blob: c9d9943636f5e953648093a1cff532270f20738e [file] [log] [blame]
Elliott Hughesa55f6302013-01-02 14:23:43 -08001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
Yabin Cui9df70402014-11-05 18:01:01 -080018#include "BionicDeathTest.h"
Christopher Ferris13613132013-10-28 15:24:04 -070019#include "ScopedSignalHandler.h"
Elliott Hughesb4f76162013-09-19 16:27:24 -070020#include "TemporaryFile.h"
Elliott Hughesa55f6302013-01-02 14:23:43 -080021
Elliott Hughes915fefb2014-02-18 12:34:51 -080022#include <errno.h>
Colin Cross3d19a832014-02-14 18:56:23 -080023#include <fcntl.h>
Elliott Hughes21972b62014-07-28 12:24:22 -070024#include <limits.h>
Elliott Hughes428f5562013-02-05 16:10:59 -080025#include <stdint.h>
Elliott Hughes7086ad62014-06-19 16:39:01 -070026#include <sys/syscall.h>
Elliott Hughes764a9932014-04-08 19:44:36 -070027#include <sys/types.h>
Derek Xued94e7f02014-09-25 11:12:01 +010028#include <sys/utsname.h>
Elliott Hughes764a9932014-04-08 19:44:36 -070029#include <sys/wait.h>
Yabin Cui9df70402014-11-05 18:01:01 -080030#include <unistd.h>
31
Elliott Hughesa55f6302013-01-02 14:23:43 -080032TEST(unistd, sysconf_SC_MONOTONIC_CLOCK) {
33 ASSERT_GT(sysconf(_SC_MONOTONIC_CLOCK), 0);
34}
Elliott Hughes428f5562013-02-05 16:10:59 -080035
Elliott Hughes533dde42014-04-25 18:27:38 -070036static void* get_brk() {
37 return sbrk(0);
38}
Elliott Hughes428f5562013-02-05 16:10:59 -080039
Elliott Hughes533dde42014-04-25 18:27:38 -070040static void* page_align(uintptr_t addr) {
41 uintptr_t mask = sysconf(_SC_PAGE_SIZE) - 1;
42 return reinterpret_cast<void*>((addr + mask) & ~mask);
43}
44
45TEST(unistd, brk) {
46 void* initial_break = get_brk();
47
48 // The kernel aligns the break to a page.
49 void* new_break = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(initial_break) + 1);
Elliott Hughes428f5562013-02-05 16:10:59 -080050 ASSERT_EQ(0, brk(new_break));
Elliott Hughes533dde42014-04-25 18:27:38 -070051 ASSERT_GE(get_brk(), new_break);
Elliott Hughes428f5562013-02-05 16:10:59 -080052
Elliott Hughes533dde42014-04-25 18:27:38 -070053 new_break = page_align(reinterpret_cast<uintptr_t>(initial_break) + sysconf(_SC_PAGE_SIZE));
54 ASSERT_EQ(0, brk(new_break));
55 ASSERT_EQ(get_brk(), new_break);
56}
57
58TEST(unistd, brk_ENOMEM) {
59 ASSERT_EQ(-1, brk(reinterpret_cast<void*>(-1)));
60 ASSERT_EQ(ENOMEM, errno);
61}
62
Christopher Ferris738b0cc2014-05-21 19:03:34 -070063#if defined(__GLIBC__)
64#define SBRK_MIN INTPTR_MIN
65#define SBRK_MAX INTPTR_MAX
66#else
67#define SBRK_MIN PTRDIFF_MIN
68#define SBRK_MAX PTRDIFF_MAX
69#endif
70
Elliott Hughes533dde42014-04-25 18:27:38 -070071TEST(unistd, sbrk_ENOMEM) {
Christopher Ferris738b0cc2014-05-21 19:03:34 -070072#if defined(__BIONIC__) && !defined(__LP64__)
73 // There is no way to guarantee that all overflow conditions can be tested
74 // without manipulating the underlying values of the current break.
