1 /* SPDX-License-Identifier: LGPL-2.1+ */
5 #include <sys/personality.h>
11 #if HAVE_VALGRIND_VALGRIND_H
12 #include <valgrind/valgrind.h>
15 #include "alloc-util.h"
16 #include "architecture.h"
17 #include "errno-util.h"
21 #include "missing_sched.h"
22 #include "missing_syscall.h"
23 #include "parse-util.h"
24 #include "process-util.h"
25 #include "rlimit-util.h"
26 #include "signal-util.h"
27 #include "stdio-util.h"
28 #include "string-util.h"
29 #include "terminal-util.h"
31 #include "user-util.h"
35 static void test_get_process_comm(pid_t pid
) {
37 _cleanup_free_
char *a
= NULL
, *c
= NULL
, *d
= NULL
, *f
= NULL
, *i
= NULL
;
38 _cleanup_free_
char *env
= NULL
;
39 char path
[STRLEN("/proc//comm") + DECIMAL_STR_MAX(pid_t
)];
46 xsprintf(path
, "/proc/"PID_FMT
"/comm", pid
);
48 if (stat(path
, &st
) == 0) {
49 assert_se(get_process_comm(pid
, &a
) >= 0);
50 log_info("PID"PID_FMT
" comm: '%s'", pid
, a
);
52 log_warning("%s not exist.", path
);
54 assert_se(get_process_cmdline(pid
, 0, PROCESS_CMDLINE_COMM_FALLBACK
, &c
) >= 0);
55 log_info("PID"PID_FMT
" cmdline: '%s'", pid
, c
);
57 assert_se(get_process_cmdline(pid
, 8, 0, &d
) >= 0);
58 log_info("PID"PID_FMT
" cmdline truncated to 8: '%s'", pid
, d
);
61 assert_se(get_process_cmdline(pid
, 1, 0, &d
) >= 0);
62 log_info("PID"PID_FMT
" cmdline truncated to 1: '%s'", pid
, d
);
64 assert_se(get_process_ppid(pid
, &e
) >= 0);
65 log_info("PID"PID_FMT
" PPID: "PID_FMT
, pid
, e
);
66 assert_se(pid
== 1 ? e
== 0 : e
> 0);
68 assert_se(is_kernel_thread(pid
) == 0 || pid
!= 1);
70 r
= get_process_exe(pid
, &f
);
71 assert_se(r
>= 0 || r
== -EACCES
);
72 log_info("PID"PID_FMT
" exe: '%s'", pid
, strna(f
));
74 assert_se(get_process_uid(pid
, &u
) == 0);
75 log_info("PID"PID_FMT
" UID: "UID_FMT
, pid
, u
);
77 assert_se(get_process_gid(pid
, &g
) == 0);
78 log_info("PID"PID_FMT
" GID: "GID_FMT
, pid
, g
);
80 r
= get_process_environ(pid
, &env
);
81 assert_se(r
>= 0 || r
== -EACCES
);
82 log_info("PID"PID_FMT
" strlen(environ): %zi", pid
, env
? (ssize_t
)strlen(env
) : (ssize_t
)-errno
);
84 if (!detect_container())
85 assert_se(get_ctty_devnr(pid
, &h
) == -ENXIO
|| pid
!= 1);
87 (void) getenv_for_pid(pid
, "PATH", &i
);
88 log_info("PID"PID_FMT
" $PATH: '%s'", pid
, strna(i
));
91 static void test_get_process_comm_escape_one(const char *input
, const char *output
) {
92 _cleanup_free_
char *n
= NULL
;
94 log_info("input: <%s> — output: <%s>", input
, output
);
96 assert_se(prctl(PR_SET_NAME
, input
) >= 0);
97 assert_se(get_process_comm(0, &n
) >= 0);
99 log_info("got: <%s>", n
);
101 assert_se(streq_ptr(n
, output
));
104 static void test_get_process_comm_escape(void) {
105 _cleanup_free_
char *saved
= NULL
;
107 assert_se(get_process_comm(0, &saved
) >= 0);
109 test_get_process_comm_escape_one("", "");
110 test_get_process_comm_escape_one("foo", "foo");
111 test_get_process_comm_escape_one("012345678901234", "012345678901234");
112 test_get_process_comm_escape_one("0123456789012345", "012345678901234");
113 test_get_process_comm_escape_one("äöüß", "\\303\\244\\303\\266\\303\\274\\303\\237");
114 test_get_process_comm_escape_one("xäöüß", "x\\303\\244\\303\\266\\303\\274\\303\\237");
115 test_get_process_comm_escape_one("xxäöüß", "xx\\303\\244\\303\\266\\303\\274\\303\\237");
