1 /* 2 * Copyright (C) 2012 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 #include <gtest/gtest.h> 18 19 #include "BionicDeathTest.h" 20 #include "ScopedSignalHandler.h" 21 #include "TemporaryFile.h" 22 #include "utils.h" 23 24 #include <errno.h> 25 #include <fcntl.h> 26 #include <libgen.h> 27 #include <limits.h> 28 #include <stdint.h> 29 #include <sys/capability.h> 30 #include <sys/param.h> 31 #include <sys/syscall.h> 32 #include <sys/types.h> 33 #include <sys/utsname.h> 34 #include <sys/wait.h> 35 #include <unistd.h> 36 37 #include <android-base/file.h> 38 #include <android-base/strings.h> 39 40 #include "private/get_cpu_count_from_string.h" 41 42 #if defined(NOFORTIFY) 43 #define UNISTD_TEST unistd_nofortify 44 #define UNISTD_DEATHTEST unistd_nofortify_DeathTest 45 #else 46 #define UNISTD_TEST unistd 47 #define UNISTD_DEATHTEST unistd_DeathTest 48 #endif 49 50 static void* get_brk() { 51 return sbrk(0); 52 } 53 54 static void* page_align(uintptr_t addr) { 55 uintptr_t mask = sysconf(_SC_PAGE_SIZE) - 1; 56 return reinterpret_cast<void*>((addr + mask) & ~mask); 57 } 58 59 TEST(UNISTD_TEST, brk) { 60 void* initial_break = get_brk(); 61 62 void* new_break = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(initial_break) + 1); 63 int ret = brk(new_break); 64 if (ret == -1) { 65 ASSERT_EQ(errno, ENOMEM); 66 } else { 67 ASSERT_EQ(0, ret); 68 ASSERT_GE(get_brk(), new_break); 69 } 70 71 // Expand by a full page to force the mapping to expand 72 new_break = page_align(reinterpret_cast<uintptr_t>(initial_break) + sysconf(_SC_PAGE_SIZE)); 73 ret = brk(new_break); 74 if (ret == -1) { 75 ASSERT_EQ(errno, ENOMEM); 76 } else { 77 ASSERT_EQ(0, ret); 78 ASSERT_EQ(get_brk(), new_break); 79 } 80 } 81 82 TEST(UNISTD_TEST, brk_ENOMEM) { 83 ASSERT_EQ(-1, brk(reinterpret_cast<void*>(-1))); 84 ASSERT_EQ(ENOMEM, errno); 85 } 86 87 #if defined(__GLIBC__) 88 #define SBRK_MIN INTPTR_MIN 89 #define SBRK_MAX INTPTR_MAX 90 #else 91 #define SBRK_MIN PTRDIFF_MIN 92 #define SBRK_MAX PTRDIFF_MAX 93 #endif 94 95 TEST(UNISTD_TEST, sbrk_ENOMEM) { 96 #if defined(__BIONIC__) && !defined(__LP64__) 97 // There is no way to guarantee that all overflow conditions can be tested 98 // without manipulating the underlying values of the current break. 99 extern void* __bionic_brk; 100 101 class ScopedBrk { 102 public: 103 ScopedBrk() : saved_brk_(__bionic_brk) {} 104 virtual ~ScopedBrk() { __bionic_brk = saved_brk_; } 105 106 private: 107 void* saved_brk_; 108 }; 109 110 ScopedBrk scope_brk; 111 112 // Set the current break to a point that will cause an overflow. 113 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) + 2); 114 115 // Can't increase by so much that we'd overflow. 116 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MAX)); 117 ASSERT_EQ(ENOMEM, errno); 118 119 // Set the current break to a point that will cause an overflow. 120 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX)); 121 122 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN)); 123 ASSERT_EQ(ENOMEM, errno); 124 125 __bionic_brk = reinterpret_cast<void*>(static_cast<uintptr_t>(PTRDIFF_MAX) - 1); 126 127 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(PTRDIFF_MIN + 1)); 128 ASSERT_EQ(ENOMEM, errno); 129 #else 130 class ScopedBrk { 131 public: 132 ScopedBrk() : saved_brk_(get_brk()) {} 133 virtual ~ScopedBrk() { brk(saved_brk_); } 134 135 private: 136 void* saved_brk_; 137 }; 138 139 ScopedBrk scope_brk; 140 141 uintptr_t cur_brk = reinterpret_cast<uintptr_t>(get_brk()); 142 if (cur_brk < static_cast<uintptr_t>(-(SBRK_MIN+1))) { 143 // Do the overflow test for a max negative increment. 144 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MIN)); 145 #if defined(__BIONIC__) 146 // GLIBC does not set errno in overflow case. 147 ASSERT_EQ(ENOMEM, errno); 148 #endif 149 } 150 151 uintptr_t overflow_brk = static_cast<uintptr_t>(SBRK_MAX) + 2; 152 if (cur_brk < overflow_brk) { 153 // Try and move the value to PTRDIFF_MAX + 2. 154 cur_brk = reinterpret_cast<uintptr_t>(sbrk(overflow_brk)); 155 } 156 if (cur_brk >= overflow_brk) { 157 ASSERT_EQ(reinterpret_cast<void*>(-1), sbrk(SBRK_MAX)); 158 #if defined(__BIONIC__) 159 // GLIBC does not set errno in overflow case. 160 ASSERT_EQ(ENOMEM, errno); 161 #endif 162 } 163 #endif 164 } 165 166 TEST(UNISTD_TEST, truncate) { 167 TemporaryFile tf; 168 ASSERT_EQ(0, close(tf.fd)); 169 ASSERT_EQ(0, truncate(tf.filename, 123)); 170 171 struct stat sb; 172 ASSERT_EQ(0, stat(tf.filename, &sb)); 173 ASSERT_EQ(123, sb.st_size); 174 } 175 176 TEST(UNISTD_TEST, truncate64) { 177 TemporaryFile tf; 178 ASSERT_EQ(0, close(tf.fd)); 179 ASSERT_EQ(0, truncate64(tf.filename, 123)); 180 181 struct stat sb; 182 ASSERT_EQ(0, stat(tf.filename, &sb)); 183 ASSERT_EQ(123, sb.st_size); 184 } 185 186 TEST(UNISTD_TEST, ftruncate) { 187 TemporaryFile tf; 188 ASSERT_EQ(0, ftruncate(tf.fd, 123)); 189 ASSERT_EQ(0, close(tf.fd)); 190 191 struct stat sb; 192 ASSERT_EQ(0, stat(tf.filename, &sb)); 193 ASSERT_EQ(123, sb.st_size); 194 } 195 196 TEST(UNISTD_TEST, ftruncate64) { 197 TemporaryFile tf; 198 ASSERT_EQ(0, ftruncate64(tf.fd, 123)); 199 ASSERT_EQ(0, close(tf.fd)); 200 201 struct stat sb; 202 ASSERT_EQ(0, stat(tf.filename, &sb)); 203 ASSERT_EQ(123, sb.st_size); 204 } 205 206 TEST(UNISTD_TEST, ftruncate_negative) { 207 TemporaryFile tf; 208 errno = 0; 209 ASSERT_EQ(-1, ftruncate(tf.fd, -123)); 210 ASSERT_EQ(EINVAL, errno); 211 } 212 213 static bool g_pause_test_flag = false; 214 static void PauseTestSignalHandler(int) { 215 g_pause_test_flag = true; 216 } 217 218 TEST(UNISTD_TEST, pause) { 219 ScopedSignalHandler handler(SIGALRM, PauseTestSignalHandler); 220 221 alarm(1); 222 ASSERT_FALSE(g_pause_test_flag); 223 ASSERT_EQ(-1, pause()); 224 ASSERT_TRUE(g_pause_test_flag); 225 } 226 227 TEST(UNISTD_TEST, read) { 228 int fd = open("/proc/version", O_RDONLY); 229 ASSERT_TRUE(fd != -1); 230 231 char buf[5]; 232 ASSERT_EQ(5, read(fd, buf, 5)); 233 ASSERT_EQ(buf[0], 'L'); 234 ASSERT_EQ(buf[1], 'i'); 235 ASSERT_EQ(buf[2], 'n'); 236 ASSERT_EQ(buf[3], 'u'); 237 ASSERT_EQ(buf[4], 'x'); 238 close(fd); 239 } 240 241 TEST(UNISTD_TEST, read_EBADF) { 242 // read returns ssize_t which is 64-bits on LP64, so it's worth explicitly checking that 243 // our syscall stubs correctly return a 64-bit -1. 