75 extern void* __bionic_brk;
76
77 class ScopedBrk {
78 public:
79 ScopedBrk() : saved_brk_(__bionic_brk) {}
80 virtual ~ScopedBrk() { __bionic_brk = saved_brk_; }
81
82 private:
83 void* saved_brk_;
84 };
85
86 ScopedBrk scope_brk;
87
88 // Set the current break to a point that will cause an overflow.
89 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) + 2);
Elliott Hughes533dde42014-04-25 18:27:38 -070090
91 // Can't increase by so much that we'd overflow.
92 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MAX));
93 ASSERT_EQ(ENOMEM, errno);
94
Christopher Ferris738b0cc2014-05-21 19:03:34 -070095 // Set the current break to a point that will cause an overflow.
96 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX));
Elliott Hughes533dde42014-04-25 18:27:38 -070097
Elliott Hughes533dde42014-04-25 18:27:38 -070098 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN));
99 ASSERT_EQ(ENOMEM, errno);
Christopher Ferris738b0cc2014-05-21 19:03:34 -0700100
101 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) - 1);
102
103 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN + 1));
104 ASSERT_EQ(ENOMEM, errno);
105#else
106 class ScopedBrk {
107 public:
108 ScopedBrk() : saved_brk_(get_brk()) {}
109 virtual ~ScopedBrk() { brk(saved_brk_); }
110
111 private:
112 void* saved_brk_;
113 };
114
115 ScopedBrk scope_brk;
116
117 uintptr_t cur_brk = reinterpret_cast<uintptr_t>(get_brk());
118 if (cur_brk < static_cast<uintptr_t>(-(SBRK_MIN+1))) {
119 // Do the overflow test for a max negative increment.
120 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MIN));
121#if defined(__BIONIC__)
122 // GLIBC does not set errno in overflow case.
123 ASSERT_EQ(ENOMEM, errno);
124#endif
125 }
126
127 uintptr_t overflow_brk = static_cast<uintptr_t>(SBRK_MAX) + 2;
128 if (cur_brk < overflow_brk) {
129 // Try and move the value to PTRDIFF_MAX + 2.
130 cur_brk = reinterpret_cast<uintptr_t>(sbrk(overflow_brk));
131 }
132 if (cur_brk >= overflow_brk) {
133 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MAX));
134#if defined(__BIONIC__)
135 // GLIBC does not set errno in overflow case.
136 ASSERT_EQ(ENOMEM, errno);
137#endif
138 }
Elliott Hughes533dde42014-04-25 18:27:38 -0700139#endif
Elliott Hughes428f5562013-02-05 16:10:59 -0800140}
Elliott Hughesb4f76162013-09-19 16:27:24 -0700141
142TEST(unistd, truncate) {
143 TemporaryFile tf;
144 ASSERT_EQ(0, close(tf.fd));
145 ASSERT_EQ(0, truncate(tf.filename, 123));
146
147 struct stat sb;
148 ASSERT_EQ(0, stat(tf.filename, &sb));
149 ASSERT_EQ(123, sb.st_size);
