2013-11-07 01:20:54 +01:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2013 The Android Open Source Project
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <gtest/gtest.h>
|
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
2016-07-20 00:20:24 +02:00
|
|
|
#include <string.h>
|
|
|
|
#include <sys/utsname.h>
|
2017-06-02 19:09:19 +02:00
|
|
|
#include <sys/vfs.h>
|
2013-11-07 01:20:54 +01:00
|
|
|
|
2018-11-13 16:35:21 +01:00
|
|
|
#include <android-base/file.h>
|
2022-02-17 21:55:42 +01:00
|
|
|
#include <android-base/silent_death_test.h>
|
2017-08-04 18:34:19 +02:00
|
|
|
#include <android-base/stringprintf.h>
|
|
|
|
|
2016-07-20 00:20:24 +02:00
|
|
|
// Glibc v2.19 doesn't include these in fcntl.h so host builds will fail without.
|
|
|
|
#if !defined(FALLOC_FL_PUNCH_HOLE) || !defined(FALLOC_FL_KEEP_SIZE)
|
|
|
|
#include <linux/falloc.h>
|
2021-07-28 20:18:11 +02:00
|
|
|
#endif
|
|
|
|
#if !defined(EXT4_SUPER_MAGIC)
|
2017-06-02 19:09:19 +02:00
|
|
|
#include <linux/magic.h>
|
2016-07-20 00:20:24 +02:00
|
|
|
#endif
|
|
|
|
|
2023-09-21 23:11:19 +02:00
|
|
|
#include "utils.h"
|
|
|
|
|
2022-02-17 21:55:42 +01:00
|
|
|
using fcntl_DeathTest = SilentDeathTest;
|
|
|
|
|
2013-11-07 01:20:54 +01:00
|
|
|
TEST(fcntl, fcntl_smoke) {
|
|
|
|
int fd = open("/proc/version", O_RDONLY);
|
|
|
|
ASSERT_TRUE(fd != -1);
|
|
|
|
|
|
|
|
int flags = fcntl(fd, F_GETFD);
|
|
|
|
ASSERT_TRUE(flags != -1);
|
|
|
|
ASSERT_EQ(0, flags & FD_CLOEXEC);
|
|
|
|
|
|
|
|
int rc = fcntl(fd, F_SETFD, FD_CLOEXEC);
|
|
|
|
ASSERT_EQ(0, rc);
|
|
|
|
|
|
|
|
flags = fcntl(fd, F_GETFD);
|
|
|
|
ASSERT_TRUE(flags != -1);
|
|
|
|
ASSERT_EQ(FD_CLOEXEC, flags & FD_CLOEXEC);
|
Implement some of the missing LFS64 support.
This gives us:
* <dirent.h>
struct dirent64
readdir64, readdir64_r, alphasort64, scandir64
* <fcntl.h>
creat64, openat64, open64.
* <sys/stat.h>
struct stat64
fstat64, fstatat64, lstat64, stat64.
* <sys/statvfs.h>
struct statvfs64
statvfs64, fstatvfs64.
* <sys/vfs.h>
struct statfs64
statfs64, fstatfs64.
This also removes some of the incorrect #define hacks we've had in the
past (for stat64, for example, which we promised to clean up way back
in bug 8472078).
Bug: 11865851
Bug: 8472078
Change-Id: Ia46443521918519f2dfa64d4621027dfd13ac566
2014-01-18 03:42:49 +01:00
|
|
|
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(fcntl, open_open64) {
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
fd = open("/proc/version", O_RDONLY);
|
|
|
|
ASSERT_TRUE(fd != -1);
|
|
|
|
close(fd);
|
|
|
|
|
|
|
|
fd = open64("/proc/version", O_RDONLY);
|
|
|
|
ASSERT_TRUE(fd != -1);
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(fcntl, openat_openat64) {
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
fd = openat(AT_FDCWD, "/proc/version", O_RDONLY);
|
|
|
|
ASSERT_TRUE(fd != -1);
|
|
|
|
close(fd);
|
|
|
|
|
|
|
|
fd = openat64(AT_FDCWD, "/proc/version", O_RDONLY);
|
|
|
|
ASSERT_TRUE(fd != -1);
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(fcntl, creat_creat64) {
|
|
|
|
ASSERT_EQ(-1, creat("", 0666));
|
2023-09-21 23:11:19 +02:00
|
|
|
ASSERT_ERRNO(ENOENT);
|
Implement some of the missing LFS64 support.