244 char buf[1]; 245 ASSERT_EQ(-1, read(-1, buf, sizeof(buf))); 246 ASSERT_EQ(EBADF, errno); 247 } 248 249 TEST(UNISTD_TEST, syscall_long) { 250 // Check that syscall(3) correctly returns long results. 251 // https://code.google.com/p/android/issues/detail?id=73952 252 // We assume that the break is > 4GiB, but this is potentially flaky. 253 uintptr_t p = reinterpret_cast<uintptr_t>(sbrk(0)); 254 ASSERT_EQ(p, static_cast<uintptr_t>(syscall(__NR_brk, 0))); 255 } 256 257 TEST(UNISTD_TEST, alarm) { 258 ASSERT_EQ(0U, alarm(0)); 259 } 260 261 TEST(UNISTD_TEST, _exit) { 262 pid_t pid = fork(); 263 ASSERT_NE(-1, pid) << strerror(errno); 264 265 if (pid == 0) { 266 _exit(99); 267 } 268 269 AssertChildExited(pid, 99); 270 } 271 272 TEST(UNISTD_TEST, getenv_unsetenv) { 273 ASSERT_EQ(0, setenv("test-variable", "hello", 1)); 274 ASSERT_STREQ("hello", getenv("test-variable")); 275 ASSERT_EQ(0, unsetenv("test-variable")); 276 ASSERT_TRUE(getenv("test-variable") == NULL); 277 } 278 279 TEST(UNISTD_TEST, unsetenv_EINVAL) { 280 EXPECT_EQ(-1, unsetenv("")); 281 EXPECT_EQ(EINVAL, errno); 282 EXPECT_EQ(-1, unsetenv("a=b")); 283 EXPECT_EQ(EINVAL, errno); 284 } 285 286 TEST(UNISTD_TEST, setenv_EINVAL) { 287 EXPECT_EQ(-1, setenv(NULL, "value", 0)); 288 EXPECT_EQ(EINVAL, errno); 289 EXPECT_EQ(-1, setenv(NULL, "value", 1)); 290 EXPECT_EQ(EINVAL, errno); 291 EXPECT_EQ(-1, setenv("", "value", 0)); 292 EXPECT_EQ(EINVAL, errno); 293 EXPECT_EQ(-1, setenv("", "value", 1)); 294 EXPECT_EQ(EINVAL, errno); 295 EXPECT_EQ(-1, setenv("a=b", "value", 0)); 296 EXPECT_EQ(EINVAL, errno); 297 EXPECT_EQ(-1, setenv("a=b", "value", 1)); 298 EXPECT_EQ(EINVAL, errno); 299 } 300 301 TEST(UNISTD_TEST, setenv) { 302 ASSERT_EQ(0, unsetenv("test-variable")); 303 304 char a[] = "a"; 305 char b[] = "b"; 306 char c[] = "c"; 307 308 // New value. 309 EXPECT_EQ(0, setenv("test-variable", a, 0)); 310 EXPECT_STREQ(a, getenv("test-variable")); 311 312 // Existing value, no overwrite. 313 EXPECT_EQ(0, setenv("test-variable", b, 0)); 314 EXPECT_STREQ(a, getenv("test-variable")); 315 316 // Existing value, overwrite. 317 EXPECT_EQ(0, setenv("test-variable", c, 1)); 318 EXPECT_STREQ(c, getenv("test-variable")); 319 // But the arrays backing the values are unchanged. 320 EXPECT_EQ('a', a[0]); 321 EXPECT_EQ('b', b[0]); 322 EXPECT_EQ('c', c[0]); 323 324 ASSERT_EQ(0, unsetenv("test-variable")); 325 } 326 327 TEST(UNISTD_TEST, putenv) { 328 ASSERT_EQ(0, unsetenv("a")); 329 330 char* s1 = strdup("a=b"); 331 ASSERT_EQ(0, putenv(s1)); 332 333 ASSERT_STREQ("b", getenv("a")); 334 s1[2] = 'c'; 335 ASSERT_STREQ("c", getenv("a")); 336 337 char* s2 = strdup("a=b"); 338 ASSERT_EQ(0, putenv(s2)); 339 340 ASSERT_STREQ("b", getenv("a")); 341 ASSERT_EQ('c', s1[2]); 342 343 ASSERT_EQ(0, unsetenv("a")); 344 free(s1); 345 free(s2); 346 } 347 348 TEST(UNISTD_TEST, clearenv) { 349 extern char** environ; 350 351 // Guarantee that environ is not initially empty... 352 ASSERT_EQ(0, setenv("test-variable", "a", 1)); 353 354 // Stash a copy. 355 std::vector<char*> old_environ; 356 for (size_t i = 0; environ[i] != NULL; ++i) { 357 old_environ.push_back(strdup(environ[i])); 358 } 359 360 ASSERT_EQ(0, clearenv()); 361 362 EXPECT_TRUE(environ == NULL || environ[0] == NULL); 363 EXPECT_EQ(NULL, getenv("test-variable")); 364 EXPECT_EQ(0, setenv("test-variable", "post-clear", 1)); 365 EXPECT_STREQ("post-clear", getenv("test-variable")); 366 367 // Put the old environment back. 368 for (size_t i = 0; i < old_environ.size(); ++i) { 369 EXPECT_EQ(0, putenv(old_environ[i])); 370 } 371 372 // Check it wasn't overwritten. 373 EXPECT_STREQ("a", getenv("test-variable")); 374 375 EXPECT_EQ(0, unsetenv("test-variable")); 376 } 377 378 static void TestSyncFunction(int (*fn)(int)) { 379 int fd; 380 381 // Can't sync an invalid fd. 382 errno = 0; 383 EXPECT_EQ(-1, fn(-1)); 384 EXPECT_EQ(EBADF, errno); 385 386 // It doesn't matter whether you've opened a file for write or not. 387 TemporaryFile tf; 388 ASSERT_NE(-1, tf.fd); 389 390 EXPECT_EQ(0, fn(tf.fd)); 391 392 ASSERT_NE(-1, fd = open(tf.filename, O_RDONLY)); 393 EXPECT_EQ(0, fn(fd)); 394 close(fd); 395 396 ASSERT_NE(-1, fd = open(tf.filename, O_RDWR)); 397 EXPECT_EQ(0, fn(fd)); 398 close(fd); 399 400 // The fd can even be a directory. 401 ASSERT_NE(-1, fd = open("/data/local/tmp", O_RDONLY)); 402 EXPECT_EQ(0, fn(fd)); 403 close(fd); 404 } 405 406 static void TestFsyncFunction(int (*fn)(int)) { 407 TestSyncFunction(fn); 408 409 // But some file systems are fussy about fsync/fdatasync... 410 errno = 0; 411 int fd = open("/proc/version", O_RDONLY); 412 ASSERT_NE(-1, fd); 413 EXPECT_EQ(-1, fn(fd)); 414 EXPECT_EQ(EINVAL, errno); 415 close(fd); 416 } 417 418 TEST(UNISTD_TEST, fdatasync) { 419 TestFsyncFunction(fdatasync); 420 } 421 422 TEST(UNISTD_TEST, fsync) { 423 TestFsyncFunction(fsync); 424 } 425 426 TEST(UNISTD_TEST, syncfs) { 427 TestSyncFunction(syncfs); 428 } 429 430 static void AssertGetPidCorrect() { 431 // The loop is just to make manual testing/debugging with strace easier. 432 pid_t getpid_syscall_result = syscall(__NR_getpid); 433 for (size_t i = 0; i < 128; ++i) { 434 ASSERT_EQ(getpid_syscall_result, getpid()); 435 } 436 } 437 438 static void TestGetPidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) { 439 pid_t parent_pid = getpid(); 440 ASSERT_EQ(syscall(__NR_getpid), parent_pid); 441 442 pid_t fork_result = fork_fn(); 443 ASSERT_NE(fork_result, -1); 444 if (fork_result == 0) { 445 // We're the child. 446 ASSERT_NO_FATAL_FAILURE(AssertGetPidCorrect()); 447 ASSERT_EQ(parent_pid, getppid()); 448 exit_fn(123); 449 } else { 450 // We're the parent. 451 ASSERT_EQ(parent_pid, getpid()); 452 AssertChildExited(fork_result, 123); 453 } 454 } 455 456 // gettid() is marked as __attribute_const__, which will have the compiler 457 // optimize out multiple calls to gettid in the same function. This wrapper 458 // defeats that optimization. 459 static __attribute__((__noinline__)) pid_t GetTidForTest() { 460 __asm__(""); 461 return gettid(); 462 } 463 464 static void AssertGetTidCorrect() { 465 // The loop is just to make manual testing/debugging with strace easier. 