a8a2c5a7e1
We'll make it a build time check in V after this. Due to being a runtime flog, it was hard to spot and debug, so delaying. Bug: 340953047 Test: boot, CtsInitTestCases Change-Id: Ica1a1c780e230c88615dad7937404d2b0fe9c68f
805 lines
25 KiB
C++
805 lines
25 KiB
C++
/*
|
|
* Copyright (C) 2017 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <fstream>
|
|
#include <functional>
|
|
#include <string_view>
|
|
#include <thread>
|
|
#include <type_traits>
|
|
|
|
#include <android-base/file.h>
|
|
#include <android-base/logging.h>
|
|
#include <android-base/properties.h>
|
|
#include <android-base/stringprintf.h>
|
|
#include <android/api-level.h>
|
|
#include <gtest/gtest.h>
|
|
#include <selinux/selinux.h>
|
|
#include <sys/resource.h>
|
|
|
|
#include "action.h"
|
|
#include "action_manager.h"
|
|
#include "action_parser.h"
|
|
#include "builtin_arguments.h"
|
|
#include "builtins.h"
|
|
#include "import_parser.h"
|
|
#include "init.h"
|
|
#include "keyword_map.h"
|
|
#include "parser.h"
|
|
#include "service.h"
|
|
#include "service_list.h"
|
|
#include "service_parser.h"
|
|
#include "util.h"
|
|
|
|
using android::base::GetIntProperty;
|
|
using android::base::GetProperty;
|
|
using android::base::SetProperty;
|
|
using android::base::StringPrintf;
|
|
using android::base::StringReplace;
|
|
using android::base::WaitForProperty;
|
|
using namespace std::literals;
|
|
|
|
namespace android {
|
|
namespace init {
|
|
|
|
using ActionManagerCommand = std::function<void(ActionManager&)>;
|
|
|
|
void TestInit(const std::string& init_script_file, const BuiltinFunctionMap& test_function_map,
|
|
const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager,
|
|
ServiceList* service_list) {
|
|
Action::set_function_map(&test_function_map);
|
|
|
|
Parser parser;
|
|
parser.AddSectionParser("service",
|
|
std::make_unique<ServiceParser>(service_list, nullptr, std::nullopt));
|
|
parser.AddSectionParser("on", std::make_unique<ActionParser>(action_manager, nullptr));
|
|
parser.AddSectionParser("import", std::make_unique<ImportParser>(&parser));
|
|
|
|
ASSERT_TRUE(parser.ParseConfig(init_script_file));
|
|
|
|
for (const auto& command : commands) {
|
|
command(*action_manager);
|
|
}
|
|
|
|
while (action_manager->HasMoreCommands()) {
|
|
action_manager->ExecuteOneCommand();
|
|
}
|
|
}
|
|
|
|
void TestInitText(const std::string& init_script, const BuiltinFunctionMap& test_function_map,
|
|
const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager,
|
|
ServiceList* service_list) {
|
|
TemporaryFile tf;
|
|
ASSERT_TRUE(tf.fd != -1);
|
|
ASSERT_TRUE(android::base::WriteStringToFd(init_script, tf.fd));
|
|
TestInit(tf.path, test_function_map, commands, action_manager, service_list);
|
|
}
|
|
|
|
TEST(init, SimpleEventTrigger) {
|
|
bool expect_true = false;
|
|
std::string init_script =
|
|
R"init(
|
|
on boot
|
|
pass_test
|
|
)init";
|
|
|
|
auto do_pass_test = [&expect_true](const BuiltinArguments&) {
|
|
expect_true = true;
|
|
return Result<void>{};
|
|
};
|
|
BuiltinFunctionMap test_function_map = {
|
|
{"pass_test", {0, 0, {false, do_pass_test}}},
|
|
};
|
|
|
|
ActionManagerCommand trigger_boot = [](ActionManager& am) { am.QueueEventTrigger("boot"); };
|
|
std::vector<ActionManagerCommand> commands{trigger_boot};
|
|
|
|