This gives us:
* <dirent.h>
struct dirent64
readdir64, readdir64_r, alphasort64, scandir64
* <fcntl.h>
creat64, openat64, open64.
* <sys/stat.h>
struct stat64
fstat64, fstatat64, lstat64, stat64.
* <sys/statvfs.h>
struct statvfs64
statvfs64, fstatvfs64.
* <sys/vfs.h>
struct statfs64
statfs64, fstatfs64.
This also removes some of the incorrect #define hacks we've had in the
past (for stat64, for example, which we promised to clean up way back
in bug 8472078).
Bug: 11865851
Bug: 8472078
Change-Id: Ia46443521918519f2dfa64d4621027dfd13ac566
2014-01-18 03:42:49 +01:00
|
|
|
ASSERT_EQ(-1, creat64("", 0666));
|
2023-09-21 23:11:19 +02:00
|
|
|
ASSERT_ERRNO(ENOENT);
|
2013-11-07 01:20:54 +01:00
|
|
|
}
|
2014-02-04 01:20:46 +01:00
|
|
|
|
2014-09-11 02:39:00 +02:00
|
|
|
TEST(fcntl, posix_fadvise) {
|
|
|
|
TemporaryFile tf;
|
|
|
|
errno = 0;
|
|
|
|
|
|
|
|
EXPECT_EQ(EBADF, posix_fadvise(-1, 0, 0, POSIX_FADV_NORMAL));
|
2023-09-21 23:11:19 +02:00
|
|
|
EXPECT_ERRNO(0);
|
2014-09-11 02:39:00 +02:00
|
|
|
|
|
|
|
EXPECT_EQ(EBADF, posix_fadvise64(-1, 0, 0, POSIX_FADV_NORMAL));
|
2023-09-21 23:11:19 +02:00
|
|
|
EXPECT_ERRNO(0);
|
2014-09-11 02:39:00 +02:00
|
|
|
|
|
|
|
EXPECT_EQ(EINVAL, posix_fadvise(tf.fd, 0, 0, -1));
|
2023-09-21 23:11:19 +02:00
|
|
|
EXPECT_ERRNO(0);
|
2014-09-11 02:39:00 +02:00
|
|
|
|
|
|
|
EXPECT_EQ(EINVAL, posix_fadvise64(tf.fd, 0, 0, -1));
|
2023-09-21 23:11:19 +02:00
|
|
|
EXPECT_ERRNO(0);
|
2014-09-11 02:39:00 +02:00
|
|
|
|
|
|
|
EXPECT_EQ(0, posix_fadvise(tf.fd, 0, 0, POSIX_FADV_NORMAL));
|
|
|
|
EXPECT_EQ(0, posix_fadvise64(tf.fd, 0, 0, POSIX_FADV_NORMAL));
|
|
|
|
}
|
|
|
|
|
2014-02-04 01:20:46 +01:00
|
|
|
TEST(fcntl, fallocate_EINVAL) {
|
|
|
|
TemporaryFile tf;
|
|
|
|
|
2014-09-11 02:39:00 +02:00
|
|
|
// fallocate/fallocate64 set errno.
|
|
|
|
// posix_fallocate/posix_fallocate64 return an errno value.