466 pid_t gettid_syscall_result = syscall(__NR_gettid); 467 for (size_t i = 0; i < 128; ++i) { 468 ASSERT_EQ(gettid_syscall_result, GetTidForTest()); 469 } 470 } 471 472 static void TestGetTidCachingWithFork(int (*fork_fn)(), void (*exit_fn)(int)) { 473 pid_t parent_tid = GetTidForTest(); 474 ASSERT_EQ(syscall(__NR_gettid), parent_tid); 475 476 pid_t fork_result = fork_fn(); 477 ASSERT_NE(fork_result, -1); 478 if (fork_result == 0) { 479 // We're the child. 480 EXPECT_EQ(syscall(__NR_getpid), syscall(__NR_gettid)); 481 EXPECT_EQ(getpid(), GetTidForTest()) << "real tid is " << syscall(__NR_gettid) 482 << ", pid is " << syscall(__NR_getpid); 483 ASSERT_NO_FATAL_FAILURE(AssertGetTidCorrect()); 484 exit_fn(123); 485 } else { 486 // We're the parent. 487 ASSERT_EQ(parent_tid, GetTidForTest()); 488 AssertChildExited(fork_result, 123); 489 } 490 } 491 492 TEST(UNISTD_TEST, getpid_caching_and_fork) { 493 TestGetPidCachingWithFork(fork, exit); 494 } 495 496 TEST(UNISTD_TEST, gettid_caching_and_fork) { 497 TestGetTidCachingWithFork(fork, exit); 498 } 499 500 TEST(UNISTD_TEST, getpid_caching_and_vfork) { 501 TestGetPidCachingWithFork(vfork, _exit); 502 } 503 504 static int CloneLikeFork() { 505 return clone(nullptr, nullptr, SIGCHLD, nullptr); 506 } 507 508 TEST(UNISTD_TEST, getpid_caching_and_clone_process) { 509 TestGetPidCachingWithFork(CloneLikeFork, exit); 510 } 511 512 TEST(UNISTD_TEST, gettid_caching_and_clone_process) { 513 TestGetTidCachingWithFork(CloneLikeFork, exit); 514 } 515 516 static int CloneAndSetTid() { 517 pid_t child_tid = 0; 518 pid_t parent_tid = GetTidForTest(); 519 520 int rv = clone(nullptr, nullptr, CLONE_CHILD_SETTID | SIGCHLD, nullptr, nullptr, nullptr, &child_tid); 521 EXPECT_NE(-1, rv); 522 523 if (rv == 0) { 524 // Child. 525 EXPECT_EQ(child_tid, GetTidForTest()); 526 EXPECT_NE(child_tid, parent_tid); 527 } else { 528 EXPECT_NE(child_tid, GetTidForTest()); 529 EXPECT_NE(child_tid, parent_tid); 530 EXPECT_EQ(GetTidForTest(), parent_tid); 531 } 532 533 return rv; 534 } 535 536 TEST(UNISTD_TEST, gettid_caching_and_clone_process_settid) { 537 TestGetTidCachingWithFork(CloneAndSetTid, exit); 538 } 539 540 static int CloneStartRoutine(int (*start_routine)(void*)) { 541 void* child_stack[1024]; 542 return clone(start_routine, &child_stack[1024], SIGCHLD, NULL); 543 } 544 545 static int GetPidCachingCloneStartRoutine(void*) { 546 AssertGetPidCorrect(); 547 return 123; 548 } 549 550 TEST(UNISTD_TEST, getpid_caching_and_clone) { 551 pid_t parent_pid = getpid(); 552 ASSERT_EQ(syscall(__NR_getpid), parent_pid); 553 554 int clone_result = CloneStartRoutine(GetPidCachingCloneStartRoutine); 555 ASSERT_NE(clone_result, -1); 556 557 ASSERT_EQ(parent_pid, getpid()); 558 559 AssertChildExited(clone_result, 123); 560 } 561 562 static int GetTidCachingCloneStartRoutine(void*) { 563 AssertGetTidCorrect(); 564 return 123; 565 } 566 567 TEST(UNISTD_TEST, gettid_caching_and_clone) { 568 pid_t parent_tid = GetTidForTest(); 569 ASSERT_EQ(syscall(__NR_gettid), parent_tid); 570 571 int clone_result = CloneStartRoutine(GetTidCachingCloneStartRoutine); 572 ASSERT_NE(clone_result, -1); 573 574 ASSERT_EQ(parent_tid, GetTidForTest()); 575 576 AssertChildExited(clone_result, 123); 577 } 578 579 static int CloneChildExit(void*) { 580 AssertGetPidCorrect(); 581 AssertGetTidCorrect(); 582 exit(33); 583 } 584 585 TEST(UNISTD_TEST, clone_fn_and_exit) { 586 int clone_result = CloneStartRoutine(CloneChildExit); 587 ASSERT_NE(-1, clone_result); 588 589 AssertGetPidCorrect(); 590 AssertGetTidCorrect(); 591 592 AssertChildExited(clone_result, 33); 593 } 594 595 static void* GetPidCachingPthreadStartRoutine(void*) { 596 AssertGetPidCorrect(); 597 return NULL; 598 } 599 600 TEST(UNISTD_TEST, getpid_caching_and_pthread_create) { 601 pid_t parent_pid = getpid(); 602 603 pthread_t t; 604 ASSERT_EQ(0, pthread_create(&t, NULL, GetPidCachingPthreadStartRoutine, NULL)); 605 606 ASSERT_EQ(parent_pid, getpid()); 607 608 void* result; 609 ASSERT_EQ(0, pthread_join(t, &result)); 610 ASSERT_EQ(NULL, result); 611 } 612 613 static void* GetTidCachingPthreadStartRoutine(void*) { 614 AssertGetTidCorrect(); 615 uint64_t tid = GetTidForTest(); 616 return reinterpret_cast<void*>(tid); 617 } 618 619 TEST(UNISTD_TEST, gettid_caching_and_pthread_create) { 620 pid_t parent_tid = GetTidForTest(); 621 622 pthread_t t; 623 ASSERT_EQ(0, pthread_create(&t, NULL, GetTidCachingPthreadStartRoutine, &parent_tid)); 624 625 ASSERT_EQ(parent_tid, GetTidForTest()); 626 627 void* result; 628 ASSERT_EQ(0, pthread_join(t, &result)); 629 ASSERT_NE(static_cast<uint64_t>(parent_tid), reinterpret_cast<uint64_t>(result)); 630 } 631 632 class UNISTD_DEATHTEST : public BionicDeathTest {}; 633 634 TEST_F(UNISTD_DEATHTEST, abort) { 635 ASSERT_EXIT(abort(), testing::KilledBySignal(SIGABRT), ""); 636 } 637 638 TEST(UNISTD_TEST, sethostname) { 639 // The permissions check happens before the argument check, so this will 640 // fail for a different reason if you're running as root than if you're 641 // not, but it'll fail either way. Checking that we have the symbol is about 642 // all we can do for sethostname(2). 643 ASSERT_EQ(-1, sethostname("", -1)); 644 } 645 646 TEST(UNISTD_TEST, gethostname) { 647 char hostname[HOST_NAME_MAX + 1]; 648 memset(hostname, 0, sizeof(hostname)); 649 650 // Can we get the hostname with a big buffer? 651 ASSERT_EQ(0, gethostname(hostname, HOST_NAME_MAX)); 652 653 // Can we get the hostname with a right-sized buffer? 654 errno = 0; 655 ASSERT_EQ(0, gethostname(hostname, strlen(hostname) + 1)); 656 657 // Does uname(2) agree? 658 utsname buf; 659 ASSERT_EQ(0, uname(&buf)); 660 ASSERT_EQ(0, strncmp(hostname, buf.nodename, SYS_NMLN)); 661 ASSERT_GT(strlen(hostname), 0U); 662 663 // Do we correctly detect truncation? 664 errno = 0; 665 ASSERT_EQ(-1, gethostname(hostname, strlen(hostname))); 666 ASSERT_EQ(ENAMETOOLONG, errno); 667 } 668 669 TEST(UNISTD_TEST, pathconf_fpathconf) { 670 TemporaryFile tf; 671 long rc = 0L; 672 // As a file system's block size is always power of 2, the configure values 673 // for ALLOC and XFER should be power of 2 as well. 674 rc = pathconf(tf.filename, _PC_ALLOC_SIZE_MIN); 675 ASSERT_TRUE(rc > 0 && powerof2(rc)); 676 rc = pathconf(tf.filename, _PC_REC_MIN_XFER_SIZE); 677 ASSERT_TRUE(rc > 0 && powerof2(rc)); 678 rc = pathconf(tf.filename, _PC_REC_XFER_ALIGN); 679 ASSERT_TRUE(rc > 0 && powerof2(rc)); 680 681 rc = fpathconf(tf.fd, _PC_ALLOC_SIZE_MIN); 682 ASSERT_TRUE(rc > 0 && powerof2(rc)); 683 rc = fpathconf(tf.fd, _PC_REC_MIN_XFER_SIZE); 684 ASSERT_TRUE(rc > 0 && powerof2(rc)); 685 rc = fpathconf(tf.fd, _PC_REC_XFER_ALIGN); 686 ASSERT_TRUE(rc > 0 && powerof2(rc)); 687 } 688 689 TEST(UNISTD_TEST, _POSIX_constants) { 690 // Make a tight verification of _POSIX_* / _POSIX2_* / _XOPEN_* macros, to prevent change by mistake. 