ActionManager action_manager;
|
|
ServiceList service_list;
|
|
TestInitText(init_script, test_function_map, commands, &action_manager, &service_list);
|
|
|
|
EXPECT_TRUE(expect_true);
|
|
}
|
|
|
|
TEST(init, WrongEventTrigger) {
|
|
std::string init_script =
|
|
R"init(
|
|
on boot:
|
|
pass_test
|
|
)init";
|
|
|
|
TemporaryFile tf;
|
|
ASSERT_TRUE(tf.fd != -1);
|
|
ASSERT_TRUE(android::base::WriteStringToFd(init_script, tf.fd));
|
|
|
|
ActionManager am;
|
|
|
|
Parser parser;
|
|
parser.AddSectionParser("on", std::make_unique<ActionParser>(&am, nullptr));
|
|
|
|
ASSERT_TRUE(parser.ParseConfig(tf.path));
|
|
ASSERT_EQ(1u, parser.parse_error_count());
|
|
}
|
|
|
|
TEST(init, EventTriggerOrder) {
|
|
std::string init_script =
|
|
R"init(
|
|
on boot
|
|
execute_first
|
|
|
|
on boot && property:ro.hardware=*
|
|
execute_second
|
|
|
|
on boot
|
|
execute_third
|
|
|
|
)init";
|
|
|
|
int num_executed = 0;
|
|
auto do_execute_first = [&num_executed](const BuiltinArguments&) {
|
|
EXPECT_EQ(0, num_executed++);
|
|
return Result<void>{};
|
|
};
|
|
auto do_execute_second = [&num_executed](const BuiltinArguments&) {
|
|
EXPECT_EQ(1, num_executed++);
|
|
return Result<void>{};
|
|
};
|
|
auto do_execute_third = [&num_executed](const BuiltinArguments&) {
|
|
EXPECT_EQ(2, num_executed++);
|
|
return Result<void>{};
|
|
};
|
|
|
|
BuiltinFunctionMap test_function_map = {
|
|
{"execute_first", {0, 0, {false, do_execute_first}}},
|
|
{"execute_second", {0, 0, {false, do_execute_second}}},
|
|
{"execute_third", {0, 0, {false, do_execute_third}}},
|
|
};
|
|
|
|
ActionManagerCommand trigger_boot = [](ActionManager& am) { am.QueueEventTrigger("boot"); };
|
|
std::vector<ActionManagerCommand> commands{trigger_boot};
|
|
|
|
ActionManager action_manager;
|
|
ServiceList service_list;
|
|
TestInitText(init_script, test_function_map, commands, &action_manager, &service_list);
|
|
EXPECT_EQ(3, num_executed);
|
|
}
|
|
|
|
TEST(init, OverrideService) {
|
|
std::string init_script = R"init(
|
|
service A something
|
|
class first
|
|
user nobody
|
|
|
|
service A something
|
|
class second
|
|
user nobody
|
|
override
|
|
|
|
)init";
|
|
|
|
ActionManager action_manager;
|
|
ServiceList service_list;
|
|
TestInitText(init_script, BuiltinFunctionMap(), {}, &action_manager, &service_list);
|
|
ASSERT_EQ(1, std::distance(service_list.begin(), service_list.end()));
|
|
|
|
auto service = service_list.begin()->get();
|
|
ASSERT_NE(nullptr, service);
|
|
EXPECT_EQ(std::set<std::string>({"second"}), service->classnames());
|
|
EXPECT_EQ("A", service->name());
|
|
EXPECT_TRUE(service->is_override());
|
|
}
|
|
|
|
TEST(init, StartConsole) {
|
|
if (GetProperty("ro.build.type", "") == "user") {
|
|
GTEST_SKIP() << "Must run on userdebug/eng builds. b/262090304";
|
|
return;
|
|
}
|
|
if (getuid() != 0) {
|
|
GTEST_SKIP() << "Must be run as root.";
|
|
return;
|
|
}
|
|
std::string init_script = R"init(
|
|
service console /system/bin/sh
|
|
class core
|
|
console null
|
|
disabled
|
|
user root
|
|
group root shell log readproc
|
|
seclabel u:r:shell:s0
|
|
setenv HOSTNAME console
|
|
)init";
|
|
|
|
ActionManager action_manager;
|
|
ServiceList service_list;
|
|
TestInitText(init_script, BuiltinFunctionMap(), {}, &action_manager, &service_list);
|
|