|
|
|
|
|
2014-02-04 01:20:46 +01:00
|
|
|
errno = 0;
|
|
|
|
ASSERT_EQ(-1, fallocate(tf.fd, 0, 0, -1));
|
2023-09-21 23:11:19 +02:00
|
|
|
ASSERT_ERRNO(EINVAL);
|
2014-02-04 01:20:46 +01:00
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
ASSERT_EQ(-1, fallocate64(tf.fd, 0, 0, -1));
|
2023-09-21 23:11:19 +02:00
|
|
|
ASSERT_ERRNO(EINVAL);
|
2014-02-04 01:20:46 +01:00
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
ASSERT_EQ(EINVAL, posix_fallocate(tf.fd, 0, -1));
|
2023-09-21 23:11:19 +02:00
|
|
|
ASSERT_ERRNO(0);
|
2014-02-04 01:20:46 +01:00
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
ASSERT_EQ(EINVAL, posix_fallocate64(tf.fd, 0, -1));
|
2023-09-21 23:11:19 +02:00
|
|
|
ASSERT_ERRNO(0);
|
2014-02-04 01:20:46 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(fcntl, fallocate) {
|
|
|
|
TemporaryFile tf;
|
|
|
|
struct stat sb;
|
|
|
|
ASSERT_EQ(0, fstat(tf.fd, &sb));
|
|
|
|
ASSERT_EQ(0, sb.st_size);
|
|
|
|
|
2014-05-13 20:19:57 +02:00
|
|
|
#if defined(__BIONIC__)
|
2014-02-04 01:20:46 +01:00
|
|
|
ASSERT_EQ(0, fallocate(tf.fd, 0, 0, 1));
|
|
|
|
ASSERT_EQ(0, fstat(tf.fd, &sb));
|
|
|
|
ASSERT_EQ(1, sb.st_size);
|
|
|
|
|
|
|
|
ASSERT_EQ(0, fallocate64(tf.fd, 0, 0, 2));
|
|
|
|
ASSERT_EQ(0, fstat(tf.fd, &sb));
|
|
|
|
ASSERT_EQ(2, sb.st_size);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
ASSERT_EQ(0, posix_fallocate(tf.fd, 0, 3));
|
|
|
|
ASSERT_EQ(0, fstat(tf.fd, &sb));
|
|
|
|
ASSERT_EQ(3, sb.st_size);
|
|
|
|
|
|
|
|
ASSERT_EQ(0, posix_fallocate64(tf.fd, 0, 4));
|
|
|
|
ASSERT_EQ(0, fstat(tf.fd, &sb));
|
|
|
|
ASSERT_EQ(4, sb.st_size);
|
|
|
|
}
|
2014-03-14 14:16:25 +01:00
|
|
|
|
2020-01-30 04:20:45 +01:00
|
|
|
TEST(fcntl, f_getlk) {
|
|
|
|
int fd = open("/proc/version", O_RDONLY);
|
|
|
|
ASSERT_TRUE(fd != -1);
|
|
|
|
|
|
|
|
struct flock check_lock;
|
|
|
|
check_lock.l_type = F_WRLCK;
|
|
|
|
check_lock.l_start = 0;
|
|
|
|
check_lock.l_whence = SEEK_SET;
|
|
|
|
check_lock.l_len = 0;
|
|
|
|
|
|
|
|
ASSERT_EQ(0, fcntl(fd, F_GETLK, &check_lock));
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
|
2014-03-14 14:16:25 +01:00
|
|
|
TEST(fcntl, f_getlk64) {
|
|
|
|
int fd = open64("/proc/version", O_RDONLY);
|
|
|
|
ASSERT_TRUE(fd != -1);
|
|
|
|
|
|
|
|
struct flock64 check_lock;
|
|
|
|
check_lock.l_type = F_WRLCK;
|
|
|
|
check_lock.l_start = 0;
|
|
|
|
check_lock.l_whence = SEEK_SET;
|
|
|
|
check_lock.l_len = 0;
|
|
|
|
|
2020-01-30 04:20:45 +01:00
|
|
|
ASSERT_EQ(0, fcntl(fd, F_GETLK64, &check_lock));
|
2014-03-14 14:16:25 +01:00
|
|
|
close(fd);
|
|
|
|
}
|
2014-06-25 01:32:01 +02:00
|
|
|
|
|
|
|
TEST(fcntl, splice) {
|
|
|
|
int pipe_fds[2];
|
|
|
|