150}
151
152TEST(unistd, truncate64) {
153 TemporaryFile tf;
154 ASSERT_EQ(0, close(tf.fd));
155 ASSERT_EQ(0, truncate64(tf.filename, 123));
156
157 struct stat sb;
158 ASSERT_EQ(0, stat(tf.filename, &sb));
159 ASSERT_EQ(123, sb.st_size);
160}
161
162TEST(unistd, ftruncate) {
163 TemporaryFile tf;
164 ASSERT_EQ(0, ftruncate(tf.fd, 123));
165 ASSERT_EQ(0, close(tf.fd));
166
167 struct stat sb;
168 ASSERT_EQ(0, stat(tf.filename, &sb));
169 ASSERT_EQ(123, sb.st_size);
170}
171
172TEST(unistd, ftruncate64) {
173 TemporaryFile tf;
174 ASSERT_EQ(0, ftruncate64(tf.fd, 123));
175 ASSERT_EQ(0, close(tf.fd));
176
177 struct stat sb;
178 ASSERT_EQ(0, stat(tf.filename, &sb));
179 ASSERT_EQ(123, sb.st_size);
180}
Elliott Hughes11952072013-10-24 15:15:14 -0700181
Elliott Hughes1728b232014-05-14 10:02:03 -0700182static bool g_pause_test_flag = false;
Elliott Hughes11952072013-10-24 15:15:14 -0700183static void PauseTestSignalHandler(int) {
Elliott Hughes1728b232014-05-14 10:02:03 -0700184 g_pause_test_flag = true;
Elliott Hughes11952072013-10-24 15:15:14 -0700185}
186
187TEST(unistd, pause) {
Christopher Ferris13613132013-10-28 15:24:04 -0700188 ScopedSignalHandler handler(SIGALRM, PauseTestSignalHandler);
189
Elliott Hughes11952072013-10-24 15:15:14 -0700190 alarm(1);
Elliott Hughes1728b232014-05-14 10:02:03 -0700191 ASSERT_FALSE(g_pause_test_flag);
Elliott Hughes11952072013-10-24 15:15:14 -0700192 ASSERT_EQ(-1, pause());
Elliott Hughes1728b232014-05-14 10:02:03 -0700193 ASSERT_TRUE(g_pause_test_flag);
Elliott Hughes11952072013-10-24 15:15:14 -0700194}
Colin Cross3d19a832014-02-14 18:56:23 -0800195
196TEST(unistd, read) {
197 int fd = open("/proc/version", O_RDONLY);
198 ASSERT_TRUE(fd != -1);
199
200 char buf[5];
201 ASSERT_EQ(5, read(fd, buf, 5));
202 ASSERT_EQ(buf[0], 'L');
203 ASSERT_EQ(buf[1], 'i');
204 ASSERT_EQ(buf[2], 'n');
205 ASSERT_EQ(buf[3], 'u');
206 ASSERT_EQ(buf[4], 'x');
207 close(fd);
208}
209
210TEST(unistd, read_EBADF) {
211 // read returns ssize_t which is 64-bits on LP64, so it's worth explicitly checking that
212 // our syscall stubs correctly return a 64-bit -1.
213 char buf[1];
214 ASSERT_EQ(-1, read(-1, buf, sizeof(buf)));
215 ASSERT_EQ(EBADF, errno);
216}
Elliott Hughesaedb00d2014-03-03 14:38:20 -0800217
Elliott Hughes21972b62014-07-28 12:24:22 -0700218TEST(unistd, syscall_long) {
219 // Check that syscall(3) correctly returns long results.
220 // https://code.google.com/p/android/issues/detail?id=73952
221 // We assume that the break is > 4GiB, but this is potentially flaky.
