSITIVE(name) \
977   VerifySysconf(name, #name, [](long v){return (v > 0 || v == -1) && errno == 0;})
978 
979 #define VERIFY_SYSCONF_POSIX_VERSION(name) \
980   VerifySysconf(name, #name, [](long v){return v == _POSIX_VERSION && errno == 0;})
981 
VerifySysconf(int option,const char * option_name,bool (* verify)(long))982 static void VerifySysconf(int option, const char *option_name, bool (*verify)(long)) {
983   errno = 0;
984   long ret = sysconf(option);
985   EXPECT_TRUE(verify(ret)) << "name = " << option_name << ", ret = "
986       << ret <<", Error Message: " << strerror(errno);
987 }
988 
TEST(UNISTD_TEST,sysconf)989 TEST(UNISTD_TEST, sysconf) {
990   VERIFY_SYSCONF_POSIX_VERSION(_SC_ADVISORY_INFO);
991   VERIFY_SYSCONF_POSITIVE(_SC_ARG_MAX);
992   VERIFY_SYSCONF_POSIX_VERSION(_SC_BARRIERS);
993   VERIFY_SYSCONF_POSITIVE(_SC_BC_BASE_MAX);
994   VERIFY_SYSCONF_POSITIVE(_SC_BC_DIM_MAX);
995   VERIFY_SYSCONF_POSITIVE(_SC_BC_SCALE_MAX);
996   VERIFY_SYSCONF_POSITIVE(_SC_CHILD_MAX);
997   VERIFY_SYSCONF_POSITIVE(_SC_CLK_TCK);
998   VERIFY_SYSCONF_POSITIVE(_SC_COLL_WEIGHTS_MAX);
999   VERIFY_SYSCONF_POSIX_VERSION(_SC_CPUTIME);
1000   VERIFY_SYSCONF_POSITIVE(_SC_EXPR_NEST_MAX);
1001   VERIFY_SYSCONF_POSITIVE(_SC_LINE_MAX);
1002   VerifySysconf(_SC_NGROUPS_MAX, "_SC_NGROUPS_MAX", [](long v){return v >= 0 && v <= NGROUPS_MAX;});
1003 #if defined(__BIONIC__) || defined(_SC_NSIG) // New in POSIX 2024.
1004   EXPECT_EQ(NSIG, sysconf(_SC_NSIG));
1005 #endif
1006   VERIFY_SYSCONF_POSITIVE(_SC_OPEN_MAX);
1007   VERIFY_SYSCONF_POSITIVE(_SC_PASS_MAX);
1008   VERIFY_SYSCONF_POSIX_VERSION(_SC_2_C_BIND);
1009   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_DEV);
1010   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_RUN);
1011   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_UPE);
1012   VERIFY_SYSCONF_POSIX_VERSION(_SC_2_VERSION);
1013   VERIFY_SYSCONF_POSITIVE(_SC_JOB_CONTROL);
1014   VERIFY_SYSCONF_POSITIVE(_SC_SAVED_IDS);
1015   VERIFY_SYSCONF_POSIX_VERSION(_SC_VERSION);
1016   VERIFY_SYSCONF_POSITIVE(_SC_RE_DUP_MAX);
1017   VERIFY_SYSCONF_POSITIVE(_SC_STREAM_MAX);
1018   VERIFY_SYSCONF_POSITIVE(_SC_TZNAME_MAX);
1019   VerifySysconf(_SC_XOPEN_VERSION, "_SC_XOPEN_VERSION", [](long v){return v == _XOPEN_VERSION && errno == 0;});
1020   VERIFY_SYSCONF_POSITIVE(_SC_ATEXIT_MAX);
1021   VERIFY_SYSCONF_POSITIVE(_SC_IOV_MAX);
1022   VERIFY_SYSCONF_POSITIVE(_SC_UIO_MAXIOV);
1023   EXPECT_EQ(sysconf(_SC_IOV_MAX), sysconf(_SC_UIO_MAXIOV));
1024   VERIFY_SYSCONF_POSITIVE(_SC_PAGESIZE);
1025   VERIFY_SYSCONF_POSITIVE(_SC_PAGE_SIZE);
1026   VerifySysconf(_SC_PAGE_SIZE, "_SC_PAGE_SIZE",
1027                 [](long v){return v == sysconf(_SC_PAGESIZE) && errno == 0 && v == getpagesize();});
1028   VERIFY_SYSCONF_POSITIVE(_SC_XOPEN_UNIX);
1029   VERIFY_SYSCONF_POSITIVE(_SC_AIO_LISTIO_MAX);
1030   VERIFY_SYSCONF_POSITIVE(_SC_AIO_MAX);
1031   VerifySysconf(_SC_AIO_PRIO_DELTA_MAX, "_SC_AIO_PRIO_DELTA_MAX", [](long v){return v >= 0 && errno == 0;});
1032   VERIFY_SYSCONF_POSITIVE(_SC_DELAYTIMER_MAX);
1033   VERIFY_SYSCONF_POSITIVE(_SC_MQ_OPEN_MAX);
1034   VERIFY_SYSCONF_POSITIVE(_SC_MQ_PRIO_MAX);
1035   VERIFY_SYSCONF_POSITIVE(_SC_RTSIG_MAX);
1036   VERIFY_SYSCONF_POSITIVE(_SC_SEM_NSEMS_MAX);
1037   VERIFY_SYSCONF_POSITIVE(_SC_SEM_VALUE_MAX);
1038   VERIFY_SYSCONF_POSIX_VERSION(_SC_SPIN_LOCKS);
1039   VERIFY_SYSCONF_POSITIVE(_SC_TIMER_MAX);
1040   VERIFY_SYSCONF_POSIX_VERSION(_SC_FSYNC);
1041   VERIFY_SYSCONF_POSIX_VERSION(_SC_MAPPED_FILES);
1042   VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK);
1043   VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK_RANGE);
1044   VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMORY_PROTECTION);
1045   VERIFY_SYSCONF_POSIX_VERSION(_SC_PRIORITY_SCHEDULING);
1046   VERIFY_SYSCONF_POSIX_VERSION(_SC_REALTIME_SIGNALS);
1047   VERIFY_SYSCONF_POSIX_VERSION(_SC_SEMAPHORES);
1048   VERIFY_SYSCONF_POSIX_VERSION(_SC_SYNCHRONIZED_IO);
1049   VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMERS);