ASSERT_EQ(0, pipe(pipe_fds));
|
|
|
|
|
|
|
|
int in = open("/proc/cpuinfo", O_RDONLY);
|
|
|
|
ASSERT_NE(in, -1);
|
|
|
|
|
|
|
|
TemporaryFile tf;
|
|
|
|
|
2018-08-03 02:31:13 +02:00
|
|
|
ssize_t bytes_read = splice(in, nullptr, pipe_fds[1], nullptr, 8*1024, SPLICE_F_MORE | SPLICE_F_MOVE);
|
2014-06-25 01:32:01 +02:00
|
|
|
ASSERT_NE(bytes_read, -1);
|
|
|
|
|
2018-08-03 02:31:13 +02:00
|
|
|
ssize_t bytes_written = splice(pipe_fds[0], nullptr, tf.fd, nullptr, bytes_read, SPLICE_F_MORE | SPLICE_F_MOVE);
|
2014-06-25 01:32:01 +02:00
|
|
|
ASSERT_EQ(bytes_read, bytes_written);
|
|
|
|
|
|
|
|
close(pipe_fds[0]);
|
|
|
|
close(pipe_fds[1]);
|
|
|
|
close(in);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(fcntl, vmsplice) {
|
|
|
|
int pipe_fds[2];
|
|
|
|
ASSERT_EQ(0, pipe(pipe_fds));
|
|
|
|
|
|
|
|
iovec v[2];
|
|
|
|
v[0].iov_base = const_cast<char*>("hello ");
|
|
|
|
v[0].iov_len = 6;
|
|
|
|
v[1].iov_base = const_cast<char*>("world\n");
|
|
|
|
v[1].iov_len = 6;
|
|
|
|
ssize_t bytes_written = vmsplice(pipe_fds[1], v, sizeof(v)/sizeof(iovec), 0);
|
|
|
|
ASSERT_EQ(v[0].iov_len + v[1].iov_len, static_cast<size_t>(bytes_written));
|
|
|
|
close(pipe_fds[1]);
|
|
|
|
|
|
|
|
char buf[BUFSIZ];
|
|
|
|
FILE* fp = fdopen(pipe_fds[0], "r");
|
2018-08-03 02:31:13 +02:00
|
|
|
ASSERT_TRUE(fp != nullptr);
|
|
|
|
ASSERT_TRUE(fgets(buf, sizeof(buf), fp) != nullptr);
|
2014-06-25 01:32:01 +02:00
|
|
|
fclose(fp);
|
|
|
|
ASSERT_STREQ("hello world\n", buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(fcntl, tee) {
|
2017-09-25 08:18:29 +02:00
|
|
|
char expected[BUFSIZ];
|
2014-06-25 01:32:01 +02:00
|
|
|
FILE* expected_fp = fopen("/proc/version", "r");
|
2018-08-03 02:31:13 +02:00
|
|
|
ASSERT_TRUE(expected_fp != nullptr);
|
|
|
|
ASSERT_TRUE(fgets(expected, sizeof(expected), expected_fp) != nullptr);
|
2014-06-25 01:32:01 +02:00
|
|
|
fclose(expected_fp);
|
|
|
|
|
|
|
|
int pipe1[2];
|
|
|
|
ASSERT_EQ(0, pipe(pipe1));
|
|
|
|
|
|
|
|
int pipe2[2];
|
|
|
|
ASSERT_EQ(0, pipe(pipe2));
|
|
|
|
|
|
|
|
int in = open("/proc/version", O_RDONLY);
|
|
|
|
ASSERT_NE(in, -1);
|
|
|
|
|
|
|
|
// Write /proc/version into pipe1.
|
2018-08-03 02:31:13 +02:00
|
|
|
ssize_t bytes_read = splice(in, nullptr, pipe1[1], nullptr, 8*1024, SPLICE_F_MORE | SPLICE_F_MOVE);
|
2014-06-25 01:32:01 +02:00
|
|
|
ASSERT_NE(bytes_read, -1);
|
|
|
|
close(pipe1[1]);
|
|
|
|
|
|
|
|
// Tee /proc/version from pipe1 into pipe2.
|
|
|
|
ssize_t bytes_teed = tee(pipe1[0], pipe2[1], SIZE_MAX, 0);
|
|
|
|
ASSERT_EQ(bytes_read, bytes_teed);
|
|
|
|
close(pipe2[1]);
|
|
|
|
|
|
|
|
// The out fds of both pipe1 and pipe2 should now contain /proc/version.
