]>
Commit | Line | Data |
---|---|---|
db9ecf05 | 1 | /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
0b452006 | 2 | |
f5947a5e | 3 | #include <fcntl.h> |
69281c49 | 4 | #include <sys/mount.h> |
26fbedd7 | 5 | #include <sys/personality.h> |
69281c49 | 6 | #include <sys/prctl.h> |
0b452006 | 7 | #include <sys/stat.h> |
07630cea | 8 | #include <sys/types.h> |
0b452006 RC |
9 | #include <sys/wait.h> |
10 | #include <unistd.h> | |
349cc4a5 | 11 | #if HAVE_VALGRIND_VALGRIND_H |
b3d69149 EV |
12 | #include <valgrind/valgrind.h> |
13 | #endif | |
0b452006 | 14 | |
b5efdb8a | 15 | #include "alloc-util.h" |
26fbedd7 | 16 | #include "architecture.h" |
75997c3f | 17 | #include "errno-util.h" |
69281c49 | 18 | #include "fd-util.h" |
0b452006 | 19 | #include "log.h" |
0b452006 | 20 | #include "macro.h" |
f5947a5e YW |
21 | #include "missing_sched.h" |
22 | #include "missing_syscall.h" | |
18dade5a | 23 | #include "parse-util.h" |
07630cea | 24 | #include "process-util.h" |
75997c3f | 25 | #include "rlimit-util.h" |
4c253ed1 | 26 | #include "signal-util.h" |
9a140c35 | 27 | #include "stdio-util.h" |
07630cea | 28 | #include "string-util.h" |
288a74cc | 29 | #include "terminal-util.h" |
6d7c4033 | 30 | #include "tests.h" |
75997c3f | 31 | #include "user-util.h" |
07630cea LP |
32 | #include "util.h" |
33 | #include "virt.h" | |
0b452006 | 34 | |
9a140c35 | 35 | static void test_get_process_comm(pid_t pid) { |
0b452006 | 36 | struct stat st; |
ba19c6e1 | 37 | _cleanup_free_ char *a = NULL, *c = NULL, *d = NULL, *f = NULL, *i = NULL; |
0b452006 | 38 | _cleanup_free_ char *env = NULL; |
fbd0b64f | 39 | char path[STRLEN("/proc//comm") + DECIMAL_STR_MAX(pid_t)]; |
0b452006 RC |
40 | pid_t e; |
41 | uid_t u; | |
42 | gid_t g; | |
43 | dev_t h; | |
44 | int r; | |
0b452006 | 45 | |
9a140c35 ZJS |
46 | xsprintf(path, "/proc/"PID_FMT"/comm", pid); |
47 | ||
48 | if (stat(path, &st) == 0) { | |
49 | assert_se(get_process_comm(pid, &a) >= 0); | |
50 | log_info("PID"PID_FMT" comm: '%s'", pid, a); | |
cfeaa44a | 51 | } else |
9a140c35 | 52 | log_warning("%s not exist.", path); |
0b452006 | 53 | |
09c1dcee | 54 | assert_se(get_process_cmdline(pid, 0, PROCESS_CMDLINE_COMM_FALLBACK, &c) >= 0); |
9a140c35 | 55 | log_info("PID"PID_FMT" cmdline: '%s'", pid, c); |
0b452006 | 56 | |
09c1dcee | 57 | assert_se(get_process_cmdline(pid, 8, 0, &d) >= 0); |
69281c49 LP |
58 | log_info("PID"PID_FMT" cmdline truncated to 8: '%s'", pid, d); |
59 | ||
60 | free(d); | |
09c1dcee | 61 | assert_se(get_process_cmdline(pid, 1, 0, &d) >= 0); |
69281c49 | 62 | log_info("PID"PID_FMT" cmdline truncated to 1: '%s'", pid, d); |
0b452006 | 63 | |
9a140c35 ZJS |
64 | assert_se(get_process_ppid(pid, &e) >= 0); |
65 | log_info("PID"PID_FMT" PPID: "PID_FMT, pid, e); | |
66 | assert_se(pid == 1 ? e == 0 : e > 0); | |
0b452006 | 67 | |
9a140c35 | 68 | assert_se(is_kernel_thread(pid) == 0 || pid != 1); |
0b452006 | 69 | |
9a140c35 | 70 | r = get_process_exe(pid, &f); |
0b452006 | 71 | assert_se(r >= 0 || r == -EACCES); |
9a140c35 | 72 | log_info("PID"PID_FMT" exe: '%s'", pid, strna(f)); |
0b452006 | 73 | |
9a140c35 ZJS |
74 | assert_se(get_process_uid(pid, &u) == 0); |
75 | log_info("PID"PID_FMT" UID: "UID_FMT, pid, u); | |
0b452006 | 76 | |
9a140c35 ZJS |
77 | assert_se(get_process_gid(pid, &g) == 0); |
78 | log_info("PID"PID_FMT" GID: "GID_FMT, pid, g); | |
0b452006 | 79 | |
9a140c35 | 80 | r = get_process_environ(pid, &env); |
0b452006 | 81 | assert_se(r >= 0 || r == -EACCES); |
9a140c35 | 82 | log_info("PID"PID_FMT" strlen(environ): %zi", pid, env ? (ssize_t)strlen(env) : (ssize_t)-errno); |
0b452006 | 83 | |
75f86906 | 84 | if (!detect_container()) |
9a140c35 | 85 | assert_se(get_ctty_devnr(pid, &h) == -ENXIO || pid != 1); |
0b452006 | 86 | |
6fb05b07 | 87 | (void) getenv_for_pid(pid, "PATH", &i); |