222 uintptr_t p = reinterpret_cast<uintptr_t>(sbrk(0));
223 ASSERT_EQ(p, static_cast<uintptr_t>(syscall(__NR_brk, 0)));
224}
225
Elliott Hughesaedb00d2014-03-03 14:38:20 -0800226TEST(unistd, alarm) {
227 ASSERT_EQ(0U, alarm(0));
228}
Elliott Hughes9f525642014-04-08 17:14:01 -0700229
230TEST(unistd, _exit) {
231 int pid = fork();
232 ASSERT_NE(-1, pid) << strerror(errno);
233
234 if (pid == 0) {
235 _exit(99);
236 }
237
238 int status;
239 ASSERT_EQ(pid, waitpid(pid, &status, 0));
240 ASSERT_TRUE(WIFEXITED(status));
241 ASSERT_EQ(99, WEXITSTATUS(status));
242}
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400243
244TEST(unistd, getenv_unsetenv) {
245 ASSERT_EQ(0, setenv("test-variable", "hello", 1));
246 ASSERT_STREQ("hello", getenv("test-variable"));
247 ASSERT_EQ(0, unsetenv("test-variable"));
248 ASSERT_TRUE(getenv("test-variable") == NULL);
249}
250
251TEST(unistd, unsetenv_EINVAL) {
Grigoriy Kraynovcbf6df02013-09-17 15:44:22 +0400252 EXPECT_EQ(-1, unsetenv(""));
253 EXPECT_EQ(EINVAL, errno);
254 EXPECT_EQ(-1, unsetenv("a=b"));
255 EXPECT_EQ(EINVAL, errno);
256}
257
258TEST(unistd, setenv_EINVAL) {
259 EXPECT_EQ(-1, setenv(NULL, "value", 0));
260 EXPECT_EQ(EINVAL, errno);
261 EXPECT_EQ(-1, setenv(NULL, "value", 1));
262 EXPECT_EQ(EINVAL, errno);
263 EXPECT_EQ(-1, setenv("", "value", 0));
264 EXPECT_EQ(EINVAL, errno);
265 EXPECT_EQ(-1, setenv("", "value", 1));
266 EXPECT_EQ(EINVAL, errno);
267 EXPECT_EQ(-1, setenv("a=b", "value", 0));
268 EXPECT_EQ(EINVAL, errno);
269 EXPECT_EQ(-1, setenv("a=b", "value", 1));
270 EXPECT_EQ(EINVAL, errno);
271}
272
273TEST(unistd, setenv) {
274 ASSERT_EQ(0, unsetenv("test-variable"));
275
276 char a[] = "a";
277 char b[] = "b";
278 char c[] = "c";
279
280 // New value.
281 EXPECT_EQ(0, setenv("test-variable", a, 0));
282 EXPECT_STREQ(a, getenv("test-variable"));
283
284 // Existing value, no overwrite.
285 EXPECT_EQ(0, setenv("test-variable", b, 0));
286 EXPECT_STREQ(a, getenv("test-variable"));
287
288 // Existing value, overwrite.
289 EXPECT_EQ(0, setenv("test-variable", c, 1));
290 EXPECT_STREQ(c, getenv("test-variable"));
291 // But the arrays backing the values are unchanged.
292 EXPECT_EQ('a', a[0]);
293 EXPECT_EQ('b', b[0]);
294 EXPECT_EQ('c', c[0]);
295
296 ASSERT_EQ(0, unsetenv("test-variable"));
297}
298
299TEST(unistd, putenv) {
300 ASSERT_EQ(0, unsetenv("a"));
301
302 char* s1 = strdup("a=b");
303 ASSERT_EQ(0, putenv(s1));
304
305 ASSERT_STREQ("b", getenv("a"));
306 s1[2] = 'c';
307 ASSERT_STREQ("c", getenv("a"));
308
309 char* s2 = strdup("a=b");
310 ASSERT_EQ(0, putenv(s2));
311
312 ASSERT_STREQ("b", getenv("a"));
313 ASSERT_EQ('c', s1[2]);
314
315 ASSERT_EQ(0, unsetenv("a"));
316 free(s1);
317 free(s2);
318}
319
320TEST(unistd, clearenv) {
321 extern char** environ;
322
323 // Guarantee that environ is not initially empty...
324 ASSERT_EQ(0, setenv("test-variable", "a", 1));
325
326 // Stash a copy.
327 std::vector<char*> old_environ;
328 for (size_t i = 0; environ[i] != NULL; ++i) {
329 old_environ.push_back(strdup(environ[i]));
330 }
331
332 ASSERT_EQ(0, clearenv());
333
334 EXPECT_TRUE(environ == NULL || environ[0] == NULL);
335 EXPECT_EQ(NULL, getenv("test-variable"));
336 EXPECT_EQ(0, setenv("test-variable", "post-clear", 1));
337 EXPECT_STREQ("post-clear", getenv("test-variable"));
338
339 // Put the old environment back.