1050   VERIFY_SYSCONF_POSITIVE(_SC_GETGR_R_SIZE_MAX);
1051   VERIFY_SYSCONF_POSITIVE(_SC_GETPW_R_SIZE_MAX);
1052   VERIFY_SYSCONF_POSITIVE(_SC_LOGIN_NAME_MAX);
1053   VERIFY_SYSCONF_POSITIVE(_SC_THREAD_DESTRUCTOR_ITERATIONS);
1054   VERIFY_SYSCONF_POSITIVE(_SC_THREAD_KEYS_MAX);
1055   VERIFY_SYSCONF_POSITIVE(_SC_THREAD_STACK_MIN);
1056   VERIFY_SYSCONF_POSITIVE(_SC_THREAD_THREADS_MAX);
1057   VERIFY_SYSCONF_POSITIVE(_SC_TTY_NAME_MAX);
1058   VERIFY_SYSCONF_POSIX_VERSION(_SC_THREADS);
1059   VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKADDR);
1060   VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKSIZE);
1061   VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PRIORITY_SCHEDULING);
1062   VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_INHERIT);
1063   VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_PROTECT);
1064   VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_SAFE_FUNCTIONS);
1065   VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_CONF);
1066   VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_ONLN);
1067   VERIFY_SYSCONF_POSITIVE(_SC_PHYS_PAGES);
1068   VERIFY_SYSCONF_POSITIVE(_SC_AVPHYS_PAGES);
1069   VERIFY_SYSCONF_POSIX_VERSION(_SC_MONOTONIC_CLOCK);
1070   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS);
1071   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_ACCOUNTING);
1072   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_CHECKPOINT);
1073   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_LOCATE);
1074   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_MESSAGE);
1075   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_TRACK);
1076   VERIFY_SYSCONF_POSIX_VERSION(_SC_CLOCK_SELECTION);
1077   VERIFY_SYSCONF_POSITIVE(_SC_HOST_NAME_MAX);
1078   VERIFY_SYSCONF_POSIX_VERSION(_SC_IPV6);
1079   VERIFY_SYSCONF_POSIX_VERSION(_SC_RAW_SOCKETS);
1080   VERIFY_SYSCONF_POSIX_VERSION(_SC_READER_WRITER_LOCKS);
1081   VERIFY_SYSCONF_POSITIVE(_SC_REGEXP);
1082   VERIFY_SYSCONF_POSITIVE(_SC_SHELL);
1083   VERIFY_SYSCONF_POSIX_VERSION(_SC_SPAWN);
1084   VERIFY_SYSCONF_UNSUPPORTED(_SC_SPORADIC_SERVER);
1085   VERIFY_SYSCONF_POSITIVE(_SC_SYMLOOP_MAX);
1086   VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_CPUTIME);
1087   VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PROCESS_SHARED);
1088   VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_SPORADIC_SERVER);
1089   VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMEOUTS);
1090   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE);
1091   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_FILTER);
1092   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_NAME_MAX);
1093   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_INHERIT);
1094   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_LOG);
1095   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_NAME_MAX);
1096   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_SYS_MAX);
1097   VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_USER_EVENT_MAX);
1098   VERIFY_SYSCONF_UNSUPPORTED(_SC_TYPED_MEMORY_OBJECTS);
1099   VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_STREAMS);
1100 
1101 #if defined(__LP64__)
1102   VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFF32);
1103   VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG);
1104   VERIFY_SYSCONF_POSITIVE(_SC_V7_LP64_OFF64);
1105   VERIFY_SYSCONF_POSITIVE(_SC_V7_LPBIG_OFFBIG);
1106 #else
1107   VERIFY_SYSCONF_POSITIVE(_SC_V7_ILP32_OFF32);
1108 #if defined(__BIONIC__)
1109   // bionic does not support 64 bits off_t type on 32bit machine.
1110   VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG);
1111 #endif
1112   VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LP64_OFF64);
1113   VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LPBIG_OFFBIG);
1114 #endif
1115 
1116 #if defined(__BIONIC__)
1117   // Tests can only run on bionic, as bionic and glibc have different support for these options.
1118   // Below options are not supported on bionic yet.