116 test_get_process_comm_escape_one("xxxäöüß", "xxx\\303\\244\\303\\266\\303\\274\\303\\237");
117 test_get_process_comm_escape_one("xxxxäöüß", "xxxx\\303\\244\\303\\266\\303\\274\\303\\237");
118 test_get_process_comm_escape_one("xxxxxäöüß", "xxxxx\\303\\244\\303\\266\\303\\274\\303\\237");
120 assert_se(prctl(PR_SET_NAME
, saved
) >= 0);
123 static void test_pid_is_unwaited(void) {
133 waitpid(pid
, &status
, 0);
134 assert_se(!pid_is_unwaited(pid
));
136 assert_se(pid_is_unwaited(getpid_cached()));
137 assert_se(!pid_is_unwaited(-1));
140 static void test_pid_is_alive(void) {
150 waitpid(pid
, &status
, 0);
151 assert_se(!pid_is_alive(pid
));
153 assert_se(pid_is_alive(getpid_cached()));
154 assert_se(!pid_is_alive(-1));
157 static void test_personality(void) {
159 assert_se(personality_to_string(PER_LINUX
));
160 assert_se(!personality_to_string(PERSONALITY_INVALID
));
162 assert_se(streq(personality_to_string(PER_LINUX
), architecture_to_string(native_architecture())));
164 assert_se(personality_from_string(personality_to_string(PER_LINUX
)) == PER_LINUX
);
165 assert_se(personality_from_string(architecture_to_string(native_architecture())) == PER_LINUX
);
168 assert_se(streq_ptr(personality_to_string(PER_LINUX
), "x86-64"));
169 assert_se(streq_ptr(personality_to_string(PER_LINUX32
), "x86"));
171 assert_se(personality_from_string("x86-64") == PER_LINUX
);
172 assert_se(personality_from_string("x86") == PER_LINUX32
);
173 assert_se(personality_from_string("ia64") == PERSONALITY_INVALID
);
174 assert_se(personality_from_string(NULL
) == PERSONALITY_INVALID
);
176 assert_se(personality_from_string(personality_to_string(PER_LINUX32
)) == PER_LINUX32
);
180 static void test_get_process_cmdline_harder(void) {
181 char path
[] = "/tmp/test-cmdlineXXXXXX";
182 _cleanup_close_
int fd
= -1;
183 _cleanup_free_
char *line
= NULL
;
186 if (geteuid() != 0) {
187 log_info("Skipping %s: not root", __func__
);
191 if (!have_namespaces()) {
192 log_notice("Testing without namespaces, skipping %s", __func__
);
196 #if HAVE_VALGRIND_VALGRIND_H
197 /* valgrind patches open(/proc//cmdline)
198 * so, test_get_process_cmdline_harder fails always
199 * See https://github.com/systemd/systemd/pull/3555#issuecomment-226564908 */
200 if (RUNNING_ON_VALGRIND
) {
201 log_info("Skipping %s: running on valgrind", __func__
);
210 (void) wait_for_terminate(pid
, &si
);
212 assert_se(si
.si_code
== CLD_EXITED
);
213 assert_se(si
.si_status
== 0);
219 assert_se(unshare(CLONE_NEWNS
) >= 0);
221 if (mount(NULL
, "/", NULL
, MS_SLAVE
|MS_REC
, NULL
) < 0) {
222 log_warning_errno(errno
, "mount(..., \"/\", MS_SLAVE|MS_REC, ...) failed: %m");
223 assert_se(IN_SET(errno
, EPERM
, EACCES
));
227 fd
= mkostemp(path
, O_CLOEXEC
);
230 /* Note that we don't unmount the following bind-mount at the end of the test because the kernel
231 * will clear up its /proc/PID/ hierarchy automatically as soon as the test stops. */
232 if (mount(path
, "/proc/self/cmdline", "bind", MS_BIND
, NULL
) < 0) {
233 /* This happens under selinux… Abort the test in this case. */
234 log_warning_errno(errno
, "mount(..., \"/proc/self/cmdline\", \"bind\", ...) failed: %m");
235 assert_se(IN_SET(errno
, EPERM
, EACCES
));
239 assert_se(unlink(path
) >= 0);
241 assert_se(prctl(PR_SET_NAME
, "testa") >= 0);
243 assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX
, 0, &line
) == -ENOENT
);
245 assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX
, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
246 assert_se(streq(line
, "[testa]"));
249 assert_se(get_process_cmdline(getpid_cached(), 0, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
250 log_info("'%s'", line
);
251 assert_se(streq(line
, ""));
254 assert_se(get_process_cmdline(getpid_cached(), 1, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
255 assert_se(streq(line
, "…"));
258 assert_se(get_process_cmdline(getpid_cached(), 2, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
259 assert_se(streq(line
, "[…"));
262 assert_se(get_process_cmdline(getpid_cached(), 3, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
263 assert_se(streq(line
, "[t…"));
266 assert_se(get_process_cmdline(getpid_cached(), 4, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
267 assert_se(streq(line
, "[te…"));
270 assert_se(get_process_cmdline(getpid_cached(), 5, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
271 assert_se(streq(line
, "[tes…"));
274 assert_se(get_process_cmdline(getpid_cached(), 6, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
275 assert_se(streq(line
, "[test…"));
278 assert_se(get_process_cmdline(getpid_cached(), 7, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
279 assert_se(streq(line
, "[testa]"));
282 assert_se(get_process_cmdline(getpid_cached(), 8, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
283 assert_se(streq(line
, "[testa]"));
286 assert_se(write(fd
, "foo\0bar", 8) == 8);
288 assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX
, 0, &line
) >= 0);
289 log_info("'%s'", line
);
290 assert_se(streq(line
, "foo bar"));
293 assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX
, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
294 assert_se(streq(line
, "foo bar"));
297 assert_se(write(fd
, "quux", 4) == 4);
298 assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX
, 0, &line
) >= 0);
299 log_info("'%s'", line
);
300 assert_se(streq(line
, "foo bar quux"));
303 assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX
, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
304 assert_se(streq(line
, "foo bar quux"));
307 assert_se(get_process_cmdline(getpid_cached(), 1, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
308 assert_se(streq(line
, "…"));
311 assert_se(get_process_cmdline(getpid_cached(), 2, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
312 assert_se(streq(line
, "f…"));
315 assert_se(get_process_cmdline(getpid_cached(), 3, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
316 assert_se(streq(line
, "fo…"));
319 assert_se(get_process_cmdline(getpid_cached(), 4, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
320 assert_se(streq(line
, "foo…"));
323 assert_se(get_process_cmdline(getpid_cached(), 5, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
324 assert_se(streq(line
, "foo …"));
327 assert_se(get_process_cmdline(getpid_cached(), 6, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
328 assert_se(streq(line
, "foo b…"));
331 assert_se(get_process_cmdline(getpid_cached(), 7, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
332 assert_se(streq(line
, "foo ba…"));
335 assert_se(get_process_cmdline(getpid_cached(), 8, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
