5455 lines
141 KiB
Go
5455 lines
141 KiB
Go
// Copyright 2017 Google Inc. All rights reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package cc
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"reflect"
|
|
"regexp"
|
|
"runtime"
|
|
"strings"
|
|
"testing"
|
|
|
|
"android/soong/aidl_library"
|
|
"android/soong/android"
|
|
"android/soong/bazel/cquery"
|
|
)
|
|
|
|
func init() {
|
|
registerTestMutators(android.InitRegistrationContext)
|
|
}
|
|
|
|
func TestMain(m *testing.M) {
|
|
os.Exit(m.Run())
|
|
}
|
|
|
|
var prepareForCcTest = android.GroupFixturePreparers(
|
|
PrepareForTestWithCcIncludeVndk,
|
|
android.FixtureModifyProductVariables(func(variables android.FixtureProductVariables) {
|
|
variables.DeviceVndkVersion = StringPtr("current")
|
|
variables.Platform_vndk_version = StringPtr("29")
|
|
}),
|
|
)
|
|
|
|
var ccLibInApex = "cc_lib_in_apex"
|
|
var apexVariationName = "apex28"
|
|
var apexVersion = "28"
|
|
|
|
func registerTestMutators(ctx android.RegistrationContext) {
|
|
ctx.PostDepsMutators(func(ctx android.RegisterMutatorsContext) {
|
|
ctx.BottomUp("apex", testApexMutator).Parallel()
|
|
ctx.BottomUp("mixed_builds_prep", mixedBuildsPrepareMutator).Parallel()
|
|
})
|
|
}
|
|
|
|
func mixedBuildsPrepareMutator(ctx android.BottomUpMutatorContext) {
|
|
if m := ctx.Module(); m.Enabled() {
|
|
if mixedBuildMod, ok := m.(android.MixedBuildBuildable); ok {
|
|
if mixedBuildMod.IsMixedBuildSupported(ctx) && android.MixedBuildsEnabled(ctx) == android.MixedBuildEnabled {
|
|
mixedBuildMod.QueueBazelCall(ctx)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func testApexMutator(mctx android.BottomUpMutatorContext) {
|
|
modules := mctx.CreateVariations(apexVariationName)
|
|
apexInfo := android.ApexInfo{
|
|
ApexVariationName: apexVariationName,
|
|
MinSdkVersion: android.ApiLevelForTest(apexVersion),
|
|
}
|
|
mctx.SetVariationProvider(modules[0], android.ApexInfoProvider, apexInfo)
|
|
}
|
|
|
|
// testCcWithConfig runs tests using the prepareForCcTest
|
|
//
|
|
// See testCc for an explanation as to how to stop using this deprecated method.
|
|
//
|
|
// deprecated
|
|
func testCcWithConfig(t *testing.T, config android.Config) *android.TestContext {
|
|
t.Helper()
|
|
result := prepareForCcTest.RunTestWithConfig(t, config)
|
|
return result.TestContext
|
|
}
|
|
|
|
// testCc runs tests using the prepareForCcTest
|
|
//
|
|
// Do not add any new usages of this, instead use the prepareForCcTest directly as it makes it much
|
|
// easier to customize the test behavior.
|
|
//
|
|
// If it is necessary to customize the behavior of an existing test that uses this then please first
|
|
// convert the test to using prepareForCcTest first and then in a following change add the
|
|
// appropriate fixture preparers. Keeping the conversion change separate makes it easy to verify
|
|
// that it did not change the test behavior unexpectedly.
|
|
//
|
|
// deprecated
|
|
func testCc(t *testing.T, bp string) *android.TestContext {
|
|
t.Helper()
|
|
result := prepareForCcTest.RunTestWithBp(t, bp)
|
|
return result.TestContext
|
|
}
|
|
|
|
// testCcErrorWithConfig runs tests using the prepareForCcTest
|
|
//
|
|
// See testCc for an explanation as to how to stop using this deprecated method.
|
|
//
|
|
// deprecated
|
|
func testCcErrorWithConfig(t *testing.T, pattern string, config android.Config) {
|
|
t.Helper()
|
|
|
|
prepareForCcTest.
|
|
ExtendWithErrorHandler(android.FixtureExpectsAtLeastOneErrorMatchingPattern(pattern)).
|
|
RunTestWithConfig(t, config)
|
|
}
|
|
|
|
// testCcError runs tests using the prepareForCcTest
|
|
//
|
|
// See testCc for an explanation as to how to stop using this deprecated method.
|
|
//
|
|
// deprecated
|
|
func testCcError(t *testing.T, pattern string, bp string) {
|
|
t.Helper()
|
|
config := TestConfig(t.TempDir(), android.Android, nil, bp, nil)
|
|
config.TestProductVariables.DeviceVndkVersion = StringPtr("current")
|
|
config.TestProductVariables.Platform_vndk_version = StringPtr("29")
|
|
testCcErrorWithConfig(t, pattern, config)
|
|
return
|
|
}
|
|
|
|
// testCcErrorProductVndk runs tests using the prepareForCcTest
|
|
//
|
|
// See testCc for an explanation as to how to stop using this deprecated method.
|
|
//
|
|
// deprecated
|
|
func testCcErrorProductVndk(t *testing.T, pattern string, bp string) {
|
|
t.Helper()
|
|
config := TestConfig(t.TempDir(), android.Android, nil, bp, nil)
|
|
config.TestProductVariables.DeviceVndkVersion = StringPtr("current")
|
|
config.TestProductVariables.Platform_vndk_version = StringPtr("29")
|
|
testCcErrorWithConfig(t, pattern, config)
|
|
return
|
|
}
|
|
|
|
const (
|
|
coreVariant = "android_arm64_armv8-a_shared"
|
|
vendorVariant = "android_vendor.29_arm64_armv8-a_shared"
|
|
productVariant = "android_product.29_arm64_armv8-a_shared"
|
|
recoveryVariant = "android_recovery_arm64_armv8-a_shared"
|
|
)
|
|
|
|
// Test that the PrepareForTestWithCcDefaultModules provides all the files that it uses by
|
|
// running it in a fixture that requires all source files to exist.
|
|
func TestPrepareForTestWithCcDefaultModules(t *testing.T) {
|
|
android.GroupFixturePreparers(
|
|
PrepareForTestWithCcDefaultModules,
|
|
android.PrepareForTestDisallowNonExistentPaths,
|
|
).RunTest(t)
|
|
}
|
|
|
|
func TestVendorSrc(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_library {
|
|
name: "libTest",
|
|
srcs: ["foo.c"],
|
|
no_libcrt: true,
|
|
nocrt: true,
|
|
system_shared_libs: [],
|
|
vendor_available: true,
|
|
target: {
|
|
vendor: {
|
|
srcs: ["bar.c"],
|
|
},
|
|
},
|
|
}
|
|
`)
|
|
|
|
ld := ctx.ModuleForTests("libTest", vendorVariant).Rule("ld")
|
|
var objs []string
|
|
for _, o := range ld.Inputs {
|
|
objs = append(objs, o.Base())
|
|
}
|
|
if len(objs) != 2 || objs[0] != "foo.o" || objs[1] != "bar.o" {
|
|
t.Errorf("inputs of libTest must be []string{\"foo.o\", \"bar.o\"}, but was %#v.", objs)
|
|
}
|
|
}
|
|
|
|
func checkInstallPartition(t *testing.T, ctx *android.TestContext, name, variant, expected string) {
|
|
mod := ctx.ModuleForTests(name, variant).Module().(*Module)
|
|
partitionDefined := false
|
|
checkPartition := func(specific bool, partition string) {
|
|
if specific {
|
|
if expected != partition && !partitionDefined {
|
|
// The variant is installed to the 'partition'
|
|
t.Errorf("%s variant of %q must not be installed to %s partition", variant, name, partition)
|
|
}
|
|
partitionDefined = true
|
|
} else {
|
|
// The variant is not installed to the 'partition'
|
|
if expected == partition {
|
|
t.Errorf("%s variant of %q must be installed to %s partition", variant, name, partition)
|
|
}
|
|
}
|
|
}
|
|
socSpecific := func(m *Module) bool {
|
|
return m.SocSpecific() || m.socSpecificModuleContext()
|
|
}
|
|
deviceSpecific := func(m *Module) bool {
|
|
return m.DeviceSpecific() || m.deviceSpecificModuleContext()
|
|
}
|
|
productSpecific := func(m *Module) bool {
|
|
return m.ProductSpecific() || m.productSpecificModuleContext()
|
|
}
|
|
systemExtSpecific := func(m *Module) bool {
|
|
return m.SystemExtSpecific()
|
|
}
|
|
checkPartition(socSpecific(mod), "vendor")
|
|
checkPartition(deviceSpecific(mod), "odm")
|
|
checkPartition(productSpecific(mod), "product")
|
|
checkPartition(systemExtSpecific(mod), "system_ext")
|
|
if !partitionDefined && expected != "system" {
|
|
t.Errorf("%s variant of %q is expected to be installed to %s partition,"+
|
|
" but installed to system partition", variant, name, expected)
|
|
}
|
|
}
|
|
|
|
func TestInstallPartition(t *testing.T) {
|
|
t.Parallel()
|
|
t.Helper()
|
|
ctx := prepareForCcTest.RunTestWithBp(t, `
|
|
cc_library {
|
|
name: "libsystem",
|
|
}
|
|
cc_library {
|
|
name: "libsystem_ext",
|
|
system_ext_specific: true,
|
|
}
|
|
cc_library {
|
|
name: "libproduct",
|
|
product_specific: true,
|
|
}
|
|
cc_library {
|
|
name: "libvendor",
|
|
vendor: true,
|
|
}
|
|
cc_library {
|
|
name: "libodm",
|
|
device_specific: true,
|
|
}
|
|
cc_library {
|
|
name: "liball_available",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
}
|
|
cc_library {
|
|
name: "libsystem_ext_all_available",
|
|
system_ext_specific: true,
|
|
vendor_available: true,
|
|
product_available: true,
|
|
}
|
|
cc_library {
|
|
name: "liball_available_odm",
|
|
odm_available: true,
|
|
product_available: true,
|
|
}
|
|
cc_library {
|
|
name: "libproduct_vendoravailable",
|
|
product_specific: true,
|
|
vendor_available: true,
|
|
}
|
|
cc_library {
|
|
name: "libproduct_odmavailable",
|
|
product_specific: true,
|
|
odm_available: true,
|
|
}
|
|
`).TestContext
|
|
|
|
checkInstallPartition(t, ctx, "libsystem", coreVariant, "system")
|
|
checkInstallPartition(t, ctx, "libsystem_ext", coreVariant, "system_ext")
|
|
checkInstallPartition(t, ctx, "libproduct", productVariant, "product")
|
|
checkInstallPartition(t, ctx, "libvendor", vendorVariant, "vendor")
|
|
checkInstallPartition(t, ctx, "libodm", vendorVariant, "odm")
|
|
|
|
checkInstallPartition(t, ctx, "liball_available", coreVariant, "system")
|
|
checkInstallPartition(t, ctx, "liball_available", productVariant, "product")
|
|
checkInstallPartition(t, ctx, "liball_available", vendorVariant, "vendor")
|
|
|
|
checkInstallPartition(t, ctx, "libsystem_ext_all_available", coreVariant, "system_ext")
|
|
checkInstallPartition(t, ctx, "libsystem_ext_all_available", productVariant, "product")
|
|
checkInstallPartition(t, ctx, "libsystem_ext_all_available", vendorVariant, "vendor")
|
|
|
|
checkInstallPartition(t, ctx, "liball_available_odm", coreVariant, "system")
|
|
checkInstallPartition(t, ctx, "liball_available_odm", productVariant, "product")
|
|
checkInstallPartition(t, ctx, "liball_available_odm", vendorVariant, "odm")
|
|
|
|
checkInstallPartition(t, ctx, "libproduct_vendoravailable", productVariant, "product")
|
|
checkInstallPartition(t, ctx, "libproduct_vendoravailable", vendorVariant, "vendor")
|
|
|
|
checkInstallPartition(t, ctx, "libproduct_odmavailable", productVariant, "product")
|
|
checkInstallPartition(t, ctx, "libproduct_odmavailable", vendorVariant, "odm")
|
|
}
|
|
|
|
func checkVndkModule(t *testing.T, ctx *android.TestContext, name, subDir string,
|
|
isVndkSp bool, extends string, variant string) {
|
|
|
|
t.Helper()
|
|
|
|
mod := ctx.ModuleForTests(name, variant).Module().(*Module)
|
|
|
|
// Check library properties.
|
|
lib, ok := mod.compiler.(*libraryDecorator)
|
|
if !ok {
|
|
t.Errorf("%q must have libraryDecorator", name)
|
|
} else if lib.baseInstaller.subDir != subDir {
|
|
t.Errorf("%q must use %q as subdir but it is using %q", name, subDir,
|
|
lib.baseInstaller.subDir)
|
|
}
|
|
|
|
// Check VNDK properties.
|
|
if mod.vndkdep == nil {
|
|
t.Fatalf("%q must have `vndkdep`", name)
|
|
}
|
|
if !mod.IsVndk() {
|
|
t.Errorf("%q IsVndk() must equal to true", name)
|
|
}
|
|
if mod.IsVndkSp() != isVndkSp {
|
|
t.Errorf("%q IsVndkSp() must equal to %t", name, isVndkSp)
|
|
}
|
|
|
|
// Check VNDK extension properties.
|
|
isVndkExt := extends != ""
|
|
if mod.IsVndkExt() != isVndkExt {
|
|
t.Errorf("%q IsVndkExt() must equal to %t", name, isVndkExt)
|
|
}
|
|
|
|
if actualExtends := mod.getVndkExtendsModuleName(); actualExtends != extends {
|
|
t.Errorf("%q must extend from %q but get %q", name, extends, actualExtends)
|
|
}
|
|
}
|
|
|
|
func checkWriteFileOutput(t *testing.T, params android.TestingBuildParams, expected []string) {
|
|
t.Helper()
|
|
content := android.ContentFromFileRuleForTests(t, params)
|
|
actual := strings.FieldsFunc(content, func(r rune) bool { return r == '\n' })
|
|
assertArrayString(t, actual, expected)
|
|
}
|
|
|
|
func checkVndkOutput(t *testing.T, ctx *android.TestContext, output string, expected []string) {
|
|
t.Helper()
|
|
vndkSnapshot := ctx.SingletonForTests("vndk-snapshot")
|
|
checkWriteFileOutput(t, vndkSnapshot.Output(output), expected)
|
|
}
|
|
|
|
func checkVndkLibrariesOutput(t *testing.T, ctx *android.TestContext, module string, expected []string) {
|
|
t.Helper()
|
|
got := ctx.ModuleForTests(module, "android_common").Module().(*vndkLibrariesTxt).fileNames
|
|
assertArrayString(t, got, expected)
|
|
}
|
|
|
|
func TestVndk(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_private",
|
|
vendor_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
private: true,
|
|
},
|
|
nocrt: true,
|
|
stem: "libvndk-private",
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_product",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
target: {
|
|
vendor: {
|
|
cflags: ["-DTEST"],
|
|
},
|
|
product: {
|
|
cflags: ["-DTEST"],
|
|
},
|
|
},
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp",
|
|
vendor_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
nocrt: true,
|
|
suffix: "-x",
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp_private",
|
|
vendor_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
private: true,
|
|
},
|
|
nocrt: true,
|
|
target: {
|
|
vendor: {
|
|
suffix: "-x",
|
|
},
|
|
},
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp_product_private",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
private: true,
|
|
},
|
|
nocrt: true,
|
|
target: {
|
|
vendor: {
|
|
suffix: "-x",
|
|
},
|
|
product: {
|
|
suffix: "-x",
|
|
},
|
|
},
|
|
}
|
|
|
|
cc_library {
|
|
name: "libllndk",
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
export_llndk_headers: ["libllndk_headers"],
|
|
}
|
|
}
|
|
|
|
cc_library {
|
|
name: "libclang_rt.hwasan-llndk",
|
|
llndk: {
|
|
symbol_file: "libclang_rt.hwasan.map.txt",
|
|
}
|
|
}
|
|
|
|
cc_library_headers {
|
|
name: "libllndk_headers",
|
|
llndk: {
|
|
llndk_headers: true,
|
|
},
|
|
export_include_dirs: ["include"],
|
|
}
|
|
|
|
llndk_libraries_txt {
|
|
name: "llndk.libraries.txt",
|
|
}
|
|
vndkcore_libraries_txt {
|
|
name: "vndkcore.libraries.txt",
|
|
}
|
|
vndksp_libraries_txt {
|
|
name: "vndksp.libraries.txt",
|
|
}
|
|
vndkprivate_libraries_txt {
|
|
name: "vndkprivate.libraries.txt",
|
|
}
|
|
vndkproduct_libraries_txt {
|
|
name: "vndkproduct.libraries.txt",
|
|
}
|
|
vndkcorevariant_libraries_txt {
|
|
name: "vndkcorevariant.libraries.txt",
|
|
insert_vndk_version: false,
|
|
}
|
|
`
|
|
|
|
config := TestConfig(t.TempDir(), android.Android, nil, bp, nil)
|
|
config.TestProductVariables.DeviceVndkVersion = StringPtr("current")
|
|
config.TestProductVariables.Platform_vndk_version = StringPtr("29")
|
|
|
|
ctx := testCcWithConfig(t, config)
|
|
|
|
// subdir == "" because VNDK libs are not supposed to be installed separately.
|
|
// They are installed as part of VNDK APEX instead.
|
|
checkVndkModule(t, ctx, "libvndk", "", false, "", vendorVariant)
|
|
checkVndkModule(t, ctx, "libvndk_private", "", false, "", vendorVariant)
|
|
checkVndkModule(t, ctx, "libvndk_product", "", false, "", vendorVariant)
|
|
checkVndkModule(t, ctx, "libvndk_sp", "", true, "", vendorVariant)
|
|
checkVndkModule(t, ctx, "libvndk_sp_private", "", true, "", vendorVariant)
|
|
checkVndkModule(t, ctx, "libvndk_sp_product_private", "", true, "", vendorVariant)
|
|
|
|
checkVndkModule(t, ctx, "libvndk_product", "", false, "", productVariant)
|
|
checkVndkModule(t, ctx, "libvndk_sp_product_private", "", true, "", productVariant)
|
|
|
|
// Check VNDK snapshot output.