691 // Verify according to POSIX.1-2008. 692 EXPECT_EQ(200809L, _POSIX_VERSION); 693 694 EXPECT_EQ(2, _POSIX_AIO_LISTIO_MAX); 695 EXPECT_EQ(1, _POSIX_AIO_MAX); 696 EXPECT_EQ(4096, _POSIX_ARG_MAX); 697 EXPECT_EQ(25, _POSIX_CHILD_MAX); 698 EXPECT_EQ(20000000, _POSIX_CLOCKRES_MIN); 699 EXPECT_EQ(32, _POSIX_DELAYTIMER_MAX); 700 EXPECT_EQ(255, _POSIX_HOST_NAME_MAX); 701 EXPECT_EQ(8, _POSIX_LINK_MAX); 702 EXPECT_EQ(9, _POSIX_LOGIN_NAME_MAX); 703 EXPECT_EQ(255, _POSIX_MAX_CANON); 704 EXPECT_EQ(255, _POSIX_MAX_INPUT); 705 EXPECT_EQ(8, _POSIX_MQ_OPEN_MAX); 706 EXPECT_EQ(32, _POSIX_MQ_PRIO_MAX); 707 EXPECT_EQ(14, _POSIX_NAME_MAX); 708 EXPECT_EQ(8, _POSIX_NGROUPS_MAX); 709 EXPECT_EQ(20, _POSIX_OPEN_MAX); 710 EXPECT_EQ(256, _POSIX_PATH_MAX); 711 EXPECT_EQ(512, _POSIX_PIPE_BUF); 712 EXPECT_EQ(255, _POSIX_RE_DUP_MAX); 713 EXPECT_EQ(8, _POSIX_RTSIG_MAX); 714 EXPECT_EQ(256, _POSIX_SEM_NSEMS_MAX); 715 EXPECT_EQ(32767, _POSIX_SEM_VALUE_MAX); 716 EXPECT_EQ(32, _POSIX_SIGQUEUE_MAX); 717 EXPECT_EQ(32767, _POSIX_SSIZE_MAX); 718 EXPECT_EQ(8, _POSIX_STREAM_MAX); 719 #if !defined(__GLIBC__) 720 EXPECT_EQ(4, _POSIX_SS_REPL_MAX); 721 #endif 722 EXPECT_EQ(255, _POSIX_SYMLINK_MAX); 723 EXPECT_EQ(8, _POSIX_SYMLOOP_MAX); 724 EXPECT_EQ(4, _POSIX_THREAD_DESTRUCTOR_ITERATIONS); 725 EXPECT_EQ(128, _POSIX_THREAD_KEYS_MAX); 726 EXPECT_EQ(64, _POSIX_THREAD_THREADS_MAX); 727 EXPECT_EQ(32, _POSIX_TIMER_MAX); 728 #if !defined(__GLIBC__) 729 EXPECT_EQ(30, _POSIX_TRACE_EVENT_NAME_MAX); 730 EXPECT_EQ(8, _POSIX_TRACE_NAME_MAX); 731 EXPECT_EQ(8, _POSIX_TRACE_SYS_MAX); 732 EXPECT_EQ(32, _POSIX_TRACE_USER_EVENT_MAX); 733 #endif 734 EXPECT_EQ(9, _POSIX_TTY_NAME_MAX); 735 EXPECT_EQ(6, _POSIX_TZNAME_MAX); 736 EXPECT_EQ(99, _POSIX2_BC_BASE_MAX); 737 EXPECT_EQ(2048, _POSIX2_BC_DIM_MAX); 738 EXPECT_EQ(99, _POSIX2_BC_SCALE_MAX); 739 EXPECT_EQ(1000, _POSIX2_BC_STRING_MAX); 740 EXPECT_EQ(14, _POSIX2_CHARCLASS_NAME_MAX); 741 EXPECT_EQ(2, _POSIX2_COLL_WEIGHTS_MAX); 742 EXPECT_EQ(32, _POSIX2_EXPR_NEST_MAX); 743 EXPECT_EQ(2048, _POSIX2_LINE_MAX); 744 EXPECT_EQ(255, _POSIX2_RE_DUP_MAX); 745 746 EXPECT_EQ(16, _XOPEN_IOV_MAX); 747 #if !defined(__GLIBC__) 748 EXPECT_EQ(255, _XOPEN_NAME_MAX); 749 EXPECT_EQ(1024, _XOPEN_PATH_MAX); 750 #endif 751 } 752 753 TEST(UNISTD_TEST, _POSIX_options) { 754 EXPECT_EQ(_POSIX_VERSION, _POSIX_ADVISORY_INFO); 755 EXPECT_GT(_POSIX_BARRIERS, 0); 756 EXPECT_GT(_POSIX_SPIN_LOCKS, 0); 757 EXPECT_NE(_POSIX_CHOWN_RESTRICTED, -1); 758 EXPECT_EQ(_POSIX_VERSION, _POSIX_CLOCK_SELECTION); 759 #if !defined(__GLIBC__) // glibc supports ancient kernels. 760 EXPECT_EQ(_POSIX_VERSION, _POSIX_CPUTIME); 761 #endif 762 EXPECT_EQ(_POSIX_VERSION, _POSIX_FSYNC); 763 EXPECT_EQ(_POSIX_VERSION, _POSIX_IPV6); 764 EXPECT_GT(_POSIX_JOB_CONTROL, 0); 765 EXPECT_EQ(_POSIX_VERSION, _POSIX_MAPPED_FILES); 766 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK); 767 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMLOCK_RANGE); 768 EXPECT_EQ(_POSIX_VERSION, _POSIX_MEMORY_PROTECTION); 769 #if !defined(__GLIBC__) // glibc supports ancient kernels. 770 EXPECT_EQ(_POSIX_VERSION, _POSIX_MONOTONIC_CLOCK); 771 #endif 772 EXPECT_GT(_POSIX_NO_TRUNC, 0); 773 EXPECT_EQ(_POSIX_VERSION, _POSIX_PRIORITY_SCHEDULING); 774 EXPECT_EQ(_POSIX_VERSION, _POSIX_RAW_SOCKETS); 775 EXPECT_EQ(_POSIX_VERSION, _POSIX_READER_WRITER_LOCKS); 776 EXPECT_EQ(_POSIX_VERSION, _POSIX_REALTIME_SIGNALS); 777 EXPECT_GT(_POSIX_REGEXP, 0); 778 EXPECT_GT(_POSIX_SAVED_IDS, 0); 779 EXPECT_EQ(_POSIX_VERSION, _POSIX_SEMAPHORES); 780 EXPECT_GT(_POSIX_SHELL, 0); 781 EXPECT_EQ(_POSIX_VERSION, _POSIX_SPAWN); 782 EXPECT_EQ(-1, _POSIX_SPORADIC_SERVER); 783 EXPECT_EQ(_POSIX_VERSION, _POSIX_SYNCHRONIZED_IO); 784 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREADS); 785 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKADDR); 786 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_ATTR_STACKSIZE); 787 #if !defined(__GLIBC__) // glibc supports ancient kernels. 788 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_CPUTIME); 789 #endif 790 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PRIORITY_SCHEDULING); 791 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_PROCESS_SHARED); 792 EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_PROTECT); 793 EXPECT_EQ(_POSIX_VERSION, _POSIX_THREAD_SAFE_FUNCTIONS); 794 EXPECT_EQ(-1, _POSIX_THREAD_SPORADIC_SERVER); 795 EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMEOUTS); 796 EXPECT_EQ(_POSIX_VERSION, _POSIX_TIMERS); 797 EXPECT_EQ(-1, _POSIX_TRACE); 798 EXPECT_EQ(-1, _POSIX_TRACE_EVENT_FILTER); 799 EXPECT_EQ(-1, _POSIX_TRACE_INHERIT); 800 EXPECT_EQ(-1, _POSIX_TRACE_LOG); 801 EXPECT_EQ(-1, _POSIX_TYPED_MEMORY_OBJECTS); 802 EXPECT_NE(-1, _POSIX_VDISABLE); 803 804 EXPECT_EQ(_POSIX_VERSION, _POSIX2_VERSION); 805 EXPECT_EQ(_POSIX_VERSION, _POSIX2_C_BIND); 806 EXPECT_EQ(_POSIX_VERSION, _POSIX2_CHAR_TERM); 807 808 EXPECT_EQ(700, _XOPEN_VERSION); 809 EXPECT_EQ(1, _XOPEN_ENH_I18N); 810 EXPECT_EQ(1, _XOPEN_REALTIME); 811 EXPECT_EQ(1, _XOPEN_REALTIME_THREADS); 812 EXPECT_EQ(1, _XOPEN_SHM); 813 EXPECT_EQ(1, _XOPEN_UNIX); 814 815 #if defined(__BIONIC__) 816 // These tests only pass on bionic, as bionic and glibc has different support on these macros. 817 // Macros like _POSIX_ASYNCHRONOUS_IO are not supported on bionic yet. 818 EXPECT_EQ(-1, _POSIX_ASYNCHRONOUS_IO); 819 EXPECT_EQ(-1, _POSIX_MESSAGE_PASSING); 820 EXPECT_EQ(-1, _POSIX_PRIORITIZED_IO); 821 EXPECT_EQ(-1, _POSIX_SHARED_MEMORY_OBJECTS); 822 EXPECT_EQ(-1, _POSIX_THREAD_PRIO_INHERIT); 823 EXPECT_EQ(-1, _POSIX_THREAD_PRIO_PROTECT); 824 EXPECT_EQ(-1, _POSIX_THREAD_ROBUST_PRIO_INHERIT); 825 826 EXPECT_EQ(-1, _POSIX2_C_DEV); 827 EXPECT_EQ(-1, _POSIX2_FORT_DEV); 828 EXPECT_EQ(-1, _POSIX2_FORT_RUN); 829 EXPECT_EQ(-1, _POSIX2_LOCALEDEF); 830 EXPECT_EQ(-1, _POSIX2_SW_DEV); 831 EXPECT_EQ(-1, _POSIX2_UPE); 832 833 EXPECT_EQ(-1, _XOPEN_CRYPT); 834 EXPECT_EQ(-1, _XOPEN_LEGACY); 835 EXPECT_EQ(-1, _XOPEN_STREAMS); 836 #endif // defined(__BIONIC__) 837 } 838 839 #define VERIFY_SYSCONF_UNSUPPORTED(name) VerifySysconf(name, #name, [](long v){return v == -1;}) 840 841 // sysconf() means unlimited when it returns -1 with errno unchanged. 