336 assert_se(streq(line
, "foo bar…"));
339 assert_se(get_process_cmdline(getpid_cached(), 9, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
340 assert_se(streq(line
, "foo bar …"));
343 assert_se(get_process_cmdline(getpid_cached(), 10, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
344 assert_se(streq(line
, "foo bar q…"));
347 assert_se(get_process_cmdline(getpid_cached(), 11, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
348 assert_se(streq(line
, "foo bar qu…"));
351 assert_se(get_process_cmdline(getpid_cached(), 12, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
352 assert_se(streq(line
, "foo bar quux"));
355 assert_se(get_process_cmdline(getpid_cached(), 13, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
356 assert_se(streq(line
, "foo bar quux"));
359 assert_se(get_process_cmdline(getpid_cached(), 14, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
360 assert_se(streq(line
, "foo bar quux"));
363 assert_se(get_process_cmdline(getpid_cached(), 1000, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
364 assert_se(streq(line
, "foo bar quux"));
367 assert_se(ftruncate(fd
, 0) >= 0);
368 assert_se(prctl(PR_SET_NAME
, "aaaa bbbb cccc") >= 0);
370 assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX
, 0, &line
) == -ENOENT
);
372 assert_se(get_process_cmdline(getpid_cached(), SIZE_MAX
, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
373 assert_se(streq(line
, "[aaaa bbbb cccc]"));
376 assert_se(get_process_cmdline(getpid_cached(), 10, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
377 assert_se(streq(line
, "[aaaa bbb…"));
380 assert_se(get_process_cmdline(getpid_cached(), 11, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
381 assert_se(streq(line
, "[aaaa bbbb…"));
384 assert_se(get_process_cmdline(getpid_cached(), 12, PROCESS_CMDLINE_COMM_FALLBACK
, &line
) >= 0);
385 assert_se(streq(line
, "[aaaa bbbb …"));
392 static void test_rename_process_now(const char *p
, int ret
) {
393 _cleanup_free_
char *comm
= NULL
, *cmdline
= NULL
;
396 r
= rename_process(p
);
397 assert_se(r
== ret
||
398 (ret
== 0 && r
>= 0) ||
404 #if HAVE_VALGRIND_VALGRIND_H
405 /* see above, valgrind is weird, we can't verify what we are doing here */
406 if (RUNNING_ON_VALGRIND
)
410 assert_se(get_process_comm(0, &comm
) >= 0);
411 log_info("comm = <%s>", comm
);
412 assert_se(strneq(comm
, p
, TASK_COMM_LEN
-1));
413 /* We expect comm to be at most 16 bytes (TASK_COMM_LEN). The kernel may raise this limit in the
414 * future. We'd only check the initial part, at least until we recompile, but this will still pass. */
416 r
= get_process_cmdline(0, SIZE_MAX
, 0, &cmdline
);
418 /* we cannot expect cmdline to be renamed properly without privileges */
419 if (geteuid() == 0) {
420 if (r
== 0 && detect_container() > 0)
421 log_info("cmdline = <%s> (not verified, Running in unprivileged container?)", cmdline
);
423 log_info("cmdline = <%s>", cmdline
);
424 assert_se(strneq(p
, cmdline
, STRLEN("test-process-util")));
425 assert_se(startswith(p
, cmdline
));
428 log_info("cmdline = <%s> (not verified)", cmdline
);
431 static void test_rename_process_one(const char *p
, int ret
) {
440 test_rename_process_now(p
, ret
);
444 assert_se(wait_for_terminate(pid
, &si
) >= 0);
445 assert_se(si