|
|
snapshotDir := "vndk-snapshot"
|
|
snapshotVariantPath := filepath.Join("out/soong", snapshotDir, "arm64")
|
|
|
|
vndkLibPath := filepath.Join(snapshotVariantPath, fmt.Sprintf("arch-%s-%s",
|
|
"arm64", "armv8-a"))
|
|
vndkLib2ndPath := filepath.Join(snapshotVariantPath, fmt.Sprintf("arch-%s-%s",
|
|
"arm", "armv7-a-neon"))
|
|
|
|
vndkCoreLibPath := filepath.Join(vndkLibPath, "shared", "vndk-core")
|
|
vndkSpLibPath := filepath.Join(vndkLibPath, "shared", "vndk-sp")
|
|
llndkLibPath := filepath.Join(vndkLibPath, "shared", "llndk-stub")
|
|
|
|
vndkCoreLib2ndPath := filepath.Join(vndkLib2ndPath, "shared", "vndk-core")
|
|
vndkSpLib2ndPath := filepath.Join(vndkLib2ndPath, "shared", "vndk-sp")
|
|
llndkLib2ndPath := filepath.Join(vndkLib2ndPath, "shared", "llndk-stub")
|
|
|
|
variant := "android_vendor.29_arm64_armv8-a_shared"
|
|
variant2nd := "android_vendor.29_arm_armv7-a-neon_shared"
|
|
|
|
snapshotSingleton := ctx.SingletonForTests("vndk-snapshot")
|
|
|
|
CheckSnapshot(t, ctx, snapshotSingleton, "libvndk", "libvndk.so", vndkCoreLibPath, variant)
|
|
CheckSnapshot(t, ctx, snapshotSingleton, "libvndk", "libvndk.so", vndkCoreLib2ndPath, variant2nd)
|
|
CheckSnapshot(t, ctx, snapshotSingleton, "libvndk_product", "libvndk_product.so", vndkCoreLibPath, variant)
|
|
CheckSnapshot(t, ctx, snapshotSingleton, "libvndk_product", "libvndk_product.so", vndkCoreLib2ndPath, variant2nd)
|
|
CheckSnapshot(t, ctx, snapshotSingleton, "libvndk_sp", "libvndk_sp-x.so", vndkSpLibPath, variant)
|
|
CheckSnapshot(t, ctx, snapshotSingleton, "libvndk_sp", "libvndk_sp-x.so", vndkSpLib2ndPath, variant2nd)
|
|
CheckSnapshot(t, ctx, snapshotSingleton, "libllndk", "libllndk.so", llndkLibPath, variant)
|
|
CheckSnapshot(t, ctx, snapshotSingleton, "libllndk", "libllndk.so", llndkLib2ndPath, variant2nd)
|
|
|
|
snapshotConfigsPath := filepath.Join(snapshotVariantPath, "configs")
|
|
CheckSnapshot(t, ctx, snapshotSingleton, "llndk.libraries.txt", "llndk.libraries.txt", snapshotConfigsPath, "android_common")
|
|
CheckSnapshot(t, ctx, snapshotSingleton, "vndkcore.libraries.txt", "vndkcore.libraries.txt", snapshotConfigsPath, "android_common")
|
|
CheckSnapshot(t, ctx, snapshotSingleton, "vndksp.libraries.txt", "vndksp.libraries.txt", snapshotConfigsPath, "android_common")
|
|
CheckSnapshot(t, ctx, snapshotSingleton, "vndkprivate.libraries.txt", "vndkprivate.libraries.txt", snapshotConfigsPath, "android_common")
|
|
CheckSnapshot(t, ctx, snapshotSingleton, "vndkproduct.libraries.txt", "vndkproduct.libraries.txt", snapshotConfigsPath, "android_common")
|
|
|
|
checkVndkOutput(t, ctx, "vndk/vndk.libraries.txt", []string{
|
|
"LLNDK: libc.so",
|
|
"LLNDK: libdl.so",
|
|
"LLNDK: libft2.so",
|
|
"LLNDK: libllndk.so",
|
|
"LLNDK: libm.so",
|
|
"VNDK-SP: libc++.so",
|
|
"VNDK-SP: libvndk_sp-x.so",
|
|
"VNDK-SP: libvndk_sp_private-x.so",
|
|
"VNDK-SP: libvndk_sp_product_private-x.so",
|
|
"VNDK-core: libvndk-private.so",
|
|
"VNDK-core: libvndk.so",
|
|
"VNDK-core: libvndk_product.so",
|
|
"VNDK-private: libft2.so",
|
|
"VNDK-private: libvndk-private.so",
|
|
"VNDK-private: libvndk_sp_private-x.so",
|
|
"VNDK-private: libvndk_sp_product_private-x.so",
|
|
"VNDK-product: libc++.so",
|
|
"VNDK-product: libvndk_product.so",
|
|
"VNDK-product: libvndk_sp_product_private-x.so",
|
|
})
|
|
checkVndkLibrariesOutput(t, ctx, "llndk.libraries.txt", []string{"libc.so", "libclang_rt.hwasan-llndk.so", "libdl.so", "libft2.so", "libllndk.so", "libm.so"})
|
|
checkVndkLibrariesOutput(t, ctx, "vndkcore.libraries.txt", []string{"libvndk-private.so", "libvndk.so", "libvndk_product.so"})
|
|
checkVndkLibrariesOutput(t, ctx, "vndksp.libraries.txt", []string{"libc++.so", "libvndk_sp-x.so", "libvndk_sp_private-x.so", "libvndk_sp_product_private-x.so"})
|
|
checkVndkLibrariesOutput(t, ctx, "vndkprivate.libraries.txt", []string{"libft2.so", "libvndk-private.so", "libvndk_sp_private-x.so", "libvndk_sp_product_private-x.so"})
|
|
checkVndkLibrariesOutput(t, ctx, "vndkproduct.libraries.txt", []string{"libc++.so", "libvndk_product.so", "libvndk_sp_product_private-x.so"})
|
|
checkVndkLibrariesOutput(t, ctx, "vndkcorevariant.libraries.txt", nil)
|
|
}
|
|
|
|
func TestVndkWithHostSupported(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_library {
|
|
name: "libvndk_host_supported",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
host_supported: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_host_supported_but_disabled_on_device",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
host_supported: true,
|
|
enabled: false,
|
|
target: {
|
|
host: {
|
|
enabled: true,
|
|
}
|
|
}
|
|
}
|
|
|
|
vndkcore_libraries_txt {
|
|
name: "vndkcore.libraries.txt",
|
|
}
|
|
`)
|
|
|
|
checkVndkLibrariesOutput(t, ctx, "vndkcore.libraries.txt", []string{"libvndk_host_supported.so"})
|
|
}
|
|
|
|
func TestVndkLibrariesTxtAndroidMk(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
llndk_libraries_txt {
|
|
name: "llndk.libraries.txt",
|
|
insert_vndk_version: true,
|
|
}`
|
|
config := TestConfig(t.TempDir(), android.Android, nil, bp, nil)
|
|
config.TestProductVariables.DeviceVndkVersion = StringPtr("current")
|
|
config.TestProductVariables.Platform_vndk_version = StringPtr("29")
|
|
config.TestProductVariables.KeepVndk = BoolPtr(true)
|
|
ctx := testCcWithConfig(t, config)
|
|
|
|
module := ctx.ModuleForTests("llndk.libraries.txt", "android_common")
|
|
entries := android.AndroidMkEntriesForTest(t, ctx, module.Module())[0]
|
|
assertArrayString(t, entries.EntryMap["LOCAL_MODULE_STEM"], []string{"llndk.libraries.29.txt"})
|
|
}
|
|
|
|
func TestVndkUsingCoreVariant(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk2",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
private: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
vndkcorevariant_libraries_txt {
|
|
name: "vndkcorevariant.libraries.txt",
|
|
insert_vndk_version: false,
|
|
}
|
|
`
|
|
|
|
config := TestConfig(t.TempDir(), android.Android, nil, bp, nil)
|
|
config.TestProductVariables.DeviceVndkVersion = StringPtr("current")
|
|
config.TestProductVariables.Platform_vndk_version = StringPtr("29")
|
|
config.TestProductVariables.VndkUseCoreVariant = BoolPtr(true)
|
|
config.TestProductVariables.KeepVndk = BoolPtr(true)
|
|
|
|
setVndkMustUseVendorVariantListForTest(config, []string{"libvndk"})
|
|
|
|
ctx := testCcWithConfig(t, config)
|
|
|
|
checkVndkLibrariesOutput(t, ctx, "vndkcorevariant.libraries.txt", []string{"libc++.so", "libvndk2.so", "libvndk_sp.so"})
|
|
}
|
|
|
|
func TestDataLibs(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_test_library {
|
|
name: "test_lib",
|
|
srcs: ["test_lib.cpp"],
|
|
gtest: false,
|
|
}
|
|
|
|
cc_test {
|
|
name: "main_test",
|
|
data_libs: ["test_lib"],
|
|
gtest: false,
|
|
}
|
|
`
|
|
|
|
config := TestConfig(t.TempDir(), android.Android, nil, bp, nil)
|
|
config.TestProductVariables.DeviceVndkVersion = StringPtr("current")
|
|
config.TestProductVariables.Platform_vndk_version = StringPtr("29")
|
|
config.TestProductVariables.VndkUseCoreVariant = BoolPtr(true)
|
|
|
|
ctx := testCcWithConfig(t, config)
|
|
module := ctx.ModuleForTests("main_test", "android_arm_armv7-a-neon").Module()
|
|
testBinary := module.(*Module).linker.(*testBinary)
|
|
outputFiles, err := module.(android.OutputFileProducer).OutputFiles("")
|
|
if err != nil {
|
|
t.Errorf("Expected cc_test to produce output files, error: %s", err)
|
|
return
|
|
}
|
|
if len(outputFiles) != 1 {
|
|
t.Errorf("expected exactly one output file. output files: [%s]", outputFiles)
|
|
return
|
|
}
|
|
if len(testBinary.dataPaths()) != 1 {
|
|
t.Errorf("expected exactly one test data file. test data files: [%s]", testBinary.dataPaths())
|
|
return
|
|
}
|
|
|
|
outputPath := outputFiles[0].String()
|
|
testBinaryPath := testBinary.dataPaths()[0].SrcPath.String()
|
|
|
|
if !strings.HasSuffix(outputPath, "/main_test") {
|
|
t.Errorf("expected test output file to be 'main_test', but was '%s'", outputPath)
|
|
return
|
|
}
|
|
if !strings.HasSuffix(testBinaryPath, "/test_lib.so") {
|
|
t.Errorf("expected test data file to be 'test_lib.so', but was '%s'", testBinaryPath)
|
|
return
|
|
}
|
|
}
|
|
|
|
func TestDataLibsRelativeInstallPath(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_test_library {
|
|
name: "test_lib",
|
|
srcs: ["test_lib.cpp"],
|
|
relative_install_path: "foo/bar/baz",
|
|
gtest: false,
|
|
}
|
|
|
|
cc_binary {
|
|
name: "test_bin",
|
|
relative_install_path: "foo/bar/baz",
|
|
compile_multilib: "both",
|
|
}
|
|
|
|
cc_test {
|
|
name: "main_test",
|
|
data_libs: ["test_lib"],
|
|
data_bins: ["test_bin"],
|
|
gtest: false,
|
|
}
|
|
`
|
|
|
|
config := TestConfig(t.TempDir(), android.Android, nil, bp, nil)
|
|
config.TestProductVariables.DeviceVndkVersion = StringPtr("current")
|
|
config.TestProductVariables.Platform_vndk_version = StringPtr("29")
|
|
config.TestProductVariables.VndkUseCoreVariant = BoolPtr(true)
|
|
|
|
ctx := testCcWithConfig(t, config)
|
|
module := ctx.ModuleForTests("main_test", "android_arm_armv7-a-neon").Module()
|
|
testBinary := module.(*Module).linker.(*testBinary)
|
|
outputFiles, err := module.(android.OutputFileProducer).OutputFiles("")
|
|
if err != nil {
|
|
t.Fatalf("Expected cc_test to produce output files, error: %s", err)
|
|
}
|
|
if len(outputFiles) != 1 {
|
|
t.Fatalf("expected exactly one output file. output files: [%s]", outputFiles)
|
|
}
|
|
if len(testBinary.dataPaths()) != 2 {
|
|
t.Fatalf("expected exactly one test data file. test data files: [%s]", testBinary.dataPaths())
|
|
}
|
|
|
|
outputPath := outputFiles[0].String()
|
|
|
|
if !strings.HasSuffix(outputPath, "/main_test") {
|
|
t.Errorf("expected test output file to be 'main_test', but was '%s'", outputPath)
|
|
}
|
|
entries := android.AndroidMkEntriesForTest(t, ctx, module)[0]
|
|
if !strings.HasSuffix(entries.EntryMap["LOCAL_TEST_DATA"][0], ":test_lib.so:foo/bar/baz") {
|
|
t.Errorf("expected LOCAL_TEST_DATA to end with `:test_lib.so:foo/bar/baz`,"+
|
|
" but was '%s'", entries.EntryMap["LOCAL_TEST_DATA"][0])
|
|
}
|
|
if !strings.HasSuffix(entries.EntryMap["LOCAL_TEST_DATA"][1], ":test_bin:foo/bar/baz") {
|
|
t.Errorf("expected LOCAL_TEST_DATA to end with `:test_bin:foo/bar/baz`,"+
|
|
" but was '%s'", entries.EntryMap["LOCAL_TEST_DATA"][1])
|
|
}
|
|
}
|
|
|
|
func TestTestBinaryTestSuites(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_test {
|
|
name: "main_test",
|
|
srcs: ["main_test.cpp"],
|
|
test_suites: [
|
|
"suite_1",
|
|
"suite_2",
|
|
],
|
|
gtest: false,
|
|
}
|
|
`
|
|
|
|
ctx := prepareForCcTest.RunTestWithBp(t, bp).TestContext
|
|
module := ctx.ModuleForTests("main_test", "android_arm_armv7-a-neon").Module()
|
|
|
|
entries := android.AndroidMkEntriesForTest(t, ctx, module)[0]
|
|
compatEntries := entries.EntryMap["LOCAL_COMPATIBILITY_SUITE"]
|
|
if len(compatEntries) != 2 {
|
|
t.Errorf("expected two elements in LOCAL_COMPATIBILITY_SUITE. got %d", len(compatEntries))
|
|
}
|
|
if compatEntries[0] != "suite_1" {
|
|
t.Errorf("expected LOCAL_COMPATIBILITY_SUITE to be`suite_1`,"+
|
|
" but was '%s'", compatEntries[0])
|
|
}
|
|
if compatEntries[1] != "suite_2" {
|
|
t.Errorf("expected LOCAL_COMPATIBILITY_SUITE to be`suite_2`,"+
|
|
" but was '%s'", compatEntries[1])
|
|
}
|
|
}
|
|
|
|
func TestTestLibraryTestSuites(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_test_library {
|
|
name: "main_test_lib",
|
|
srcs: ["main_test_lib.cpp"],
|
|
test_suites: [
|
|
"suite_1",
|
|
"suite_2",
|
|
],
|
|
gtest: false,
|
|
}
|
|
`
|
|
|
|
ctx := prepareForCcTest.RunTestWithBp(t, bp).TestContext
|
|
module := ctx.ModuleForTests("main_test_lib", "android_arm_armv7-a-neon_shared").Module()
|
|
|
|
entries := android.AndroidMkEntriesForTest(t, ctx, module)[0]
|
|
compatEntries := entries.EntryMap["LOCAL_COMPATIBILITY_SUITE"]
|
|
if len(compatEntries) != 2 {
|
|
t.Errorf("expected two elements in LOCAL_COMPATIBILITY_SUITE. got %d", len(compatEntries))
|
|
}
|
|
if compatEntries[0] != "suite_1" {
|
|
t.Errorf("expected LOCAL_COMPATIBILITY_SUITE to be`suite_1`,"+
|
|
" but was '%s'", compatEntries[0])
|
|
}
|
|
if compatEntries[1] != "suite_2" {
|
|
t.Errorf("expected LOCAL_COMPATIBILITY_SUITE to be`suite_2`,"+
|
|
" but was '%s'", compatEntries[1])
|
|
}
|
|
}
|
|
|
|
func TestVndkModuleError(t *testing.T) {
|
|
t.Parallel()
|
|
// Check the error message for vendor_available and product_available properties.
|
|
testCcErrorProductVndk(t, "vndk: vendor_available must be set to true when `vndk: {enabled: true}`", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
testCcErrorProductVndk(t, "vndk: vendor_available must be set to true when `vndk: {enabled: true}`", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
testCcErrorProductVndk(t, "product properties must have the same values with the vendor properties for VNDK modules", `
|
|
cc_library {
|
|
name: "libvndkprop",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
target: {
|
|
vendor: {
|
|
cflags: ["-DTEST",],
|
|
},
|
|
},
|
|
}
|
|
`)
|
|
}
|
|
|
|
func TestVndkDepError(t *testing.T) {
|
|
t.Parallel()
|
|
// Check whether an error is emitted when a VNDK lib depends on a system lib.
|
|
testCcError(t, "dependency \".*\" of \".*\" missing variant", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
shared_libs: ["libfwk"], // Cause error
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libfwk",
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
// Check whether an error is emitted when a VNDK lib depends on a vendor lib.
|
|
testCcError(t, "dependency \".*\" of \".*\" missing variant", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
shared_libs: ["libvendor"], // Cause error
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvendor",
|
|
vendor: true,
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
// Check whether an error is emitted when a VNDK-SP lib depends on a system lib.
|
|
testCcError(t, "dependency \".*\" of \".*\" missing variant", `
|
|
cc_library {
|
|
name: "libvndk_sp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
shared_libs: ["libfwk"], // Cause error
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libfwk",
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
// Check whether an error is emitted when a VNDK-SP lib depends on a vendor lib.
|
|
testCcError(t, "dependency \".*\" of \".*\" missing variant", `
|
|
cc_library {
|
|
name: "libvndk_sp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
shared_libs: ["libvendor"], // Cause error
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvendor",
|
|
vendor: true,
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
// Check whether an error is emitted when a VNDK-SP lib depends on a VNDK lib.
|
|
testCcError(t, "module \".*\" variant \".*\": \\(.*\\) should not link to \".*\"", `
|
|
cc_library {
|
|
name: "libvndk_sp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
shared_libs: ["libvndk"], // Cause error
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
// Check whether an error is emitted when a VNDK lib depends on a non-VNDK lib.
|
|
testCcError(t, "module \".*\" variant \".*\": \\(.*\\) should not link to \".*\"", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
shared_libs: ["libnonvndk"],
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libnonvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
// Check whether an error is emitted when a VNDK-private lib depends on a non-VNDK lib.
|
|
testCcError(t, "module \".*\" variant \".*\": \\(.*\\) should not link to \".*\"", `
|
|
cc_library {
|
|
name: "libvndkprivate",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
private: true,
|
|
},
|
|
shared_libs: ["libnonvndk"],
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libnonvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
// Check whether an error is emitted when a VNDK-sp lib depends on a non-VNDK lib.
|
|
testCcError(t, "module \".*\" variant \".*\": \\(.*\\) should not link to \".*\"", `
|
|
cc_library {
|
|
name: "libvndksp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
shared_libs: ["libnonvndk"],
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libnonvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
// Check whether an error is emitted when a VNDK-sp-private lib depends on a non-VNDK lib.
|
|
testCcError(t, "module \".*\" variant \".*\": \\(.*\\) should not link to \".*\"", `
|
|
cc_library {
|
|
name: "libvndkspprivate",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
private: true,
|
|
},
|
|
shared_libs: ["libnonvndk"],
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libnonvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
}
|
|
|
|
func TestDoubleLoadbleDep(t *testing.T) {
|
|
t.Parallel()
|
|
// okay to link : LLNDK -> double_loadable VNDK
|
|
testCc(t, `
|
|
cc_library {
|
|
name: "libllndk",
|
|
shared_libs: ["libdoubleloadable"],
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
}
|
|
}
|
|
|
|
cc_library {
|
|
name: "libdoubleloadable",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
double_loadable: true,
|
|
}
|
|
`)
|
|
// okay to link : LLNDK -> VNDK-SP
|
|
testCc(t, `
|
|
cc_library {
|
|
name: "libllndk",
|
|
shared_libs: ["libvndksp"],
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
}
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndksp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
}
|
|
`)
|
|
// okay to link : double_loadable -> double_loadable
|
|
testCc(t, `
|
|
cc_library {
|
|
name: "libdoubleloadable1",
|
|
shared_libs: ["libdoubleloadable2"],
|
|
vendor_available: true,
|
|
double_loadable: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libdoubleloadable2",
|
|
vendor_available: true,
|
|
double_loadable: true,
|
|
}
|
|
`)
|
|
// okay to link : double_loadable VNDK -> double_loadable VNDK private
|
|
testCc(t, `
|
|
cc_library {
|
|
name: "libdoubleloadable",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
double_loadable: true,
|
|
shared_libs: ["libnondoubleloadable"],
|
|
}
|
|
|
|
cc_library {
|
|
name: "libnondoubleloadable",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
private: true,
|
|
},
|
|
double_loadable: true,
|
|
}
|
|
`)
|
|
// okay to link : LLNDK -> core-only -> vendor_available & double_loadable
|
|
testCc(t, `
|
|
cc_library {
|
|
name: "libllndk",
|
|
shared_libs: ["libcoreonly"],
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
}
|
|
}
|
|
|
|
cc_library {
|
|
name: "libcoreonly",
|
|
shared_libs: ["libvendoravailable"],
|
|
}
|
|
|
|
// indirect dependency of LLNDK
|
|
cc_library {
|
|
name: "libvendoravailable",
|
|
vendor_available: true,
|
|
double_loadable: true,
|
|
}
|
|
`)
|
|
}
|
|
|
|
func TestDoubleLoadableDepError(t *testing.T) {
|
|
t.Parallel()
|
|
// Check whether an error is emitted when a LLNDK depends on a non-double_loadable VNDK lib.
|
|
testCcError(t, "module \".*\" variant \".*\": link.* \".*\" which is not LL-NDK, VNDK-SP, .*double_loadable", `
|
|
cc_library {
|
|
name: "libllndk",
|
|
shared_libs: ["libnondoubleloadable"],
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
}
|
|
}
|
|
|
|
cc_library {
|
|
name: "libnondoubleloadable",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
}
|
|
`)
|
|
|
|
// Check whether an error is emitted when a LLNDK depends on a non-double_loadable vendor_available lib.
|
|
testCcError(t, "module \".*\" variant \".*\": link.* \".*\" which is not LL-NDK, VNDK-SP, .*double_loadable", `
|
|
cc_library {
|
|
name: "libllndk",
|
|
no_libcrt: true,
|
|
shared_libs: ["libnondoubleloadable"],
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
}
|
|
}
|
|
|
|
cc_library {
|
|
name: "libnondoubleloadable",
|
|
vendor_available: true,
|
|
}
|
|
`)
|
|
|
|
// Check whether an error is emitted when a LLNDK depends on a non-double_loadable indirectly.
|
|
testCcError(t, "module \".*\" variant \".*\": link.* \".*\" which is not LL-NDK, VNDK-SP, .*double_loadable", `
|
|
cc_library {
|
|
name: "libllndk",
|
|
shared_libs: ["libcoreonly"],
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
}
|
|
}
|
|
|
|
cc_library {
|
|
name: "libcoreonly",
|
|
shared_libs: ["libvendoravailable"],
|
|
}
|
|
|
|
// indirect dependency of LLNDK
|
|
cc_library {
|
|
name: "libvendoravailable",
|
|
vendor_available: true,
|
|
}
|
|
`)
|
|
|
|
// The error is not from 'client' but from 'libllndk'
|
|
testCcError(t, "module \"libllndk\".* links a library \"libnondoubleloadable\".*double_loadable", `
|
|
cc_library {
|
|
name: "client",
|
|
vendor_available: true,
|
|
double_loadable: true,
|
|
shared_libs: ["libllndk"],
|
|
}
|
|
cc_library {
|
|
name: "libllndk",
|
|
shared_libs: ["libnondoubleloadable"],
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
}
|
|
}
|
|
cc_library {
|
|
name: "libnondoubleloadable",
|
|
vendor_available: true,
|
|
}
|
|
`)
|
|
}
|
|
|
|
func TestCheckVndkMembershipBeforeDoubleLoadable(t *testing.T) {
|
|
t.Parallel()
|
|
testCcError(t, "module \"libvndksp\" variant .*: .*: VNDK-SP must only depend on VNDK-SP", `
|
|
cc_library {
|
|
name: "libvndksp",
|
|
shared_libs: ["libanothervndksp"],
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
}
|
|
}
|
|
|
|
cc_library {
|
|
name: "libllndk",
|
|
shared_libs: ["libanothervndksp"],
|
|
}
|
|
|
|
cc_library {
|
|
name: "libanothervndksp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
}
|
|
`)
|
|
}
|
|
|
|
func TestVndkExt(t *testing.T) {
|
|
t.Parallel()
|
|
// This test checks the VNDK-Ext properties.
|
|
bp := `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
cc_library {
|
|
name: "libvndk2",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
target: {
|
|
vendor: {
|
|
suffix: "-suffix",
|
|
},
|
|
product: {
|
|
suffix: "-suffix",
|
|
},
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk",
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk2_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk2",
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext_product",
|
|
product_specific: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk",
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk2_ext_product",
|
|
product_specific: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk2",
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`
|
|
config := TestConfig(t.TempDir(), android.Android, nil, bp, nil)
|
|
config.TestProductVariables.DeviceVndkVersion = StringPtr("current")
|
|
config.TestProductVariables.Platform_vndk_version = StringPtr("29")
|
|
|
|
ctx := testCcWithConfig(t, config)
|
|
|
|
checkVndkModule(t, ctx, "libvndk_ext", "vndk", false, "libvndk", vendorVariant)
|
|
checkVndkModule(t, ctx, "libvndk_ext_product", "vndk", false, "libvndk", productVariant)
|
|
|
|
mod_vendor := ctx.ModuleForTests("libvndk2_ext", vendorVariant).Module().(*Module)
|
|
assertString(t, mod_vendor.outputFile.Path().Base(), "libvndk2-suffix.so")
|
|
|
|
mod_product := ctx.ModuleForTests("libvndk2_ext_product", productVariant).Module().(*Module)
|
|
assertString(t, mod_product.outputFile.Path().Base(), "libvndk2-suffix.so")
|
|
}
|
|
|
|
func TestVndkExtError(t *testing.T) {
|
|
t.Parallel()
|
|
// This test ensures an error is emitted in ill-formed vndk-ext definition.