9a140c35 | 88 | log_info("PID"PID_FMT" $PATH: '%s'", pid, strna(i)); |
0b452006 RC |
89 | } |
90 | ||
ce268825 LP |
91 | static void test_get_process_comm_escape_one(const char *input, const char *output) { |
92 | _cleanup_free_ char *n = NULL; | |
93 | ||
94 | log_info("input: <%s> — output: <%s>", input, output); | |
95 | ||
96 | assert_se(prctl(PR_SET_NAME, input) >= 0); | |
97 | assert_se(get_process_comm(0, &n) >= 0); | |
98 | ||
99 | log_info("got: <%s>", n); | |
100 | ||
101 | assert_se(streq_ptr(n, output)); | |
102 | } | |
103 | ||
104 | static void test_get_process_comm_escape(void) { | |
105 | _cleanup_free_ char *saved = NULL; | |
106 | ||
107 | assert_se(get_process_comm(0, &saved) >= 0); | |
108 | ||
109 | test_get_process_comm_escape_one("", ""); | |
110 | test_get_process_comm_escape_one("foo", "foo"); | |
111 | test_get_process_comm_escape_one("012345678901234", "012345678901234"); | |
112 | test_get_process_comm_escape_one("0123456789012345", "012345678901234"); | |
0e85cbcf ZJS |
113 | test_get_process_comm_escape_one("äöüß", "\\303\\244\\303\\266\\303\\274\\303\\237"); |
114 | test_get_process_comm_escape_one("xäöüß", "x\\303\\244\\303\\266\\303\\274\\303\\237"); | |
115 | test_get_process_comm_escape_one("xxäöüß", "xx\\303\\244\\303\\266\\303\\274\\303\\237"); | |
116 | test_get_process_comm_escape_one("xxxäöüß", "xxx\\303\\244\\303\\266\\303\\274\\303\\237"); | |
117 | test_get_process_comm_escape_one("xxxxäöüß", "xxxx\\303\\244\\303\\266\\303\\274\\303\\237"); | |
118 | test_get_process_comm_escape_one("xxxxxäöüß", "xxxxx\\303\\244\\303\\266\\303\\274\\303\\237"); | |
ce268825 LP |
119 | |
120 | assert_se(prctl(PR_SET_NAME, saved) >= 0); | |
121 | } | |
122 | ||
0b452006 RC |
123 | static void test_pid_is_unwaited(void) { |
124 | pid_t pid; | |
125 | ||
126 | pid = fork(); | |
127 | assert_se(pid >= 0); | |
128 | if (pid == 0) { | |
129 | _exit(EXIT_SUCCESS); | |
130 | } else { | |
131 | int status; | |
132 | ||
133 | waitpid(pid, &status, 0); | |
134 | assert_se(!pid_is_unwaited(pid)); | |
135 | } | |
df0ff127 | 136 | assert_se(pid_is_unwaited(getpid_cached())); |
0b452006 RC |
137 | assert_se(!pid_is_unwaited(-1)); |
138 | } | |
139 | ||
140 | static void test_pid_is_alive(void) { | |
141 | pid_t pid; | |
142 | ||
143 | pid = fork(); | |
144 | assert_se(pid >= 0); | |
145 | if (pid == 0) { | |
146 | _exit(EXIT_SUCCESS); | |
147 | } else { | |
148 | int status; | |
149 | ||
150 | waitpid(pid, &status, 0); | |
151 | assert_se(!pid_is_alive(pid)); | |
152 | } | |
df0ff127 | 153 | assert_se(pid_is_alive(getpid_cached())); |
0b452006 RC |
154 | assert_se(!pid_is_alive(-1)); |
155 | } | |
156 | ||
26fbedd7 LP |
157 | static void test_personality(void) { |
158 | ||
159 | assert_se(personality_to_string(PER_LINUX)); | |
160 | assert_se(!personality_to_string(PERSONALITY_INVALID)); | |
161 | ||
162 | assert_se(streq(personality_to_string(PER_LINUX), architecture_to_string(native_architecture()))); | |
163 | ||
164 | assert_se(personality_from_string(personality_to_string(PER_LINUX)) == PER_LINUX); | |
165 | assert_se(personality_from_string(architecture_to_string(native_architecture())) == PER_LINUX); | |
166 | ||
167 | #ifdef __x86_64__ | |
168 | assert_se(streq_ptr(personality_to_string(PER_LINUX), "x86-64")); | |
169 | assert_se(streq_ptr(personality_to_string(PER_LINUX32), "x86")); | |
170 | ||
171 | assert_se(personality_from_string("x86-64") == PER_LINUX); | |
172 | assert_se(personality_from_string("x86") == PER_LINUX32); | |
173 | assert_se(personality_from_string("ia64") == PERSONALITY_INVALID); | |
174 | assert_se(personality_from_string(NULL) == PERSONALITY_INVALID); | |
175 | ||
176 | assert_se(personality_from_string(personality_to_string(PER_LINUX32)) == PER_LINUX32); | |