842 #define VERIFY_SYSCONF_POSITIVE(name) \ 843 VerifySysconf(name, #name, [](long v){return (v > 0 || v == -1);}) 844 845 #define VERIFY_SYSCONF_POSIX_VERSION(name) \ 846 VerifySysconf(name, #name, [](long v){return v == _POSIX_VERSION;}) 847 848 static void VerifySysconf(int option, const char *option_name, bool (*verify)(long)) { 849 errno = 0; 850 long ret = sysconf(option); 851 EXPECT_TRUE(0 == errno && verify(ret)) << "name = " << option_name << ", ret = " 852 << ret <<", Error Message: " << strerror(errno); 853 } 854 855 TEST(UNISTD_TEST, sysconf) { 856 VERIFY_SYSCONF_POSIX_VERSION(_SC_ADVISORY_INFO); 857 VERIFY_SYSCONF_POSITIVE(_SC_ARG_MAX); 858 VERIFY_SYSCONF_POSIX_VERSION(_SC_BARRIERS); 859 VERIFY_SYSCONF_POSITIVE(_SC_BC_BASE_MAX); 860 VERIFY_SYSCONF_POSITIVE(_SC_BC_DIM_MAX); 861 VERIFY_SYSCONF_POSITIVE(_SC_BC_SCALE_MAX); 862 VERIFY_SYSCONF_POSITIVE(_SC_CHILD_MAX); 863 VERIFY_SYSCONF_POSITIVE(_SC_CLK_TCK); 864 VERIFY_SYSCONF_POSITIVE(_SC_COLL_WEIGHTS_MAX); 865 VERIFY_SYSCONF_POSIX_VERSION(_SC_CPUTIME); 866 VERIFY_SYSCONF_POSITIVE(_SC_EXPR_NEST_MAX); 867 VERIFY_SYSCONF_POSITIVE(_SC_LINE_MAX); 868 VERIFY_SYSCONF_POSITIVE(_SC_NGROUPS_MAX); 869 VERIFY_SYSCONF_POSITIVE(_SC_OPEN_MAX); 870 VERIFY_SYSCONF_POSITIVE(_SC_PASS_MAX); 871 VERIFY_SYSCONF_POSIX_VERSION(_SC_2_C_BIND); 872 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_DEV); 873 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_FORT_RUN); 874 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_UPE); 875 VERIFY_SYSCONF_POSIX_VERSION(_SC_2_VERSION); 876 VERIFY_SYSCONF_POSITIVE(_SC_JOB_CONTROL); 877 VERIFY_SYSCONF_POSITIVE(_SC_SAVED_IDS); 878 VERIFY_SYSCONF_POSIX_VERSION(_SC_VERSION); 879 VERIFY_SYSCONF_POSITIVE(_SC_RE_DUP_MAX); 880 VERIFY_SYSCONF_POSITIVE(_SC_STREAM_MAX); 881 VERIFY_SYSCONF_POSITIVE(_SC_TZNAME_MAX); 882 VerifySysconf(_SC_XOPEN_VERSION, "_SC_XOPEN_VERSION", [](long v){return v == _XOPEN_VERSION;}); 883 VERIFY_SYSCONF_POSITIVE(_SC_ATEXIT_MAX); 884 VERIFY_SYSCONF_POSITIVE(_SC_IOV_MAX); 885 VERIFY_SYSCONF_POSITIVE(_SC_PAGESIZE); 886 VERIFY_SYSCONF_POSITIVE(_SC_PAGE_SIZE); 887 VerifySysconf(_SC_PAGE_SIZE, "_SC_PAGE_SIZE", 888 [](long v){return v == sysconf(_SC_PAGESIZE) && v == getpagesize();}); 889 VERIFY_SYSCONF_POSITIVE(_SC_XOPEN_UNIX); 890 VERIFY_SYSCONF_POSITIVE(_SC_AIO_LISTIO_MAX); 891 VERIFY_SYSCONF_POSITIVE(_SC_AIO_MAX); 892 VerifySysconf(_SC_AIO_PRIO_DELTA_MAX, "_SC_AIO_PRIO_DELTA_MAX", [](long v){return v >= 0;}); 893 VERIFY_SYSCONF_POSITIVE(_SC_DELAYTIMER_MAX); 894 VERIFY_SYSCONF_POSITIVE(_SC_MQ_OPEN_MAX); 895 VERIFY_SYSCONF_POSITIVE(_SC_MQ_PRIO_MAX); 896 VERIFY_SYSCONF_POSITIVE(_SC_RTSIG_MAX); 897 VERIFY_SYSCONF_POSITIVE(_SC_SEM_NSEMS_MAX); 898 VERIFY_SYSCONF_POSITIVE(_SC_SEM_VALUE_MAX); 899 VERIFY_SYSCONF_POSIX_VERSION(_SC_SPIN_LOCKS); 900 VERIFY_SYSCONF_POSITIVE(_SC_TIMER_MAX); 901 VERIFY_SYSCONF_POSIX_VERSION(_SC_FSYNC); 902 VERIFY_SYSCONF_POSIX_VERSION(_SC_MAPPED_FILES); 903 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK); 904 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMLOCK_RANGE); 905 VERIFY_SYSCONF_POSIX_VERSION(_SC_MEMORY_PROTECTION); 906 VERIFY_SYSCONF_POSIX_VERSION(_SC_PRIORITY_SCHEDULING); 907 VERIFY_SYSCONF_POSIX_VERSION(_SC_REALTIME_SIGNALS); 908 VERIFY_SYSCONF_POSIX_VERSION(_SC_SEMAPHORES); 909 VERIFY_SYSCONF_POSIX_VERSION(_SC_SYNCHRONIZED_IO); 910 VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMERS); 911 VERIFY_SYSCONF_POSITIVE(_SC_GETGR_R_SIZE_MAX); 912 VERIFY_SYSCONF_POSITIVE(_SC_GETPW_R_SIZE_MAX); 913 VERIFY_SYSCONF_POSITIVE(_SC_LOGIN_NAME_MAX); 914 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_DESTRUCTOR_ITERATIONS); 915 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_KEYS_MAX); 916 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_STACK_MIN); 917 VERIFY_SYSCONF_POSITIVE(_SC_THREAD_THREADS_MAX); 918 VERIFY_SYSCONF_POSITIVE(_SC_TTY_NAME_MAX); 919 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREADS); 920 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKADDR); 921 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_ATTR_STACKSIZE); 922 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PRIORITY_SCHEDULING); 923 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_INHERIT); 924 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_PRIO_PROTECT); 925 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_SAFE_FUNCTIONS); 926 VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_CONF); 927 VERIFY_SYSCONF_POSITIVE(_SC_NPROCESSORS_ONLN); 928 VERIFY_SYSCONF_POSITIVE(_SC_PHYS_PAGES); 929 VERIFY_SYSCONF_POSITIVE(_SC_AVPHYS_PAGES); 930 VERIFY_SYSCONF_POSIX_VERSION(_SC_MONOTONIC_CLOCK); 931 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS); 932 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_ACCOUNTING); 933 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_CHECKPOINT); 934 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_LOCATE); 935 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_MESSAGE); 936 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_PBS_TRACK); 937 VERIFY_SYSCONF_POSIX_VERSION(_SC_CLOCK_SELECTION); 938 VERIFY_SYSCONF_POSITIVE(_SC_HOST_NAME_MAX); 939 VERIFY_SYSCONF_POSIX_VERSION(_SC_IPV6); 940 VERIFY_SYSCONF_POSIX_VERSION(_SC_RAW_SOCKETS); 941 VERIFY_SYSCONF_POSIX_VERSION(_SC_READER_WRITER_LOCKS); 942 VERIFY_SYSCONF_POSITIVE(_SC_REGEXP); 943 VERIFY_SYSCONF_POSITIVE(_SC_SHELL); 944 VERIFY_SYSCONF_POSIX_VERSION(_SC_SPAWN); 945 VERIFY_SYSCONF_UNSUPPORTED(_SC_SPORADIC_SERVER); 946 VERIFY_SYSCONF_POSITIVE(_SC_SYMLOOP_MAX); 947 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_CPUTIME); 948 VERIFY_SYSCONF_POSIX_VERSION(_SC_THREAD_PROCESS_SHARED); 949 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_SPORADIC_SERVER); 950 VERIFY_SYSCONF_POSIX_VERSION(_SC_TIMEOUTS); 951 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE); 952 