|
|
|
|
char buf1[BUFSIZ];
|
|
|
|
FILE* fp1 = fdopen(pipe1[0], "r");
|
2018-08-03 02:31:13 +02:00
|
|
|
ASSERT_TRUE(fp1 != nullptr);
|
|
|
|
ASSERT_TRUE(fgets(buf1, sizeof(buf1), fp1) != nullptr);
|
2014-06-25 01:32:01 +02:00
|
|
|
fclose(fp1);
|
|
|
|
|
|
|
|
char buf2[BUFSIZ];
|
|
|
|
FILE* fp2 = fdopen(pipe2[0], "r");
|
2018-08-03 02:31:13 +02:00
|
|
|
ASSERT_TRUE(fp2 != nullptr);
|
|
|
|
ASSERT_TRUE(fgets(buf2, sizeof(buf2), fp2) != nullptr);
|
2014-06-25 01:32:01 +02:00
|
|
|
fclose(fp2);
|
|
|
|
|
|
|
|
ASSERT_STREQ(expected, buf1);
|
|
|
|
ASSERT_STREQ(expected, buf2);
|
|
|
|
}
|
2016-04-05 20:06:02 +02:00
|
|
|
|
|
|
|
TEST(fcntl, readahead) {
|
|
|
|
// Just check that the function is available.
|
|
|
|
errno = 0;
|
|
|
|
ASSERT_EQ(-1, readahead(-1, 0, 123));
|
2023-09-21 23:11:19 +02:00
|
|
|
ASSERT_ERRNO(EBADF);
|
2016-04-05 20:06:02 +02:00
|
|
|
}
|
2016-04-05 20:56:03 +02:00
|
|
|
|
|
|
|
TEST(fcntl, sync_file_range) {
|
|
|
|
// Just check that the function is available.
|
|
|
|
errno = 0;
|
|
|
|
ASSERT_EQ(-1, sync_file_range(-1, 0, 0, 0));
|
2023-09-21 23:11:19 +02:00
|
|
|
ASSERT_ERRNO(EBADF);
|
2016-04-05 20:56:03 +02:00
|
|
|
|
|
|
|
TemporaryFile tf;
|
|
|
|
ASSERT_EQ(0, sync_file_range(tf.fd, 0, 0, 0));
|
|
|
|
|
|
|
|
// The arguments to the underlying system call are in a different order on 32-bit ARM.
|
|
|
|
// Check that the `flags` argument gets passed to the kernel correctly.
|
|
|
|
errno = 0;
|
|
|
|
ASSERT_EQ(-1, sync_file_range(tf.fd, 0, 0, ~0));
|
2023-09-21 23:11:19 +02:00
|
|
|
ASSERT_ERRNO(EINVAL);
|
2016-04-05 20:56:03 +02:00
|
|
|
}
|
2016-07-20 00:20:24 +02:00
|
|
|
|
|
|
|
static bool parse_kernel_release(long* const major, long* const minor) {
|
|
|
|
struct utsname buf;
|
|
|
|
if (uname(&buf) == -1) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return sscanf(buf.release, "%ld.%ld", major, minor) == 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2017-06-02 23:57:49 +02:00
|
|
|
* b/28760453:
|
|
|
|
* Kernels older than 4.1 should have ext4 FALLOC_FL_PUNCH_HOLE disabled due to CVE-2015-8839.
|
|
|
|
* Devices that fail this test should cherry-pick the following commit:
|
|
|
|
* https://android.googlesource.com/kernel/msm/+/bdba352e898cbf57c8620ad68c8abf749c784d1f
|
2016-07-20 00:20:24 +02:00
|
|
|
*/
|
|
|
|
TEST(fcntl, falloc_punch) {
|
|
|
|
long major = 0, minor = 0;
|
|
|
|
ASSERT_TRUE(parse_kernel_release(&major, &minor));
|
|
|
|
|
|
|
|
if (major < 4 || (major == 4 && minor < 1)) {
|
|
|
|
TemporaryFile tf;
|
2017-06-02 19:09:19 +02:00
|
|
|
struct statfs sfs;
|
|
|
|
ASSERT_EQ(0, fstatfs(tf.fd, &sfs));
|
|
|
|
if (sfs.f_type == EXT4_SUPER_MAGIC) {
|
|
|
|
ASSERT_EQ(-1, fallocate(tf.fd, FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE, 0, 1));
|
2023-09-21 23:11:19 +02:00
|
|
|
ASSERT_ERRNO(EOPNOTSUPP);
|
2017-06-02 19:09:19 +02:00
|
|
|
}
|
2016-07-20 00:20:24 +02:00
|
|
|
}
|
|
|
|
}
|
2017-08-04 18:34:19 +02:00
|
|
|
|
|
|
|
TEST(fcntl, open_O_TMPFILE_mode) {
|
|
|
|
TemporaryDir dir;
|
|
|
|
// Without O_EXCL, we're allowed to give this a name later.