ASSERT_EQ(std::distance(service_list.begin(), service_list.end()), 1);
|
|
|
|
auto service = service_list.begin()->get();
|
|
ASSERT_NE(service, nullptr);
|
|
ASSERT_RESULT_OK(service->Start());
|
|
const pid_t pid = service->pid();
|
|
ASSERT_GT(pid, 0);
|
|
EXPECT_NE(getsid(pid), 0);
|
|
service->Stop();
|
|
}
|
|
|
|
static std::string GetSecurityContext() {
|
|
char* ctx;
|
|
if (getcon(&ctx) == -1) {
|
|
ADD_FAILURE() << "Failed to call getcon : " << strerror(errno);
|
|
}
|
|
std::string result = std::string(ctx);
|
|
freecon(ctx);
|
|
return result;
|
|
}
|
|
|
|
void TestStartApexServices(const std::vector<std::string>& service_names,
|
|
const std::string& apex_name) {
|
|
for (auto const& svc : service_names) {
|
|
auto service = ServiceList::GetInstance().FindService(svc);
|
|
ASSERT_NE(nullptr, service);
|
|
ASSERT_RESULT_OK(service->Start());
|
|
ASSERT_TRUE(service->IsRunning());
|
|
LOG(INFO) << "Service " << svc << " is running";
|
|
if (!apex_name.empty()) {
|
|
service->set_filename("/apex/" + apex_name + "/init_test.rc");
|
|
} else {
|
|
service->set_filename("");
|
|
}
|
|
}
|
|
if (!apex_name.empty()) {
|
|
auto apex_services = ServiceList::GetInstance().FindServicesByApexName(apex_name);
|
|
EXPECT_EQ(service_names.size(), apex_services.size());
|
|
}
|
|
}
|
|
|
|
void TestStopApexServices(const std::vector<std::string>& service_names, bool expect_to_run) {
|
|
for (auto const& svc : service_names) {
|
|
auto service = ServiceList::GetInstance().FindService(svc);
|
|
ASSERT_NE(nullptr, service);
|
|
EXPECT_EQ(expect_to_run, service->IsRunning());
|
|
}
|
|
}
|
|
|
|
void TestRemoveApexService(const std::vector<std::string>& service_names, bool exist) {
|
|
for (auto const& svc : service_names) {
|
|
auto service = ServiceList::GetInstance().FindService(svc);
|
|
ASSERT_EQ(exist, service != nullptr);
|
|
}
|
|
}
|
|
|
|
void InitApexService(const std::string_view& init_template) {
|
|
std::string init_script = StringReplace(init_template, "$selabel",
|
|
GetSecurityContext(), true);
|
|
|
|
TestInitText(init_script, BuiltinFunctionMap(), {}, &ActionManager::GetInstance(),
|
|
&ServiceList::GetInstance());
|
|
}
|
|
|
|
void CleanupApexServices() {
|
|
std::vector<std::string> names;
|
|
for (const auto& s : ServiceList::GetInstance()) {
|
|
names.push_back(s->name());
|
|
}
|
|
|
|
for (const auto& name : names) {
|
|
auto s = ServiceList::GetInstance().FindService(name);
|
|
auto pid = s->pid();
|
|
ServiceList::GetInstance().RemoveService(*s);
|
|
if (pid > 0) {
|
|
kill(pid, SIGTERM);
|
|
kill(pid, SIGKILL);
|
|
}
|
|
}
|
|
|
|
ActionManager::GetInstance().RemoveActionIf([&](const std::unique_ptr<Action>& s) -> bool {
|
|
return true;
|
|
});
|
|
}
|
|
|
|
void TestApexServicesInit(const std::vector<std::string>& apex_services,
|
|
const std::vector<std::string>& other_apex_services,
|
|
const std::vector<std::string> non_apex_services) {
|
|
auto num_svc = apex_services.size() + other_apex_services.size() + non_apex_services.size();
|
|
ASSERT_EQ(num_svc, ServiceList::GetInstance().size());
|
|
|
|
TestStartApexServices(apex_services, "com.android.apex.test_service");
|
|
TestStartApexServices(other_apex_services, "com.android.other_apex.test_service");
|
|
TestStartApexServices(non_apex_services, /*apex_anme=*/ "");
|
|
|
|