.si_code
== CLD_EXITED
);
446 assert_se(si
.si_status
== EXIT_SUCCESS
);
449 static void test_rename_process_multi(void) {
458 assert_se(wait_for_terminate(pid
, &si
) >= 0);
459 assert_se(si
.si_code
== CLD_EXITED
);
460 assert_se(si
.si_status
== EXIT_SUCCESS
);
466 test_rename_process_now("one", 1);
467 test_rename_process_now("more", 0); /* longer than "one", hence truncated */
468 (void) setresuid(99, 99, 99); /* change uid when running privileged */
469 test_rename_process_now("time!", 0);
470 test_rename_process_now("0", 1); /* shorter than "one", should fit */
471 test_rename_process_one("", -EINVAL
);
472 test_rename_process_one(NULL
, -EINVAL
);
476 static void test_rename_process(void) {
477 test_rename_process_one(NULL
, -EINVAL
);
478 test_rename_process_one("", -EINVAL
);
479 test_rename_process_one("foo", 1); /* should always fit */
480 test_rename_process_one("this is a really really long process name, followed by some more words", 0); /* unlikely to fit */
481 test_rename_process_one("1234567", 1); /* should always fit */
482 test_rename_process_multi(); /* multiple invocations and dropped privileges */
485 static void test_getpid_cached(void) {
487 pid_t a
, b
, c
, d
, e
, f
, child
;
493 assert_se(a
== b
&& a
== c
);
496 assert_se(child
>= 0);
504 assert_se(a
== b
&& a
== c
);
512 assert_se(a
== d
&& a
== e
&& a
== f
);
514 assert_se(wait_for_terminate(child
, &si
) >= 0);
515 assert_se(si
.si_status
== 0);
516 assert_se(si
.si_code
== CLD_EXITED
);
519 #define MEASURE_ITERATIONS (10000000LLU)
521 static void test_getpid_measure(void) {
522 unsigned long long i
;
525 t
= now(CLOCK_MONOTONIC
);
526 for (i
= 0; i
< MEASURE_ITERATIONS
; i
++)
528 q
= now(CLOCK_MONOTONIC
) - t
;
530 log_info(" glibc getpid(): %lf µs each\n", (double) q
/ MEASURE_ITERATIONS
);
532 t
= now(CLOCK_MONOTONIC
);
533 for (i
= 0; i
< MEASURE_ITERATIONS
; i
++)
534 (void) getpid_cached();
535 q
= now(CLOCK_MONOTONIC
) - t
;
537 log_info("getpid_cached(): %lf µs each\n", (double) q
/ MEASURE_ITERATIONS
);
540 static void test_safe_fork(void) {
545 BLOCK_SIGNALS(SIGCHLD
);
547 r
= safe_fork("(test-child)", FORK_RESET_SIGNALS
|FORK_CLOSE_ALL_FDS
|FORK_DEATHSIG
|FORK_NULL_STDIO
|FORK_REOPEN_LOG
, &pid
);
552 usleep(100 * USEC_PER_MSEC
);
557 assert_se(wait_for_terminate(pid
, &status
) >= 0);
558 assert_se(status
.si_code
== CLD_EXITED
);
559 assert_se(status
.si_status
== 88);
562 static void test_pid_to_ptr(void) {
564 assert_se(PTR_TO_PID(NULL
) == 0);
565 assert_se(PID_TO_PTR(0) == NULL
);
567 assert_se(PTR_TO_PID(PID_TO_PTR(1)) == 1);
568 assert_se(PTR_TO_PID(PID_TO_PTR(2)) == 2);
569 assert_se(PTR_TO_PID(PID_TO_PTR(-1)) == -1);
570 assert_se(PTR_TO_PID(PID_TO_PTR(-2)) == -2);
572 assert_se(PTR_TO_PID(PID_TO_PTR(INT16_MAX
)) == INT16_MAX
);
573 assert_se(PTR_TO_PID(PID_TO_PTR(INT16_MIN
)) == INT16_MIN
);
575 assert_se(PTR_TO_PID(PID_TO_PTR(INT32_MAX
)) == INT32_MAX
);
576 assert_se(PTR_TO_PID(PID_TO_PTR(INT32_MIN
)) == INT32_MIN
);
579 static void test_ioprio_class_from_to_string_one(const char *val
, int expected
) {
580 assert_se(ioprio_class_from_string(val
) == expected
);
582 _cleanup_free_
char *s
= NULL
;
585 assert_se(ioprio_class_to_string_alloc(expected
, &s
) == 0);
586 /* We sometimes get a class number and sometimes a number back */
587 assert_se(streq(s