1119   VERIFY_SYSCONF_UNSUPPORTED(_SC_ASYNCHRONOUS_IO);
1120   VERIFY_SYSCONF_UNSUPPORTED(_SC_MESSAGE_PASSING);
1121   VERIFY_SYSCONF_UNSUPPORTED(_SC_PRIORITIZED_IO);
1122   VERIFY_SYSCONF_UNSUPPORTED(_SC_SHARED_MEMORY_OBJECTS);
1123   VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_INHERIT);
1124   VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_PROTECT);
1125 
1126   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_C_DEV);
1127   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_LOCALEDEF);
1128   VERIFY_SYSCONF_UNSUPPORTED(_SC_2_SW_DEV);
1129 
1130   VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_CRYPT);
1131   VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_LEGACY);
1132   VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_UUCP);
1133 #endif // defined(__BIONIC__)
1134 }
1135 
TEST(UNISTD_TEST,get_cpu_count_from_string)1136 TEST(UNISTD_TEST, get_cpu_count_from_string) {
1137   ASSERT_EQ(0, GetCpuCountFromString(" "));
1138   ASSERT_EQ(1, GetCpuCountFromString("0"));
1139   ASSERT_EQ(40, GetCpuCountFromString("0-39"));
1140   ASSERT_EQ(4, GetCpuCountFromString("0, 1-2, 4\n"));
1141 }
1142 
TEST(UNISTD_TEST,sysconf_SC_NPROCESSORS_make_sense)1143 TEST(UNISTD_TEST, sysconf_SC_NPROCESSORS_make_sense) {
1144   ASSERT_LE(sysconf(_SC_NPROCESSORS_ONLN), sysconf(_SC_NPROCESSORS_CONF));
1145 }
1146 
TEST(UNISTD_TEST,sysconf_SC_NPROCESSORS_ONLN)1147 TEST(UNISTD_TEST, sysconf_SC_NPROCESSORS_ONLN) {
1148   std::string line;
1149   ASSERT_TRUE(android::base::ReadFileToString("/sys/devices/system/cpu/online", &line));
1150   long online_cpus = 0;
1151   for (const std::string& s : android::base::Split(line, ",")) {
1152     std::vector<std::string> numbers = android::base::Split(s, "-");
1153     if (numbers.size() == 1u) {
1154       online_cpus++;
1155     } else {
1156       online_cpus += atoi(numbers[1].c_str()) - atoi(numbers[0].c_str()) + 1;
1157     }
1158   }
1159   ASSERT_EQ(online_cpus, sysconf(_SC_NPROCESSORS_ONLN));
1160 }
1161 
TEST(UNISTD_TEST,sysconf_SC_ARG_MAX)1162 TEST(UNISTD_TEST, sysconf_SC_ARG_MAX) {
1163   // Since Linux 2.6.23, ARG_MAX isn't a constant and depends on RLIMIT_STACK.
1164   // See setup_arg_pages() in the kernel for the gory details:
1165   // https://elixir.bootlin.com/linux/v6.6.4/source/fs/exec.c#L749
1166 
1167   // Get our current limit, and set things up so we restore the limit.
1168   rlimit rl;
1169   ASSERT_EQ(0, getrlimit(RLIMIT_STACK, &rl));
1170   uint64_t original_rlim_cur = rl.rlim_cur;
1171   if (rl.rlim_cur == RLIM_INFINITY) {
1172     rl.rlim_cur = 8 * 1024 * 1024; // Bionic reports unlimited stacks as 8MiB.
1173   }
1174   auto guard = android::base::make_scope_guard([&rl, original_rlim_cur]() {
1175     rl.rlim_cur = original_rlim_cur;
1176     ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1177   });
1178 
1179   // _SC_ARG_MAX should be 1/4 the stack size.
1180   EXPECT_EQ(static_cast<long>(rl.rlim_cur / 4), sysconf(_SC_ARG_MAX));
1181 
1182   // If you have a really small stack, the kernel still guarantees a stack
1183   // expansion of 128KiB (see setup_arg_pages() in fs/exec.c).
1184   rl.rlim_cur = 1024;
1185   rl.rlim_max = RLIM_INFINITY;
1186   ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1187 
1188   // The stack expansion number is defined in fs/exec.c.
1189   // https://elixir.bootlin.com/linux/v6.6.4/source/fs/exec.c#L845
1190   constexpr long kernel_stack_expansion = 131072;
1191   EXPECT_EQ(kernel_stack_expansion, sysconf(_SC_ARG_MAX));
1192 
1193   // If you have a large stack, the kernel will keep the stack
1194   // expansion to 128KiB (see setup_arg_pages() in fs/exec.c).
1195   rl.rlim_cur = 524288;
1196   rl.rlim_max = RLIM_INFINITY;
1197   ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1198 
1199   EXPECT_EQ(kernel_stack_expansion, sysconf(_SC_ARG_MAX));
1200 }
1201 
TEST(UNISTD_TEST,sysconf_unknown)1202 TEST(UNISTD_TEST, sysconf_unknown) {
1203   VERIFY_SYSCONF_UNKNOWN(-1);
1204   VERIFY_SYSCONF_UNKNOWN(666);
1205 }
1206 
show_cache(const char * name,long size,long assoc,long line_size)1207 [[maybe_unused]] static void show_cache(const char* name, long size, long assoc, long line_size) {
1208   printf("%s cache size: %ld bytes, line size %ld bytes, ", name, size, line_size);
1209   if (assoc == 0) {
1210     printf("fully");
1211   } else {
1212     printf("%ld-way", assoc);
1213   }
1214   printf(" associative\n");
1215 }
1216 
TEST(UNISTD_TEST,sysconf_cache)1217 TEST(UNISTD_TEST, sysconf_cache) {
1218 #if defined(ANDROID_HOST_MUSL)
1219   GTEST_SKIP() << "musl does not have _SC_LEVEL?_?CACHE_SIZE";
1220 #else
1221   // It's not obvious we can _test_ any of these, but we can at least
1222   // show the output for humans to inspect.