|
|
testCcError(t, "must set `vendor: true` or `product_specific: true` to set `extends: \".*\"`", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext",
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk",
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
testCcError(t, "must set `extends: \"\\.\\.\\.\"` to vndk extension", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
testCcErrorProductVndk(t, "must set `extends: \"\\.\\.\\.\"` to vndk extension", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext_product",
|
|
product_specific: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
testCcErrorProductVndk(t, "must not set at the same time as `vndk: {extends: \"\\.\\.\\.\"}`", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext_product",
|
|
product_specific: true,
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk",
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
}
|
|
|
|
func TestVndkExtInconsistentSupportSystemProcessError(t *testing.T) {
|
|
t.Parallel()
|
|
// This test ensures an error is emitted for inconsistent support_system_process.
|
|
testCcError(t, "module \".*\" with mismatched support_system_process", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk",
|
|
support_system_process: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
testCcError(t, "module \".*\" with mismatched support_system_process", `
|
|
cc_library {
|
|
name: "libvndk_sp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk_sp",
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
}
|
|
|
|
func TestVndkExtVendorAvailableFalseError(t *testing.T) {
|
|
t.Parallel()
|
|
// This test ensures an error is emitted when a VNDK-Ext library extends a VNDK library
|
|
// with `private: true`.
|
|
testCcError(t, "`extends` refers module \".*\" which has `private: true`", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
private: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk",
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
testCcErrorProductVndk(t, "`extends` refers module \".*\" which has `private: true`", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
private: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext_product",
|
|
product_specific: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk",
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
}
|
|
|
|
func TestVendorModuleUseVndkExt(t *testing.T) {
|
|
t.Parallel()
|
|
// This test ensures a vendor module can depend on a VNDK-Ext library.
|
|
testCc(t, `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk",
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk_sp",
|
|
support_system_process: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvendor",
|
|
vendor: true,
|
|
shared_libs: ["libvndk_ext", "libvndk_sp_ext"],
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
}
|
|
|
|
func TestVndkExtUseVendorLib(t *testing.T) {
|
|
t.Parallel()
|
|
// This test ensures a VNDK-Ext library can depend on a vendor library.
|
|
testCc(t, `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk",
|
|
},
|
|
shared_libs: ["libvendor"],
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvendor",
|
|
vendor: true,
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
// This test ensures a VNDK-SP-Ext library can depend on a vendor library.
|
|
testCc(t, `
|
|
cc_library {
|
|
name: "libvndk_sp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk_sp",
|
|
support_system_process: true,
|
|
},
|
|
shared_libs: ["libvendor"], // Cause an error
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvendor",
|
|
vendor: true,
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
}
|
|
|
|
func TestProductVndkExtDependency(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext_product",
|
|
product_specific: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk",
|
|
},
|
|
shared_libs: ["libproduct_for_vndklibs"],
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp_ext_product",
|
|
product_specific: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk_sp",
|
|
support_system_process: true,
|
|
},
|
|
shared_libs: ["libproduct_for_vndklibs"],
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libproduct",
|
|
product_specific: true,
|
|
shared_libs: ["libvndk_ext_product", "libvndk_sp_ext_product"],
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libproduct_for_vndklibs",
|
|
product_specific: true,
|
|
nocrt: true,
|
|
}
|
|
`
|
|
config := TestConfig(t.TempDir(), android.Android, nil, bp, nil)
|
|
config.TestProductVariables.DeviceVndkVersion = StringPtr("current")
|
|
config.TestProductVariables.Platform_vndk_version = StringPtr("29")
|
|
|
|
testCcWithConfig(t, config)
|
|
}
|
|
|
|
func TestVndkSpExtUseVndkError(t *testing.T) {
|
|
t.Parallel()
|
|
// This test ensures an error is emitted if a VNDK-SP-Ext library depends on a VNDK
|
|
// library.
|
|
testCcError(t, "module \".*\" variant \".*\": \\(.*\\) should not link to \".*\"", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk_sp",
|
|
support_system_process: true,
|
|
},
|
|
shared_libs: ["libvndk"], // Cause an error
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
// This test ensures an error is emitted if a VNDK-SP-Ext library depends on a VNDK-Ext
|
|
// library.
|
|
testCcError(t, "module \".*\" variant \".*\": \\(.*\\) should not link to \".*\"", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk",
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk_sp",
|
|
support_system_process: true,
|
|
},
|
|
shared_libs: ["libvndk_ext"], // Cause an error
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
}
|
|
|
|
func TestVndkUseVndkExtError(t *testing.T) {
|
|
t.Parallel()
|
|
// This test ensures an error is emitted if a VNDK/VNDK-SP library depends on a
|
|
// VNDK-Ext/VNDK-SP-Ext library.
|
|
testCcError(t, "dependency \".*\" of \".*\" missing variant", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk",
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk2",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
shared_libs: ["libvndk_ext"],
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
testCcError(t, "module \".*\" variant \".*\": \\(.*\\) should not link to \".*\"", `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk",
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk2",
|
|
vendor_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
target: {
|
|
vendor: {
|
|
shared_libs: ["libvndk_ext"],
|
|
},
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
testCcError(t, "dependency \".*\" of \".*\" missing variant", `
|
|
cc_library {
|
|
name: "libvndk_sp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk_sp",
|
|
support_system_process: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp_2",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
shared_libs: ["libvndk_sp_ext"],
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
testCcError(t, "module \".*\" variant \".*\": \\(.*\\) should not link to \".*\"", `
|
|
cc_library {
|
|
name: "libvndk_sp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp_ext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk_sp",
|
|
},
|
|
nocrt: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvndk_sp2",
|
|
vendor_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
target: {
|
|
vendor: {
|
|
shared_libs: ["libvndk_sp_ext"],
|
|
},
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
}
|
|
|
|
func TestEnforceProductVndkVersion(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_library {
|
|
name: "libllndk",
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
}
|
|
}
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
cc_library {
|
|
name: "libvndk_sp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
cc_library {
|
|
name: "libva",
|
|
vendor_available: true,
|
|
nocrt: true,
|
|
}
|
|
cc_library {
|
|
name: "libpa",
|
|
product_available: true,
|
|
nocrt: true,
|
|
}
|
|
cc_library {
|
|
name: "libboth_available",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
nocrt: true,
|
|
srcs: ["foo.c"],
|
|
target: {
|
|
vendor: {
|
|
suffix: "-vendor",
|
|
},
|
|
product: {
|
|
suffix: "-product",
|
|
},
|
|
}
|
|
}
|
|
cc_library {
|
|
name: "libproduct_va",
|
|
product_specific: true,
|
|
vendor_available: true,
|
|
nocrt: true,
|
|
}
|
|
cc_library {
|
|
name: "libprod",
|
|
product_specific: true,
|
|
shared_libs: [
|
|
"libllndk",
|
|
"libvndk",
|
|
"libvndk_sp",
|
|
"libpa",
|
|
"libboth_available",
|
|
"libproduct_va",
|
|
],
|
|
nocrt: true,
|
|
}
|
|
cc_library {
|
|
name: "libvendor",
|
|
vendor: true,
|
|
shared_libs: [
|
|
"libllndk",
|
|
"libvndk",
|
|
"libvndk_sp",
|
|
"libva",
|
|
"libboth_available",
|
|
"libproduct_va",
|
|
],
|
|
nocrt: true,
|
|
}
|
|
`
|
|
|
|
ctx := prepareForCcTest.RunTestWithBp(t, bp).TestContext
|
|
|
|
checkVndkModule(t, ctx, "libvndk", "", false, "", productVariant)
|
|
checkVndkModule(t, ctx, "libvndk_sp", "", true, "", productVariant)
|
|
|
|
mod_vendor := ctx.ModuleForTests("libboth_available", vendorVariant).Module().(*Module)
|
|
assertString(t, mod_vendor.outputFile.Path().Base(), "libboth_available-vendor.so")
|
|
|
|
mod_product := ctx.ModuleForTests("libboth_available", productVariant).Module().(*Module)
|
|
assertString(t, mod_product.outputFile.Path().Base(), "libboth_available-product.so")
|
|
|
|
ensureStringContains := func(t *testing.T, str string, substr string) {
|
|
t.Helper()
|
|
if !strings.Contains(str, substr) {
|
|
t.Errorf("%q is not found in %v", substr, str)
|
|
}
|
|
}
|
|
ensureStringNotContains := func(t *testing.T, str string, substr string) {
|
|
t.Helper()
|
|
if strings.Contains(str, substr) {
|
|
t.Errorf("%q is found in %v", substr, str)
|
|
}
|
|
}
|
|
|
|
// _static variant is used since _shared reuses *.o from the static variant
|
|
vendor_static := ctx.ModuleForTests("libboth_available", strings.Replace(vendorVariant, "_shared", "_static", 1))
|
|
product_static := ctx.ModuleForTests("libboth_available", strings.Replace(productVariant, "_shared", "_static", 1))
|
|
|
|
vendor_cflags := vendor_static.Rule("cc").Args["cFlags"]
|
|
ensureStringContains(t, vendor_cflags, "-D__ANDROID_VNDK__")
|
|
ensureStringContains(t, vendor_cflags, "-D__ANDROID_VENDOR__")
|
|
ensureStringNotContains(t, vendor_cflags, "-D__ANDROID_PRODUCT__")
|
|
|
|
product_cflags := product_static.Rule("cc").Args["cFlags"]
|
|
ensureStringContains(t, product_cflags, "-D__ANDROID_VNDK__")
|
|
ensureStringContains(t, product_cflags, "-D__ANDROID_PRODUCT__")
|
|
ensureStringNotContains(t, product_cflags, "-D__ANDROID_VENDOR__")
|
|
}
|
|
|
|
func TestEnforceProductVndkVersionErrors(t *testing.T) {
|
|
t.Parallel()
|
|
testCcErrorProductVndk(t, "dependency \".*\" of \".*\" missing variant:\n.*image:product.29", `
|
|
cc_library {
|
|
name: "libprod",
|
|
product_specific: true,
|
|
shared_libs: [
|
|
"libvendor",
|
|
],
|
|
nocrt: true,
|
|
}
|
|
cc_library {
|
|
name: "libvendor",
|
|
vendor: true,
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
testCcErrorProductVndk(t, "dependency \".*\" of \".*\" missing variant:\n.*image:product.29", `
|
|
cc_library {
|
|
name: "libprod",
|
|
product_specific: true,
|
|
shared_libs: [
|
|
"libsystem",
|
|
],
|
|
nocrt: true,
|
|
}
|
|
cc_library {
|
|
name: "libsystem",
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
testCcErrorProductVndk(t, "dependency \".*\" of \".*\" missing variant:\n.*image:product.29", `
|
|
cc_library {
|
|
name: "libprod",
|
|
product_specific: true,
|
|
shared_libs: [
|
|
"libva",
|
|
],
|
|
nocrt: true,
|
|
}
|
|
cc_library {
|
|
name: "libva",
|
|
vendor_available: true,
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
testCcErrorProductVndk(t, "non-VNDK module should not link to \".*\" which has `private: true`", `
|
|
cc_library {
|
|
name: "libprod",
|
|
product_specific: true,
|
|
shared_libs: [
|
|
"libvndk_private",
|
|
],
|
|
nocrt: true,
|
|
}
|
|
cc_library {
|
|
name: "libvndk_private",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
private: true,
|
|
},
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
testCcErrorProductVndk(t, "dependency \".*\" of \".*\" missing variant:\n.*image:product.29", `
|
|
cc_library {
|
|
name: "libprod",
|
|
product_specific: true,
|
|
shared_libs: [
|
|
"libsystem_ext",
|
|
],
|
|
nocrt: true,
|
|
}
|
|
cc_library {
|
|
name: "libsystem_ext",
|
|
system_ext_specific: true,
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
testCcErrorProductVndk(t, "dependency \".*\" of \".*\" missing variant:\n.*image:", `
|
|
cc_library {
|
|
name: "libsystem",
|
|
shared_libs: [
|
|
"libproduct_va",
|
|
],
|
|
nocrt: true,
|
|
}
|
|
cc_library {
|
|
name: "libproduct_va",
|
|
product_specific: true,
|
|
vendor_available: true,
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
}
|
|
|
|
func TestMakeLinkType(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_library {
|
|
name: "libvndk",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
}
|
|
cc_library {
|
|
name: "libvndksp",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
support_system_process: true,
|
|
},
|
|
}
|
|
cc_library {
|
|
name: "libvndkprivate",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
private: true,
|
|
},
|
|
}
|
|
cc_library {
|
|
name: "libvendor",
|
|
vendor: true,
|
|
}
|
|
cc_library {
|
|
name: "libvndkext",
|
|
vendor: true,
|
|
vndk: {
|
|
enabled: true,
|
|
extends: "libvndk",
|
|
},
|
|
}
|
|
vndk_prebuilt_shared {
|
|
name: "prevndk",
|
|
version: "27",
|
|
target_arch: "arm",
|
|
binder32bit: true,
|
|
vendor_available: true,
|
|
product_available: true,
|
|
vndk: {
|
|
enabled: true,
|
|
},
|
|
arch: {
|
|
arm: {
|
|
srcs: ["liba.so"],
|
|
},
|
|
},
|
|
}
|
|
cc_library {
|
|
name: "libllndk",
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
}
|
|
}
|
|
cc_library {
|
|
name: "libllndkprivate",
|
|
llndk: {
|
|
symbol_file: "libllndkprivate.map.txt",
|
|
private: true,
|
|
}
|
|
}
|
|
|
|
llndk_libraries_txt {
|
|
name: "llndk.libraries.txt",
|
|
}
|
|
vndkcore_libraries_txt {
|
|
name: "vndkcore.libraries.txt",
|
|
}
|
|
vndksp_libraries_txt {
|
|
name: "vndksp.libraries.txt",
|
|
}
|
|
vndkprivate_libraries_txt {
|
|
name: "vndkprivate.libraries.txt",
|
|
}
|
|
vndkcorevariant_libraries_txt {
|
|
name: "vndkcorevariant.libraries.txt",
|
|
insert_vndk_version: false,
|
|
}
|
|
`
|
|
|
|
config := TestConfig(t.TempDir(), android.Android, nil, bp, nil)
|
|
config.TestProductVariables.DeviceVndkVersion = StringPtr("current")
|
|
config.TestProductVariables.Platform_vndk_version = StringPtr("29")
|
|
// native:vndk
|
|
ctx := testCcWithConfig(t, config)
|
|
|
|
checkVndkLibrariesOutput(t, ctx, "vndkcore.libraries.txt",
|
|
[]string{"libvndk.so", "libvndkprivate.so"})
|
|
checkVndkLibrariesOutput(t, ctx, "vndksp.libraries.txt",
|
|
[]string{"libc++.so", "libvndksp.so"})
|
|
checkVndkLibrariesOutput(t, ctx, "llndk.libraries.txt",
|
|
[]string{"libc.so", "libdl.so", "libft2.so", "libllndk.so", "libllndkprivate.so", "libm.so"})
|
|
checkVndkLibrariesOutput(t, ctx, "vndkprivate.libraries.txt",
|
|
[]string{"libft2.so", "libllndkprivate.so", "libvndkprivate.so"})
|
|
|
|
vendorVariant27 := "android_vendor.27_arm64_armv8-a_shared"
|
|
|
|
tests := []struct {
|
|
variant string
|
|
name string
|
|
expected string
|
|
}{
|
|
{vendorVariant, "libvndk", "native:vndk"},
|
|
{vendorVariant, "libvndksp", "native:vndk"},
|
|
{vendorVariant, "libvndkprivate", "native:vndk_private"},
|
|
{vendorVariant, "libvendor", "native:vendor"},
|
|
{vendorVariant, "libvndkext", "native:vendor"},
|
|
{vendorVariant, "libllndk", "native:vndk"},
|
|
{vendorVariant27, "prevndk.vndk.27.arm.binder32", "native:vndk"},
|
|
{coreVariant, "libvndk", "native:platform"},
|
|
{coreVariant, "libvndkprivate", "native:platform"},
|
|
{coreVariant, "libllndk", "native:platform"},
|
|
}
|
|
for _, test := range tests {
|
|
t.Run(test.name, func(t *testing.T) {
|
|
module := ctx.ModuleForTests(test.name, test.variant).Module().(*Module)
|
|
assertString(t, module.makeLinkType, test.expected)
|
|
})
|
|
}
|
|
}
|
|
|
|
var staticLinkDepOrderTestCases = []struct {
|
|
// This is a string representation of a map[moduleName][]moduleDependency .
|
|
// It models the dependencies declared in an Android.bp file.
|
|
inStatic string
|
|
|
|
// This is a string representation of a map[moduleName][]moduleDependency .
|
|
// It models the dependencies declared in an Android.bp file.
|
|
inShared string
|
|
|
|
// allOrdered is a string representation of a map[moduleName][]moduleDependency .
|
|
// The keys of allOrdered specify which modules we would like to check.
|
|
// The values of allOrdered specify the expected result (of the transitive closure of all
|
|
// dependencies) for each module to test
|
|
allOrdered string
|
|
|
|
// outOrdered is a string representation of a map[moduleName][]moduleDependency .
|
|
// The keys of outOrdered specify which modules we would like to check.
|
|
// The values of outOrdered specify the expected result (of the ordered linker command line)
|
|
// for each module to test.
|
|
outOrdered string
|
|
}{
|
|
// Simple tests
|
|
{
|
|
inStatic: "",
|
|
outOrdered: "",
|
|
},
|
|
{
|
|
inStatic: "a:",
|
|
outOrdered: "a:",
|
|
},
|
|
{
|
|
inStatic: "a:b; b:",
|
|
outOrdered: "a:b; b:",
|
|
},
|
|
// Tests of reordering
|
|
{
|
|
// diamond example
|
|
inStatic: "a:d,b,c; b:d; c:d; d:",
|
|
outOrdered: "a:b,c,d; b:d; c:d; d:",
|
|
},
|
|
{
|
|
// somewhat real example
|
|
inStatic: "bsdiff_unittest:b,c,d,e,f,g,h,i; e:b",
|
|
outOrdered: "bsdiff_unittest:c,d,e,b,f,g,h,i; e:b",
|
|
},
|
|
{
|
|
// multiple reorderings
|
|
inStatic: "a:b,c,d,e; d:b; e:c",
|
|
outOrdered: "a:d,b,e,c; d:b; e:c",
|
|
},
|
|
{
|
|
// should reorder without adding new transitive dependencies
|
|
inStatic: "bin:lib2,lib1; lib1:lib2,liboptional",
|
|
allOrdered: "bin:lib1,lib2,liboptional; lib1:lib2,liboptional",
|
|
outOrdered: "bin:lib1,lib2; lib1:lib2,liboptional",
|
|
},
|
|
{
|
|
// multiple levels of dependencies
|
|
inStatic: "a:b,c,d,e,f,g,h; f:b,c,d; b:c,d; c:d",
|
|
allOrdered: "a:e,f,b,c,d,g,h; f:b,c,d; b:c,d; c:d",
|
|
outOrdered: "a:e,f,b,c,d,g,h; f:b,c,d; b:c,d; c:d",
|
|
},
|
|
// shared dependencies
|
|
{
|
|
// Note that this test doesn't recurse, to minimize the amount of logic it tests.
|
|
// So, we don't actually have to check that a shared dependency of c will change the order
|
|
// of a library that depends statically on b and on c. We only need to check that if c has
|
|
// a shared dependency on b, that that shows up in allOrdered.
|
|
inShared: "c:b",
|
|
allOrdered: "c:b",
|
|
outOrdered: "c:",
|
|
},
|
|
{
|
|
// This test doesn't actually include any shared dependencies but it's a reminder of what
|
|
// the second phase of the above test would look like
|
|
inStatic: "a:b,c; c:b",
|
|
allOrdered: "a:c,b; c:b",
|
|
outOrdered: "a:c,b; c:b",
|
|
},
|
|
// tiebreakers for when two modules specifying different orderings and there is no dependency
|
|
// to dictate an order
|
|
{
|
|
// if the tie is between two modules at the end of a's deps, then a's order wins
|
|
inStatic: "a1:b,c,d,e; a2:b,c,e,d; b:d,e; c:e,d",
|
|
outOrdered: "a1:b,c,d,e; a2:b,c,e,d; b:d,e; c:e,d",
|
|
},
|
|
{
|
|
// if the tie is between two modules at the start of a's deps, then c's order is used
|
|
inStatic: "a1:d,e,b1,c1; b1:d,e; c1:e,d; a2:d,e,b2,c2; b2:d,e; c2:d,e",
|
|
outOrdered: "a1:b1,c1,e,d; b1:d,e; c1:e,d; a2:b2,c2,d,e; b2:d,e; c2:d,e",
|
|
},
|
|
// Tests involving duplicate dependencies
|
|
{
|
|
// simple duplicate
|
|
inStatic: "a:b,c,c,b",
|
|
outOrdered: "a:c,b",
|
|
},
|
|
{
|
|
// duplicates with reordering
|
|
inStatic: "a:b,c,d,c; c:b",
|
|
outOrdered: "a:d,c,b",
|
|
},
|
|
// Tests to confirm the nonexistence of infinite loops.
|
|
// These cases should never happen, so as long as the test terminates and the
|
|
// result is deterministic then that should be fine.