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_FILTER); 953 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_EVENT_NAME_MAX); 954 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_INHERIT); 955 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_LOG); 956 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_NAME_MAX); 957 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_SYS_MAX); 958 VERIFY_SYSCONF_UNSUPPORTED(_SC_TRACE_USER_EVENT_MAX); 959 VERIFY_SYSCONF_UNSUPPORTED(_SC_TYPED_MEMORY_OBJECTS); 960 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_STREAMS); 961 962 #if defined(__LP64__) 963 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFF32); 964 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG); 965 VERIFY_SYSCONF_POSITIVE(_SC_V7_LP64_OFF64); 966 VERIFY_SYSCONF_POSITIVE(_SC_V7_LPBIG_OFFBIG); 967 #else 968 VERIFY_SYSCONF_POSITIVE(_SC_V7_ILP32_OFF32); 969 #if defined(__BIONIC__) 970 // bionic does not support 64 bits off_t type on 32bit machine. 971 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_ILP32_OFFBIG); 972 #endif 973 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LP64_OFF64); 974 VERIFY_SYSCONF_UNSUPPORTED(_SC_V7_LPBIG_OFFBIG); 975 #endif 976 977 #if defined(__BIONIC__) 978 // Tests can only run on bionic, as bionic and glibc have different support for these options. 979 // Below options are not supported on bionic yet. 980 VERIFY_SYSCONF_UNSUPPORTED(_SC_ASYNCHRONOUS_IO); 981 VERIFY_SYSCONF_UNSUPPORTED(_SC_MESSAGE_PASSING); 982 VERIFY_SYSCONF_UNSUPPORTED(_SC_PRIORITIZED_IO); 983 VERIFY_SYSCONF_UNSUPPORTED(_SC_SHARED_MEMORY_OBJECTS); 984 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_INHERIT); 985 VERIFY_SYSCONF_UNSUPPORTED(_SC_THREAD_ROBUST_PRIO_PROTECT); 986 987 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_C_DEV); 988 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_LOCALEDEF); 989 VERIFY_SYSCONF_UNSUPPORTED(_SC_2_SW_DEV); 990 991 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_CRYPT); 992 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_LEGACY); 993 VERIFY_SYSCONF_UNSUPPORTED(_SC_XOPEN_UUCP); 994 #endif // defined(__BIONIC__) 995 } 996 997 TEST(UNISTD_TEST, get_cpu_count_from_string) { 998 ASSERT_EQ(0, GetCpuCountFromString(" ")); 999 ASSERT_EQ(1, GetCpuCountFromString("0")); 1000 ASSERT_EQ(40, GetCpuCountFromString("0-39")); 1001 ASSERT_EQ(4, GetCpuCountFromString("0, 1-2, 4\n")); 1002 } 1003 1004 TEST(UNISTD_TEST, sysconf_SC_NPROCESSORS_ONLN) { 1005 std::string line; 1006 ASSERT_TRUE(android::base::ReadFileToString("/sys/devices/system/cpu/online", &line)); 1007 long online_cpus = 0; 1008 for (const std::string& s : android::base::Split(line, ",")) { 1009 std::vector<std::string> numbers = android::base::Split(s, "-"); 1010 if (numbers.size() == 1u) { 1011 online_cpus++; 1012 } else { 1013 online_cpus += atoi(numbers[1].c_str()) - atoi(numbers[0].c_str()) + 1; 1014 } 1015 } 1016 ASSERT_EQ(online_cpus, sysconf(_SC_NPROCESSORS_ONLN)); 1017 } 1018 1019 TEST(UNISTD_TEST, sysconf_SC_ARG_MAX) { 1020 // https://lkml.org/lkml/2017/11/15/813. 1021 #if !defined(ARG_MAX) 1022 #define ARG_MAX 131072 1023 #endif 1024 ASSERT_EQ(ARG_MAX, sysconf(_SC_ARG_MAX)); 1025 } 1026 1027 TEST(UNISTD_TEST, dup2_same) { 1028 // POSIX says of dup2: 1029 // If fildes2 is already a valid open file descriptor ... 1030 // [and] fildes is equal to fildes2 ... dup2() shall return 1031 // fildes2 without closing it. 1032 // This isn't true of dup3(2), so we need to manually implement that. 1033 1034 // Equal and valid. 1035 int fd = open("/proc/version", O_RDONLY); 1036 ASSERT_TRUE(fd != -1); 1037 ASSERT_EQ(fd, dup2(fd, fd)); 1038 ASSERT_EQ(0, close(fd)); // Check that dup2 didn't close fd. 1039 1040 // Equal, but invalid. 1041 errno = 0; 1042 ASSERT_EQ(-1, dup2(fd, fd)); 1043 ASSERT_EQ(EBADF, errno); 1044 } 1045 1046 TEST(UNISTD_TEST, dup3) { 1047 int fd = open("/proc/version", O_RDONLY); 1048 ASSERT_EQ(666, dup3(fd, 666, 0)); 1049 AssertCloseOnExec(666, false); 1050 close(666); 1051 ASSERT_EQ(667, dup3(fd, 667, O_CLOEXEC)); 1052 AssertCloseOnExec(667, true); 1053 close(667); 1054 close(fd); 1055 } 1056 1057 TEST(UNISTD_TEST, lockf_smoke) { 1058 constexpr off64_t file_size = 32*1024LL; 1059 1060 TemporaryFile tf; 1061 ASSERT_EQ(0, ftruncate(tf.fd, file_size)); 1062 1063 // Lock everything. 1064 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); 1065 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size)); 1066 1067 // Try-lock everything, this should succeed too. 1068 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); 1069 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size)); 1070 1071 // Check status. 1072 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); 1073 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size)); 1074 1075 // Unlock file. 1076 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); 1077 ASSERT_EQ(0, lockf64(tf.fd, F_ULOCK, file_size)); 1078 } 1079 1080 TEST(UNISTD_TEST, lockf_zero) { 1081 constexpr off64_t file_size = 32*1024LL; 1082 1083 TemporaryFile tf; 1084 ASSERT_EQ(0, ftruncate(tf.fd, file_size)); 1085 1086 // Lock everything by specifying a size of 0 (meaning "to the end, even if it changes"). 1087 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); 1088 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, 0)); 1089 1090 // Check that it's locked. 1091 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); 1092 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size)); 1093 1094 // Move the end. 1095 ASSERT_EQ(0, ftruncate(tf.fd, 2*file_size)); 1096 1097 // Check that the new section is locked too. 1098 ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET)); 1099 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, 2*file_size)); 1100 } 1101 1102 TEST(UNISTD_TEST, lockf_negative) { 1103 constexpr off64_t file_size = 32*1024LL; 1104 1105 TemporaryFile tf; 1106 ASSERT_EQ(0, ftruncate(tf.fd, file_size)); 1107 1108 // Lock everything, but specifying the range in reverse. 1109 ASSERT_EQ(file_size, lseek64(tf.fd, file_size, SEEK_SET)); 1110 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, -file_size)); 1111 1112 // Check that it's locked. 