1223   show_cache("L1D", sysconf(_SC_LEVEL1_DCACHE_SIZE), sysconf(_SC_LEVEL1_DCACHE_ASSOC), sysconf(_SC_LEVEL1_DCACHE_LINESIZE));
1224   show_cache("L1I", sysconf(_SC_LEVEL1_ICACHE_SIZE), sysconf(_SC_LEVEL1_ICACHE_ASSOC), sysconf(_SC_LEVEL1_ICACHE_LINESIZE));
1225   show_cache("L2", sysconf(_SC_LEVEL2_CACHE_SIZE), sysconf(_SC_LEVEL2_CACHE_ASSOC), sysconf(_SC_LEVEL2_CACHE_LINESIZE));
1226   show_cache("L3", sysconf(_SC_LEVEL3_CACHE_SIZE), sysconf(_SC_LEVEL3_CACHE_ASSOC), sysconf(_SC_LEVEL3_CACHE_LINESIZE));
1227   show_cache("L4", sysconf(_SC_LEVEL4_CACHE_SIZE), sysconf(_SC_LEVEL4_CACHE_ASSOC), sysconf(_SC_LEVEL4_CACHE_LINESIZE));
1228 #endif
1229 }
1230 
TEST(UNISTD_TEST,dup2_same)1231 TEST(UNISTD_TEST, dup2_same) {
1232   // POSIX says of dup2:
1233   // If fildes2 is already a valid open file descriptor ...
1234   // [and] fildes is equal to fildes2 ... dup2() shall return
1235   // fildes2 without closing it.
1236   // This isn't true of dup3(2), so we need to manually implement that.
1237 
1238   // Equal and valid.
1239   int fd = open("/proc/version", O_RDONLY);
1240   ASSERT_TRUE(fd != -1);
1241   ASSERT_EQ(fd, dup2(fd, fd));
1242   ASSERT_EQ(0, close(fd)); // Check that dup2 didn't close fd.
1243 
1244   // Equal, but invalid.
1245   errno = 0;
1246   ASSERT_EQ(-1, dup2(fd, fd));
1247   ASSERT_ERRNO(EBADF);
1248 }
1249 
TEST(UNISTD_TEST,dup3)1250 TEST(UNISTD_TEST, dup3) {
1251   int fd = open("/proc/version", O_RDONLY);
1252   ASSERT_EQ(666, dup3(fd, 666, 0));
1253   ASSERT_FALSE(CloseOnExec(666));
1254   close(666);
1255   ASSERT_EQ(667, dup3(fd, 667, O_CLOEXEC));
1256   ASSERT_TRUE(CloseOnExec(667));
1257   close(667);
1258   close(fd);
1259 }
1260 
TEST(UNISTD_TEST,lockf_smoke)1261 TEST(UNISTD_TEST, lockf_smoke) {
1262   constexpr off64_t file_size = 32*1024LL;
1263 
1264   TemporaryFile tf;
1265   ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1266 
1267   // Lock everything.
1268   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1269   ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
1270 
1271   // Try-lock everything, this should succeed too.
1272   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1273   ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size));
1274 
1275   // Check status.
1276   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1277   ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1278 
1279   // Unlock file.
1280   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1281   ASSERT_EQ(0, lockf64(tf.fd, F_ULOCK, file_size));
1282 }
1283 
TEST(UNISTD_TEST,lockf_zero)1284 TEST(UNISTD_TEST, lockf_zero) {
1285   constexpr off64_t file_size = 32*1024LL;
1286 
1287   TemporaryFile tf;
1288   ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1289 
1290   // Lock everything by specifying a size of 0 (meaning "to the end, even if it changes").
1291   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1292   ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, 0));
1293 
1294   // Check that it's locked.
1295   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1296   ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1297 
1298   // Move the end.
1299   ASSERT_EQ(0, ftruncate(tf.fd, 2*file_size));
1300 
1301   // Check that the new section is locked too.
1302   ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
1303   ASSERT_EQ(0, lockf64(tf.fd, F_TEST, 2*file_size));
1304 }
1305 
TEST(UNISTD_TEST,lockf_negative)1306 TEST(UNISTD_TEST, lockf_negative) {
1307   constexpr off64_t file_size = 32*1024LL;
1308 
1309   TemporaryFile tf;
1310   ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1311 
1312   // Lock everything, but specifying the range in reverse.
1313   ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET));
1314   ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, -file_size));
1315 
1316   // Check that it's locked.
1317   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1318   ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size));
1319 }
1320 
TEST(UNISTD_TEST,lockf_with_child)1321 TEST(UNISTD_TEST, lockf_with_child) {
1322   constexpr off64_t file_size = 32*1024LL;
1323 
1324   TemporaryFile tf;
1325   ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1326 
1327   // Lock everything.