|
|
{
|
|
inStatic: "a:a",
|
|
outOrdered: "a:a",
|
|
},
|
|
{
|
|
inStatic: "a:b; b:c; c:a",
|
|
allOrdered: "a:b,c; b:c,a; c:a,b",
|
|
outOrdered: "a:b; b:c; c:a",
|
|
},
|
|
{
|
|
inStatic: "a:b,c; b:c,a; c:a,b",
|
|
allOrdered: "a:c,a,b; b:a,b,c; c:b,c,a",
|
|
outOrdered: "a:c,b; b:a,c; c:b,a",
|
|
},
|
|
}
|
|
|
|
// converts from a string like "a:b,c; d:e" to (["a","b"], {"a":["b","c"], "d":["e"]}, [{"a", "a.o"}, {"b", "b.o"}])
|
|
func parseModuleDeps(text string) (modulesInOrder []android.Path, allDeps map[android.Path][]android.Path) {
|
|
// convert from "a:b,c; d:e" to "a:b,c;d:e"
|
|
strippedText := strings.Replace(text, " ", "", -1)
|
|
if len(strippedText) < 1 {
|
|
return []android.Path{}, make(map[android.Path][]android.Path, 0)
|
|
}
|
|
allDeps = make(map[android.Path][]android.Path, 0)
|
|
|
|
// convert from "a:b,c;d:e" to ["a:b,c", "d:e"]
|
|
moduleTexts := strings.Split(strippedText, ";")
|
|
|
|
outputForModuleName := func(moduleName string) android.Path {
|
|
return android.PathForTesting(moduleName)
|
|
}
|
|
|
|
for _, moduleText := range moduleTexts {
|
|
// convert from "a:b,c" to ["a", "b,c"]
|
|
components := strings.Split(moduleText, ":")
|
|
if len(components) != 2 {
|
|
panic(fmt.Sprintf("illegal module dep string %q from larger string %q; must contain one ':', not %v", moduleText, text, len(components)-1))
|
|
}
|
|
moduleName := components[0]
|
|
moduleOutput := outputForModuleName(moduleName)
|
|
modulesInOrder = append(modulesInOrder, moduleOutput)
|
|
|
|
depString := components[1]
|
|
// convert from "b,c" to ["b", "c"]
|
|
depNames := strings.Split(depString, ",")
|
|
if len(depString) < 1 {
|
|
depNames = []string{}
|
|
}
|
|
var deps []android.Path
|
|
for _, depName := range depNames {
|
|
deps = append(deps, outputForModuleName(depName))
|
|
}
|
|
allDeps[moduleOutput] = deps
|
|
}
|
|
return modulesInOrder, allDeps
|
|
}
|
|
|
|
func TestStaticLibDepReordering(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_library {
|
|
name: "a",
|
|
static_libs: ["b", "c", "d"],
|
|
stl: "none",
|
|
}
|
|
cc_library {
|
|
name: "b",
|
|
stl: "none",
|
|
}
|
|
cc_library {
|
|
name: "c",
|
|
static_libs: ["b"],
|
|
stl: "none",
|
|
}
|
|
cc_library {
|
|
name: "d",
|
|
stl: "none",
|
|
}
|
|
|
|
`)
|
|
|
|
variant := "android_arm64_armv8-a_static"
|
|
moduleA := ctx.ModuleForTests("a", variant).Module().(*Module)
|
|
actual := android.Paths(ctx.ModuleProvider(moduleA, StaticLibraryInfoProvider).(StaticLibraryInfo).
|
|
TransitiveStaticLibrariesForOrdering.ToList()).RelativeToTop()
|
|
expected := GetOutputPaths(ctx, variant, []string{"a", "c", "b", "d"})
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Errorf("staticDeps orderings were not propagated correctly"+
|
|
"\nactual: %v"+
|
|
"\nexpected: %v",
|
|
actual,
|
|
expected,
|
|
)
|
|
}
|
|
}
|
|
|
|
func TestStaticLibDepReorderingWithShared(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_library {
|
|
name: "a",
|
|
static_libs: ["b", "c"],
|
|
stl: "none",
|
|
}
|
|
cc_library {
|
|
name: "b",
|
|
stl: "none",
|
|
}
|
|
cc_library {
|
|
name: "c",
|
|
shared_libs: ["b"],
|
|
stl: "none",
|
|
}
|
|
|
|
`)
|
|
|
|
variant := "android_arm64_armv8-a_static"
|
|
moduleA := ctx.ModuleForTests("a", variant).Module().(*Module)
|
|
actual := android.Paths(ctx.ModuleProvider(moduleA, StaticLibraryInfoProvider).(StaticLibraryInfo).
|
|
TransitiveStaticLibrariesForOrdering.ToList()).RelativeToTop()
|
|
expected := GetOutputPaths(ctx, variant, []string{"a", "c", "b"})
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Errorf("staticDeps orderings did not account for shared libs"+
|
|
"\nactual: %v"+
|
|
"\nexpected: %v",
|
|
actual,
|
|
expected,
|
|
)
|
|
}
|
|
}
|
|
|
|
func checkEquals(t *testing.T, message string, expected, actual interface{}) {
|
|
t.Helper()
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Errorf(message+
|
|
"\nactual: %v"+
|
|
"\nexpected: %v",
|
|
actual,
|
|
expected,
|
|
)
|
|
}
|
|
}
|
|
|
|
func TestLlndkLibrary(t *testing.T) {
|
|
t.Parallel()
|
|
result := prepareForCcTest.RunTestWithBp(t, `
|
|
cc_library {
|
|
name: "libllndk",
|
|
stubs: { versions: ["1", "2"] },
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
},
|
|
export_include_dirs: ["include"],
|
|
}
|
|
|
|
cc_prebuilt_library_shared {
|
|
name: "libllndkprebuilt",
|
|
stubs: { versions: ["1", "2"] },
|
|
llndk: {
|
|
symbol_file: "libllndkprebuilt.map.txt",
|
|
},
|
|
}
|
|
|
|
cc_library {
|
|
name: "libllndk_with_external_headers",
|
|
stubs: { versions: ["1", "2"] },
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
export_llndk_headers: ["libexternal_llndk_headers"],
|
|
},
|
|
header_libs: ["libexternal_headers"],
|
|
export_header_lib_headers: ["libexternal_headers"],
|
|
}
|
|
cc_library_headers {
|
|
name: "libexternal_headers",
|
|
export_include_dirs: ["include"],
|
|
vendor_available: true,
|
|
}
|
|
cc_library_headers {
|
|
name: "libexternal_llndk_headers",
|
|
export_include_dirs: ["include_llndk"],
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
},
|
|
vendor_available: true,
|
|
}
|
|
|
|
cc_library {
|
|
name: "libllndk_with_override_headers",
|
|
stubs: { versions: ["1", "2"] },
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
override_export_include_dirs: ["include_llndk"],
|
|
},
|
|
export_include_dirs: ["include"],
|
|
}
|
|
`)
|
|
actual := result.ModuleVariantsForTests("libllndk")
|
|
for i := 0; i < len(actual); i++ {
|
|
if !strings.HasPrefix(actual[i], "android_vendor.29_") {
|
|
actual = append(actual[:i], actual[i+1:]...)
|
|
i--
|
|
}
|
|
}
|
|
expected := []string{
|
|
"android_vendor.29_arm64_armv8-a_shared_current",
|
|
"android_vendor.29_arm64_armv8-a_shared",
|
|
"android_vendor.29_arm_armv7-a-neon_shared_current",
|
|
"android_vendor.29_arm_armv7-a-neon_shared",
|
|
}
|
|
android.AssertArrayString(t, "variants for llndk stubs", expected, actual)
|
|
|
|
params := result.ModuleForTests("libllndk", "android_vendor.29_arm_armv7-a-neon_shared").Description("generate stub")
|
|
android.AssertSame(t, "use VNDK version for default stubs", "current", params.Args["apiLevel"])
|
|
|
|
checkExportedIncludeDirs := func(module, variant string, expectedDirs ...string) {
|
|
t.Helper()
|
|
m := result.ModuleForTests(module, variant).Module()
|
|
f := result.ModuleProvider(m, FlagExporterInfoProvider).(FlagExporterInfo)
|
|
android.AssertPathsRelativeToTopEquals(t, "exported include dirs for "+module+"["+variant+"]",
|
|
expectedDirs, f.IncludeDirs)
|
|
}
|
|
|
|
checkExportedIncludeDirs("libllndk", "android_arm64_armv8-a_shared", "include")
|
|
checkExportedIncludeDirs("libllndk", "android_vendor.29_arm64_armv8-a_shared", "include")
|
|
checkExportedIncludeDirs("libllndk_with_external_headers", "android_arm64_armv8-a_shared", "include")
|
|
checkExportedIncludeDirs("libllndk_with_external_headers", "android_vendor.29_arm64_armv8-a_shared", "include_llndk")
|
|
checkExportedIncludeDirs("libllndk_with_override_headers", "android_arm64_armv8-a_shared", "include")
|
|
checkExportedIncludeDirs("libllndk_with_override_headers", "android_vendor.29_arm64_armv8-a_shared", "include_llndk")
|
|
}
|
|
|
|
func TestLlndkHeaders(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_library_headers {
|
|
name: "libllndk_headers",
|
|
export_include_dirs: ["my_include"],
|
|
llndk: {
|
|
llndk_headers: true,
|
|
},
|
|
}
|
|
cc_library {
|
|
name: "libllndk",
|
|
llndk: {
|
|
symbol_file: "libllndk.map.txt",
|
|
export_llndk_headers: ["libllndk_headers"],
|
|
}
|
|
}
|
|
|
|
cc_library {
|
|
name: "libvendor",
|
|
shared_libs: ["libllndk"],
|
|
vendor: true,
|
|
srcs: ["foo.c"],
|
|
no_libcrt: true,
|
|
nocrt: true,
|
|
}
|
|
`)
|
|
|
|
// _static variant is used since _shared reuses *.o from the static variant
|
|
cc := ctx.ModuleForTests("libvendor", "android_vendor.29_arm_armv7-a-neon_static").Rule("cc")
|
|
cflags := cc.Args["cFlags"]
|
|
if !strings.Contains(cflags, "-Imy_include") {
|
|
t.Errorf("cflags for libvendor must contain -Imy_include, but was %#v.", cflags)
|
|
}
|
|
}
|
|
|
|
func checkRuntimeLibs(t *testing.T, expected []string, module *Module) {
|
|
actual := module.Properties.AndroidMkRuntimeLibs
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Errorf("incorrect runtime_libs for shared libs"+
|
|
"\nactual: %v"+
|
|
"\nexpected: %v",
|
|
actual,
|
|
expected,
|
|
)
|
|
}
|
|
}
|
|
|
|
const runtimeLibAndroidBp = `
|
|
cc_library {
|
|
name: "liball_available",
|
|
vendor_available: true,
|
|
product_available: true,
|
|
no_libcrt : true,
|
|
nocrt : true,
|
|
system_shared_libs : [],
|
|
}
|
|
cc_library {
|
|
name: "libvendor_available1",
|
|
vendor_available: true,
|
|
runtime_libs: ["liball_available"],
|
|
no_libcrt : true,
|
|
nocrt : true,
|
|
system_shared_libs : [],
|
|
}
|
|
cc_library {
|
|
name: "libvendor_available2",
|
|
vendor_available: true,
|
|
runtime_libs: ["liball_available"],
|
|
target: {
|
|
vendor: {
|
|
exclude_runtime_libs: ["liball_available"],
|
|
}
|
|
},
|
|
no_libcrt : true,
|
|
nocrt : true,
|
|
system_shared_libs : [],
|
|
}
|
|
cc_library {
|
|
name: "libproduct_vendor",
|
|
product_specific: true,
|
|
vendor_available: true,
|
|
no_libcrt : true,
|
|
nocrt : true,
|
|
system_shared_libs : [],
|
|
}
|
|
cc_library {
|
|
name: "libcore",
|
|
runtime_libs: ["liball_available"],
|
|
no_libcrt : true,
|
|
nocrt : true,
|
|
system_shared_libs : [],
|
|
}
|
|
cc_library {
|
|
name: "libvendor1",
|
|
vendor: true,
|
|
no_libcrt : true,
|
|
nocrt : true,
|
|
system_shared_libs : [],
|
|
}
|
|
cc_library {
|
|
name: "libvendor2",
|
|
vendor: true,
|
|
runtime_libs: ["liball_available", "libvendor1", "libproduct_vendor"],
|
|
no_libcrt : true,
|
|
nocrt : true,
|
|
system_shared_libs : [],
|
|
}
|
|
cc_library {
|
|
name: "libproduct_available1",
|
|
product_available: true,
|
|
runtime_libs: ["liball_available"],
|
|
no_libcrt : true,
|
|
nocrt : true,
|
|
system_shared_libs : [],
|
|
}
|
|
cc_library {
|
|
name: "libproduct1",
|
|
product_specific: true,
|
|
no_libcrt : true,
|
|
nocrt : true,
|
|
system_shared_libs : [],
|
|
}
|
|
cc_library {
|
|
name: "libproduct2",
|
|
product_specific: true,
|
|
runtime_libs: ["liball_available", "libproduct1", "libproduct_vendor"],
|
|
no_libcrt : true,
|
|
nocrt : true,
|
|
system_shared_libs : [],
|
|
}
|
|
`
|
|
|
|
func TestRuntimeLibs(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, runtimeLibAndroidBp)
|
|
|
|
// runtime_libs for core variants use the module names without suffixes.
|
|
variant := "android_arm64_armv8-a_shared"
|
|
|
|
module := ctx.ModuleForTests("libvendor_available1", variant).Module().(*Module)
|
|
checkRuntimeLibs(t, []string{"liball_available"}, module)
|
|
|
|
module = ctx.ModuleForTests("libproduct_available1", variant).Module().(*Module)
|
|
checkRuntimeLibs(t, []string{"liball_available"}, module)
|
|
|
|
module = ctx.ModuleForTests("libcore", variant).Module().(*Module)
|
|
checkRuntimeLibs(t, []string{"liball_available"}, module)
|
|
|
|
// runtime_libs for vendor variants have '.vendor' suffixes if the modules have both core
|
|
// and vendor variants.
|
|
variant = "android_vendor.29_arm64_armv8-a_shared"
|
|
|
|
module = ctx.ModuleForTests("libvendor_available1", variant).Module().(*Module)
|
|
checkRuntimeLibs(t, []string{"liball_available.vendor"}, module)
|
|
|
|
module = ctx.ModuleForTests("libvendor2", variant).Module().(*Module)
|
|
checkRuntimeLibs(t, []string{"liball_available.vendor", "libvendor1", "libproduct_vendor.vendor"}, module)
|
|
|
|
// runtime_libs for product variants have '.product' suffixes if the modules have both core
|
|
// and product variants.
|
|
variant = "android_product.29_arm64_armv8-a_shared"
|
|
|
|
module = ctx.ModuleForTests("libproduct_available1", variant).Module().(*Module)
|
|
checkRuntimeLibs(t, []string{"liball_available.product"}, module)
|
|
|
|
module = ctx.ModuleForTests("libproduct2", variant).Module().(*Module)
|
|
checkRuntimeLibs(t, []string{"liball_available.product", "libproduct1", "libproduct_vendor"}, module)
|
|
}
|
|
|
|
func TestExcludeRuntimeLibs(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, runtimeLibAndroidBp)
|
|
|
|
variant := "android_arm64_armv8-a_shared"
|
|
module := ctx.ModuleForTests("libvendor_available2", variant).Module().(*Module)
|
|
checkRuntimeLibs(t, []string{"liball_available"}, module)
|
|
|
|
variant = "android_vendor.29_arm64_armv8-a_shared"
|
|
module = ctx.ModuleForTests("libvendor_available2", variant).Module().(*Module)
|
|
checkRuntimeLibs(t, nil, module)
|
|
}
|
|
|
|
func checkStaticLibs(t *testing.T, expected []string, module *Module) {
|
|
t.Helper()
|
|
actual := module.Properties.AndroidMkStaticLibs
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Errorf("incorrect static_libs"+
|
|
"\nactual: %v"+
|
|
"\nexpected: %v",
|
|
actual,
|
|
expected,
|
|
)
|
|
}
|
|
}
|
|
|
|
const staticLibAndroidBp = `
|
|
cc_library {
|
|
name: "lib1",
|
|
}
|
|
cc_library {
|
|
name: "lib2",
|
|
static_libs: ["lib1"],
|
|
}
|
|
`
|
|
|
|
func TestStaticLibDepExport(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, staticLibAndroidBp)
|
|
|
|
// Check the shared version of lib2.
|
|
variant := "android_arm64_armv8-a_shared"
|
|
module := ctx.ModuleForTests("lib2", variant).Module().(*Module)
|
|
checkStaticLibs(t, []string{"lib1", "libc++demangle", "libclang_rt.builtins"}, module)
|
|
|
|
// Check the static version of lib2.
|
|
variant = "android_arm64_armv8-a_static"
|
|
module = ctx.ModuleForTests("lib2", variant).Module().(*Module)
|
|
// libc++_static is linked additionally.
|
|
checkStaticLibs(t, []string{"lib1", "libc++_static", "libc++demangle", "libclang_rt.builtins"}, module)
|
|
}
|
|
|
|
func TestLibDepAndroidMkExportInMixedBuilds(t *testing.T) {
|
|
bp := `
|
|
cc_library {
|
|
name: "static_dep",
|
|
}
|
|
cc_library {
|
|
name: "whole_static_dep",
|
|
}
|
|
cc_library {
|
|
name: "shared_dep",
|
|
}
|
|
cc_library {
|
|
name: "lib",
|
|
bazel_module: { label: "//:lib" },
|
|
static_libs: ["static_dep"],
|
|
whole_static_libs: ["whole_static_dep"],
|
|
shared_libs: ["shared_dep"],
|
|
}
|
|
cc_test {
|
|
name: "test",
|
|
bazel_module: { label: "//:test" },
|
|
static_libs: ["static_dep"],
|
|
whole_static_libs: ["whole_static_dep"],
|
|
shared_libs: ["shared_dep"],
|
|
gtest: false,
|
|
sanitize: {
|
|
// cc_test modules default to memtag_heap: true,
|
|
// but this adds extra dependencies that we don't care about
|
|
never: true,
|
|
}
|
|
}
|
|
cc_binary {
|
|
name: "binary",
|
|
bazel_module: { label: "//:binary" },
|
|
static_libs: ["static_dep"],
|
|
whole_static_libs: ["whole_static_dep"],
|
|
shared_libs: ["shared_dep"],
|
|
}
|
|
cc_library_headers {
|
|
name: "lib_headers",
|
|
bazel_module: { label: "//:lib_headers" },
|
|
static_libs: ["static_dep"],
|
|
whole_static_libs: ["whole_static_dep"],
|
|
shared_libs: ["shared_dep"],
|
|
}
|
|
cc_prebuilt_library {
|
|
name: "lib_prebuilt",
|
|
bazel_module: { label: "//:lib_prebuilt" },
|
|
static_libs: ["static_dep"],
|
|
whole_static_libs: ["whole_static_dep"],
|
|
shared_libs: ["shared_dep"],
|
|
}
|
|
`
|
|
|
|
testCases := []struct {
|
|
name string
|
|
moduleName string
|
|
variant string
|
|
androidMkInfo cquery.CcAndroidMkInfo
|
|
}{
|
|
{
|
|
name: "shared lib",
|
|
moduleName: "lib",
|
|
variant: "android_arm64_armv8-a_shared",
|
|
androidMkInfo: cquery.CcAndroidMkInfo{
|
|
LocalStaticLibs: []string{"static_dep"},
|
|
LocalWholeStaticLibs: []string{"whole_static_dep"},
|
|
LocalSharedLibs: []string{"shared_dep"},
|
|
},
|
|
},
|
|
{
|
|
name: "static lib",
|
|
moduleName: "lib",
|
|
variant: "android_arm64_armv8-a_static",
|
|
androidMkInfo: cquery.CcAndroidMkInfo{
|
|
LocalStaticLibs: []string{"static_dep"},
|
|
LocalWholeStaticLibs: []string{"whole_static_dep"},
|
|
LocalSharedLibs: []string{"shared_dep"},
|
|
},
|
|
},
|
|
{
|
|
name: "cc_test arm64",
|
|
moduleName: "test",
|
|
variant: "android_arm64_armv8-a",
|
|
androidMkInfo: cquery.CcAndroidMkInfo{
|
|
LocalStaticLibs: []string{"static_dep"},
|
|
LocalWholeStaticLibs: []string{"whole_static_dep"},
|
|
LocalSharedLibs: []string{"shared_dep"},
|
|
},
|
|
},
|
|
{
|
|
name: "cc_test arm",
|
|
moduleName: "test",
|
|
variant: "android_arm_armv7-a-neon",
|
|
androidMkInfo: cquery.CcAndroidMkInfo{
|
|
LocalStaticLibs: []string{"static_dep"},
|
|
LocalWholeStaticLibs: []string{"whole_static_dep"},
|
|
LocalSharedLibs: []string{"shared_dep"},
|
|
},
|
|
},
|
|
{
|
|
name: "cc_binary",
|
|
moduleName: "binary",
|
|
variant: "android_arm64_armv8-a",
|
|
androidMkInfo: cquery.CcAndroidMkInfo{
|
|
LocalStaticLibs: []string{"static_dep"},
|
|
LocalWholeStaticLibs: []string{"whole_static_dep"},
|
|
LocalSharedLibs: []string{"shared_dep"},
|
|
},
|
|
},
|
|
{
|
|
name: "cc_library_headers",
|
|
moduleName: "lib_headers",
|
|
variant: "android_arm64_armv8-a",
|
|
androidMkInfo: cquery.CcAndroidMkInfo{
|
|
LocalStaticLibs: []string{"static_dep"},
|
|
LocalWholeStaticLibs: []string{"whole_static_dep"},
|
|
LocalSharedLibs: []string{"shared_dep"},
|
|
},
|
|
},
|
|
{
|
|
name: "prebuilt lib static",
|
|
moduleName: "lib_prebuilt",
|
|
variant: "android_arm64_armv8-a_static",
|
|
androidMkInfo: cquery.CcAndroidMkInfo{
|
|
LocalStaticLibs: []string{"static_dep"},
|
|
LocalWholeStaticLibs: []string{"whole_static_dep"},
|
|
LocalSharedLibs: []string{"shared_dep"},
|
|
},
|
|
},
|
|
{
|
|
name: "prebuilt lib shared",
|
|
moduleName: "lib_prebuilt",
|
|
variant: "android_arm64_armv8-a_shared",
|
|
androidMkInfo: cquery.CcAndroidMkInfo{
|
|
LocalStaticLibs: []string{"static_dep"},
|
|
LocalWholeStaticLibs: []string{"whole_static_dep"},
|
|
LocalSharedLibs: []string{"shared_dep"},
|
|
},
|
|
},
|
|
}
|
|
|
|
outputBaseDir := "out/bazel"
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
result := android.GroupFixturePreparers(
|
|
prepareForCcTest,
|
|
android.FixtureModifyConfig(func(config android.Config) {
|
|
config.BazelContext = android.MockBazelContext{
|
|
OutputBaseDir: outputBaseDir,
|
|
LabelToCcInfo: map[string]cquery.CcInfo{
|
|
"//:lib": cquery.CcInfo{
|
|
CcAndroidMkInfo: tc.androidMkInfo,
|
|
RootDynamicLibraries: []string{""},
|
|
},
|
|
"//:lib_bp2build_cc_library_static": cquery.CcInfo{
|
|
CcAndroidMkInfo: tc.androidMkInfo,
|
|
RootStaticArchives: []string{""},
|
|
},
|
|
"//:lib_headers": cquery.CcInfo{
|
|
CcAndroidMkInfo: tc.androidMkInfo,
|
|
OutputFiles: []string{""},
|
|
},
|
|
"//:lib_prebuilt": cquery.CcInfo{
|
|
CcAndroidMkInfo: tc.androidMkInfo,
|
|
},
|
|
"//:lib_prebuilt_bp2build_cc_library_static": cquery.CcInfo{
|
|
CcAndroidMkInfo: tc.androidMkInfo,
|
|
},
|
|
},
|
|
LabelToCcBinary: map[string]cquery.CcUnstrippedInfo{
|
|
"//:test__tf_internal": cquery.CcUnstrippedInfo{
|
|
CcAndroidMkInfo: tc.androidMkInfo,
|
|
},
|
|
"//:binary": cquery.CcUnstrippedInfo{
|
|
CcAndroidMkInfo: tc.androidMkInfo,
|
|
},
|
|
},
|
|
}
|
|
}),
|
|
).RunTestWithBp(t, bp)
|
|
ctx := result.TestContext
|
|
|
|
module := ctx.ModuleForTests(tc.moduleName, tc.variant).Module().(*Module)
|
|
entries := android.AndroidMkEntriesForTest(t, ctx, module)[0]
|
|