177 | #endif | |
178 | } | |
179 | ||
69281c49 LP |
180 | static void test_get_process_cmdline_harder(void) { |
181 | char path[] = "/tmp/test-cmdlineXXXXXX"; | |
182 | _cleanup_close_ int fd = -1; | |
183 | _cleanup_free_ char *line = NULL; | |
184 | pid_t pid; | |
185 | ||
92f6a1b6 YW |
186 | if (geteuid() != 0) { |
187 | log_info("Skipping %s: not root", __func__); | |
69281c49 | 188 | return; |
92f6a1b6 | 189 | } |
69281c49 | 190 | |
5f00dc4d LP |
191 | if (!have_namespaces()) { |
192 | log_notice("Testing without namespaces, skipping %s", __func__); | |
193 | return; | |
194 | } | |
195 | ||
349cc4a5 | 196 | #if HAVE_VALGRIND_VALGRIND_H |
b3d69149 EV |
197 | /* valgrind patches open(/proc//cmdline) |
198 | * so, test_get_process_cmdline_harder fails always | |
199 | * See https://github.com/systemd/systemd/pull/3555#issuecomment-226564908 */ | |
92f6a1b6 YW |
200 | if (RUNNING_ON_VALGRIND) { |
201 | log_info("Skipping %s: running on valgrind", __func__); | |
b3d69149 | 202 | return; |
92f6a1b6 | 203 | } |
b3d69149 EV |
204 | #endif |
205 | ||
69281c49 LP |
206 | pid = fork(); |
207 | if (pid > 0) { | |
208 | siginfo_t si; | |
209 | ||
210 | (void) wait_for_terminate(pid, &si); | |
211 | ||
212 | assert_se(si.si_code == CLD_EXITED); | |
213 | assert_se(si.si_status == 0); | |
214 | ||
215 | return; | |
216 | } | |
217 | ||
218 | assert_se(pid == 0); | |
219 | assert_se(unshare(CLONE_NEWNS) >= 0); | |
220 | ||
0ffa4c7c EV |
221 | if (mount(NULL, "/", NULL, MS_SLAVE|MS_REC, NULL) < 0) { |
222 | log_warning_errno(errno, "mount(..., \"/\", MS_SLAVE|MS_REC, ...) failed: %m"); | |
223 | assert_se(IN_SET(errno, EPERM, EACCES)); | |
224 | return; | |
225 | } | |
c58fd466 | 226 | |
69281c49 LP |
227 | fd = mkostemp(path, O_CLOEXEC); |
228 | assert_se(fd >= 0); | |
347ebd02 | 229 | |
0ffa4c7c EV |
230 | /* Note that we don't unmount the following bind-mount at the end of the test because the kernel |
231 | * will clear up its /proc/PID/ hierarchy automatically as soon as the test stops. */ | |
347ebd02 ZJS |
232 | if (mount(path, "/proc/self/cmdline", "bind", MS_BIND, NULL) < 0) { |
233 | /* This happens under selinux… Abort the test in this case. */ | |
234 | log_warning_errno(errno, "mount(..., \"/proc/self/cmdline\", \"bind\", ...) failed: %m"); | |
0ffa4c7c | 235 | assert_se(IN_SET(errno, EPERM, EACCES)); |
347ebd02 ZJS |
236 | return; |
237 | } | |
238 | ||
7b7a060e AZ |
239 | /* Set RLIMIT_STACK to infinity to test we don't try to allocate unncessarily large values to read |
240 | * the cmdline. */ | |
241 | if (setrlimit(RLIMIT_STACK, &RLIMIT_MAKE_CONST(RLIM_INFINITY)) < 0) | |
242 | log_warning("Testing without RLIMIT_STACK=infinity"); | |
243 | ||
69281c49 LP |
244 | assert_se(unlink(path) >= 0); |
245 | ||
246 | assert_se(prctl(PR_SET_NAME, "testa") >= 0); | |
247 | ||
09c1dcee | 248 | assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX, 0, &line) == -ENOENT); |
69281c49 | 249 | |
09c1dcee | 250 | assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
69281c49 LP |
251 | assert_se(streq(line, "[testa]")); |
252 | line = mfree(line); | |
253 | ||
09c1dcee | 254 | assert_se(get_process_cmdline(getpid_cached(), 0, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 255 | log_info("'%s'", line); |
69281c49 LP |
256 | assert_se(streq(line, "")); |
257 | line = mfree(line); | |
258 | ||
09c1dcee | 259 | assert_se(get_process_cmdline(getpid_cached(), 1, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e ZJS |
260 | assert_se(streq(line, "…")); |
261 | line = mfree(line); | |
262 | ||
09c1dcee | 263 | assert_se(get_process_cmdline(getpid_cached(), 2, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 264 | assert_se(streq(line, "[…")); |
69281c49 LP |
265 | line = mfree(line); |
266 | ||