, val
) ||
588 safe_atou(val
, &ret
) == 0);
592 static void test_ioprio_class_from_to_string(void) {
593 test_ioprio_class_from_to_string_one("none", IOPRIO_CLASS_NONE
);
594 test_ioprio_class_from_to_string_one("realtime", IOPRIO_CLASS_RT
);
595 test_ioprio_class_from_to_string_one("best-effort", IOPRIO_CLASS_BE
);
596 test_ioprio_class_from_to_string_one("idle", IOPRIO_CLASS_IDLE
);
597 test_ioprio_class_from_to_string_one("0", 0);
598 test_ioprio_class_from_to_string_one("1", 1);
599 test_ioprio_class_from_to_string_one("7", 7);
600 test_ioprio_class_from_to_string_one("8", 8);
601 test_ioprio_class_from_to_string_one("9", -1);
602 test_ioprio_class_from_to_string_one("-1", -1);
605 static void test_setpriority_closest(void) {
608 r
= safe_fork("(test-setprio)", FORK_RESET_SIGNALS
|FORK_CLOSE_ALL_FDS
|FORK_DEATHSIG
|FORK_WAIT
|FORK_LOG
, NULL
);
616 /* rlimit of 30 equals nice level of -10 */
617 if (setrlimit(RLIMIT_NICE
, &RLIMIT_MAKE_CONST(30)) < 0) {
618 /* If this fails we are probably unprivileged or in a userns of some kind, let's skip
620 assert_se(ERRNO_IS_PRIVILEGE(errno
));
623 assert_se(setresgid(GID_NOBODY
, GID_NOBODY
, GID_NOBODY
) >= 0);
624 assert_se(setresuid(UID_NOBODY
, UID_NOBODY
, UID_NOBODY
) >= 0);
629 p
= getpriority(PRIO_PROCESS
, 0);
630 assert_se(errno
== 0);
632 /* It should always be possible to set our nice level to the current one */
633 assert_se(setpriority_closest(p
) > 0);
636 q
= getpriority(PRIO_PROCESS
, 0);
637 assert_se(errno
== 0 && p
== q
);
639 /* It should also be possible to to set the nice level to one higher */
640 if (p
< PRIO_MAX
-1) {
641 assert_se(setpriority_closest(++p
) > 0);
644 q
= getpriority(PRIO_PROCESS
, 0);
645 assert_se(errno
== 0 && p
== q
);
648 /* It should also be possible to to set the nice level to two higher */
649 if (p
< PRIO_MAX
-1) {
650 assert_se(setpriority_closest(++p
) > 0);
653 q
= getpriority(PRIO_PROCESS
, 0);
654 assert_se(errno
== 0 && p
== q
);
658 /* These two should work, given the RLIMIT_NICE we set above */
659 assert_se(setpriority_closest(-10) > 0);
661 q
= getpriority(PRIO_PROCESS
, 0);
662 assert_se(errno
== 0 && q
== -10);
664 assert_se(setpriority_closest(-9) > 0);
666 q
= getpriority(PRIO_PROCESS
, 0);
667 assert_se(errno
== 0 && q
== -9);
669 /* This should succeed but should be clamped to the limit */
670 assert_se(setpriority_closest(-11) == 0);
672 q
= getpriority(PRIO_PROCESS
, 0);
673 assert_se(errno
== 0 && q
== -10);
675 assert_se(setpriority_closest(-8) > 0);
677 q
= getpriority(PRIO_PROCESS
, 0);
678 assert_se(errno
== 0 && q
== -8);
680 /* This should succeed but should be clamped to the limit */
681 assert_se(setpriority_closest(-12) == 0);
683 q
= getpriority(PRIO_PROCESS
, 0);
684 assert_se(errno
== 0 && q
== -10);
691 int main(int argc
, char *argv
[]) {
692 test_setup_logging(LOG_DEBUG
);
694 save_argc_argv(argc
, argv
);
699 (void) parse_pid(argv
[1], &pid
);
700 test_get_process_comm(pid
);
702 TEST_REQ_RUNNING_SYSTEMD(test_get_process_comm(1));
703 test_get_process_comm(getpid());
706 test_get_process_comm_escape();
707 test_pid_is_unwaited();
710 test_get_process_cmdline_harder();
711 test_rename_process();
712 test_getpid_cached();
713 test_getpid_measure();
716 test_ioprio_class_from_to_string();
717 test_setpriority_closest();