if !reflect.DeepEqual(module.Properties.AndroidMkStaticLibs, tc.androidMkInfo.LocalStaticLibs) {
|
|
t.Errorf("incorrect static_libs"+
|
|
"\nactual: %v"+
|
|
"\nexpected: %v",
|
|
module.Properties.AndroidMkStaticLibs,
|
|
tc.androidMkInfo.LocalStaticLibs,
|
|
)
|
|
}
|
|
staticDepsDiffer, missingStaticDeps, additionalStaticDeps := android.ListSetDifference(
|
|
entries.EntryMap["LOCAL_STATIC_LIBRARIES"],
|
|
tc.androidMkInfo.LocalStaticLibs,
|
|
)
|
|
if staticDepsDiffer {
|
|
t.Errorf(
|
|
"expected LOCAL_STATIC_LIBRARIES to be %q but was %q; missing: %q; extra %q",
|
|
tc.androidMkInfo.LocalStaticLibs,
|
|
entries.EntryMap["LOCAL_STATIC_LIBRARIES"],
|
|
missingStaticDeps,
|
|
additionalStaticDeps,
|
|
)
|
|
}
|
|
|
|
if !reflect.DeepEqual(module.Properties.AndroidMkWholeStaticLibs, tc.androidMkInfo.LocalWholeStaticLibs) {
|
|
t.Errorf("expected module.Properties.AndroidMkWholeStaticLibs to be %q, but was %q",
|
|
tc.androidMkInfo.LocalWholeStaticLibs,
|
|
module.Properties.AndroidMkWholeStaticLibs,
|
|
)
|
|
}
|
|
wholeStaticDepsDiffer, missingWholeStaticDeps, additionalWholeStaticDeps := android.ListSetDifference(
|
|
entries.EntryMap["LOCAL_WHOLE_STATIC_LIBRARIES"],
|
|
tc.androidMkInfo.LocalWholeStaticLibs,
|
|
)
|
|
if wholeStaticDepsDiffer {
|
|
t.Errorf(
|
|
"expected LOCAL_WHOLE_STATIC_LIBRARIES to be %q but was %q; missing: %q; extra %q",
|
|
tc.androidMkInfo.LocalWholeStaticLibs,
|
|
entries.EntryMap["LOCAL_WHOLE_STATIC_LIBRARIES"],
|
|
missingWholeStaticDeps,
|
|
additionalWholeStaticDeps,
|
|
)
|
|
}
|
|
|
|
if !reflect.DeepEqual(module.Properties.AndroidMkSharedLibs, tc.androidMkInfo.LocalSharedLibs) {
|
|
t.Errorf("incorrect shared_libs"+
|
|
"\nactual: %v"+
|
|
"\nexpected: %v",
|
|
module.Properties.AndroidMkSharedLibs,
|
|
tc.androidMkInfo.LocalSharedLibs,
|
|
)
|
|
}
|
|
sharedDepsDiffer, missingSharedDeps, additionalSharedDeps := android.ListSetDifference(
|
|
entries.EntryMap["LOCAL_SHARED_LIBRARIES"],
|
|
tc.androidMkInfo.LocalSharedLibs,
|
|
)
|
|
if sharedDepsDiffer {
|
|
t.Errorf(
|
|
"expected LOCAL_SHARED_LIBRARIES to be %q but was %q; missing %q; extra %q",
|
|
tc.androidMkInfo.LocalSharedLibs,
|
|
entries.EntryMap["LOCAL_SHARED_LIBRARIES"],
|
|
missingSharedDeps,
|
|
additionalSharedDeps,
|
|
)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
var compilerFlagsTestCases = []struct {
|
|
in string
|
|
out bool
|
|
}{
|
|
{
|
|
in: "a",
|
|
out: false,
|
|
},
|
|
{
|
|
in: "-a",
|
|
out: true,
|
|
},
|
|
{
|
|
in: "-Ipath/to/something",
|
|
out: false,
|
|
},
|
|
{
|
|
in: "-isystempath/to/something",
|
|
out: false,
|
|
},
|
|
{
|
|
in: "--coverage",
|
|
out: false,
|
|
},
|
|
{
|
|
in: "-include a/b",
|
|
out: true,
|
|
},
|
|
{
|
|
in: "-include a/b c/d",
|
|
out: false,
|
|
},
|
|
{
|
|
in: "-DMACRO",
|
|
out: true,
|
|
},
|
|
{
|
|
in: "-DMAC RO",
|
|
out: false,
|
|
},
|
|
{
|
|
in: "-a -b",
|
|
out: false,
|
|
},
|
|
{
|
|
in: "-DMACRO=definition",
|
|
out: true,
|
|
},
|
|
{
|
|
in: "-DMACRO=defi nition",
|
|
out: true, // TODO(jiyong): this should be false
|
|
},
|
|
{
|
|
in: "-DMACRO(x)=x + 1",
|
|
out: true,
|
|
},
|
|
{
|
|
in: "-DMACRO=\"defi nition\"",
|
|
out: true,
|
|
},
|
|
}
|
|
|
|
type mockContext struct {
|
|
BaseModuleContext
|
|
result bool
|
|
}
|
|
|
|
func (ctx *mockContext) PropertyErrorf(property, format string, args ...interface{}) {
|
|
// CheckBadCompilerFlags calls this function when the flag should be rejected
|
|
ctx.result = false
|
|
}
|
|
|
|
func TestCompilerFlags(t *testing.T) {
|
|
t.Parallel()
|
|
for _, testCase := range compilerFlagsTestCases {
|
|
ctx := &mockContext{result: true}
|
|
CheckBadCompilerFlags(ctx, "", []string{testCase.in})
|
|
if ctx.result != testCase.out {
|
|
t.Errorf("incorrect output:")
|
|
t.Errorf(" input: %#v", testCase.in)
|
|
t.Errorf(" expected: %#v", testCase.out)
|
|
t.Errorf(" got: %#v", ctx.result)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestRecovery(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_library_shared {
|
|
name: "librecovery",
|
|
recovery: true,
|
|
}
|
|
cc_library_shared {
|
|
name: "librecovery32",
|
|
recovery: true,
|
|
compile_multilib:"32",
|
|
}
|
|
cc_library_shared {
|
|
name: "libHalInRecovery",
|
|
recovery_available: true,
|
|
vendor: true,
|
|
}
|
|
`)
|
|
|
|
variants := ctx.ModuleVariantsForTests("librecovery")
|
|
const arm64 = "android_recovery_arm64_armv8-a_shared"
|
|
if len(variants) != 1 || !android.InList(arm64, variants) {
|
|
t.Errorf("variants of librecovery must be \"%s\" only, but was %#v", arm64, variants)
|
|
}
|
|
|
|
variants = ctx.ModuleVariantsForTests("librecovery32")
|
|
if android.InList(arm64, variants) {
|
|
t.Errorf("multilib was set to 32 for librecovery32, but its variants has %s.", arm64)
|
|
}
|
|
|
|
recoveryModule := ctx.ModuleForTests("libHalInRecovery", recoveryVariant).Module().(*Module)
|
|
if !recoveryModule.Platform() {
|
|
t.Errorf("recovery variant of libHalInRecovery must not specific to device, soc, or product")
|
|
}
|
|
}
|
|
|
|
func TestDataLibsPrebuiltSharedTestLibrary(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_prebuilt_test_library_shared {
|
|
name: "test_lib",
|
|
relative_install_path: "foo/bar/baz",
|
|
srcs: ["srcpath/dontusethispath/baz.so"],
|
|
}
|
|
|
|
cc_test {
|
|
name: "main_test",
|
|
data_libs: ["test_lib"],
|
|
gtest: false,
|
|
}
|
|
`
|
|
|
|
config := TestConfig(t.TempDir(), android.Android, nil, bp, nil)
|
|
config.TestProductVariables.DeviceVndkVersion = StringPtr("current")
|
|
config.TestProductVariables.Platform_vndk_version = StringPtr("29")
|
|
config.TestProductVariables.VndkUseCoreVariant = BoolPtr(true)
|
|
|
|
ctx := testCcWithConfig(t, config)
|
|
module := ctx.ModuleForTests("main_test", "android_arm_armv7-a-neon").Module()
|
|
testBinary := module.(*Module).linker.(*testBinary)
|
|
outputFiles, err := module.(android.OutputFileProducer).OutputFiles("")
|
|
if err != nil {
|
|
t.Fatalf("Expected cc_test to produce output files, error: %s", err)
|
|
}
|
|
if len(outputFiles) != 1 {
|
|
t.Errorf("expected exactly one output file. output files: [%s]", outputFiles)
|
|
}
|
|
if len(testBinary.dataPaths()) != 1 {
|
|
t.Errorf("expected exactly one test data file. test data files: [%s]", testBinary.dataPaths())
|
|
}
|
|
|
|
outputPath := outputFiles[0].String()
|
|
|
|
if !strings.HasSuffix(outputPath, "/main_test") {
|
|
t.Errorf("expected test output file to be 'main_test', but was '%s'", outputPath)
|
|
}
|
|
entries := android.AndroidMkEntriesForTest(t, ctx, module)[0]
|
|
if !strings.HasSuffix(entries.EntryMap["LOCAL_TEST_DATA"][0], ":test_lib.so:foo/bar/baz") {
|
|
t.Errorf("expected LOCAL_TEST_DATA to end with `:test_lib.so:foo/bar/baz`,"+
|
|
" but was '%s'", entries.EntryMap["LOCAL_TEST_DATA"][0])
|
|
}
|
|
}
|
|
|
|
func TestVersionedStubs(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_library_shared {
|
|
name: "libFoo",
|
|
srcs: ["foo.c"],
|
|
stubs: {
|
|
symbol_file: "foo.map.txt",
|
|
versions: ["1", "2", "3"],
|
|
},
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libBar",
|
|
srcs: ["bar.c"],
|
|
shared_libs: ["libFoo#1"],
|
|
}`)
|
|
|
|
variants := ctx.ModuleVariantsForTests("libFoo")
|
|
expectedVariants := []string{
|
|
"android_arm64_armv8-a_shared",
|
|
"android_arm64_armv8-a_shared_1",
|
|
"android_arm64_armv8-a_shared_2",
|
|
"android_arm64_armv8-a_shared_3",
|
|
"android_arm64_armv8-a_shared_current",
|
|
"android_arm_armv7-a-neon_shared",
|
|
"android_arm_armv7-a-neon_shared_1",
|
|
"android_arm_armv7-a-neon_shared_2",
|
|
"android_arm_armv7-a-neon_shared_3",
|
|
"android_arm_armv7-a-neon_shared_current",
|
|
}
|
|
variantsMismatch := false
|
|
if len(variants) != len(expectedVariants) {
|
|
variantsMismatch = true
|
|
} else {
|
|
for _, v := range expectedVariants {
|
|
if !inList(v, variants) {
|
|
variantsMismatch = false
|
|
}
|
|
}
|
|
}
|
|
if variantsMismatch {
|
|
t.Errorf("variants of libFoo expected:\n")
|
|
for _, v := range expectedVariants {
|
|
t.Errorf("%q\n", v)
|
|
}
|
|
t.Errorf(", but got:\n")
|
|
for _, v := range variants {
|
|
t.Errorf("%q\n", v)
|
|
}
|
|
}
|
|
|
|
libBarLinkRule := ctx.ModuleForTests("libBar", "android_arm64_armv8-a_shared").Rule("ld")
|
|
libFlags := libBarLinkRule.Args["libFlags"]
|
|
libFoo1StubPath := "libFoo/android_arm64_armv8-a_shared_1/libFoo.so"
|
|
if !strings.Contains(libFlags, libFoo1StubPath) {
|
|
t.Errorf("%q is not found in %q", libFoo1StubPath, libFlags)
|
|
}
|
|
|
|
libBarCompileRule := ctx.ModuleForTests("libBar", "android_arm64_armv8-a_shared").Rule("cc")
|
|
cFlags := libBarCompileRule.Args["cFlags"]
|
|
libFoo1VersioningMacro := "-D__LIBFOO_API__=1"
|
|
if !strings.Contains(cFlags, libFoo1VersioningMacro) {
|
|
t.Errorf("%q is not found in %q", libFoo1VersioningMacro, cFlags)
|
|
}
|
|
}
|
|
|
|
func TestStubsForLibraryInMultipleApexes(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_library_shared {
|
|
name: "libFoo",
|
|
srcs: ["foo.c"],
|
|
stubs: {
|
|
symbol_file: "foo.map.txt",
|
|
versions: ["current"],
|
|
},
|
|
apex_available: ["bar", "a1"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libBar",
|
|
srcs: ["bar.c"],
|
|
shared_libs: ["libFoo"],
|
|
apex_available: ["a1"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libA1",
|
|
srcs: ["a1.c"],
|
|
shared_libs: ["libFoo"],
|
|
apex_available: ["a1"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libBarA1",
|
|
srcs: ["bara1.c"],
|
|
shared_libs: ["libFoo"],
|
|
apex_available: ["bar", "a1"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libAnyApex",
|
|
srcs: ["anyApex.c"],
|
|
shared_libs: ["libFoo"],
|
|
apex_available: ["//apex_available:anyapex"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libBaz",
|
|
srcs: ["baz.c"],
|
|
shared_libs: ["libFoo"],
|
|
apex_available: ["baz"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libQux",
|
|
srcs: ["qux.c"],
|
|
shared_libs: ["libFoo"],
|
|
apex_available: ["qux", "bar"],
|
|
}`)
|
|
|
|
variants := ctx.ModuleVariantsForTests("libFoo")
|
|
expectedVariants := []string{
|
|
"android_arm64_armv8-a_shared",
|
|
"android_arm64_armv8-a_shared_current",
|
|
"android_arm_armv7-a-neon_shared",
|
|
"android_arm_armv7-a-neon_shared_current",
|
|
}
|
|
variantsMismatch := false
|
|
if len(variants) != len(expectedVariants) {
|
|
variantsMismatch = true
|
|
} else {
|
|
for _, v := range expectedVariants {
|
|
if !inList(v, variants) {
|
|
variantsMismatch = false
|
|
}
|
|
}
|
|
}
|
|
if variantsMismatch {
|
|
t.Errorf("variants of libFoo expected:\n")
|
|
for _, v := range expectedVariants {
|
|
t.Errorf("%q\n", v)
|
|
}
|
|
t.Errorf(", but got:\n")
|
|
for _, v := range variants {
|
|
t.Errorf("%q\n", v)
|
|
}
|
|
}
|
|
|
|
linkAgainstFoo := []string{"libBarA1"}
|
|
linkAgainstFooStubs := []string{"libBar", "libA1", "libBaz", "libQux", "libAnyApex"}
|
|
|
|
libFooPath := "libFoo/android_arm64_armv8-a_shared/libFoo.so"
|
|
for _, lib := range linkAgainstFoo {
|
|
libLinkRule := ctx.ModuleForTests(lib, "android_arm64_armv8-a_shared").Rule("ld")
|
|
libFlags := libLinkRule.Args["libFlags"]
|
|
if !strings.Contains(libFlags, libFooPath) {
|
|
t.Errorf("%q: %q is not found in %q", lib, libFooPath, libFlags)
|
|
}
|
|
}
|
|
|
|
libFooStubPath := "libFoo/android_arm64_armv8-a_shared_current/libFoo.so"
|
|
for _, lib := range linkAgainstFooStubs {
|
|
libLinkRule := ctx.ModuleForTests(lib, "android_arm64_armv8-a_shared").Rule("ld")
|
|
libFlags := libLinkRule.Args["libFlags"]
|
|
if !strings.Contains(libFlags, libFooStubPath) {
|
|
t.Errorf("%q: %q is not found in %q", lib, libFooStubPath, libFlags)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestMixedBuildUsesStubs(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_library_shared {
|
|
name: "libFoo",
|
|
bazel_module: { label: "//:libFoo" },
|
|
srcs: ["foo.c"],
|
|
stubs: {
|
|
symbol_file: "foo.map.txt",
|
|
versions: ["current"],
|
|
},
|
|
apex_available: ["bar", "a1"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libBar",
|
|
srcs: ["bar.c"],
|
|
shared_libs: ["libFoo"],
|
|
apex_available: ["a1"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libA1",
|
|
srcs: ["a1.c"],
|
|
shared_libs: ["libFoo"],
|
|
apex_available: ["a1"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libBarA1",
|
|
srcs: ["bara1.c"],
|
|
shared_libs: ["libFoo"],
|
|
apex_available: ["bar", "a1"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libAnyApex",
|
|
srcs: ["anyApex.c"],
|
|
shared_libs: ["libFoo"],
|
|
apex_available: ["//apex_available:anyapex"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libBaz",
|
|
srcs: ["baz.c"],
|
|
shared_libs: ["libFoo"],
|
|
apex_available: ["baz"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libQux",
|
|
srcs: ["qux.c"],
|
|
shared_libs: ["libFoo"],
|
|
apex_available: ["qux", "bar"],
|
|
}`
|
|
|
|
result := android.GroupFixturePreparers(
|
|
prepareForCcTest,
|
|
android.FixtureModifyConfig(func(config android.Config) {
|
|
config.BazelContext = android.MockBazelContext{
|
|
OutputBaseDir: "out/bazel",
|
|
LabelToCcInfo: map[string]cquery.CcInfo{
|
|
"//:libFoo": {
|
|
RootDynamicLibraries: []string{"libFoo.so"},
|
|
},
|
|
"//:libFoo_stub_libs-current": {
|
|
RootDynamicLibraries: []string{"libFoo_stub_libs-current.so"},
|
|
},
|
|
},
|
|
}
|
|
}),
|
|
).RunTestWithBp(t, bp)
|
|
ctx := result.TestContext
|
|
|
|
variants := ctx.ModuleVariantsForTests("libFoo")
|
|
expectedVariants := []string{
|
|
"android_arm64_armv8-a_shared",
|
|
"android_arm64_armv8-a_shared_current",
|
|
"android_arm_armv7-a-neon_shared",
|
|
"android_arm_armv7-a-neon_shared_current",
|
|
}
|
|
variantsMismatch := false
|
|
if len(variants) != len(expectedVariants) {
|
|
variantsMismatch = true
|
|
} else {
|
|
for _, v := range expectedVariants {
|
|
if !inList(v, variants) {
|
|
variantsMismatch = false
|
|
}
|
|
}
|
|
}
|
|
if variantsMismatch {
|
|
t.Errorf("variants of libFoo expected:\n")
|
|
for _, v := range expectedVariants {
|
|
t.Errorf("%q\n", v)
|
|
}
|
|
t.Errorf(", but got:\n")
|
|
for _, v := range variants {
|
|
t.Errorf("%q\n", v)
|
|
}
|
|
}
|
|
|
|
linkAgainstFoo := []string{"libBarA1"}
|
|
linkAgainstFooStubs := []string{"libBar", "libA1", "libBaz", "libQux", "libAnyApex"}
|
|
|
|
libFooPath := "out/bazel/execroot/__main__/libFoo.so"
|
|
for _, lib := range linkAgainstFoo {
|
|
libLinkRule := ctx.ModuleForTests(lib, "android_arm64_armv8-a_shared").Rule("ld")
|
|
libFlags := libLinkRule.Args["libFlags"]
|
|
if !strings.Contains(libFlags, libFooPath) {
|
|
t.Errorf("%q: %q is not found in %q", lib, libFooPath, libFlags)
|
|
}
|
|
}
|
|
|
|
libFooStubPath := "out/bazel/execroot/__main__/libFoo_stub_libs-current.so"
|
|
for _, lib := range linkAgainstFooStubs {
|
|
libLinkRule := ctx.ModuleForTests(lib, "android_arm64_armv8-a_shared").Rule("ld")
|
|
libFlags := libLinkRule.Args["libFlags"]
|
|
if !strings.Contains(libFlags, libFooStubPath) {
|
|
t.Errorf("%q: %q is not found in %q", lib, libFooStubPath, libFlags)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestVersioningMacro(t *testing.T) {
|
|
t.Parallel()
|
|
for _, tc := range []struct{ moduleName, expected string }{
|
|
{"libc", "__LIBC_API__"},
|
|
{"libfoo", "__LIBFOO_API__"},
|
|
{"libfoo@1", "__LIBFOO_1_API__"},
|
|
{"libfoo-v1", "__LIBFOO_V1_API__"},
|
|
{"libfoo.v1", "__LIBFOO_V1_API__"},
|
|
} {
|
|
checkEquals(t, tc.moduleName, tc.expected, versioningMacroName(tc.moduleName))
|
|
}
|
|
}
|
|
|
|
func pathsToBase(paths android.Paths) []string {
|
|
var ret []string
|
|
for _, p := range paths {
|
|
ret = append(ret, p.Base())
|
|
}
|
|
return ret
|
|
}
|
|
|
|
func TestStaticLibArchiveArgs(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_library_static {
|
|
name: "foo",
|
|
srcs: ["foo.c"],
|
|
}
|
|
|
|
cc_library_static {
|
|
name: "bar",
|
|
srcs: ["bar.c"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "qux",
|
|
srcs: ["qux.c"],
|
|
}
|
|
|
|
cc_library_static {
|
|
name: "baz",
|
|
srcs: ["baz.c"],
|
|
static_libs: ["foo"],
|
|
shared_libs: ["qux"],
|
|
whole_static_libs: ["bar"],
|
|
}`)
|
|
|
|
variant := "android_arm64_armv8-a_static"
|
|
arRule := ctx.ModuleForTests("baz", variant).Rule("ar")
|
|
|
|
// For static libraries, the object files of a whole static dep are included in the archive
|
|
// directly
|
|
if g, w := pathsToBase(arRule.Inputs), []string{"bar.o", "baz.o"}; !reflect.DeepEqual(w, g) {
|
|
t.Errorf("Expected input objects %q, got %q", w, g)
|
|
}
|
|
|
|
// non whole static dependencies are not linked into the archive
|
|
if len(arRule.Implicits) > 0 {
|
|
t.Errorf("Expected 0 additional deps, got %q", arRule.Implicits)
|
|
}
|
|
}
|
|
|
|
func TestSharedLibLinkingArgs(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_library_static {
|
|
name: "foo",
|
|
srcs: ["foo.c"],
|
|
}
|
|
|
|
cc_library_static {
|
|
name: "bar",
|
|
srcs: ["bar.c"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "qux",
|
|
srcs: ["qux.c"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "baz",
|
|
srcs: ["baz.c"],
|
|
static_libs: ["foo"],
|
|
shared_libs: ["qux"],
|
|
whole_static_libs: ["bar"],
|
|
}`)
|
|
|
|
variant := "android_arm64_armv8-a_shared"
|
|
linkRule := ctx.ModuleForTests("baz", variant).Rule("ld")
|
|
libFlags := linkRule.Args["libFlags"]
|
|
// When dynamically linking, we expect static dependencies to be found on the command line
|
|
if expected := "foo.a"; !strings.Contains(libFlags, expected) {
|
|
t.Errorf("Static lib %q was not found in %q", expected, libFlags)
|
|
}
|
|
// When dynamically linking, we expect whole static dependencies to be found on the command line
|
|
if expected := "bar.a"; !strings.Contains(libFlags, expected) {
|
|
t.Errorf("Static lib %q was not found in %q", expected, libFlags)
|
|
}
|
|
|
|
// When dynamically linking, we expect shared dependencies to be found on the command line
|
|
if expected := "qux.so"; !strings.Contains(libFlags, expected) {
|
|
t.Errorf("Shared lib %q was not found in %q", expected, libFlags)
|
|
}
|
|
|
|
// We should only have the objects from the shared library srcs, not the whole static dependencies
|
|
if g, w := pathsToBase(linkRule.Inputs), []string{"baz.o"}; !reflect.DeepEqual(w, g) {
|
|
t.Errorf("Expected input objects %q, got %q", w, g)
|
|
}
|
|
}
|
|
|
|
func TestStaticExecutable(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_binary {
|
|
name: "static_test",
|
|
srcs: ["foo.c", "baz.o"],
|
|
static_executable: true,
|
|
}`)
|
|
|
|
variant := "android_arm64_armv8-a"
|
|
binModuleRule := ctx.ModuleForTests("static_test", variant).Rule("ld")
|
|
libFlags := binModuleRule.Args["libFlags"]
|
|
systemStaticLibs := []string{"libc.a", "libm.a"}
|
|
for _, lib := range systemStaticLibs {
|
|
if !strings.Contains(libFlags, lib) {
|
|
t.Errorf("Static lib %q was not found in %q", lib, libFlags)
|
|
}
|
|
}
|
|
systemSharedLibs := []string{"libc.so", "libm.so", "libdl.so"}
|
|
for _, lib := range systemSharedLibs {
|
|
if strings.Contains(libFlags, lib) {
|
|
t.Errorf("Shared lib %q was found in %q", lib, libFlags)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestStaticDepsOrderWithStubs(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_binary {