1113 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); 1114 ASSERT_EQ(0, lockf64(tf.fd, F_TEST, file_size)); 1115 } 1116 1117 TEST(UNISTD_TEST, lockf_with_child) { 1118 constexpr off64_t file_size = 32*1024LL; 1119 1120 TemporaryFile tf; 1121 ASSERT_EQ(0, ftruncate(tf.fd, file_size)); 1122 1123 // Lock everything. 1124 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); 1125 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size)); 1126 1127 // Fork a child process 1128 pid_t pid = fork(); 1129 ASSERT_NE(-1, pid); 1130 if (pid == 0) { 1131 // Check that the child cannot lock the file. 1132 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); 1133 ASSERT_EQ(-1, lockf64(tf.fd, F_TLOCK, file_size)); 1134 ASSERT_EQ(EAGAIN, errno); 1135 // Check also that it reports itself as locked. 1136 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); 1137 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size)); 1138 ASSERT_EQ(EACCES, errno); 1139 _exit(0); 1140 } 1141 AssertChildExited(pid, 0); 1142 } 1143 1144 TEST(UNISTD_TEST, lockf_partial_with_child) { 1145 constexpr off64_t file_size = 32*1024LL; 1146 1147 TemporaryFile tf; 1148 ASSERT_EQ(0, ftruncate(tf.fd, file_size)); 1149 1150 // Lock the first half of the file. 1151 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); 1152 ASSERT_EQ(0, lockf64(tf.fd, F_LOCK, file_size/2)); 1153 1154 // Fork a child process. 1155 pid_t pid = fork(); 1156 ASSERT_NE(-1, pid); 1157 if (pid == 0) { 1158 // Check that the child can lock the other half. 1159 ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET)); 1160 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2)); 1161 // Check that the child cannot lock the first half. 1162 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); 1163 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2)); 1164 ASSERT_EQ(EACCES, errno); 1165 // Check also that it reports itself as locked. 1166 ASSERT_EQ(0, lseek64(tf.fd, 0, SEEK_SET)); 1167 ASSERT_EQ(-1, lockf64(tf.fd, F_TEST, file_size/2)); 1168 ASSERT_EQ(EACCES, errno); 1169 _exit(0); 1170 } 1171 AssertChildExited(pid, 0); 1172 1173 // The second half was locked by the child, but the lock disappeared 1174 // when the process exited, so check it can be locked now. 1175 ASSERT_EQ(file_size/2, lseek64(tf.fd, file_size/2, SEEK_SET)); 1176 ASSERT_EQ(0, lockf64(tf.fd, F_TLOCK, file_size/2)); 1177 } 1178 1179 TEST(UNISTD_TEST, getdomainname) { 1180 struct utsname u; 1181 ASSERT_EQ(0, uname(&u)); 1182 1183 char buf[sizeof(u.domainname)]; 1184 ASSERT_EQ(0, getdomainname(buf, sizeof(buf))); 1185 EXPECT_STREQ(u.domainname, buf); 1186 1187 #if defined(__BIONIC__) 1188 // bionic and glibc have different behaviors when len is too small 1189 ASSERT_EQ(-1, getdomainname(buf, strlen(u.domainname))); 1190 EXPECT_EQ(EINVAL, errno); 1191 #endif 1192 } 1193 1194 TEST(UNISTD_TEST, setdomainname) { 1195 __user_cap_header_struct header; 1196 memset(&header, 0, sizeof(header)); 1197 header.version = _LINUX_CAPABILITY_VERSION_3; 1198 1199 __user_cap_data_struct old_caps[_LINUX_CAPABILITY_U32S_3]; 1200 ASSERT_EQ(0, capget(&header, &old_caps[0])); 1201 1202 auto admin_idx = CAP_TO_INDEX(CAP_SYS_ADMIN); 1203 auto admin_mask = CAP_TO_MASK(CAP_SYS_ADMIN); 1204 bool has_admin = old_caps[admin_idx].effective & admin_mask; 1205 if (has_admin) { 1206 __user_cap_data_struct new_caps[_LINUX_CAPABILITY_U32S_3]; 1207 memcpy(new_caps, old_caps, sizeof(new_caps)); 1208 new_caps[admin_idx].effective &= ~admin_mask; 1209 1210 ASSERT_EQ(0, capset(&header, &new_caps[0])) << "failed to drop admin privileges"; 1211 } 1212 1213 const char* name = "newdomainname"; 1214 ASSERT_EQ(-1, setdomainname(name, strlen(name))); 1215 ASSERT_EQ(EPERM, errno); 1216 1217 if (has_admin) { 1218 ASSERT_EQ(0, capset(&header, &old_caps[0])) << "failed to restore admin privileges"; 1219 } 1220 } 1221 1222 TEST(UNISTD_TEST, execve_failure) { 1223 ExecTestHelper eth; 1224 errno = 0; 1225 ASSERT_EQ(-1, execve("/", eth.GetArgs(), eth.GetEnv())); 1226 ASSERT_EQ(EACCES, errno); 1227 } 1228 1229 TEST(UNISTD_TEST, execve_args) { 1230 // int execve(const char* path, char* argv[], char* envp[]); 1231 1232 // Test basic argument passing. 1233 ExecTestHelper eth; 1234 eth.SetArgs({"echo", "hello", "world", nullptr}); 1235 eth.Run([&]() { execve(BIN_DIR "echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n"); 1236 1237 // Test environment variable setting too. 1238 eth.SetArgs({"printenv", nullptr}); 1239 eth.SetEnv({"A=B", nullptr}); 1240 eth.Run([&]() { execve(BIN_DIR "printenv", eth.GetArgs(), eth.GetEnv()); }, 0, "A=B\n"); 1241 } 1242 1243 TEST(UNISTD_TEST, execl_failure) { 1244 errno = 0; 1245 ASSERT_EQ(-1, execl("/", "/", nullptr)); 1246 ASSERT_EQ(EACCES, errno); 1247 } 1248 1249 TEST(UNISTD_TEST, execl) { 1250 ExecTestHelper eth; 1251 // int execl(const char* path, const char* arg, ...); 1252 eth.Run([&]() { execl(BIN_DIR "echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n"); 1253 } 1254 1255 TEST(UNISTD_TEST, execle_failure) { 1256 ExecTestHelper eth; 1257 errno = 0; 1258 ASSERT_EQ(-1, execle("/", "/", nullptr, eth.GetEnv())); 1259 ASSERT_EQ(EACCES, errno); 1260 } 1261 1262 TEST(UNISTD_TEST, execle) { 1263 ExecTestHelper eth; 1264 eth.SetEnv({"A=B", nullptr}); 1265 // int execle(const char* path, const char* arg, ..., char* envp[]); 1266 eth.Run([&]() { execle(BIN_DIR "printenv", "printenv", nullptr, eth.GetEnv()); }, 0, "A=B\n"); 1267 } 1268 1269 TEST(UNISTD_TEST, execv_failure) { 1270 ExecTestHelper eth; 1271 errno = 0; 1272 ASSERT_EQ(-1, execv("/", eth.GetArgs())); 1273 ASSERT_EQ(EACCES, errno); 1274 } 1275 1276 TEST(UNISTD_TEST, execv) { 1277 ExecTestHelper eth; 1278 eth.SetArgs({"echo", "hello", "world", nullptr}); 1279 // int execv(const char* path, char* argv[]); 1280 eth.Run([&]() { execv(BIN_DIR "echo", eth.GetArgs()); }, 0, "hello world\n"); 1281 } 1282 1283 TEST(UNISTD_TEST, execlp_failure) { 1284 errno = 0; 1285 ASSERT_EQ(-1, execlp("/", "/", nullptr)); 1286 ASSERT_EQ(EACCES, errno); 1287 } 1288 1289 TEST(UNISTD_TEST, execlp) { 1290 ExecTestHelper eth; 1291 // int execlp(const char* file, const char* arg, ...); 1292 eth.Run([&]() { execlp("echo", "echo", "hello", "world", nullptr); }, 0, "hello world\n"); 1293 } 1294 1295 TEST(UNISTD_TEST, execvp_failure) { 1296 ExecTestHelper eth; 1297 eth.SetArgs({nullptr}); 1298 errno = 0; 1299 ASSERT_EQ(-1, execvp("/", eth.GetArgs())); 1300 ASSERT_EQ(EACCES, errno); 1301 } 1302 1303 TEST(UNISTD_TEST, execvp) { 1304 ExecTestHelper eth; 1305 eth.SetArgs({"echo", "hello", "world", nullptr}); 1306 // int execvp(const char* file, char* argv[]); 1307 eth.Run([&]() { execvp("echo", eth.GetArgs()); }, 0, "hello world\n"); 1308 } 1309 1310 TEST(UNISTD_TEST, execvpe_failure) { 1311 ExecTestHelper eth; 1312 errno = 0; 1313 ASSERT_EQ(-1, execvpe("this-does-not-exist", eth.GetArgs(), eth.GetEnv())); 1314 // Running in CTS we might not even be able to search all directories in $PATH. 1315 ASSERT_TRUE(errno == ENOENT || errno == EACCES); 1316 } 1317 1318 TEST(UNISTD_TEST, execvpe) { 1319 // int execvpe(const char* file, char* argv[], char* envp[]); 1320 1321 // Test basic argument passing. 