340 for (size_t i = 0; i < old_environ.size(); ++i) {
341 EXPECT_EQ(0, putenv(old_environ[i]));
342 }
343
344 // Check it wasn't overwritten.
345 EXPECT_STREQ("a", getenv("test-variable"));
346
347 EXPECT_EQ(0, unsetenv("test-variable"));
348}
Elliott Hughesa62a28d2014-05-07 14:30:33 -0700349
350static void TestFsyncFunction(int (*fn)(int)) {
351 int fd;
352
353 // Can't sync an invalid fd.
354 errno = 0;
355 EXPECT_EQ(-1, fn(-1));
356 EXPECT_EQ(EBADF, errno);
357
358 // It doesn't matter whether you've opened a file for write or not.
359 TemporaryFile tf;
360 ASSERT_NE(-1, tf.fd);
361
362 EXPECT_EQ(0, fn(tf.fd));
363
364 ASSERT_NE(-1, fd = open(tf.filename, O_RDONLY));
365 EXPECT_EQ(0, fn(fd));
366 close(fd);
367
368 ASSERT_NE(-1, fd = open(tf.filename, O_RDWR));
369 EXPECT_EQ(0, fn(fd));
370 close(fd);
371
372 // The fd can even be a directory.
373 ASSERT_NE(-1, fd = open("/", O_RDONLY));
374 EXPECT_EQ(0, fn(fd));
375 close(fd);
376
377 // But some file systems may choose to be fussy...
378 errno = 0;
379 ASSERT_NE(-1, fd = open("/proc/version", O_RDONLY));
380 EXPECT_EQ(-1, fn(fd));
381 EXPECT_EQ(EINVAL, errno);
382 close(fd);
383}
384
385TEST(unistd, fdatasync) {
386 TestFsyncFunction(fdatasync);
387}
388
389TEST(unistd, fsync) {
390 TestFsyncFunction(fsync);
391}
Elliott Hughes7086ad62014-06-19 16:39:01 -0700392
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700393static void AssertGetPidCorrect() {
394 // The loop is just to make manual testing/debugging with strace easier.
395 pid_t getpid_syscall_result = syscall(__NR_getpid);
396 for (size_t i = 0; i < 128; ++i) {
397 ASSERT_EQ(getpid_syscall_result, getpid());
398 }
399}
400
Elliott Hughes7086ad62014-06-19 16:39:01 -0700401TEST(unistd, getpid_caching_and_fork) {
402 pid_t parent_pid = getpid();
403 ASSERT_EQ(syscall(__NR_getpid), parent_pid);
404
405 pid_t fork_result = fork();
406 ASSERT_NE(fork_result, -1);
407 if (fork_result == 0) {
408 // We're the child.
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700409 AssertGetPidCorrect();
Elliott Hughes7086ad62014-06-19 16:39:01 -0700410 ASSERT_EQ(parent_pid, getppid());
411 _exit(123);
412 } else {
413 // We're the parent.