|
|
name: "mybin",
|
|
srcs: ["foo.c"],
|
|
static_libs: ["libfooC", "libfooB"],
|
|
static_executable: true,
|
|
stl: "none",
|
|
}
|
|
|
|
cc_library {
|
|
name: "libfooB",
|
|
srcs: ["foo.c"],
|
|
shared_libs: ["libfooC"],
|
|
stl: "none",
|
|
}
|
|
|
|
cc_library {
|
|
name: "libfooC",
|
|
srcs: ["foo.c"],
|
|
stl: "none",
|
|
stubs: {
|
|
versions: ["1"],
|
|
},
|
|
}`)
|
|
|
|
mybin := ctx.ModuleForTests("mybin", "android_arm64_armv8-a").Rule("ld")
|
|
actual := mybin.Implicits[:2]
|
|
expected := GetOutputPaths(ctx, "android_arm64_armv8-a_static", []string{"libfooB", "libfooC"})
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Errorf("staticDeps orderings were not propagated correctly"+
|
|
"\nactual: %v"+
|
|
"\nexpected: %v",
|
|
actual,
|
|
expected,
|
|
)
|
|
}
|
|
}
|
|
|
|
func TestErrorsIfAModuleDependsOnDisabled(t *testing.T) {
|
|
t.Parallel()
|
|
testCcError(t, `module "libA" .* depends on disabled module "libB"`, `
|
|
cc_library {
|
|
name: "libA",
|
|
srcs: ["foo.c"],
|
|
shared_libs: ["libB"],
|
|
stl: "none",
|
|
}
|
|
|
|
cc_library {
|
|
name: "libB",
|
|
srcs: ["foo.c"],
|
|
enabled: false,
|
|
stl: "none",
|
|
}
|
|
`)
|
|
}
|
|
|
|
func VerifyAFLFuzzTargetVariant(t *testing.T, variant string) {
|
|
bp := `
|
|
cc_fuzz {
|
|
name: "test_afl_fuzz_target",
|
|
srcs: ["foo.c"],
|
|
host_supported: true,
|
|
static_libs: [
|
|
"afl_fuzz_static_lib",
|
|
],
|
|
shared_libs: [
|
|
"afl_fuzz_shared_lib",
|
|
],
|
|
fuzzing_frameworks: {
|
|
afl: true,
|
|
libfuzzer: false,
|
|
},
|
|
}
|
|
cc_library {
|
|
name: "afl_fuzz_static_lib",
|
|
host_supported: true,
|
|
srcs: ["static_file.c"],
|
|
}
|
|
cc_library {
|
|
name: "libfuzzer_only_static_lib",
|
|
host_supported: true,
|
|
srcs: ["static_file.c"],
|
|
}
|
|
cc_library {
|
|
name: "afl_fuzz_shared_lib",
|
|
host_supported: true,
|
|
srcs: ["shared_file.c"],
|
|
static_libs: [
|
|
"second_static_lib",
|
|
],
|
|
}
|
|
cc_library_headers {
|
|
name: "libafl_headers",
|
|
vendor_available: true,
|
|
host_supported: true,
|
|
export_include_dirs: [
|
|
"include",
|
|
"instrumentation",
|
|
],
|
|
}
|
|
cc_object {
|
|
name: "afl-compiler-rt",
|
|
vendor_available: true,
|
|
host_supported: true,
|
|
cflags: [
|
|
"-fPIC",
|
|
],
|
|
srcs: [
|
|
"instrumentation/afl-compiler-rt.o.c",
|
|
],
|
|
}
|
|
cc_library {
|
|
name: "second_static_lib",
|
|
host_supported: true,
|
|
srcs: ["second_file.c"],
|
|
}
|
|
cc_object {
|
|
name: "aflpp_driver",
|
|
host_supported: true,
|
|
srcs: [
|
|
"aflpp_driver.c",
|
|
],
|
|
}`
|
|
|
|
testEnv := map[string]string{
|
|
"FUZZ_FRAMEWORK": "AFL",
|
|
}
|
|
|
|
ctx := android.GroupFixturePreparers(prepareForCcTest, android.FixtureMergeEnv(testEnv)).RunTestWithBp(t, bp)
|
|
|
|
checkPcGuardFlag := func(
|
|
modName string, variantName string, shouldHave bool) {
|
|
cc := ctx.ModuleForTests(modName, variantName).Rule("cc")
|
|
|
|
cFlags, ok := cc.Args["cFlags"]
|
|
if !ok {
|
|
t.Errorf("Could not find cFlags for module %s and variant %s",
|
|
modName, variantName)
|
|
}
|
|
|
|
if strings.Contains(
|
|
cFlags, "-fsanitize-coverage=trace-pc-guard") != shouldHave {
|
|
t.Errorf("Flag was found: %t. Expected to find flag: %t. "+
|
|
"Test failed for module %s and variant %s",
|
|
!shouldHave, shouldHave, modName, variantName)
|
|
}
|
|
}
|
|
|
|
moduleName := "test_afl_fuzz_target"
|
|
checkPcGuardFlag(moduleName, variant+"_fuzzer", true)
|
|
|
|
moduleName = "afl_fuzz_static_lib"
|
|
checkPcGuardFlag(moduleName, variant+"_static", false)
|
|
checkPcGuardFlag(moduleName, variant+"_static_fuzzer", true)
|
|
|
|
moduleName = "second_static_lib"
|
|
checkPcGuardFlag(moduleName, variant+"_static", false)
|
|
checkPcGuardFlag(moduleName, variant+"_static_fuzzer", true)
|
|
|
|
ctx.ModuleForTests("afl_fuzz_shared_lib",
|
|
"android_arm64_armv8-a_shared").Rule("cc")
|
|
ctx.ModuleForTests("afl_fuzz_shared_lib",
|
|
"android_arm64_armv8-a_shared_fuzzer").Rule("cc")
|
|
}
|
|
|
|
func TestAFLFuzzTargetForDevice(t *testing.T) {
|
|
t.Parallel()
|
|
VerifyAFLFuzzTargetVariant(t, "android_arm64_armv8-a")
|
|
}
|
|
|
|
func TestAFLFuzzTargetForLinuxHost(t *testing.T) {
|
|
t.Parallel()
|
|
if runtime.GOOS != "linux" {
|
|
t.Skip("requires linux")
|
|
}
|
|
|
|
VerifyAFLFuzzTargetVariant(t, "linux_glibc_x86_64")
|
|
}
|
|
|
|
// Simple smoke test for the cc_fuzz target that ensures the rule compiles
|
|
// correctly.
|
|
func TestFuzzTarget(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_fuzz {
|
|
name: "fuzz_smoke_test",
|
|
srcs: ["foo.c"],
|
|
}`)
|
|
|
|
variant := "android_arm64_armv8-a_fuzzer"
|
|
ctx.ModuleForTests("fuzz_smoke_test", variant).Rule("cc")
|
|
}
|
|
|
|
func assertString(t *testing.T, got, expected string) {
|
|
t.Helper()
|
|
if got != expected {
|
|
t.Errorf("expected %q got %q", expected, got)
|
|
}
|
|
}
|
|
|
|
func assertArrayString(t *testing.T, got, expected []string) {
|
|
t.Helper()
|
|
if len(got) != len(expected) {
|
|
t.Errorf("expected %d (%q) got (%d) %q", len(expected), expected, len(got), got)
|
|
return
|
|
}
|
|
for i := range got {
|
|
if got[i] != expected[i] {
|
|
t.Errorf("expected %d-th %q (%q) got %q (%q)",
|
|
i, expected[i], expected, got[i], got)
|
|
return
|
|
}
|
|
}
|
|
}
|
|
|
|
func assertMapKeys(t *testing.T, m map[string]string, expected []string) {
|
|
t.Helper()
|
|
assertArrayString(t, android.SortedKeys(m), expected)
|
|
}
|
|
|
|
func TestDefaults(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_defaults {
|
|
name: "defaults",
|
|
srcs: ["foo.c"],
|
|
static: {
|
|
srcs: ["bar.c"],
|
|
},
|
|
shared: {
|
|
srcs: ["baz.c"],
|
|
},
|
|
bazel_module: {
|
|
bp2build_available: true,
|
|
},
|
|
}
|
|
|
|
cc_library_static {
|
|
name: "libstatic",
|
|
defaults: ["defaults"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libshared",
|
|
defaults: ["defaults"],
|
|
}
|
|
|
|
cc_library {
|
|
name: "libboth",
|
|
defaults: ["defaults"],
|
|
}
|
|
|
|
cc_binary {
|
|
name: "binary",
|
|
defaults: ["defaults"],
|
|
}`)
|
|
|
|
shared := ctx.ModuleForTests("libshared", "android_arm64_armv8-a_shared").Rule("ld")
|
|
if g, w := pathsToBase(shared.Inputs), []string{"foo.o", "baz.o"}; !reflect.DeepEqual(w, g) {
|
|
t.Errorf("libshared ld rule wanted %q, got %q", w, g)
|
|
}
|
|
bothShared := ctx.ModuleForTests("libboth", "android_arm64_armv8-a_shared").Rule("ld")
|
|
if g, w := pathsToBase(bothShared.Inputs), []string{"foo.o", "baz.o"}; !reflect.DeepEqual(w, g) {
|
|
t.Errorf("libboth ld rule wanted %q, got %q", w, g)
|
|
}
|
|
binary := ctx.ModuleForTests("binary", "android_arm64_armv8-a").Rule("ld")
|
|
if g, w := pathsToBase(binary.Inputs), []string{"foo.o"}; !reflect.DeepEqual(w, g) {
|
|
t.Errorf("binary ld rule wanted %q, got %q", w, g)
|
|
}
|
|
|
|
static := ctx.ModuleForTests("libstatic", "android_arm64_armv8-a_static").Rule("ar")
|
|
if g, w := pathsToBase(static.Inputs), []string{"foo.o", "bar.o"}; !reflect.DeepEqual(w, g) {
|
|
t.Errorf("libstatic ar rule wanted %q, got %q", w, g)
|
|
}
|
|
bothStatic := ctx.ModuleForTests("libboth", "android_arm64_armv8-a_static").Rule("ar")
|
|
if g, w := pathsToBase(bothStatic.Inputs), []string{"foo.o", "bar.o"}; !reflect.DeepEqual(w, g) {
|
|
t.Errorf("libboth ar rule wanted %q, got %q", w, g)
|
|
}
|
|
}
|
|
|
|
func TestProductVariableDefaults(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_defaults {
|
|
name: "libfoo_defaults",
|
|
srcs: ["foo.c"],
|
|
cppflags: ["-DFOO"],
|
|
product_variables: {
|
|
debuggable: {
|
|
cppflags: ["-DBAR"],
|
|
},
|
|
},
|
|
}
|
|
|
|
cc_library {
|
|
name: "libfoo",
|
|
defaults: ["libfoo_defaults"],
|
|
}
|
|
`
|
|
|
|
result := android.GroupFixturePreparers(
|
|
prepareForCcTest,
|
|
android.PrepareForTestWithVariables,
|
|
|
|
android.FixtureModifyProductVariables(func(variables android.FixtureProductVariables) {
|
|
variables.Debuggable = BoolPtr(true)
|
|
}),
|
|
).RunTestWithBp(t, bp)
|
|
|
|
libfoo := result.Module("libfoo", "android_arm64_armv8-a_static").(*Module)
|
|
android.AssertStringListContains(t, "cppflags", libfoo.flags.Local.CppFlags, "-DBAR")
|
|
}
|
|
|
|
func TestEmptyWholeStaticLibsAllowMissingDependencies(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_library_static {
|
|
name: "libfoo",
|
|
srcs: ["foo.c"],
|
|
whole_static_libs: ["libbar"],
|
|
}
|
|
|
|
cc_library_static {
|
|
name: "libbar",
|
|
whole_static_libs: ["libmissing"],
|
|
}
|
|
`
|
|
|
|
result := android.GroupFixturePreparers(
|
|
prepareForCcTest,
|
|
android.PrepareForTestWithAllowMissingDependencies,
|
|
).RunTestWithBp(t, bp)
|
|
|
|
libbar := result.ModuleForTests("libbar", "android_arm64_armv8-a_static").Output("libbar.a")
|
|
android.AssertDeepEquals(t, "libbar rule", android.ErrorRule, libbar.Rule)
|
|
|
|
android.AssertStringDoesContain(t, "libbar error", libbar.Args["error"], "missing dependencies: libmissing")
|
|
|
|
libfoo := result.ModuleForTests("libfoo", "android_arm64_armv8-a_static").Output("libfoo.a")
|
|
android.AssertStringListContains(t, "libfoo.a dependencies", libfoo.Inputs.Strings(), libbar.Output.String())
|
|
}
|
|
|
|
func TestInstallSharedLibs(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_binary {
|
|
name: "bin",
|
|
host_supported: true,
|
|
shared_libs: ["libshared"],
|
|
runtime_libs: ["libruntime"],
|
|
srcs: [":gen"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libshared",
|
|
host_supported: true,
|
|
shared_libs: ["libtransitive"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libtransitive",
|
|
host_supported: true,
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libruntime",
|
|
host_supported: true,
|
|
}
|
|
|
|
cc_binary_host {
|
|
name: "tool",
|
|
srcs: ["foo.cpp"],
|
|
}
|
|
|
|
genrule {
|
|
name: "gen",
|
|
tools: ["tool"],
|
|
out: ["gen.cpp"],
|
|
cmd: "$(location tool) $(out)",
|
|
}
|
|
`
|
|
|
|
config := TestConfig(t.TempDir(), android.Android, nil, bp, nil)
|
|
ctx := testCcWithConfig(t, config)
|
|
|
|
hostBin := ctx.ModuleForTests("bin", config.BuildOSTarget.String()).Description("install")
|
|
hostShared := ctx.ModuleForTests("libshared", config.BuildOSTarget.String()+"_shared").Description("install")
|
|
hostRuntime := ctx.ModuleForTests("libruntime", config.BuildOSTarget.String()+"_shared").Description("install")
|
|
hostTransitive := ctx.ModuleForTests("libtransitive", config.BuildOSTarget.String()+"_shared").Description("install")
|
|
hostTool := ctx.ModuleForTests("tool", config.BuildOSTarget.String()).Description("install")
|
|
|
|
if g, w := hostBin.Implicits.Strings(), hostShared.Output.String(); !android.InList(w, g) {
|
|
t.Errorf("expected host bin dependency %q, got %q", w, g)
|
|
}
|
|
|
|
if g, w := hostBin.Implicits.Strings(), hostTransitive.Output.String(); !android.InList(w, g) {
|
|
t.Errorf("expected host bin dependency %q, got %q", w, g)
|
|
}
|
|
|
|
if g, w := hostShared.Implicits.Strings(), hostTransitive.Output.String(); !android.InList(w, g) {
|
|
t.Errorf("expected host bin dependency %q, got %q", w, g)
|
|
}
|
|
|
|
if g, w := hostBin.Implicits.Strings(), hostRuntime.Output.String(); !android.InList(w, g) {
|
|
t.Errorf("expected host bin dependency %q, got %q", w, g)
|
|
}
|
|
|
|
if g, w := hostBin.Implicits.Strings(), hostTool.Output.String(); android.InList(w, g) {
|
|
t.Errorf("expected no host bin dependency %q, got %q", w, g)
|
|
}
|
|
|
|
deviceBin := ctx.ModuleForTests("bin", "android_arm64_armv8-a").Description("install")
|
|
deviceShared := ctx.ModuleForTests("libshared", "android_arm64_armv8-a_shared").Description("install")
|
|
deviceTransitive := ctx.ModuleForTests("libtransitive", "android_arm64_armv8-a_shared").Description("install")
|
|
deviceRuntime := ctx.ModuleForTests("libruntime", "android_arm64_armv8-a_shared").Description("install")
|
|
|
|
if g, w := deviceBin.OrderOnly.Strings(), deviceShared.Output.String(); !android.InList(w, g) {
|
|
t.Errorf("expected device bin dependency %q, got %q", w, g)
|
|
}
|
|
|
|
if g, w := deviceBin.OrderOnly.Strings(), deviceTransitive.Output.String(); !android.InList(w, g) {
|
|
t.Errorf("expected device bin dependency %q, got %q", w, g)
|
|
}
|
|
|
|
if g, w := deviceShared.OrderOnly.Strings(), deviceTransitive.Output.String(); !android.InList(w, g) {
|
|
t.Errorf("expected device bin dependency %q, got %q", w, g)
|
|
}
|
|
|
|
if g, w := deviceBin.OrderOnly.Strings(), deviceRuntime.Output.String(); !android.InList(w, g) {
|
|
t.Errorf("expected device bin dependency %q, got %q", w, g)
|
|
}
|
|
|
|
if g, w := deviceBin.OrderOnly.Strings(), hostTool.Output.String(); android.InList(w, g) {
|
|
t.Errorf("expected no device bin dependency %q, got %q", w, g)
|
|
}
|
|
|
|
}
|
|
|
|
func TestStubsLibReexportsHeaders(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_library_shared {
|
|
name: "libclient",
|
|
srcs: ["foo.c"],
|
|
shared_libs: ["libfoo#1"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libfoo",
|
|
srcs: ["foo.c"],
|
|
shared_libs: ["libbar"],
|
|
export_shared_lib_headers: ["libbar"],
|
|
stubs: {
|
|
symbol_file: "foo.map.txt",
|
|
versions: ["1", "2", "3"],
|
|
},
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libbar",
|
|
export_include_dirs: ["include/libbar"],
|
|
srcs: ["foo.c"],
|
|
}`)
|
|
|
|
cFlags := ctx.ModuleForTests("libclient", "android_arm64_armv8-a_shared").Rule("cc").Args["cFlags"]
|
|
|
|
if !strings.Contains(cFlags, "-Iinclude/libbar") {
|
|
t.Errorf("expected %q in cflags, got %q", "-Iinclude/libbar", cFlags)
|
|
}
|
|
}
|
|
|
|
func TestAidlLibraryWithHeaders(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := android.GroupFixturePreparers(
|
|
prepareForCcTest,
|
|
aidl_library.PrepareForTestWithAidlLibrary,
|
|
android.MockFS{
|
|
"package_bar/Android.bp": []byte(`
|
|
aidl_library {
|
|
name: "bar",
|
|
srcs: ["x/y/Bar.aidl"],
|
|
hdrs: ["x/HeaderBar.aidl"],
|
|
strip_import_prefix: "x",
|
|
}
|
|
`)}.AddToFixture(),
|
|
android.MockFS{
|
|
"package_foo/Android.bp": []byte(`
|
|
aidl_library {
|
|
name: "foo",
|
|
srcs: ["a/b/Foo.aidl"],
|
|
hdrs: ["a/HeaderFoo.aidl"],
|
|
strip_import_prefix: "a",
|
|
deps: ["bar"],
|
|
}
|
|
cc_library {
|
|
name: "libfoo",
|
|
aidl: {
|
|
libs: ["foo"],
|
|
}
|
|
}
|
|
`),
|
|
}.AddToFixture(),
|
|
).RunTest(t).TestContext
|
|
|
|
libfoo := ctx.ModuleForTests("libfoo", "android_arm64_armv8-a_static")
|
|
|
|
android.AssertPathsRelativeToTopEquals(
|
|
t,
|
|
"aidl headers",
|
|
[]string{
|
|
"package_bar/x/HeaderBar.aidl",
|
|
"package_foo/a/HeaderFoo.aidl",
|
|
"package_foo/a/b/Foo.aidl",
|
|
"out/soong/.intermediates/package_foo/libfoo/android_arm64_armv8-a_static/gen/aidl_library.sbox.textproto",
|
|
},
|
|
libfoo.Rule("aidl_library").Implicits,
|
|
)
|
|
|
|
manifest := android.RuleBuilderSboxProtoForTests(t, libfoo.Output("aidl_library.sbox.textproto"))
|
|
aidlCommand := manifest.Commands[0].GetCommand()
|
|
|
|
expectedAidlFlags := "-Ipackage_foo/a -Ipackage_bar/x"
|
|
if !strings.Contains(aidlCommand, expectedAidlFlags) {
|
|
t.Errorf("aidl command %q does not contain %q", aidlCommand, expectedAidlFlags)
|
|
}
|
|
|
|
outputs := strings.Join(libfoo.AllOutputs(), " ")
|
|
|
|
android.AssertStringDoesContain(t, "aidl-generated header", outputs, "gen/aidl_library/b/BpFoo.h")
|
|
android.AssertStringDoesContain(t, "aidl-generated header", outputs, "gen/aidl_library/b/BnFoo.h")
|
|
android.AssertStringDoesContain(t, "aidl-generated header", outputs, "gen/aidl_library/b/Foo.h")
|
|
android.AssertStringDoesContain(t, "aidl-generated cpp", outputs, "b/Foo.cpp")
|
|
// Confirm that the aidl header doesn't get compiled to cpp and h files
|
|
android.AssertStringDoesNotContain(t, "aidl-generated header", outputs, "gen/aidl_library/y/BpBar.h")
|
|
android.AssertStringDoesNotContain(t, "aidl-generated header", outputs, "gen/aidl_library/y/BnBar.h")
|
|
android.AssertStringDoesNotContain(t, "aidl-generated header", outputs, "gen/aidl_library/y/Bar.h")
|
|
android.AssertStringDoesNotContain(t, "aidl-generated cpp", outputs, "y/Bar.cpp")
|
|
}
|
|
|
|
func TestAidlFlagsPassedToTheAidlCompiler(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := android.GroupFixturePreparers(
|
|
prepareForCcTest,
|
|
aidl_library.PrepareForTestWithAidlLibrary,
|
|
).RunTestWithBp(t, `
|
|
cc_library {
|
|
name: "libfoo",
|
|
srcs: ["a/Foo.aidl"],
|
|
aidl: { flags: ["-Werror"], },
|
|
}
|
|
`)
|
|
|
|
libfoo := ctx.ModuleForTests("libfoo", "android_arm64_armv8-a_static")
|
|
manifest := android.RuleBuilderSboxProtoForTests(t, libfoo.Output("aidl.sbox.textproto"))
|
|
aidlCommand := manifest.Commands[0].GetCommand()
|
|
expectedAidlFlag := "-Werror"
|
|
if !strings.Contains(aidlCommand, expectedAidlFlag) {
|
|
t.Errorf("aidl command %q does not contain %q", aidlCommand, expectedAidlFlag)
|
|
}
|
|
}
|
|
|
|
func TestAidlFlagsWithMinSdkVersion(t *testing.T) {
|
|
t.Parallel()
|
|
for _, tc := range []struct {
|
|
name string
|
|
sdkVersion string
|
|
variant string
|
|
expected string
|
|
}{
|
|
{
|
|
name: "default is current",
|
|
sdkVersion: "",
|
|
variant: "android_arm64_armv8-a_static",
|
|
expected: "platform_apis",
|
|
},
|
|
{
|
|
name: "use sdk_version",
|
|
sdkVersion: `sdk_version: "29"`,
|
|
variant: "android_arm64_armv8-a_static",
|
|
expected: "platform_apis",
|
|
},
|
|
{
|
|
name: "use sdk_version(sdk variant)",
|
|
sdkVersion: `sdk_version: "29"`,
|
|
variant: "android_arm64_armv8-a_sdk_static",
|
|
expected: "29",
|
|
},
|
|
{
|
|
name: "use min_sdk_version",
|
|
sdkVersion: `min_sdk_version: "29"`,
|
|
variant: "android_arm64_armv8-a_static",
|
|
expected: "29",
|
|
},
|
|
} {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
ctx := testCc(t, `
|
|
cc_library {
|
|
name: "libfoo",
|
|
stl: "none",
|
|
srcs: ["a/Foo.aidl"],
|
|
`+tc.sdkVersion+`
|
|
}
|
|
`)
|
|
libfoo := ctx.ModuleForTests("libfoo", tc.variant)
|
|
manifest := android.RuleBuilderSboxProtoForTests(t, libfoo.Output("aidl.sbox.textproto"))
|
|
aidlCommand := manifest.Commands[0].GetCommand()
|
|
expectedAidlFlag := "--min_sdk_version=" + tc.expected
|
|
if !strings.Contains(aidlCommand, expectedAidlFlag) {
|
|
t.Errorf("aidl command %q does not contain %q", aidlCommand, expectedAidlFlag)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestInvalidAidlProp(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
testCases := []struct {
|
|
description string
|
|
bp string
|
|
}{
|
|
{
|
|
description: "Invalid use of aidl.libs and aidl.include_dirs",
|
|
bp: `
|
|
cc_library {
|
|
name: "foo",
|
|
aidl: {
|
|
libs: ["foo_aidl"],
|
|
include_dirs: ["bar/include"],
|
|
}
|
|
}
|
|
`,
|
|
},
|
|
{
|
|
description: "Invalid use of aidl.libs and aidl.local_include_dirs",
|
|
bp: `
|
|
cc_library {
|
|
name: "foo",
|
|
aidl: {
|
|
libs: ["foo_aidl"],
|
|
local_include_dirs: ["include"],
|
|
}
|
|
}
|
|
`,
|
|
},
|
|
}
|
|
|
|
for _, testCase := range testCases {
|
|
t.Run(testCase.description, func(t *testing.T) {
|
|
bp := `
|
|
aidl_library {
|
|
name: "foo_aidl",
|
|
srcs: ["Foo.aidl"],
|
|
} ` + testCase.bp
|
|
android.GroupFixturePreparers(
|
|
prepareForCcTest,
|
|
aidl_library.PrepareForTestWithAidlLibrary.