1328   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1329   ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size));
1330 
1331   // Fork a child process
1332   pid_t pid = fork();
1333   ASSERT_NE(-1, pid);
1334   if (pid == 0) {
1335     // Check that the child cannot lock the file.
1336     ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1337     ASSERT_EQ(-1, lockf64(tf.fd, F_TLOCK, file_size));
1338     ASSERT_ERRNO(EAGAIN);
1339     // Check also that it reports itself as locked.
1340     ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1341     ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size));
1342     ASSERT_ERRNO(EACCES);
1343     _exit(0);
1344   }
1345   AssertChildExited(pid, 0);
1346 }
1347 
TEST(UNISTD_TEST,lockf_partial_with_child)1348 TEST(UNISTD_TEST, lockf_partial_with_child) {
1349   constexpr off64_t file_size = 32*1024LL;
1350 
1351   TemporaryFile tf;
1352   ASSERT_EQ(0, ftruncate(tf.fd, file_size));
1353 
1354   // Lock the first half of the file.
1355   ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1356   ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size/2));
1357 
1358   // Fork a child process.
1359   pid_t pid = fork();
1360   ASSERT_NE(-1, pid);
1361   if (pid == 0) {
1362     // Check that the child can lock the other half.
1363     ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
1364     ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
1365     // Check that the child cannot lock the first half.
1366     ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1367     ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
1368     ASSERT_ERRNO(EACCES);
1369     // Check also that it reports itself as locked.
1370     ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET));
1371     ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2));
1372     ASSERT_ERRNO(EACCES);
1373     _exit(0);
1374   }
1375   AssertChildExited(pid, 0);
1376 
1377   // The second half was locked by the child, but the lock disappeared
1378   // when the process exited, so check it can be locked now.
1379   ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET));
1380   ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2));
1381 }
1382 
TEST(UNISTD_TEST,getdomainname)1383 TEST(UNISTD_TEST, getdomainname) {
1384   struct utsname u;
1385   ASSERT_EQ(0, uname(&u));
1386 
1387   char buf[sizeof(u.domainname)];
1388   ASSERT_EQ(0, getdomainname(buf, sizeof(buf)));
1389   EXPECT_STREQ(u.domainname, buf);
1390 
1391 #if defined(__BIONIC__)
1392   // bionic and glibc have different behaviors when len is too small
1393   ASSERT_EQ(-1, getdomainname(buf, strlen(u.domainname)));
1394   EXPECT_ERRNO(EINVAL);
1395 #endif
1396 }
1397 
TEST(UNISTD_TEST,setdomainname)1398 TEST(UNISTD_TEST, setdomainname) {
1399   __user_cap_header_struct header = {.version = _LINUX_CAPABILITY_VERSION_3};
1400 
1401   __user_cap_data_struct old_caps[_LINUX_CAPABILITY_U32S_3];
1402   ASSERT_EQ(0, capget(&header, &old_caps[0]));
1403 
1404   auto admin_idx = CAP_TO_INDEX(CAP_SYS_ADMIN);
1405   auto admin_mask = CAP_TO_MASK(CAP_SYS_ADMIN);
1406   bool has_admin = old_caps[admin_idx].effective & admin_mask;
1407   if (has_admin) {
1408     __user_cap_data_struct new_caps[_LINUX_CAPABILITY_U32S_3];
1409     memcpy(new_caps, old_caps, sizeof(new_caps));
1410     new_caps[admin_idx].effective &= ~admin_mask;
1411 
1412     ASSERT_EQ(0, capset(&header, &new_caps[0])) << "failed to drop admin privileges";
1413   }
1414 
1415   const char* name = "newdomainname";
1416   ASSERT_EQ(-1, setdomainname(name, strlen(name)));
1417   ASSERT_ERRNO(EPERM);
1418 
1419   if (has_admin) {
1420     ASSERT_EQ(0, capset(&header, &old_caps[0])) << "failed to restore admin privileges";
1421   }
1422 }
1423 
TEST(UNISTD_TEST,execve_failure)1424 TEST(UNISTD_TEST, execve_failure) {
1425   ExecTestHelper eth;
1426   errno = 0;
1427   ASSERT_EQ(-1, execve("/", eth.GetArgs(), eth.GetEnv()));
1428   ASSERT_ERRNO(EACCES);
1429 }
1430 
append_llvm_cov_env_var(std::string & env_str)1431 static void append_llvm_cov_env_var(std::string& env_str) {
1432   if (getenv("LLVM_PROFILE_FILE") != nullptr)
1433     env_str.append("__LLVM_PROFILE_RT_INIT_ONCE=__LLVM_PROFILE_RT_INIT_ONCE\n");
1434 }
1435 
TEST(UNISTD_TEST,execve_args)1436 TEST(UNISTD_TEST, execve_args) {
1437   // int execve(const char* path, char* argv[], char* envp[]);
1438 
1439   // Test basic argument passing.
1440   ExecTestHelper eth;
1441   eth.SetArgs({"echo", "hello", "world", nullptr});
1442   eth.Run([&]() { execve(BIN_DIR "echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1443 
1444   // Test environment variable setting too.