|
|
|
|
// (This is unrelated to the O_CREAT interaction with O_EXCL.)
|
|
|
|
const mode_t perms = S_IRUSR | S_IWUSR;
|
2018-11-13 16:35:21 +01:00
|
|
|
int fd = open(dir.path, O_TMPFILE | O_RDWR, perms);
|
2017-08-04 18:34:19 +02:00
|
|
|
|
|
|
|
// Ignore kernels without O_TMPFILE support (< 3.11).
|
|
|
|
if (fd == -1 && (errno == EISDIR || errno == EINVAL || errno == EOPNOTSUPP)) return;
|
|
|
|
|
|
|
|
ASSERT_TRUE(fd != -1) << strerror(errno);
|
|
|
|
|
|
|
|
// Does the fd claim to have the mode we set?
|
|
|
|
struct stat sb = {};
|
|
|
|
ASSERT_EQ(0, fstat(fd, &sb));
|
|
|
|
ASSERT_EQ(perms, (sb.st_mode & ~S_IFMT));
|
|
|
|
|
2017-10-25 07:54:34 +02:00
|
|
|
// On Android if we're not root, we won't be able to create links anyway...
|
|
|
|
if (getuid() != 0) return;
|
|
|
|
|
2018-11-13 16:35:21 +01:00
|
|
|
std::string final_path = android::base::StringPrintf("%s/named_now", dir.path);
|
2017-08-04 18:34:19 +02:00
|
|
|
ASSERT_EQ(0, linkat(AT_FDCWD, android::base::StringPrintf("/proc/self/fd/%d", fd).c_str(),
|
|
|
|
AT_FDCWD, final_path.c_str(),
|
|
|
|
AT_SYMLINK_FOLLOW));
|
|
|
|
ASSERT_EQ(0, close(fd));
|
|
|
|
|
|
|
|
// Does the resulting file claim to have the mode we set?
|
|
|
|
ASSERT_EQ(0, stat(final_path.c_str(), &sb));
|
|
|
|
ASSERT_EQ(perms, (sb.st_mode & ~S_IFMT));
|
|
|
|
|
|
|
|
// With O_EXCL, you're not allowed to add a name later.
|
2018-11-13 16:35:21 +01:00
|
|
|
fd = open(dir.path, O_TMPFILE | O_RDWR | O_EXCL, S_IRUSR | S_IWUSR);
|
2017-08-04 18:34:19 +02:00
|
|
|
ASSERT_TRUE(fd != -1) << strerror(errno);
|
|
|
|
errno = 0;
|
|
|
|
ASSERT_EQ(-1, linkat(AT_FDCWD, android::base::StringPrintf("/proc/self/fd/%d", fd).c_str(),
|
2018-11-13 16:35:21 +01:00
|
|
|
AT_FDCWD, android::base::StringPrintf("%s/no_chance", dir.path).c_str(),
|
2017-08-04 18:34:19 +02:00
|
|
|
AT_SYMLINK_FOLLOW));
|
2023-09-21 23:11:19 +02:00
|
|
|
ASSERT_ERRNO(ENOENT);
|
2017-08-04 18:34:19 +02:00
|
|
|
ASSERT_EQ(0, close(fd));
|
|
|
|
}
|
2022-02-17 21:55:42 +01:00
|
|
|
|
2023-07-24 22:55:01 +02:00
|
|
|
TEST_F(fcntl_DeathTest, fcntl_F_SETFD) {
|
2023-10-12 01:02:37 +02:00
|
|
|
EXPECT_DEATH(fcntl(0, F_SETFD, O_NONBLOCK), "only supports FD_CLOEXEC");
|
2022-02-17 21:55:42 +01:00
|
|
|
}
|