|
|
ExtendWithErrorHandler(android.FixtureExpectsOneErrorPattern("For aidl headers, please only use aidl.libs prop")),
|
|
).RunTestWithBp(t, bp)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestMinSdkVersionInClangTriple(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_library_shared {
|
|
name: "libfoo",
|
|
srcs: ["foo.c"],
|
|
min_sdk_version: "29",
|
|
}`)
|
|
|
|
cFlags := ctx.ModuleForTests("libfoo", "android_arm64_armv8-a_shared").Rule("cc").Args["cFlags"]
|
|
android.AssertStringDoesContain(t, "min sdk version", cFlags, "-target aarch64-linux-android29")
|
|
}
|
|
|
|
func TestNonDigitMinSdkVersionInClangTriple(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_library_shared {
|
|
name: "libfoo",
|
|
srcs: ["foo.c"],
|
|
min_sdk_version: "S",
|
|
}
|
|
`
|
|
result := android.GroupFixturePreparers(
|
|
prepareForCcTest,
|
|
android.FixtureModifyProductVariables(func(variables android.FixtureProductVariables) {
|
|
variables.Platform_version_active_codenames = []string{"UpsideDownCake", "Tiramisu"}
|
|
}),
|
|
).RunTestWithBp(t, bp)
|
|
ctx := result.TestContext
|
|
cFlags := ctx.ModuleForTests("libfoo", "android_arm64_armv8-a_shared").Rule("cc").Args["cFlags"]
|
|
android.AssertStringDoesContain(t, "min sdk version", cFlags, "-target aarch64-linux-android31")
|
|
}
|
|
|
|
func TestIncludeDirsExporting(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
// Trim spaces from the beginning, end and immediately after any newline characters. Leaves
|
|
// embedded newline characters alone.
|
|
trimIndentingSpaces := func(s string) string {
|
|
return strings.TrimSpace(regexp.MustCompile("(^|\n)\\s+").ReplaceAllString(s, "$1"))
|
|
}
|
|
|
|
checkPaths := func(t *testing.T, message string, expected string, paths android.Paths) {
|
|
t.Helper()
|
|
expected = trimIndentingSpaces(expected)
|
|
actual := trimIndentingSpaces(strings.Join(android.FirstUniqueStrings(android.NormalizePathsForTesting(paths)), "\n"))
|
|
if expected != actual {
|
|
t.Errorf("%s: expected:\n%s\n actual:\n%s\n", message, expected, actual)
|
|
}
|
|
}
|
|
|
|
type exportedChecker func(t *testing.T, name string, exported FlagExporterInfo)
|
|
|
|
checkIncludeDirs := func(t *testing.T, ctx *android.TestContext, module android.Module, checkers ...exportedChecker) {
|
|
t.Helper()
|
|
exported := ctx.ModuleProvider(module, FlagExporterInfoProvider).(FlagExporterInfo)
|
|
name := module.Name()
|
|
|
|
for _, checker := range checkers {
|
|
checker(t, name, exported)
|
|
}
|
|
}
|
|
|
|
expectedIncludeDirs := func(expectedPaths string) exportedChecker {
|
|
return func(t *testing.T, name string, exported FlagExporterInfo) {
|
|
t.Helper()
|
|
checkPaths(t, fmt.Sprintf("%s: include dirs", name), expectedPaths, exported.IncludeDirs)
|
|
}
|
|
}
|
|
|
|
expectedSystemIncludeDirs := func(expectedPaths string) exportedChecker {
|
|
return func(t *testing.T, name string, exported FlagExporterInfo) {
|
|
t.Helper()
|
|
checkPaths(t, fmt.Sprintf("%s: system include dirs", name), expectedPaths, exported.SystemIncludeDirs)
|
|
}
|
|
}
|
|
|
|
expectedGeneratedHeaders := func(expectedPaths string) exportedChecker {
|
|
return func(t *testing.T, name string, exported FlagExporterInfo) {
|
|
t.Helper()
|
|
checkPaths(t, fmt.Sprintf("%s: generated headers", name), expectedPaths, exported.GeneratedHeaders)
|
|
}
|
|
}
|
|
|
|
expectedOrderOnlyDeps := func(expectedPaths string) exportedChecker {
|
|
return func(t *testing.T, name string, exported FlagExporterInfo) {
|
|
t.Helper()
|
|
checkPaths(t, fmt.Sprintf("%s: order only deps", name), expectedPaths, exported.Deps)
|
|
}
|
|
}
|
|
|
|
genRuleModules := `
|
|
genrule {
|
|
name: "genrule_foo",
|
|
cmd: "generate-foo",
|
|
out: [
|
|
"generated_headers/foo/generated_header.h",
|
|
],
|
|
export_include_dirs: [
|
|
"generated_headers",
|
|
],
|
|
}
|
|
|
|
genrule {
|
|
name: "genrule_bar",
|
|
cmd: "generate-bar",
|
|
out: [
|
|
"generated_headers/bar/generated_header.h",
|
|
],
|
|
export_include_dirs: [
|
|
"generated_headers",
|
|
],
|
|
}
|
|
`
|
|
|
|
t.Run("ensure exported include dirs are not automatically re-exported from shared_libs", func(t *testing.T) {
|
|
ctx := testCc(t, genRuleModules+`
|
|
cc_library {
|
|
name: "libfoo",
|
|
srcs: ["foo.c"],
|
|
export_include_dirs: ["foo/standard"],
|
|
export_system_include_dirs: ["foo/system"],
|
|
generated_headers: ["genrule_foo"],
|
|
export_generated_headers: ["genrule_foo"],
|
|
}
|
|
|
|
cc_library {
|
|
name: "libbar",
|
|
srcs: ["bar.c"],
|
|
shared_libs: ["libfoo"],
|
|
export_include_dirs: ["bar/standard"],
|
|
export_system_include_dirs: ["bar/system"],
|
|
generated_headers: ["genrule_bar"],
|
|
export_generated_headers: ["genrule_bar"],
|
|
}
|
|
`)
|
|
foo := ctx.ModuleForTests("libfoo", "android_arm64_armv8-a_shared").Module()
|
|
checkIncludeDirs(t, ctx, foo,
|
|
expectedIncludeDirs(`
|
|
foo/standard
|
|
.intermediates/genrule_foo/gen/generated_headers
|
|
`),
|
|
expectedSystemIncludeDirs(`foo/system`),
|
|
expectedGeneratedHeaders(`.intermediates/genrule_foo/gen/generated_headers/foo/generated_header.h`),
|
|
expectedOrderOnlyDeps(`.intermediates/genrule_foo/gen/generated_headers/foo/generated_header.h`),
|
|
)
|
|
|
|
bar := ctx.ModuleForTests("libbar", "android_arm64_armv8-a_shared").Module()
|
|
checkIncludeDirs(t, ctx, bar,
|
|
expectedIncludeDirs(`
|
|
bar/standard
|
|
.intermediates/genrule_bar/gen/generated_headers
|
|
`),
|
|
expectedSystemIncludeDirs(`bar/system`),
|
|
expectedGeneratedHeaders(`.intermediates/genrule_bar/gen/generated_headers/bar/generated_header.h`),
|
|
expectedOrderOnlyDeps(`.intermediates/genrule_bar/gen/generated_headers/bar/generated_header.h`),
|
|
)
|
|
})
|
|
|
|
t.Run("ensure exported include dirs are automatically re-exported from whole_static_libs", func(t *testing.T) {
|
|
ctx := testCc(t, genRuleModules+`
|
|
cc_library {
|
|
name: "libfoo",
|
|
srcs: ["foo.c"],
|
|
export_include_dirs: ["foo/standard"],
|
|
export_system_include_dirs: ["foo/system"],
|
|
generated_headers: ["genrule_foo"],
|
|
export_generated_headers: ["genrule_foo"],
|
|
}
|
|
|
|
cc_library {
|
|
name: "libbar",
|
|
srcs: ["bar.c"],
|
|
whole_static_libs: ["libfoo"],
|
|
export_include_dirs: ["bar/standard"],
|
|
export_system_include_dirs: ["bar/system"],
|
|
generated_headers: ["genrule_bar"],
|
|
export_generated_headers: ["genrule_bar"],
|
|
}
|
|
`)
|
|
foo := ctx.ModuleForTests("libfoo", "android_arm64_armv8-a_shared").Module()
|
|
checkIncludeDirs(t, ctx, foo,
|
|
expectedIncludeDirs(`
|
|
foo/standard
|
|
.intermediates/genrule_foo/gen/generated_headers
|
|
`),
|
|
expectedSystemIncludeDirs(`foo/system`),
|
|
expectedGeneratedHeaders(`.intermediates/genrule_foo/gen/generated_headers/foo/generated_header.h`),
|
|
expectedOrderOnlyDeps(`.intermediates/genrule_foo/gen/generated_headers/foo/generated_header.h`),
|
|
)
|
|
|
|
bar := ctx.ModuleForTests("libbar", "android_arm64_armv8-a_shared").Module()
|
|
checkIncludeDirs(t, ctx, bar,
|
|
expectedIncludeDirs(`
|
|
bar/standard
|
|
foo/standard
|
|
.intermediates/genrule_foo/gen/generated_headers
|
|
.intermediates/genrule_bar/gen/generated_headers
|
|
`),
|
|
expectedSystemIncludeDirs(`
|
|
bar/system
|
|
foo/system
|
|
`),
|
|
expectedGeneratedHeaders(`
|
|
.intermediates/genrule_foo/gen/generated_headers/foo/generated_header.h
|
|
.intermediates/genrule_bar/gen/generated_headers/bar/generated_header.h
|
|
`),
|
|
expectedOrderOnlyDeps(`
|
|
.intermediates/genrule_foo/gen/generated_headers/foo/generated_header.h
|
|
.intermediates/genrule_bar/gen/generated_headers/bar/generated_header.h
|
|
`),
|
|
)
|
|
})
|
|
|
|
t.Run("ensure only aidl headers are exported", func(t *testing.T) {
|
|
ctx := android.GroupFixturePreparers(
|
|
prepareForCcTest,
|
|
aidl_library.PrepareForTestWithAidlLibrary,
|
|
).RunTestWithBp(t, `
|
|
aidl_library {
|
|
name: "libfoo_aidl",
|
|
srcs: ["x/y/Bar.aidl"],
|
|
strip_import_prefix: "x",
|
|
}
|
|
cc_library_shared {
|
|
name: "libfoo",
|
|
srcs: [
|
|
"foo.c",
|
|
"b.aidl",
|
|
"a.proto",
|
|
],
|
|
aidl: {
|
|
libs: ["libfoo_aidl"],
|
|
export_aidl_headers: true,
|
|
}
|
|
}
|
|
`).TestContext
|
|
foo := ctx.ModuleForTests("libfoo", "android_arm64_armv8-a_shared").Module()
|
|
checkIncludeDirs(t, ctx, foo,
|
|
expectedIncludeDirs(`
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/aidl
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/aidl_library
|
|
`),
|
|
expectedSystemIncludeDirs(``),
|
|
expectedGeneratedHeaders(`
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/aidl/b.h
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/aidl/Bnb.h
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/aidl/Bpb.h
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/aidl_library/y/Bar.h
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/aidl_library/y/BnBar.h
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/aidl_library/y/BpBar.h
|
|
`),
|
|
expectedOrderOnlyDeps(`
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/aidl/b.h
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/aidl/Bnb.h
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/aidl/Bpb.h
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/aidl_library/y/Bar.h
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/aidl_library/y/BnBar.h
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/aidl_library/y/BpBar.h
|
|
`),
|
|
)
|
|
})
|
|
|
|
t.Run("ensure only proto headers are exported", func(t *testing.T) {
|
|
ctx := testCc(t, genRuleModules+`
|
|
cc_library_shared {
|
|
name: "libfoo",
|
|
srcs: [
|
|
"foo.c",
|
|
"b.aidl",
|
|
"a.proto",
|
|
],
|
|
proto: {
|
|
export_proto_headers: true,
|
|
}
|
|
}
|
|
`)
|
|
foo := ctx.ModuleForTests("libfoo", "android_arm64_armv8-a_shared").Module()
|
|
checkIncludeDirs(t, ctx, foo,
|
|
expectedIncludeDirs(`
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/proto
|
|
`),
|
|
expectedSystemIncludeDirs(``),
|
|
expectedGeneratedHeaders(`
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/proto/a.pb.h
|
|
`),
|
|
expectedOrderOnlyDeps(`
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/proto/a.pb.h
|
|
`),
|
|
)
|
|
})
|
|
|
|
t.Run("ensure only sysprop headers are exported", func(t *testing.T) {
|
|
ctx := testCc(t, genRuleModules+`
|
|
cc_library_shared {
|
|
name: "libfoo",
|
|
srcs: [
|
|
"foo.c",
|
|
"path/to/a.sysprop",
|
|
"b.aidl",
|
|
"a.proto",
|
|
],
|
|
}
|
|
`)
|
|
foo := ctx.ModuleForTests("libfoo", "android_arm64_armv8-a_shared").Module()
|
|
checkIncludeDirs(t, ctx, foo,
|
|
expectedIncludeDirs(`
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/sysprop/include
|
|
`),
|
|
expectedSystemIncludeDirs(``),
|
|
expectedGeneratedHeaders(`
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/sysprop/include/path/to/a.sysprop.h
|
|
`),
|
|
expectedOrderOnlyDeps(`
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/sysprop/include/path/to/a.sysprop.h
|
|
.intermediates/libfoo/android_arm64_armv8-a_shared/gen/sysprop/public/include/path/to/a.sysprop.h
|
|
`),
|
|
)
|
|
})
|
|
}
|
|
|
|
func TestIncludeDirectoryOrdering(t *testing.T) {
|
|
t.Parallel()
|
|
baseExpectedFlags := []string{
|
|
"${config.ArmThumbCflags}",
|
|
"${config.ArmCflags}",
|
|
"${config.CommonGlobalCflags}",
|
|
"${config.DeviceGlobalCflags}",
|
|
"${config.ExternalCflags}",
|
|
"${config.ArmToolchainCflags}",
|
|
"${config.ArmArmv7ANeonCflags}",
|
|
"${config.ArmGenericCflags}",
|
|
"-target",
|
|
"armv7a-linux-androideabi21",
|
|
}
|
|
|
|
expectedIncludes := []string{
|
|
"external/foo/android_arm_export_include_dirs",
|
|
"external/foo/lib32_export_include_dirs",
|
|
"external/foo/arm_export_include_dirs",
|
|
"external/foo/android_export_include_dirs",
|
|
"external/foo/linux_export_include_dirs",
|
|
"external/foo/export_include_dirs",
|
|
"external/foo/android_arm_local_include_dirs",
|
|
"external/foo/lib32_local_include_dirs",
|
|
"external/foo/arm_local_include_dirs",
|
|
"external/foo/android_local_include_dirs",
|
|
"external/foo/linux_local_include_dirs",
|
|
"external/foo/local_include_dirs",
|
|
"external/foo",
|
|
"external/foo/libheader1",
|
|
"external/foo/libheader2",
|
|
"external/foo/libwhole1",
|
|
"external/foo/libwhole2",
|
|
"external/foo/libstatic1",
|
|
"external/foo/libstatic2",
|
|
"external/foo/libshared1",
|
|
"external/foo/libshared2",
|
|
"external/foo/liblinux",
|
|
"external/foo/libandroid",
|
|
"external/foo/libarm",
|
|
"external/foo/lib32",
|
|
"external/foo/libandroid_arm",
|
|
"defaults/cc/common/ndk_libc++_shared",
|
|
}
|
|
|
|
conly := []string{"-fPIC", "${config.CommonGlobalConlyflags}"}
|
|
cppOnly := []string{"-fPIC", "${config.CommonGlobalCppflags}", "${config.DeviceGlobalCppflags}", "${config.ArmCppflags}"}
|
|
|
|
cflags := []string{"-Werror", "-std=candcpp"}
|
|
cstd := []string{"-std=gnu17", "-std=conly"}
|
|
cppstd := []string{"-std=gnu++17", "-std=cpp", "-fno-rtti"}
|
|
|
|
lastIncludes := []string{
|
|
"out/soong/ndk/sysroot/usr/include",
|
|
"out/soong/ndk/sysroot/usr/include/arm-linux-androideabi",
|
|
}
|
|
|
|
combineSlices := func(slices ...[]string) []string {
|
|
var ret []string
|
|
for _, s := range slices {
|
|
ret = append(ret, s...)