09c1dcee | 267 | assert_se(get_process_cmdline(getpid_cached(), 3, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 268 | assert_se(streq(line, "[t…")); |
69281c49 LP |
269 | line = mfree(line); |
270 | ||
09c1dcee | 271 | assert_se(get_process_cmdline(getpid_cached(), 4, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 272 | assert_se(streq(line, "[te…")); |
69281c49 LP |
273 | line = mfree(line); |
274 | ||
09c1dcee | 275 | assert_se(get_process_cmdline(getpid_cached(), 5, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 276 | assert_se(streq(line, "[tes…")); |
69281c49 LP |
277 | line = mfree(line); |
278 | ||
09c1dcee | 279 | assert_se(get_process_cmdline(getpid_cached(), 6, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 280 | assert_se(streq(line, "[test…")); |
69281c49 LP |
281 | line = mfree(line); |
282 | ||
09c1dcee | 283 | assert_se(get_process_cmdline(getpid_cached(), 7, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
69281c49 LP |
284 | assert_se(streq(line, "[testa]")); |
285 | line = mfree(line); | |
286 | ||
09c1dcee | 287 | assert_se(get_process_cmdline(getpid_cached(), 8, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
69281c49 LP |
288 | assert_se(streq(line, "[testa]")); |
289 | line = mfree(line); | |
290 | ||
bc28751e | 291 | assert_se(write(fd, "foo\0bar", 8) == 8); |
69281c49 | 292 | |
09c1dcee | 293 | assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX, 0, &line) >= 0); |
bc28751e | 294 | log_info("'%s'", line); |
69281c49 LP |
295 | assert_se(streq(line, "foo bar")); |
296 | line = mfree(line); | |
297 | ||
09c1dcee | 298 | assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
69281c49 LP |
299 | assert_se(streq(line, "foo bar")); |
300 | line = mfree(line); | |
301 | ||
302 | assert_se(write(fd, "quux", 4) == 4); | |
09c1dcee | 303 | assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX, 0, &line) >= 0); |
bc28751e | 304 | log_info("'%s'", line); |
69281c49 LP |
305 | assert_se(streq(line, "foo bar quux")); |
306 | line = mfree(line); | |
307 | ||
09c1dcee | 308 | assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
69281c49 LP |
309 | assert_se(streq(line, "foo bar quux")); |
310 | line = mfree(line); | |
311 | ||
09c1dcee | 312 | assert_se(get_process_cmdline(getpid_cached(), 1, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 313 | assert_se(streq(line, "…")); |
69281c49 LP |
314 | line = mfree(line); |
315 | ||
09c1dcee | 316 | assert_se(get_process_cmdline(getpid_cached(), 2, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 317 | assert_se(streq(line, "f…")); |
69281c49 LP |
318 | line = mfree(line); |
319 | ||
09c1dcee | 320 | assert_se(get_process_cmdline(getpid_cached(), 3, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 321 | assert_se(streq(line, "fo…")); |
69281c49 LP |
322 | line = mfree(line); |
323 | ||
09c1dcee | 324 | assert_se(get_process_cmdline(getpid_cached(), 4, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 325 | assert_se(streq(line, "foo…")); |
69281c49 LP |
326 | line = mfree(line); |
327 | ||
09c1dcee | 328 | assert_se(get_process_cmdline(getpid_cached(), 5, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 329 | assert_se(streq(line, "foo …")); |
69281c49 LP |
330 | line = mfree(line); |
331 | ||
09c1dcee | 332 | assert_se(get_process_cmdline(getpid_cached(), 6, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 333 | assert_se(streq(line, "foo b…")); |
69281c49 LP |
334 | line = mfree(line); |
335 | ||
09c1dcee | 336 | assert_se(get_process_cmdline(getpid_cached(), 7, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 337 | assert_se(streq(line, "foo ba…")); |
69281c49 LP |
338 | line = mfree(line); |
339 | ||
09c1dcee | 340 | assert_se(get_process_cmdline(getpid_cached(), 8, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 341 | assert_se(streq(line, "foo bar…")); |