StopServicesFromApex("com.android.apex.test_service");
|
|
TestStopApexServices(apex_services, /*expect_to_run=*/ false);
|
|
TestStopApexServices(other_apex_services, /*expect_to_run=*/ true);
|
|
TestStopApexServices(non_apex_services, /*expect_to_run=*/ true);
|
|
|
|
RemoveServiceAndActionFromApex("com.android.apex.test_service");
|
|
ASSERT_EQ(other_apex_services.size() + non_apex_services.size(),
|
|
ServiceList::GetInstance().size());
|
|
|
|
// TODO(b/244232142): Add test to check if actions are removed
|
|
TestRemoveApexService(apex_services, /*exist*/ false);
|
|
TestRemoveApexService(other_apex_services, /*exist*/ true);
|
|
TestRemoveApexService(non_apex_services, /*exist*/ true);
|
|
|
|
CleanupApexServices();
|
|
}
|
|
|
|
TEST(init, StopServiceByApexName) {
|
|
if (getuid() != 0) {
|
|
GTEST_SKIP() << "Must be run as root.";
|
|
return;
|
|
}
|
|
std::string_view script_template = R"init(
|
|
service apex_test_service /system/bin/yes
|
|
user shell
|
|
group shell
|
|
seclabel $selabel
|
|
)init";
|
|
InitApexService(script_template);
|
|
TestApexServicesInit({"apex_test_service"}, {}, {});
|
|
}
|
|
|
|
TEST(init, StopMultipleServicesByApexName) {
|
|
if (getuid() != 0) {
|
|
GTEST_SKIP() << "Must be run as root.";
|
|
return;
|
|
}
|
|
std::string_view script_template = R"init(
|
|
service apex_test_service_multiple_a /system/bin/yes
|
|
user shell
|
|
group shell
|
|
seclabel $selabel
|
|
service apex_test_service_multiple_b /system/bin/id
|
|
user shell
|
|
group shell
|
|
seclabel $selabel
|
|
)init";
|
|
InitApexService(script_template);
|
|
TestApexServicesInit({"apex_test_service_multiple_a",
|
|
"apex_test_service_multiple_b"}, {}, {});
|
|
}
|
|
|
|
TEST(init, StopServicesFromMultipleApexes) {
|
|
if (getuid() != 0) {
|
|
GTEST_SKIP() << "Must be run as root.";
|
|
return;
|
|
}
|
|
std::string_view apex_script_template = R"init(
|
|
service apex_test_service_multi_apex_a /system/bin/yes
|
|
user shell
|
|
group shell
|
|
seclabel $selabel
|
|
service apex_test_service_multi_apex_b /system/bin/id
|
|
user shell
|
|
group shell
|
|
seclabel $selabel
|
|
)init";
|
|
InitApexService(apex_script_template);
|
|
|
|
std::string_view other_apex_script_template = R"init(
|
|
service apex_test_service_multi_apex_c /system/bin/yes
|
|
user shell
|
|
group shell
|
|
seclabel $selabel
|
|
)init";
|
|
InitApexService(other_apex_script_template);
|
|
|
|
TestApexServicesInit({"apex_test_service_multi_apex_a",
|
|
"apex_test_service_multi_apex_b"}, {"apex_test_service_multi_apex_c"}, {});
|
|
}
|
|
|
|
TEST(init, StopServicesFromApexAndNonApex) {
|
|
if (getuid() != 0) {
|
|
GTEST_SKIP() << "Must be run as root.";
|
|
return;
|
|
}
|
|
std::string_view apex_script_template = R"init(
|
|
service apex_test_service_apex_a /system/bin/yes
|
|
user shell
|
|
group shell
|
|
seclabel $selabel
|
|
service apex_test_service_apex_b /system/bin/id
|
|
user shell
|
|
group shell
|
|
seclabel $selabel
|
|
)init";
|
|
InitApexService(apex_script_template);
|
|
|
|
std::string_view non_apex_script_template = R"init(
|
|
service apex_test_service_non_apex /system/bin/yes
|
|
user shell
|
|
group shell
|
|
seclabel $selabel
|
|
)init";
|
|
InitApexService(non_apex_script_template);
|
|
|
|
TestApexServicesInit({"apex_test_service_apex_a",
|
|