1322 ExecTestHelper eth; 1323 eth.SetArgs({"echo", "hello", "world", nullptr}); 1324 eth.Run([&]() { execvpe("echo", eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n"); 1325 1326 // Test environment variable setting too. 1327 eth.SetArgs({"printenv", nullptr}); 1328 eth.SetEnv({"A=B", nullptr}); 1329 eth.Run([&]() { execvpe("printenv", eth.GetArgs(), eth.GetEnv()); }, 0, "A=B\n"); 1330 } 1331 1332 TEST(UNISTD_TEST, execvpe_ENOEXEC) { 1333 // Create a shell script with #!. 1334 TemporaryFile tf; 1335 ASSERT_TRUE(android::base::WriteStringToFile("#!" BIN_DIR "sh\necho script\n", tf.filename)); 1336 1337 // Set $PATH so we can find it. 1338 setenv("PATH", dirname(tf.filename), 1); 1339 1340 ExecTestHelper eth; 1341 eth.SetArgs({basename(tf.filename), nullptr}); 1342 1343 // It's not inherently executable. 1344 errno = 0; 1345 ASSERT_EQ(-1, execvpe(basename(tf.filename), eth.GetArgs(), eth.GetEnv())); 1346 ASSERT_EQ(EACCES, errno); 1347 1348 // Make it executable (and keep it writable because we're going to rewrite it below). 1349 ASSERT_EQ(0, chmod(tf.filename, 0777)); 1350 1351 // TemporaryFile will have a writable fd, so we can test ETXTBSY while we're here... 1352 errno = 0; 1353 ASSERT_EQ(-1, execvpe(basename(tf.filename), eth.GetArgs(), eth.GetEnv())); 1354 ASSERT_EQ(ETXTBSY, errno); 1355 1356 // 1. The simplest test: the kernel should handle this. 1357 ASSERT_EQ(0, close(tf.fd)); 1358 eth.Run([&]() { execvpe(basename(tf.filename), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n"); 1359 1360 // 2. Try again without a #!. We should have to handle this ourselves. 1361 ASSERT_TRUE(android::base::WriteStringToFile("echo script\n", tf.filename)); 1362 eth.Run([&]() { execvpe(basename(tf.filename), eth.GetArgs(), eth.GetEnv()); }, 0, "script\n"); 1363 1364 // 3. Again without a #!, but also with a leading '/', since that's a special case in the 1365 // implementation. 1366 eth.Run([&]() { execvpe(tf.filename, eth.GetArgs(), eth.GetEnv()); }, 0, "script\n"); 1367 } 1368 1369 TEST(UNISTD_TEST, execvp_libcore_test_55017) { 1370 ExecTestHelper eth; 1371 eth.SetArgs({"/system/bin/does-not-exist", nullptr}); 1372 1373 errno = 0; 1374 ASSERT_EQ(-1, execvp("/system/bin/does-not-exist", eth.GetArgs())); 1375 ASSERT_EQ(ENOENT, errno); 1376 } 1377 1378 TEST(UNISTD_TEST, exec_argv0_null) { 1379 // http://b/33276926 1380 char* args[] = {nullptr}; 1381 char* envs[] = {nullptr}; 1382 ASSERT_EXIT(execve("/system/bin/run-as", args, envs), testing::ExitedWithCode(1), 1383 "<unknown>: usage: run-as"); 1384 } 1385 1386 TEST(UNISTD_TEST, fexecve_failure) { 1387 ExecTestHelper eth; 1388 errno = 0; 1389 int fd = open("/", O_RDONLY); 1390 ASSERT_NE(-1, fd); 1391 ASSERT_EQ(-1, fexecve(fd, eth.GetArgs(), eth.GetEnv())); 1392 ASSERT_EQ(EACCES, errno); 1393 close(fd); 1394 } 1395 1396 TEST(UNISTD_TEST, fexecve_bad_fd) { 1397 ExecTestHelper eth; 1398 errno = 0; 1399 ASSERT_EQ(-1, fexecve(-1, eth.GetArgs(), eth.GetEnv())); 1400 ASSERT_EQ(EBADF, errno); 1401 } 1402 1403 TEST(UNISTD_TEST, fexecve_args) { 1404 // Test basic argument passing. 1405 int echo_fd = open(BIN_DIR "echo", O_RDONLY | O_CLOEXEC); 1406 ASSERT_NE(-1, echo_fd); 1407 ExecTestHelper eth; 1408 eth.SetArgs({"echo", "hello", "world", nullptr}); 1409 eth.Run([&]() { fexecve(echo_fd, eth.GetArgs(), eth.GetEnv()); }, 0, "hello world\n"); 1410 close(echo_fd); 1411 1412 // Test environment variable setting too. 1413 int printenv_fd = open(BIN_DIR "printenv", O_RDONLY | O_CLOEXEC); 1414 ASSERT_NE(-1, printenv_fd); 1415 eth.SetArgs({"printenv", nullptr}); 1416 eth.SetEnv({"A=B", nullptr}); 1417 eth.Run([&]() { fexecve(printenv_fd, eth.GetArgs(), eth.GetEnv()); }, 0, "A=B\n"); 1418 close(printenv_fd); 1419 } 1420 1421 TEST(UNISTD_TEST, getlogin_r) { 1422 char buf[LOGIN_NAME_MAX] = {}; 1423 EXPECT_EQ(ERANGE, getlogin_r(buf, 0)); 1424 EXPECT_EQ(0, getlogin_r(buf, sizeof(buf))); 1425 EXPECT_STREQ(getlogin(), buf); 1426 } 1427 1428 TEST(UNISTD_TEST, swab) { 1429 // POSIX: "The swab() function shall copy nbytes bytes, which are pointed to by src, 1430 // to the object pointed to by dest, exchanging adjacent bytes." 1431 char buf[BUFSIZ]; 1432 memset(buf, 'x', sizeof(buf)); 1433 swab("ehll oowlr\0d", buf, 12); 1434 ASSERT_STREQ("hello world", buf); 1435 } 1436 1437 TEST(UNISTD_TEST, swab_odd_byte_count) { 1438 // POSIX: "If nbytes is odd, swab() copies and exchanges nbytes-1 bytes and the disposition 1439 // of the last byte is unspecified." 1440 // ...but it seems unreasonable to not just leave the last byte alone. 1441 char buf[BUFSIZ]; 1442 memset(buf, 'x', sizeof(buf)); 1443 swab("012345", buf, 3); 1444 ASSERT_EQ('1', buf[0]); 1445 ASSERT_EQ('0', buf[1]); 1446 ASSERT_EQ('x', buf[2]); 1447 } 1448 1449 TEST(UNISTD_TEST, swab_overlap) { 1450 // POSIX: "If copying takes place between objects that overlap, the behavior is undefined." 1451 // ...but it seems unreasonable to not just do the right thing. 1452 char buf[] = "012345"; 1453 swab(buf, buf, 4); 1454 ASSERT_EQ('1', buf[0]); 1455 ASSERT_EQ('0', buf[1]); 1456 ASSERT_EQ('3', buf[2]); 1457 ASSERT_EQ('2', buf[3]); 1458 ASSERT_EQ('4', buf[4]); 1459 ASSERT_EQ('5', buf[5]); 1460 ASSERT_EQ(0, buf[6]); 1461 } 1462 1463 TEST(UNISTD_TEST, swab_negative_byte_count) { 1464 // POSIX: "If nbytes is negative, swab() does nothing." 1465 char buf[BUFSIZ]; 1466 memset(buf, 'x', sizeof(buf)); 1467 swab("hello", buf, -1); 1468 ASSERT_EQ('x', buf[0]); 1469 } 1470