1445   eth.SetArgs({"printenv", nullptr});
1446   eth.SetEnv({"A=B", nullptr});
1447 
1448   std::string expected_output("A=B\n");
1449   append_llvm_cov_env_var(expected_output);
1450 
1451   eth.Run([&]() { execve(BIN_DIR "printenv", eth.GetArgs(), eth.GetEnv()); }, 0,
1452           expected_output.c_str());
1453 }
1454 
TEST(UNISTD_TEST,execl_failure)1455 TEST(UNISTD_TEST, execl_failure) {
1456   errno = 0;
1457   ASSERT_EQ(-1, execl("/", "/", nullptr));
1458   ASSERT_ERRNO(EACCES);
1459 }
1460 
TEST(UNISTD_TEST,execl)1461 TEST(UNISTD_TEST, execl) {
1462   ExecTestHelper eth;
1463   // int execl(const char* path, const char* arg, ...);
1464   eth.Run([&]() { execl(BIN_DIR "echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n");
1465 }
1466 
TEST(UNISTD_TEST,execle_failure)1467 TEST(UNISTD_TEST, execle_failure) {
1468   ExecTestHelper eth;
1469   errno = 0;
1470   ASSERT_EQ(-1, execle("/", "/", nullptr, eth.GetEnv()));
1471   ASSERT_ERRNO(EACCES);
1472 }
1473 
TEST(UNISTD_TEST,execle)1474 TEST(UNISTD_TEST, execle) {
1475   ExecTestHelper eth;
1476   eth.SetEnv({"A=B", nullptr});
1477 
1478   std::string expected_output("A=B\n");
1479   append_llvm_cov_env_var(expected_output);
1480 
1481   // int execle(const char* path, const char* arg, ..., char* envp[]);
1482   eth.Run([&]() { execle(BIN_DIR "printenv", "printenv", nullptr, eth.GetEnv()); }, 0,
1483           expected_output.c_str());
1484 }
1485 
TEST(UNISTD_TEST,execv_failure)1486 TEST(UNISTD_TEST, execv_failure) {
1487   ExecTestHelper eth;
1488   errno = 0;
1489   ASSERT_EQ(-1, execv("/", eth.GetArgs()));
1490   ASSERT_ERRNO(EACCES);
1491 }
1492 
TEST(UNISTD_TEST,execv)1493 TEST(UNISTD_TEST, execv) {
1494   ExecTestHelper eth;
1495   eth.SetArgs({"echo", "hello", "world", nullptr});
1496   // int execv(const char* path, char* argv[]);
1497   eth.Run([&]() { execv(BIN_DIR "echo", eth.GetArgs()); }, 0, "hello world\n");
1498 }
1499 
TEST(UNISTD_TEST,execlp_failure)1500 TEST(UNISTD_TEST, execlp_failure) {
1501   errno = 0;
1502   ASSERT_EQ(-1, execlp("/", "/", nullptr));
1503   ASSERT_ERRNO(EACCES);
1504 }
1505 
TEST(UNISTD_TEST,execlp)1506 TEST(UNISTD_TEST, execlp) {
1507   ExecTestHelper eth;
1508   // int execlp(const char* file, const char* arg, ...);
1509   eth.Run([&]() { execlp("echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n");
1510 }
1511 
TEST(UNISTD_TEST,execvp_failure)1512 TEST(UNISTD_TEST, execvp_failure) {
1513   ExecTestHelper eth;
1514   eth.SetArgs({nullptr});
1515   errno = 0;
1516   ASSERT_EQ(-1, execvp("/", eth.GetArgs()));
1517   ASSERT_ERRNO(EACCES);
1518 }
1519 
TEST(UNISTD_TEST,execvp)1520 TEST(UNISTD_TEST, execvp) {
1521   ExecTestHelper eth;
1522   eth.SetArgs({"echo", "hello", "world", nullptr});
1523   // int execvp(const char* file, char* argv[]);
1524   eth.Run([&]() { execvp("echo", eth.GetArgs()); }, 0, "hello world\n");
1525 }
1526 
TEST(UNISTD_TEST,execvpe_failure)1527 TEST(UNISTD_TEST, execvpe_failure) {
1528   ExecTestHelper eth;
1529   errno = 0;
1530   ASSERT_EQ(-1, execvpe("this-does-not-exist", eth.GetArgs(), eth.GetEnv()));
1531   // Running in CTS we might not even be able to search all directories in $PATH.
1532   ASSERT_TRUE(errno == ENOENT || errno == EACCES) << strerror(errno);
1533 }
1534 
TEST(UNISTD_TEST,execvpe)1535 TEST(UNISTD_TEST, execvpe) {
1536   // int execvpe(const char* file, char* argv[], char* envp[]);
1537 
1538   // Test basic argument passing.
1539   ExecTestHelper eth;
1540   eth.SetArgs({"echo", "hello", "world", nullptr});
1541   eth.Run([&]() { execvpe("echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1542 
1543   // Test environment variable setting too.
1544   eth.SetArgs({"printenv", nullptr});
1545   eth.SetEnv({"A=B", nullptr});
1546 
1547   std::string expected_output("A=B\n");
1548   append_llvm_cov_env_var(expected_output);
1549 
1550   eth.Run([&]() { execvpe("printenv", eth.GetArgs(), eth.GetEnv()); }, 0, expected_output.c_str());
1551 }
1552 
TEST(UNISTD_TEST,execvpe_ENOEXEC)1553 TEST(UNISTD_TEST, execvpe_ENOEXEC) {
1554   // Create a shell script with #!.