"apex_test_service_apex_b"}, {}, {"apex_test_service_non_apex"});
|
|
}
|
|
|
|
TEST(init, StopServicesFromApexMixed) {
|
|
if (getuid() != 0) {
|
|
GTEST_SKIP() << "Must be run as root.";
|
|
return;
|
|
}
|
|
std::string_view script_template = R"init(
|
|
service apex_test_service_mixed_a /system/bin/yes
|
|
user shell
|
|
group shell
|
|
seclabel $selabel
|
|
)init";
|
|
InitApexService(script_template);
|
|
|
|
std::string_view other_apex_script_template = R"init(
|
|
service apex_test_service_mixed_b /system/bin/yes
|
|
user shell
|
|
group shell
|
|
seclabel $selabel
|
|
)init";
|
|
InitApexService(other_apex_script_template);
|
|
|
|
std::string_view non_apex_script_template = R"init(
|
|
service apex_test_service_mixed_c /system/bin/yes
|
|
user shell
|
|
group shell
|
|
seclabel $selabel
|
|
)init";
|
|
InitApexService(non_apex_script_template);
|
|
|
|
TestApexServicesInit({"apex_test_service_mixed_a"},
|
|
{"apex_test_service_mixed_b"}, {"apex_test_service_mixed_c"});
|
|
}
|
|
|
|
TEST(init, EventTriggerOrderMultipleFiles) {
|
|
// 6 total files, which should have their triggers executed in the following order:
|
|
// 1: start - original script parsed
|
|
// 2: first_import - immediately imported by first_script
|
|
// 3: dir_a - file named 'a.rc' in dir; dir is imported after first_import
|
|
// 4: a_import - file imported by dir_a
|
|
// 5: dir_b - file named 'b.rc' in dir
|
|
// 6: last_import - imported after dir is imported
|
|
|
|
TemporaryFile first_import;
|
|
ASSERT_TRUE(first_import.fd != -1);
|
|
ASSERT_TRUE(android::base::WriteStringToFd("on boot\nexecute 2", first_import.fd));
|
|
|
|
TemporaryFile dir_a_import;
|
|
ASSERT_TRUE(dir_a_import.fd != -1);
|
|
ASSERT_TRUE(android::base::WriteStringToFd("on boot\nexecute 4", dir_a_import.fd));
|
|
|
|
TemporaryFile last_import;
|
|
ASSERT_TRUE(last_import.fd != -1);
|
|
ASSERT_TRUE(android::base::WriteStringToFd("on boot\nexecute 6", last_import.fd));
|
|
|
|
TemporaryDir dir;
|
|
// clang-format off
|
|
std::string dir_a_script = "import " + std::string(dir_a_import.path) + "\n"
|
|
"on boot\n"
|
|
"execute 3";
|
|
// clang-format on
|
|
// WriteFile() ensures the right mode is set
|
|
ASSERT_RESULT_OK(WriteFile(std::string(dir.path) + "/a.rc", dir_a_script));
|
|
|
|
ASSERT_RESULT_OK(WriteFile(std::string(dir.path) + "/b.rc", "on boot\nexecute 5"));
|
|
|
|
// clang-format off
|
|
std::string start_script = "import " + std::string(first_import.path) + "\n"
|
|
"import " + std::string(dir.path) + "\n"
|
|
"import " + std::string(last_import.path) + "\n"
|
|
"on boot\n"
|
|
"execute 1";
|
|
// clang-format on
|
|
TemporaryFile start;
|
|
ASSERT_TRUE(android::base::WriteStringToFd(start_script, start.fd));
|
|
|
|
int num_executed = 0;
|
|
auto execute_command = [&num_executed](const BuiltinArguments& args) {
|
|
EXPECT_EQ(2U, args.size());
|
|
EXPECT_EQ(++num_executed, std::stoi(args[1]));
|
|
return Result<void>{};
|
|
};
|
|
|
|
BuiltinFunctionMap test_function_map = {
|
|
{"execute", {1, 1, {false, execute_command}}},
|
|
};
|
|
|
|
ActionManagerCommand trigger_boot = [](ActionManager& am) { am.QueueEventTrigger("boot"); };
|
|
std::vector<ActionManagerCommand> commands{trigger_boot};
|
|
|
|
ActionManager action_manager;
|
|
ServiceList service_list;
|
|
TestInit(start.path, test_function_map, commands, &action_manager, &service_list);