69281c49 LP |
342 | line = mfree(line); |
343 | ||
09c1dcee | 344 | assert_se(get_process_cmdline(getpid_cached(), 9, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 345 | assert_se(streq(line, "foo bar …")); |
69281c49 LP |
346 | line = mfree(line); |
347 | ||
09c1dcee | 348 | assert_se(get_process_cmdline(getpid_cached(), 10, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 349 | assert_se(streq(line, "foo bar q…")); |
69281c49 LP |
350 | line = mfree(line); |
351 | ||
09c1dcee | 352 | assert_se(get_process_cmdline(getpid_cached(), 11, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 353 | assert_se(streq(line, "foo bar qu…")); |
69281c49 LP |
354 | line = mfree(line); |
355 | ||
09c1dcee | 356 | assert_se(get_process_cmdline(getpid_cached(), 12, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 357 | assert_se(streq(line, "foo bar quux")); |
69281c49 LP |
358 | line = mfree(line); |
359 | ||
09c1dcee | 360 | assert_se(get_process_cmdline(getpid_cached(), 13, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
69281c49 LP |
361 | assert_se(streq(line, "foo bar quux")); |
362 | line = mfree(line); | |
363 | ||
09c1dcee | 364 | assert_se(get_process_cmdline(getpid_cached(), 14, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
69281c49 LP |
365 | assert_se(streq(line, "foo bar quux")); |
366 | line = mfree(line); | |
367 | ||
09c1dcee | 368 | assert_se(get_process_cmdline(getpid_cached(), 1000, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
69281c49 LP |
369 | assert_se(streq(line, "foo bar quux")); |
370 | line = mfree(line); | |
371 | ||
372 | assert_se(ftruncate(fd, 0) >= 0); | |
373 | assert_se(prctl(PR_SET_NAME, "aaaa bbbb cccc") >= 0); | |
374 | ||
09c1dcee | 375 | assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX, 0, &line) == -ENOENT); |
69281c49 | 376 | |
09c1dcee | 377 | assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
69281c49 LP |
378 | assert_se(streq(line, "[aaaa bbbb cccc]")); |
379 | line = mfree(line); | |
380 | ||
09c1dcee | 381 | assert_se(get_process_cmdline(getpid_cached(), 10, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 382 | assert_se(streq(line, "[aaaa bbb…")); |
69281c49 LP |
383 | line = mfree(line); |
384 | ||
09c1dcee | 385 | assert_se(get_process_cmdline(getpid_cached(), 11, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 386 | assert_se(streq(line, "[aaaa bbbb…")); |
69281c49 LP |
387 | line = mfree(line); |
388 | ||
09c1dcee | 389 | assert_se(get_process_cmdline(getpid_cached(), 12, PROCESS_CMDLINE_COMM_FALLBACK, &line) >= 0); |
bc28751e | 390 | assert_se(streq(line, "[aaaa bbbb …")); |
69281c49 LP |
391 | line = mfree(line); |
392 | ||
393 | safe_close(fd); | |
a45d7127 | 394 | _exit(EXIT_SUCCESS); |
69281c49 LP |
395 | } |
396 | ||
049c884a | 397 | static void test_rename_process_now(const char *p, int ret) { |
9bfaffd5 | 398 | _cleanup_free_ char *comm = NULL, *cmdline = NULL; |
9bfaffd5 LP |
399 | int r; |
400 | ||
9bfaffd5 | 401 | r = rename_process(p); |
9bfaffd5 LP |
402 | assert_se(r == ret || |
403 | (ret == 0 && r >= 0) || | |
404 | (ret > 0 && r > 0)); | |
405 | ||
406 | if (r < 0) | |
049c884a | 407 | return; |
9bfaffd5 | 408 | |
349cc4a5 | 409 | #if HAVE_VALGRIND_VALGRIND_H |
9bfaffd5 LP |
410 | /* see above, valgrind is weird, we can't verify what we are doing here */ |
411 | if (RUNNING_ON_VALGRIND) | |
049c884a | 412 | return; |
9bfaffd5 LP |
413 | #endif |
414 | ||
415 | assert_se(get_process_comm(0, &comm) >= 0); | |
416 | log_info("comm = <%s>", comm); | |
92f14395 | 417 | assert_se(strneq(comm, p, TASK_COMM_LEN-1)); |
0e85cbcf ZJS |
418 | /* We expect comm to be at most 16 bytes (TASK_COMM_LEN). The kernel may raise this limit in the |