|
|
}
|
|
return ret
|
|
}
|
|
|
|
testCases := []struct {
|
|
name string
|
|
src string
|
|
expected []string
|
|
}{
|
|
{
|
|
name: "c",
|
|
src: "foo.c",
|
|
expected: combineSlices(baseExpectedFlags, conly, expectedIncludes, cflags, cstd, lastIncludes, []string{"${config.NoOverrideGlobalCflags}", "${config.NoOverrideExternalGlobalCflags}"}),
|
|
},
|
|
{
|
|
name: "cc",
|
|
src: "foo.cc",
|
|
expected: combineSlices(baseExpectedFlags, cppOnly, expectedIncludes, cflags, cppstd, lastIncludes, []string{"${config.NoOverrideGlobalCflags}", "${config.NoOverrideExternalGlobalCflags}"}),
|
|
},
|
|
{
|
|
name: "assemble",
|
|
src: "foo.s",
|
|
expected: combineSlices(baseExpectedFlags, []string{"${config.CommonGlobalAsflags}"}, expectedIncludes, lastIncludes),
|
|
},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
bp := fmt.Sprintf(`
|
|
cc_library {
|
|
name: "libfoo",
|
|
srcs: ["%s"],
|
|
cflags: ["-std=candcpp"],
|
|
conlyflags: ["-std=conly"],
|
|
cppflags: ["-std=cpp"],
|
|
local_include_dirs: ["local_include_dirs"],
|
|
export_include_dirs: ["export_include_dirs"],
|
|
export_system_include_dirs: ["export_system_include_dirs"],
|
|
static_libs: ["libstatic1", "libstatic2"],
|
|
whole_static_libs: ["libwhole1", "libwhole2"],
|
|
shared_libs: ["libshared1", "libshared2"],
|
|
header_libs: ["libheader1", "libheader2"],
|
|
target: {
|
|
android: {
|
|
shared_libs: ["libandroid"],
|
|
local_include_dirs: ["android_local_include_dirs"],
|
|
export_include_dirs: ["android_export_include_dirs"],
|
|
},
|
|
android_arm: {
|
|
shared_libs: ["libandroid_arm"],
|
|
local_include_dirs: ["android_arm_local_include_dirs"],
|
|
export_include_dirs: ["android_arm_export_include_dirs"],
|
|
},
|
|
linux: {
|
|
shared_libs: ["liblinux"],
|
|
local_include_dirs: ["linux_local_include_dirs"],
|
|
export_include_dirs: ["linux_export_include_dirs"],
|
|
},
|
|
},
|
|
multilib: {
|
|
lib32: {
|
|
shared_libs: ["lib32"],
|
|
local_include_dirs: ["lib32_local_include_dirs"],
|
|
export_include_dirs: ["lib32_export_include_dirs"],
|
|
},
|
|
},
|
|
arch: {
|
|
arm: {
|
|
shared_libs: ["libarm"],
|
|
local_include_dirs: ["arm_local_include_dirs"],
|
|
export_include_dirs: ["arm_export_include_dirs"],
|
|
},
|
|
},
|
|
stl: "libc++",
|
|
sdk_version: "minimum",
|
|
}
|
|
|
|
cc_library_headers {
|
|
name: "libheader1",
|
|
export_include_dirs: ["libheader1"],
|
|
sdk_version: "minimum",
|
|
stl: "none",
|
|
}
|
|
|
|
cc_library_headers {
|
|
name: "libheader2",
|
|
export_include_dirs: ["libheader2"],
|
|
sdk_version: "minimum",
|
|
stl: "none",
|
|
}
|
|
`, tc.src)
|
|
|
|
libs := []string{
|
|
"libstatic1",
|
|
"libstatic2",
|
|
"libwhole1",
|
|
"libwhole2",
|
|
"libshared1",
|
|
"libshared2",
|
|
"libandroid",
|
|
"libandroid_arm",
|
|
"liblinux",
|
|
"lib32",
|
|
"libarm",
|
|
}
|
|
|
|
for _, lib := range libs {
|
|
bp += fmt.Sprintf(`
|
|
cc_library {
|
|
name: "%s",
|
|
export_include_dirs: ["%s"],
|
|
sdk_version: "minimum",
|
|
stl: "none",
|
|
}
|
|
`, lib, lib)
|
|
}
|
|
|
|
ctx := android.GroupFixturePreparers(
|
|
PrepareForIntegrationTestWithCc,
|
|
android.FixtureAddTextFile("external/foo/Android.bp", bp),
|
|
).RunTest(t)
|
|
// Use the arm variant instead of the arm64 variant so that it gets headers from
|
|
// ndk_libandroid_support to test LateStaticLibs.
|
|
cflags := ctx.ModuleForTests("libfoo", "android_arm_armv7-a-neon_sdk_static").Output("obj/external/foo/foo.o").Args["cFlags"]
|
|
|
|
var includes []string
|
|
flags := strings.Split(cflags, " ")
|
|
for _, flag := range flags {
|
|
if strings.HasPrefix(flag, "-I") {
|
|
includes = append(includes, strings.TrimPrefix(flag, "-I"))
|
|
} else if flag == "-isystem" {
|
|
// skip isystem, include next
|
|
} else if len(flag) > 0 {
|
|
includes = append(includes, flag)
|
|
}
|
|
}
|
|
|
|
android.AssertArrayString(t, "includes", tc.expected, includes)
|
|
})
|
|
}
|
|
|
|
}
|
|
|
|
func TestAddnoOverride64GlobalCflags(t *testing.T) {
|
|
t.Parallel()
|
|
ctx := testCc(t, `
|
|
cc_library_shared {
|
|
name: "libclient",
|
|
srcs: ["foo.c"],
|
|
shared_libs: ["libfoo#1"],
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libfoo",
|
|
srcs: ["foo.c"],
|
|
shared_libs: ["libbar"],
|
|
export_shared_lib_headers: ["libbar"],
|
|
stubs: {
|
|
symbol_file: "foo.map.txt",
|
|
versions: ["1", "2", "3"],
|
|
},
|
|
}
|
|
|
|
cc_library_shared {
|
|
name: "libbar",
|
|
export_include_dirs: ["include/libbar"],
|
|
srcs: ["foo.c"],
|
|
}`)
|
|
|
|
cFlags := ctx.ModuleForTests("libclient", "android_arm64_armv8-a_shared").Rule("cc").Args["cFlags"]
|
|
|
|
if !strings.Contains(cFlags, "${config.NoOverride64GlobalCflags}") {
|
|
t.Errorf("expected %q in cflags, got %q", "${config.NoOverride64GlobalCflags}", cFlags)
|
|
}
|
|
}
|
|
|
|
func TestCcBuildBrokenClangProperty(t *testing.T) {
|
|
t.Parallel()
|
|
tests := []struct {
|
|
name string
|
|
clang bool
|
|
BuildBrokenClangProperty bool
|
|
err string
|
|
}{
|
|
{
|
|
name: "error when clang is set to false",
|
|
clang: false,
|
|
err: "is no longer supported",
|
|
},
|
|
{
|
|
name: "error when clang is set to true",
|
|
clang: true,
|
|
err: "property is deprecated, see Changes.md",
|
|
},
|
|
{
|
|
name: "no error when BuildBrokenClangProperty is explicitly set to true",
|
|
clang: true,
|
|
BuildBrokenClangProperty: true,
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(test.name, func(t *testing.T) {
|
|
bp := fmt.Sprintf(`
|
|
cc_library {
|
|
name: "foo",
|
|
clang: %t,
|
|
}`, test.clang)
|
|
|
|
if test.err == "" {
|
|
android.GroupFixturePreparers(
|
|
prepareForCcTest,
|
|
android.FixtureModifyProductVariables(func(variables android.FixtureProductVariables) {
|
|
if test.BuildBrokenClangProperty {
|
|
variables.BuildBrokenClangProperty = test.BuildBrokenClangProperty
|
|
}
|
|
}),
|
|
).RunTestWithBp(t, bp)
|
|
} else {
|
|
prepareForCcTest.
|
|
ExtendWithErrorHandler(android.FixtureExpectsOneErrorPattern(test.err)).
|
|
RunTestWithBp(t, bp)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestCcBuildBrokenClangAsFlags(t *testing.T) {
|
|
t.Parallel()
|
|
tests := []struct {
|
|
name string
|
|
clangAsFlags []string
|
|
BuildBrokenClangAsFlags bool
|
|
err string
|
|
}{
|
|
{
|
|
name: "error when clang_asflags is set",
|
|
clangAsFlags: []string{"-a", "-b"},
|
|
err: "clang_asflags: property is deprecated",
|
|
},
|
|
{
|
|
name: "no error when BuildBrokenClangAsFlags is explicitly set to true",
|
|
clangAsFlags: []string{"-a", "-b"},
|
|
BuildBrokenClangAsFlags: true,
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(test.name, func(t *testing.T) {
|
|
bp := fmt.Sprintf(`
|
|
cc_library {
|
|
name: "foo",
|
|
clang_asflags: %s,
|
|
}`, `["`+strings.Join(test.clangAsFlags, `","`)+`"]`)
|
|
|
|
if test.err == "" {
|
|
android.GroupFixturePreparers(
|
|
prepareForCcTest,
|
|
android.FixtureModifyProductVariables(func(variables android.FixtureProductVariables) {
|
|
if test.BuildBrokenClangAsFlags {
|
|
variables.BuildBrokenClangAsFlags = test.BuildBrokenClangAsFlags
|
|
}
|
|
}),
|
|
).RunTestWithBp(t, bp)
|
|
} else {
|
|
prepareForCcTest.
|
|
ExtendWithErrorHandler(android.FixtureExpectsOneErrorPattern(test.err)).
|
|
RunTestWithBp(t, bp)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestCcBuildBrokenClangCFlags(t *testing.T) {
|
|
t.Parallel()
|
|
tests := []struct {
|
|
name string
|
|
clangCFlags []string
|
|
BuildBrokenClangCFlags bool
|
|
err string
|
|
}{
|
|
{
|
|
name: "error when clang_cflags is set",
|
|
clangCFlags: []string{"-a", "-b"},
|
|
err: "clang_cflags: property is deprecated",
|
|
},
|
|
{
|
|
name: "no error when BuildBrokenClangCFlags is explicitly set to true",
|
|
clangCFlags: []string{"-a", "-b"},
|
|
BuildBrokenClangCFlags: true,
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(test.name, func(t *testing.T) {
|
|
bp := fmt.Sprintf(`
|
|
cc_library {
|
|
name: "foo",
|
|
clang_cflags: %s,
|
|
}`, `["`+strings.Join(test.clangCFlags, `","`)+`"]`)
|
|
|
|
if test.err == "" {
|
|
android.GroupFixturePreparers(
|
|
prepareForCcTest,
|
|
android.FixtureModifyProductVariables(func(variables android.FixtureProductVariables) {
|
|
if test.BuildBrokenClangCFlags {
|
|
variables.BuildBrokenClangCFlags = test.BuildBrokenClangCFlags
|
|
}
|
|
}),
|
|
).RunTestWithBp(t, bp)
|
|
} else {
|
|
prepareForCcTest.
|
|
ExtendWithErrorHandler(android.FixtureExpectsOneErrorPattern(test.err)).
|
|
RunTestWithBp(t, bp)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestDclaLibraryInApex(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_library_shared {
|
|
name: "cc_lib_in_apex",
|
|
srcs: ["foo.cc"],
|
|
apex_available: ["myapex"],
|
|
bazel_module: { label: "//foo/bar:bar" },
|
|
}`
|
|
label := "//foo/bar:bar"
|
|
arch64 := "arm64_armv8-a"
|
|
arch32 := "arm_armv7-a-neon"
|
|
apexCfgKey := android.ApexConfigKey{
|
|
WithinApex: true,
|
|
ApexSdkVersion: "28",
|
|
}
|
|
|
|
result := android.GroupFixturePreparers(
|
|
prepareForCcTest,
|
|
android.FixtureRegisterWithContext(registerTestMutators),
|
|
android.FixtureModifyConfig(func(config android.Config) {
|
|
config.BazelContext = android.MockBazelContext{
|
|
OutputBaseDir: "outputbase",
|
|
LabelToCcInfo: map[string]cquery.CcInfo{
|
|
android.BuildMockBazelContextResultKey(label, arch32, android.Android, apexCfgKey): cquery.CcInfo{
|
|
RootDynamicLibraries: []string{"foo.so"},
|
|
},
|
|
android.BuildMockBazelContextResultKey(label, arch64, android.Android, apexCfgKey): cquery.CcInfo{
|
|
RootDynamicLibraries: []string{"foo.so"},
|
|
},
|
|
},
|
|
BazelRequests: make(map[string]bool),
|
|
}
|
|
}),
|
|
).RunTestWithBp(t, bp)
|
|
ctx := result.TestContext
|
|
|
|
// Test if the bazel request is queued correctly
|
|
key := android.BuildMockBazelContextRequestKey(label, cquery.GetCcInfo, arch32, android.Android, apexCfgKey)
|
|
if !ctx.Config().BazelContext.(android.MockBazelContext).BazelRequests[key] {
|
|
t.Errorf("Bazel request was not queued: %s", key)
|
|
}
|
|
|
|
sharedFoo := ctx.ModuleForTests(ccLibInApex, "android_arm_armv7-a-neon_shared_"+apexVariationName).Module()
|
|
producer := sharedFoo.(android.OutputFileProducer)
|
|
outputFiles, err := producer.OutputFiles("")
|
|
if err != nil {
|
|
t.Errorf("Unexpected error getting cc_object outputfiles %s", err)
|
|
}
|
|
expectedOutputFiles := []string{"outputbase/execroot/__main__/foo.so"}
|
|
android.AssertDeepEquals(t, "output files", expectedOutputFiles, outputFiles.Strings())
|
|
}
|
|
|
|
func TestDisableSanitizerVariantsInMixedBuilds(t *testing.T) {
|
|
t.Parallel()
|
|
bp := `
|
|
cc_library_static {
|
|
name: "foo_ubsan_minimal",
|
|
srcs: ["foo.cc"],
|
|
bazel_module: { label: "//foo_ubsan_minimal" },
|
|
sanitize: {
|
|
all_undefined: true,
|
|
integer_overflow: true,
|
|
},
|
|
}
|
|
cc_library_static {
|
|
name: "foo",
|
|
srcs: ["foo.cc"],
|
|
bazel_module: { label: "//foo" },
|
|
sanitize: {
|
|
address: true,
|
|
hwaddress: true,
|
|
fuzzer: true,
|
|
integer_overflow: true,
|
|
scs: true,
|
|
},
|
|
}
|
|
cc_library_static {
|
|
name: "foo_tsan",
|
|
srcs: ["foo.cc"],
|
|
bazel_module: { label: "//foo_tsan" },
|
|
sanitize: {
|
|
thread: true,
|
|
},
|
|
}
|
|
cc_library_static {
|
|
name: "foo_cfi",
|
|
srcs: ["foo.cc"],
|
|
bazel_module: { label: "//foo_cfi" },
|
|
sanitize: {
|
|
cfi: true,
|
|
},
|
|
}
|
|
cc_library_static {
|
|
name: "foo_memtag_stack",
|
|
srcs: ["foo.cc"],
|
|
bazel_module: { label: "//foo_memtag_stack" },
|
|
sanitize: {
|
|
memtag_stack: true,
|
|
},
|
|
}
|
|
cc_library_static {
|
|
name: "foo_memtag_heap",
|
|
srcs: ["foo.cc"],
|
|
bazel_module: { label: "//foo_memtag_heap" },
|
|
sanitize: {
|
|
memtag_heap: true,
|
|
},
|
|
}
|
|
cc_library_static {
|
|
name: "foo_safestack",
|
|
srcs: ["foo.cc"],
|
|
bazel_module: { label: "//foo_safestack" },
|
|
sanitize: {
|
|
safestack: true,
|
|
},
|
|
}
|
|
cc_library_static {
|
|
name: "foo_scudo",
|
|
srcs: ["foo.cc"],
|
|
bazel_module: { label: "//foo_scudo" },
|
|
sanitize: {
|
|
scudo: true,
|
|
},
|
|
}
|
|
`
|
|
testcases := []struct {
|
|
name string
|
|
variant string
|
|
expectedOutputPaths []string
|
|
}{
|
|
{
|
|
name: "foo_ubsan_minimal",
|
|
variant: "android_arm64_armv8-a_static_apex28",
|
|
expectedOutputPaths: []string{
|
|
"outputbase/execroot/__main__/foo_ubsan_minimal.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo",
|
|
variant: "android_arm64_armv8-a_static_apex28",
|
|
expectedOutputPaths: []string{
|
|
"outputbase/execroot/__main__/foo.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo",
|
|
variant: "android_arm_armv7-a-neon_static_asan_apex28",
|
|
expectedOutputPaths: []string{
|
|
"out/soong/.intermediates/foo/android_arm_armv7-a-neon_static_asan_apex28/foo.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo",
|
|
variant: "android_arm64_armv8-a_static_hwasan_apex28",
|
|
expectedOutputPaths: []string{
|
|
"out/soong/.intermediates/foo/android_arm64_armv8-a_static_hwasan_apex28/foo.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo",
|
|
variant: "android_arm64_armv8-a_static_fuzzer_apex28",
|
|
expectedOutputPaths: []string{
|
|
"out/soong/.intermediates/foo/android_arm64_armv8-a_static_fuzzer_apex28/foo.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo",
|
|
variant: "android_arm_armv7-a-neon_static_asan_fuzzer_apex28",
|
|
expectedOutputPaths: []string{
|
|
"out/soong/.intermediates/foo/android_arm_armv7-a-neon_static_asan_fuzzer_apex28/foo.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo",
|
|
variant: "android_arm64_armv8-a_static_hwasan_fuzzer_apex28",
|
|
expectedOutputPaths: []string{
|
|
"out/soong/.intermediates/foo/android_arm64_armv8-a_static_hwasan_fuzzer_apex28/foo.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo",
|
|
variant: "android_arm64_armv8-a_static_scs_apex28",
|
|
expectedOutputPaths: []string{
|
|
"out/soong/.intermediates/foo/android_arm64_armv8-a_static_scs_apex28/foo.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo",
|
|
variant: "android_arm64_armv8-a_static_hwasan_scs_apex28",
|
|
expectedOutputPaths: []string{
|
|
"out/soong/.intermediates/foo/android_arm64_armv8-a_static_hwasan_scs_apex28/foo.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo",
|
|
variant: "android_arm64_armv8-a_static_hwasan_scs_fuzzer_apex28",
|
|
expectedOutputPaths: []string{
|
|
"out/soong/.intermediates/foo/android_arm64_armv8-a_static_hwasan_scs_fuzzer_apex28/foo.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo_tsan",
|
|
variant: "android_arm64_armv8-a_static_apex28",
|
|
expectedOutputPaths: []string{
|
|
"outputbase/execroot/__main__/foo_tsan.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo_tsan",
|
|
variant: "android_arm64_armv8-a_static_tsan_apex28",
|
|
expectedOutputPaths: []string{
|
|
"out/soong/.intermediates/foo_tsan/android_arm64_armv8-a_static_tsan_apex28/foo_tsan.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo_cfi",
|
|
variant: "android_arm64_armv8-a_static_apex28",
|
|
expectedOutputPaths: []string{
|
|
"outputbase/execroot/__main__/foo_cfi.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo_cfi",
|
|
variant: "android_arm64_armv8-a_static_cfi_apex28",
|
|
expectedOutputPaths: []string{
|
|
"outputbase/execroot/__main__/foo_cfi.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo_memtag_stack",
|
|
variant: "android_arm64_armv8-a_static_apex28",
|
|
expectedOutputPaths: []string{
|
|
"out/soong/.intermediates/foo_memtag_stack/android_arm64_armv8-a_static_apex28/foo_memtag_stack.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo_memtag_heap",
|
|
variant: "android_arm64_armv8-a_static_apex28",
|
|
expectedOutputPaths: []string{
|
|
"out/soong/.intermediates/foo_memtag_heap/android_arm64_armv8-a_static_apex28/foo_memtag_heap.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo_safestack",
|
|
variant: "android_arm64_armv8-a_static_apex28",
|
|
expectedOutputPaths: []string{
|
|
"out/soong/.intermediates/foo_safestack/android_arm64_armv8-a_static_apex28/foo_safestack.a",
|
|
},
|
|
},
|
|
{
|
|
name: "foo_scudo",
|
|
variant: "android_arm64_armv8-a_static_apex28",
|
|
expectedOutputPaths: []string{
|
|
"out/soong/.intermediates/foo_scudo/android_arm64_armv8-a_static_apex28/foo_scudo.a",
|
|
},
|
|
},
|
|
}
|
|
|
|
ctx := android.GroupFixturePreparers(
|
|
prepareForCcTest,
|
|
prepareForAsanTest,
|
|
android.FixtureRegisterWithContext(registerTestMutators),
|
|
android.FixtureModifyConfig(func(config android.Config) {
|
|
config.BazelContext = android.MockBazelContext{
|
|
OutputBaseDir: "outputbase",
|
|
LabelToCcInfo: map[string]cquery.CcInfo{
|
|
"//foo_ubsan_minimal": {
|
|
RootStaticArchives: []string{"foo_ubsan_minimal.a"},
|
|
},
|
|
"//foo": {
|
|
RootStaticArchives: []string{"foo.a"},
|
|
},
|
|
"//foo_tsan": {
|
|
RootStaticArchives: []string{"foo_tsan.a"},
|
|
},
|
|
"//foo_cfi": {
|
|
RootStaticArchives: []string{"foo_cfi.a"},
|
|
},
|
|
"//foo_memtag_stack": {
|
|
RootStaticArchives: []string{"INVALID_ARCHIVE.a"},
|
|
},
|
|
"//foo_memtag_heap": {
|
|
RootStaticArchives: []string{"INVALID_ARCHIVE.a"},
|
|
},
|
|
"//foo_safestack": {
|
|
RootStaticArchives: []string{"INVALID_ARCHIVE.a"},
|
|
},
|
|
"//foo_scudo": {
|
|
RootStaticArchives: []string{"INVALID_ARCHIVE.a"},
|
|
},
|
|
},
|
|
}
|
|
}),
|
|
).RunTestWithBp(t, bp).TestContext
|
|
|
|
for _, tc := range testcases {
|
|
fooMod := ctx.ModuleForTests(tc.name, tc.variant).Module()
|
|
outputFiles, err := fooMod.(android.OutputFileProducer).OutputFiles("")
|
|
if err != nil {
|
|
t.Errorf("Unexpected error getting cc_object outputfiles %s", err)
|
|
}
|
|
android.AssertPathsRelativeToTopEquals(t, "output files", tc.expectedOutputPaths, outputFiles)
|
|
}
|
|
}
|