1555   TemporaryFile tf;
1556   ASSERT_TRUE(android::base::WriteStringToFile("#!" BIN_DIR "sh\necho script\n", tf.path));
1557 
1558   // Set $PATH so we can find it.
1559   setenv("PATH", dirname(tf.path), 1);
1560 
1561   ExecTestHelper eth;
1562   eth.SetArgs({basename(tf.path), nullptr});
1563 
1564   // It's not inherently executable.
1565   errno = 0;
1566   ASSERT_EQ(-1, execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()));
1567   ASSERT_ERRNO(EACCES);
1568 
1569   // Make it executable (and keep it writable because we're going to rewrite it below).
1570   ASSERT_EQ(0, chmod(tf.path, 0777));
1571 
1572   // TemporaryFile will have a writable fd, so we can test ETXTBSY while we're here...
1573   errno = 0;
1574   ASSERT_EQ(-1, execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()));
1575   ASSERT_ERRNO(ETXTBSY);
1576 
1577   // 1. The simplest test: the kernel should handle this.
1578   ASSERT_EQ(0, close(tf.fd));
1579   eth.Run([&]() { execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
1580 
1581   // 2. Try again without a #!. We should have to handle this ourselves.
1582   ASSERT_TRUE(android::base::WriteStringToFile("echo script\n", tf.path));
1583   eth.Run([&]() { execvpe(basename(tf.path), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
1584 
1585   // 3. Again without a #!, but also with a leading '/', since that's a special case in the
1586   // implementation.
1587   eth.Run([&]() { execvpe(tf.path, eth.GetArgs(), eth.GetEnv()); }, 0, "script\n");
1588 }
1589 
TEST(UNISTD_TEST,execvp_libcore_test_55017)1590 TEST(UNISTD_TEST, execvp_libcore_test_55017) {
1591   ExecTestHelper eth;
1592   eth.SetArgs({"/system/bin/does-not-exist", nullptr});
1593 
1594   errno = 0;
1595   ASSERT_EQ(-1, execvp("/system/bin/does-not-exist", eth.GetArgs()));
1596   ASSERT_ERRNO(ENOENT);
1597 }
1598 
TEST(UNISTD_TEST,exec_argv0_null)1599 TEST(UNISTD_TEST, exec_argv0_null) {
1600   // http://b/33276926 and http://b/227498625.
1601   //
1602   // With old kernels, bionic will see the null pointer and use "<unknown>" but
1603   // with new (5.18+) kernels, the kernel will already have substituted the
1604   // empty string, so we don't make any assertion here about what (if anything)
1605   // comes before the first ':'.
1606   //
1607   // If this ever causes trouble, we could change bionic to replace _either_ the
1608   // null pointer or the empty string. We could also use the actual name from
1609   // readlink() on /proc/self/exe if we ever had reason to disallow programs
1610   // from trying to hide like this.
1611   char* args[] = {nullptr};
1612   char* envs[] = {nullptr};
1613   ASSERT_EXIT(execve("/system/bin/run-as", args, envs), testing::ExitedWithCode(1),
1614               ": usage: run-as");
1615 }
1616 
TEST(UNISTD_TEST,fexecve_failure)1617 TEST(UNISTD_TEST, fexecve_failure) {
1618   ExecTestHelper eth;
1619   errno = 0;
1620   int fd = open("/", O_RDONLY);
1621   ASSERT_NE(-1, fd);
1622   ASSERT_EQ(-1, fexecve(fd, eth.GetArgs(), eth.GetEnv()));
1623   ASSERT_ERRNO(EACCES);
1624   close(fd);
1625 }
1626 
TEST(UNISTD_TEST,fexecve_bad_fd)1627 TEST(UNISTD_TEST, fexecve_bad_fd) {
1628   ExecTestHelper eth;
1629   errno = 0;
1630   ASSERT_EQ(-1, fexecve(-1, eth.GetArgs(), eth.GetEnv()));
1631   ASSERT_ERRNO(EBADF);
1632 }
1633 
TEST(UNISTD_TEST,fexecve_args)1634 TEST(UNISTD_TEST, fexecve_args) {
1635   // Test basic argument passing.
1636   int echo_fd = open(BIN_DIR "echo", O_RDONLY | O_CLOEXEC);
1637   ASSERT_NE(-1, echo_fd);
1638   ExecTestHelper eth;
1639   eth.SetArgs({"echo", "hello", "world", nullptr});
1640   eth.Run([&]() { fexecve(echo_fd, eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n");
1641   close(echo_fd);
1642 
1643   // Test environment variable setting too.
1644   int printenv_fd = open(BIN_DIR "printenv", O_RDONLY | O_CLOEXEC);
1645   ASSERT_NE(-1, printenv_fd);
1646   eth.SetArgs({"printenv", nullptr});
1647   eth.SetEnv({"A=B", nullptr});
1648 
1649   std::string expected_output("A=B\n");
1650   append_llvm_cov_env_var(expected_output);
1651 
1652   eth.Run([&]() { fexecve(printenv_fd, eth.GetArgs(), eth.GetEnv()); }, 0, expected_output.c_str());
1653   close(printenv_fd);
1654 }
1655 
TEST(UNISTD_TEST,getlogin_r)1656 TEST(UNISTD_TEST, getlogin_r) {
1657   char buf[LOGIN_NAME_MAX] = {};
1658   EXPECT_EQ(ERANGE, getlogin_r(buf, 0));
1659   EXPECT_EQ(0, getlogin_r(buf, sizeof(buf)));
1660   EXPECT_STREQ(getlogin(), buf);
1661 }
1662 
TEST(UNISTD_TEST,swab)1663 TEST(UNISTD_TEST, swab) {
1664   // POSIX: "The swab() function shall copy nbytes bytes, which are pointed to by src,
1665   // to the object pointed to by dest, exchanging adjacent bytes."