414 ASSERT_EQ(parent_pid, getpid());
415
416 int status;
417 ASSERT_EQ(fork_result, waitpid(fork_result, &status, 0));
418 ASSERT_TRUE(WIFEXITED(status));
419 ASSERT_EQ(123, WEXITSTATUS(status));
420 }
421}
422
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700423static int GetPidCachingCloneStartRoutine(void*) {
424 AssertGetPidCorrect();
425 return 123;
Elliott Hughes7086ad62014-06-19 16:39:01 -0700426}
427
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700428TEST(unistd, getpid_caching_and_clone) {
429 pid_t parent_pid = getpid();
430 ASSERT_EQ(syscall(__NR_getpid), parent_pid);
431
432 void* child_stack[1024];
433 int clone_result = clone(GetPidCachingCloneStartRoutine, &child_stack[1024], CLONE_NEWNS | SIGCHLD, NULL);
Elliott Hughes2b3b2ec2014-08-21 19:23:53 -0700434 if (clone_result == -1 && errno == EPERM && getuid() != 0) {
435 GTEST_LOG_(INFO) << "This test only works if you have permission to CLONE_NEWNS; try running as root.\n";
436 return;
437 }
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700438 ASSERT_NE(clone_result, -1);
439
440 ASSERT_EQ(parent_pid, getpid());
441
442 int status;
443 ASSERT_EQ(clone_result, waitpid(clone_result, &status, 0));
444 ASSERT_TRUE(WIFEXITED(status));
445 ASSERT_EQ(123, WEXITSTATUS(status));
446}
447
448static void* GetPidCachingPthreadStartRoutine(void*) {
449 AssertGetPidCorrect();
Elliott Hughes7086ad62014-06-19 16:39:01 -0700450 return NULL;
451}
452
453TEST(unistd, getpid_caching_and_pthread_create) {
454 pid_t parent_pid = getpid();
455
456 pthread_t t;
Elliott Hughesfa9e16e2014-06-23 17:49:45 -0700457 ASSERT_EQ(0, pthread_create(&t, NULL, GetPidCachingPthreadStartRoutine, NULL));
Elliott Hughes7086ad62014-06-19 16:39:01 -0700458
459 ASSERT_EQ(parent_pid, getpid());
460
461 void* result;
462 ASSERT_EQ(0, pthread_join(t, &result));
463 ASSERT_EQ(NULL, result);
464}
Elliott Hughes60452a22014-09-22 14:41:30 -0700465
Yabin Cui9df70402014-11-05 18:01:01 -0800466class unistd_DeathTest : public BionicDeathTest {};
467
468TEST_F(unistd_DeathTest, abort) {
Elliott Hughes60452a22014-09-22 14:41:30 -0700469 ASSERT_EXIT(abort(), testing::KilledBySignal(SIGABRT), "");
470}
Elliott Hughesb86a4c72014-11-07 16:07:13 -0800471
472TEST(unistd, sethostname) {
473 // The permissions check happens before the argument check, so this will
474 // fail for a different reason if you're running as root than if you're
475 // not, but it'll fail either way. Checking that we have the symbol is about
476 // all we can do for sethostname(2).
477 ASSERT_EQ(-1, sethostname("", -1));
478}
Derek Xued94e7f02014-09-25 11:12:01 +0100479
480TEST(unistd, gethostname) {
481 char hostname[HOST_NAME_MAX + 1];
Derek Xued94e7f02014-09-25 11:12:01 +0100482 memset(hostname, 0, sizeof(hostname));
483
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800484 // Can we get the hostname with a big buffer?
Derek Xued94e7f02014-09-25 11:12:01 +0100485 ASSERT_EQ(0, gethostname(hostname, HOST_NAME_MAX));
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800486
487 // Can we get the hostname with a right-sized buffer?
488 errno = 0;
489 ASSERT_EQ(0, gethostname(hostname, strlen(hostname) + 1));
490
491 // Does uname(2) agree?
Derek Xued94e7f02014-09-25 11:12:01 +0100492 utsname buf;
493 ASSERT_EQ(0, uname(&buf));
494 ASSERT_EQ(0, strncmp(hostname, buf.nodename, SYS_NMLN));
495 ASSERT_GT(strlen(hostname), 0U);
496
Yongqin Liu2f954ba2014-10-30 16:34:55 +0800497 // Do we correctly detect truncation?
Derek Xued94e7f02014-09-25 11:12:01 +0100498 errno = 0;
499 ASSERT_EQ(-1, gethostname(hostname, strlen(hostname)));
500 ASSERT_EQ(ENAMETOOLONG, errno);
Derek Xued94e7f02014-09-25 11:12:01 +0100501}