419 | * future. We'd only check the initial part, at least until we recompile, but this will still pass. */ | |
9bfaffd5 | 420 | |
09c1dcee | 421 | r = get_process_cmdline(0, SIZE_MAX, 0, &cmdline); |
767eab47 | 422 | assert_se(r >= 0); |
049c884a JW |
423 | /* we cannot expect cmdline to be renamed properly without privileges */ |
424 | if (geteuid() == 0) { | |
767eab47 YW |
425 | if (r == 0 && detect_container() > 0) |
426 | log_info("cmdline = <%s> (not verified, Running in unprivileged container?)", cmdline); | |
427 | else { | |
428 | log_info("cmdline = <%s>", cmdline); | |
429 | assert_se(strneq(p, cmdline, STRLEN("test-process-util"))); | |
430 | assert_se(startswith(p, cmdline)); | |
431 | } | |
049c884a JW |
432 | } else |
433 | log_info("cmdline = <%s> (not verified)", cmdline); | |
434 | } | |
435 | ||
436 | static void test_rename_process_one(const char *p, int ret) { | |
437 | siginfo_t si; | |
438 | pid_t pid; | |
439 | ||
440 | pid = fork(); | |
441 | assert_se(pid >= 0); | |
442 | ||
443 | if (pid == 0) { | |
444 | /* child */ | |
445 | test_rename_process_now(p, ret); | |
446 | _exit(EXIT_SUCCESS); | |
447 | } | |
448 | ||
449 | assert_se(wait_for_terminate(pid, &si) >= 0); | |
450 | assert_se(si.si_code == CLD_EXITED); | |
451 | assert_se(si.si_status == EXIT_SUCCESS); | |
452 | } | |
453 | ||
454 | static void test_rename_process_multi(void) { | |
455 | pid_t pid; | |
456 | ||
457 | pid = fork(); | |
458 | assert_se(pid >= 0); | |
9bfaffd5 | 459 | |
049c884a JW |
460 | if (pid > 0) { |
461 | siginfo_t si; | |
462 | ||
463 | assert_se(wait_for_terminate(pid, &si) >= 0); | |
464 | assert_se(si.si_code == CLD_EXITED); | |
465 | assert_se(si.si_status == EXIT_SUCCESS); | |
466 | ||
467 | return; | |
468 | } | |
469 | ||
470 | /* child */ | |
471 | test_rename_process_now("one", 1); | |
472 | test_rename_process_now("more", 0); /* longer than "one", hence truncated */ | |
c47a9f90 | 473 | (void) setresuid(99, 99, 99); /* change uid when running privileged */ |
049c884a JW |
474 | test_rename_process_now("time!", 0); |
475 | test_rename_process_now("0", 1); /* shorter than "one", should fit */ | |
476 | test_rename_process_one("", -EINVAL); | |
477 | test_rename_process_one(NULL, -EINVAL); | |
9bfaffd5 LP |
478 | _exit(EXIT_SUCCESS); |
479 | } | |
480 | ||
481 | static void test_rename_process(void) { | |
482 | test_rename_process_one(NULL, -EINVAL); | |
483 | test_rename_process_one("", -EINVAL); | |
484 | test_rename_process_one("foo", 1); /* should always fit */ | |
485 | test_rename_process_one("this is a really really long process name, followed by some more words", 0); /* unlikely to fit */ | |
486 | test_rename_process_one("1234567", 1); /* should always fit */ | |
049c884a | 487 | test_rename_process_multi(); /* multiple invocations and dropped privileges */ |
9bfaffd5 LP |
488 | } |
489 | ||
5c30a6d2 LP |
490 | static void test_getpid_cached(void) { |
491 | siginfo_t si; | |
492 | pid_t a, b, c, d, e, f, child; | |
493 | ||
494 | a = raw_getpid(); | |
495 | b = getpid_cached(); | |
496 | c = getpid(); | |
497 | ||
498 | assert_se(a == b && a == c); | |
499 | ||
500 | child = fork(); | |
501 | assert_se(child >= 0); | |
502 | ||
503 | if (child == 0) { | |
504 | /* In child */ | |
505 | a = raw_getpid(); | |
506 | b = getpid_cached(); | |
507 | c = getpid(); | |
508 | ||
509 | assert_se(a == b && a == c); | |
a45d7127 | 510 | _exit(EXIT_SUCCESS); |
5c30a6d2 LP |
511 | } |
512 | ||
513 | d = raw_getpid(); | |
514 | e = getpid_cached(); | |
515 | f = getpid(); | |
516 | ||
517 | assert_se(a == d && a == e && a == f); | |
518 | ||
519 | assert_se(wait_for_terminate(child, &si) >= 0); | |
520 | assert_se(si.si_status == 0); | |
521 | assert_se(si.si_code == CLD_EXITED); | |
522 | } | |
523 | ||
524 | #define MEASURE_ITERATIONS (10000000LLU) | |