1666   char buf[BUFSIZ];
1667   memset(buf, 'x', sizeof(buf));
1668   swab("ehll oowlr\0d", buf, 12);
1669   ASSERT_STREQ("hello world", buf);
1670 }
1671 
TEST(UNISTD_TEST,swab_odd_byte_count)1672 TEST(UNISTD_TEST, swab_odd_byte_count) {
1673   // POSIX: "If nbytes is odd, swab() copies and exchanges nbytes-1 bytes and the disposition
1674   // of the last byte is unspecified."
1675   // ...but it seems unreasonable to not just leave the last byte alone.
1676   char buf[BUFSIZ];
1677   memset(buf, 'x', sizeof(buf));
1678   swab("012345", buf, 3);
1679   ASSERT_EQ('1', buf[0]);
1680   ASSERT_EQ('0', buf[1]);
1681   ASSERT_EQ('x', buf[2]);
1682 }
1683 
TEST(UNISTD_TEST,swab_overlap)1684 TEST(UNISTD_TEST, swab_overlap) {
1685   // POSIX: "If copying takes place between objects that overlap, the behavior is undefined."
1686   // ...but it seems unreasonable to not just do the right thing.
1687   char buf[] = "012345";
1688   swab(buf, buf, 4);
1689   ASSERT_EQ('1', buf[0]);
1690   ASSERT_EQ('0', buf[1]);
1691   ASSERT_EQ('3', buf[2]);
1692   ASSERT_EQ('2', buf[3]);
1693   ASSERT_EQ('4', buf[4]);
1694   ASSERT_EQ('5', buf[5]);
1695   ASSERT_EQ(0, buf[6]);
1696 }
1697 
TEST(UNISTD_TEST,swab_negative_byte_count)1698 TEST(UNISTD_TEST, swab_negative_byte_count) {
1699   // POSIX: "If nbytes is negative, swab() does nothing."
1700   char buf[BUFSIZ];
1701   memset(buf, 'x', sizeof(buf));
1702   swab("hello", buf, -1);
1703   ASSERT_EQ('x', buf[0]);
1704 }
1705 
TEST(UNISTD_TEST,usleep)1706 TEST(UNISTD_TEST, usleep) {
1707   auto t0 = std::chrono::steady_clock::now();
1708   ASSERT_EQ(0, usleep(5000));
1709   auto t1 = std::chrono::steady_clock::now();
1710   ASSERT_GE(t1-t0, 5000us);
1711 }
1712 
TEST(UNISTD_TEST,sleep)1713 TEST(UNISTD_TEST, sleep) {
1714   auto t0 = std::chrono::steady_clock::now();
1715   ASSERT_EQ(0U, sleep(1));
1716   auto t1 = std::chrono::steady_clock::now();
1717   ASSERT_GE(t1-t0, 1s);
1718 }
1719 
TEST(UNISTD_TEST,close_range)1720 TEST(UNISTD_TEST, close_range) {
1721 #if defined(__GLIBC__)
1722   GTEST_SKIP() << "glibc too old";
1723 #elif defined(ANDROID_HOST_MUSL)
1724   GTEST_SKIP() << "musl does not have close_range";
1725 #else   // __GLIBC__
1726   int fd = open("/proc/version", O_RDONLY);
1727   ASSERT_GE(fd, 0);
1728 
1729   int rc = close_range(fd, fd, 0);
1730   if (rc == -1 && errno == ENOSYS) GTEST_SKIP() << "no close_range() in this kernel";
1731   ASSERT_EQ(0, rc) << strerror(errno);
1732 
1733   // Check the fd is actually closed.
1734   ASSERT_EQ(close(fd), -1);
1735   ASSERT_ERRNO(EBADF);
1736 #endif  // __GLIBC__
1737 }
1738 
TEST(UNISTD_TEST,copy_file_range)1739 TEST(UNISTD_TEST, copy_file_range) {
1740 #if defined(__GLIBC__)
1741   GTEST_SKIP() << "glibc too old";
1742 #else   // __GLIBC__
1743   TemporaryFile tf;
1744   ASSERT_TRUE(android::base::WriteStringToFd("hello world", tf.fd));
1745   ASSERT_EQ(0, lseek(tf.fd, SEEK_SET, 0));
1746   TemporaryFile tf2;
1747   ASSERT_EQ(11, copy_file_range(tf.fd, NULL, tf2.fd, NULL, 11, 0));
1748   ASSERT_EQ(0, lseek(tf2.fd, SEEK_SET, 0));
1749   std::string content;
1750   ASSERT_TRUE(android::base::ReadFdToString(tf2.fd, &content));
1751   ASSERT_EQ("hello world", content);
1752 #endif  // __GLIBC__
1753 }
1754