525 | ||
526 | static void test_getpid_measure(void) { | |
527 | unsigned long long i; | |
528 | usec_t t, q; | |
529 | ||
530 | t = now(CLOCK_MONOTONIC); | |
531 | for (i = 0; i < MEASURE_ITERATIONS; i++) | |
532 | (void) getpid(); | |
533 | q = now(CLOCK_MONOTONIC) - t; | |
534 | ||
b86a91e7 | 535 | log_info(" glibc getpid(): %lf µs each\n", (double) q / MEASURE_ITERATIONS); |
5c30a6d2 LP |
536 | |
537 | t = now(CLOCK_MONOTONIC); | |
538 | for (i = 0; i < MEASURE_ITERATIONS; i++) | |
539 | (void) getpid_cached(); | |
540 | q = now(CLOCK_MONOTONIC) - t; | |
541 | ||
b86a91e7 | 542 | log_info("getpid_cached(): %lf µs each\n", (double) q / MEASURE_ITERATIONS); |
5c30a6d2 LP |
543 | } |
544 | ||
4c253ed1 LP |
545 | static void test_safe_fork(void) { |
546 | siginfo_t status; | |
547 | pid_t pid; | |
548 | int r; | |
549 | ||
550 | BLOCK_SIGNALS(SIGCHLD); | |
551 | ||
552 | r = safe_fork("(test-child)", FORK_RESET_SIGNALS|FORK_CLOSE_ALL_FDS|FORK_DEATHSIG|FORK_NULL_STDIO|FORK_REOPEN_LOG, &pid); | |
553 | assert_se(r >= 0); | |
554 | ||
555 | if (r == 0) { | |
556 | /* child */ | |
557 | usleep(100 * USEC_PER_MSEC); | |
558 | ||
559 | _exit(88); | |
560 | } | |
561 | ||
562 | assert_se(wait_for_terminate(pid, &status) >= 0); | |
563 | assert_se(status.si_code == CLD_EXITED); | |
564 | assert_se(status.si_status == 88); | |
565 | } | |
566 | ||
eb5eb254 LP |
567 | static void test_pid_to_ptr(void) { |
568 | ||
569 | assert_se(PTR_TO_PID(NULL) == 0); | |
570 | assert_se(PID_TO_PTR(0) == NULL); | |
571 | ||
572 | assert_se(PTR_TO_PID(PID_TO_PTR(1)) == 1); | |
573 | assert_se(PTR_TO_PID(PID_TO_PTR(2)) == 2); | |
574 | assert_se(PTR_TO_PID(PID_TO_PTR(-1)) == -1); | |
575 | assert_se(PTR_TO_PID(PID_TO_PTR(-2)) == -2); | |
576 | ||
577 | assert_se(PTR_TO_PID(PID_TO_PTR(INT16_MAX)) == INT16_MAX); | |
578 | assert_se(PTR_TO_PID(PID_TO_PTR(INT16_MIN)) == INT16_MIN); | |
579 | ||
eb5eb254 LP |
580 | assert_se(PTR_TO_PID(PID_TO_PTR(INT32_MAX)) == INT32_MAX); |
581 | assert_se(PTR_TO_PID(PID_TO_PTR(INT32_MIN)) == INT32_MIN); | |
eb5eb254 LP |
582 | } |
583 | ||
10062bbc ZJS |
584 | static void test_ioprio_class_from_to_string_one(const char *val, int expected) { |
585 | assert_se(ioprio_class_from_string(val) == expected); | |
586 | if (expected >= 0) { | |
587 | _cleanup_free_ char *s = NULL; | |
588 | unsigned ret; | |
589 | ||
590 | assert_se(ioprio_class_to_string_alloc(expected, &s) == 0); | |
591 | /* We sometimes get a class number and sometimes a number back */ | |
592 | assert_se(streq(s, val) || | |
593 | safe_atou(val, &ret) == 0); | |
594 | } | |
595 | } | |
9bfaffd5 | 596 | |
10062bbc ZJS |
597 | static void test_ioprio_class_from_to_string(void) { |
598 | test_ioprio_class_from_to_string_one("none", IOPRIO_CLASS_NONE); | |
599 | test_ioprio_class_from_to_string_one("realtime", IOPRIO_CLASS_RT); | |
600 | test_ioprio_class_from_to_string_one("best-effort", IOPRIO_CLASS_BE); | |
601 | test_ioprio_class_from_to_string_one("idle", IOPRIO_CLASS_IDLE); | |
602 | test_ioprio_class_from_to_string_one("0", 0); | |
603 | test_ioprio_class_from_to_string_one("1", 1); | |
604 | test_ioprio_class_from_to_string_one("7", 7); | |
605 | test_ioprio_class_from_to_string_one("8", 8); | |
751db3b4 ZJS |
606 | test_ioprio_class_from_to_string_one("9", -EINVAL); |
607 | test_ioprio_class_from_to_string_one("-1", -EINVAL); | |
10062bbc ZJS |
608 | } |
609 | ||
75997c3f LP |
610 | static void test_setpriority_closest(void) { |
611 | int r; | |
612 | ||
613 | r = safe_fork("(test-setprio)", FORK_RESET_SIGNALS|FORK_CLOSE_ALL_FDS|FORK_DEATHSIG|FORK_WAIT|FORK_LOG, NULL); | |
614 | assert_se(r >= 0); | |
615 | ||
616 | if (r == 0) { | |
617 | bool full_test; | |
618 | int p, q; | |
619 | /* child */ | |
620 | ||
621 | /* rlimit of 30 equals nice level of -10 */ | |
622 | if (setrlimit(RLIMIT_NICE, &RLIMIT_MAKE_CONST(30)) < 0) { | |
6a6078a5 | 623 | /* If this fails we are probably unprivileged or in a userns of some kind, let's skip |
75997c3f LP |
624 | * the full test */ |
625 | assert_se(ERRNO_IS_PRIVILEGE(errno)); | |
626 | full_test = false; | |
627 | } else { | |
628 | assert_se(setresgid(GID_NOBODY, GID_NOBODY, GID_NOBODY) >= 0); | |
629 | assert_se(setresuid(UID_NOBODY, UID_NOBODY, UID_NOBODY) >= 0); | |
630 | full_test = true; | |
631 | } | |
632 | ||
633 | errno = 0; | |
634 | p = getpriority(PRIO_PROCESS, 0); | |
635 | assert_se(errno == 0); | |
636 | ||
637 | /* It should always be possible to set our nice level to the current one */ | |
638 | assert_se(setpriority_closest(p) > 0); | |
639 | ||
640 | errno = 0; | |
641 | q = getpriority(PRIO_PROCESS, 0); | |
642 | assert_se(errno == 0 && p == q); | |
643 | ||
cd990847 | 644 | /* It should also be possible to set the nice level to one higher */ |
75997c3f LP |
645 | if (p < PRIO_MAX-1) { |
646 | assert_se(setpriority_closest(++p) > 0); | |
647 | ||
648 | errno = 0; | |
649 | q = getpriority(PRIO_PROCESS, 0); | |
650 | assert_se(errno == 0 && p == q); | |
651 | } | |
652 | ||
cd990847 | 653 | /* It should also be possible to set the nice level to two higher */ |
75997c3f LP |
654 | if (p < PRIO_MAX-1) { |
655 | assert_se(setpriority_closest(++p) > 0); | |
656 | ||
657 | errno = 0; | |
658 | q = getpriority(PRIO_PROCESS, 0); | |
659 | assert_se(errno == 0 && p == q); | |
660 | } | |
661 | ||
662 | if (full_test) { | |
663 | /* These two should work, given the RLIMIT_NICE we set above */ | |
664 | assert_se(setpriority_closest(-10) > 0); | |
665 | errno = 0; | |
666 | q = getpriority(PRIO_PROCESS, 0); | |
667 | assert_se(errno == 0 && q == -10); | |
668 | ||
669 | assert_se(setpriority_closest(-9) > 0); | |
670 | errno = 0; | |
671 | q = getpriority(PRIO_PROCESS, 0); | |
672 | assert_se(errno == 0 && q == -9); | |
673 | ||
674 | /* This should succeed but should be clamped to the limit */ | |
675 | assert_se(setpriority_closest(-11) == 0); | |
676 | errno = 0; | |
677 | q = getpriority(PRIO_PROCESS, 0); | |
678 | assert_se(errno == 0 && q == -10); | |
679 | ||
680 | assert_se(setpriority_closest(-8) > 0); | |
681 | errno = 0; | |
682 | q = getpriority(PRIO_PROCESS, 0); | |
683 | assert_se(errno == 0 && q == -8); | |
684 | ||
685 | /* This should succeed but should be clamped to the limit */ | |
686 | assert_se(setpriority_closest(-12) == 0); | |
687 | errno = 0; | |
688 | q = getpriority(PRIO_PROCESS, 0); | |
689 | assert_se(errno == 0 && q == -10); | |
690 | } | |
691 | ||
692 | _exit(EXIT_SUCCESS); | |
693 | } | |
694 | } | |
695 | ||
10062bbc | 696 | int main(int argc, char *argv[]) { |
6d7c4033 | 697 | test_setup_logging(LOG_DEBUG); |
0b452006 | 698 | |
36fea155 | 699 | save_argc_argv(argc, argv); |
9bfaffd5 | 700 | |
18dade5a ZJS |
701 | if (argc > 1) { |
702 | pid_t pid = 0; | |
703 | ||
704 | (void) parse_pid(argv[1], &pid); | |
705 | test_get_process_comm(pid); | |
706 | } else { | |
76c19e9f | 707 | TEST_REQ_RUNNING_SYSTEMD(test_get_process_comm(1)); |
18dade5a ZJS |
708 | test_get_process_comm(getpid()); |
709 | } | |
710 | ||
ce268825 | 711 | test_get_process_comm_escape(); |
0b452006 RC |
712 | test_pid_is_unwaited(); |
713 | test_pid_is_alive(); | |
26fbedd7 | 714 | test_personality(); |
69281c49 | 715 | test_get_process_cmdline_harder(); |
9bfaffd5 | 716 | test_rename_process(); |
5c30a6d2 LP |
717 | test_getpid_cached(); |
718 | test_getpid_measure(); | |
4c253ed1 | 719 | test_safe_fork(); |
eb5eb254 | 720 | test_pid_to_ptr(); |
10062bbc | 721 | test_ioprio_class_from_to_string(); |
75997c3f | 722 | test_setpriority_closest(); |
0b452006 RC |
723 | |
724 | return 0; | |
725 | } |