|
|
|
|
EXPECT_EQ(6, num_executed);
|
|
}
|
|
|
|
BuiltinFunctionMap GetTestFunctionMapForLazyLoad(int& num_executed, ActionManager& action_manager) {
|
|
auto execute_command = [&num_executed](const BuiltinArguments& args) {
|
|
EXPECT_EQ(2U, args.size());
|
|
EXPECT_EQ(++num_executed, std::stoi(args[1]));
|
|
return Result<void>{};
|
|
};
|
|
auto load_command = [&action_manager](const BuiltinArguments& args) -> Result<void> {
|
|
EXPECT_EQ(2U, args.size());
|
|
Parser parser;
|
|
parser.AddSectionParser("on", std::make_unique<ActionParser>(&action_manager, nullptr));
|
|
if (!parser.ParseConfig(args[1])) {
|
|
return Error() << "Failed to load";
|
|
}
|
|
return Result<void>{};
|
|
};
|
|
auto trigger_command = [&action_manager](const BuiltinArguments& args) {
|
|
EXPECT_EQ(2U, args.size());
|
|
LOG(INFO) << "Queue event trigger: " << args[1];
|
|
action_manager.QueueEventTrigger(args[1]);
|
|
return Result<void>{};
|
|
};
|
|
BuiltinFunctionMap test_function_map = {
|
|
{"execute", {1, 1, {false, execute_command}}},
|
|
{"load", {1, 1, {false, load_command}}},
|
|
{"trigger", {1, 1, {false, trigger_command}}},
|
|
};
|
|
return test_function_map;
|
|
}
|
|
|
|
TEST(init, LazilyLoadedActionsCantBeTriggeredByTheSameTrigger) {
|
|
// "start" script loads "lazy" script. Even though "lazy" scripts
|
|
// defines "on boot" action, it's not executed by the current "boot"
|
|
// event because it's already processed.
|
|
TemporaryFile lazy;
|
|
ASSERT_TRUE(lazy.fd != -1);
|
|
ASSERT_TRUE(android::base::WriteStringToFd("on boot\nexecute 2", lazy.fd));
|
|
|
|
TemporaryFile start;
|
|
// clang-format off
|
|
std::string start_script = "on boot\n"
|
|
"load " + std::string(lazy.path) + "\n"
|
|
"execute 1";
|
|
// clang-format on
|
|
ASSERT_TRUE(android::base::WriteStringToFd(start_script, start.fd));
|
|
|
|
int num_executed = 0;
|
|
ActionManager action_manager;
|
|
ServiceList service_list;
|
|
BuiltinFunctionMap test_function_map =
|
|
GetTestFunctionMapForLazyLoad(num_executed, action_manager);
|
|
|
|
ActionManagerCommand trigger_boot = [](ActionManager& am) { am.QueueEventTrigger("boot"); };
|
|
std::vector<ActionManagerCommand> commands{trigger_boot};
|
|
TestInit(start.path, test_function_map, commands, &action_manager, &service_list);
|
|
|
|
EXPECT_EQ(1, num_executed);
|
|
}
|
|
|
|
TEST(init, LazilyLoadedActionsCanBeTriggeredByTheNextTrigger) {
|
|
// "start" script loads "lazy" script and then triggers "next" event
|
|
// which executes "on next" action loaded by the previous command.
|
|
TemporaryFile lazy;
|
|
ASSERT_TRUE(lazy.fd != -1);
|
|
ASSERT_TRUE(android::base::WriteStringToFd("on next\nexecute 2", lazy.fd));
|
|
|
|
TemporaryFile start;
|
|
// clang-format off
|
|
std::string start_script = "on boot\n"
|
|
"load " + std::string(lazy.path) + "\n"
|
|
"execute 1\n"
|
|
"trigger next";
|
|
// clang-format on
|
|
ASSERT_TRUE(android::base::WriteStringToFd(start_script, start.fd));
|
|
|
|
int num_executed = 0;
|
|
ActionManager action_manager;
|
|
ServiceList service_list;
|
|
BuiltinFunctionMap test_function_map =
|
|
GetTestFunctionMapForLazyLoad(num_executed, action_manager);
|
|
|
|
ActionManagerCommand trigger_boot = [](ActionManager& am) { am.QueueEventTrigger("boot"); };
|
|
std::vector<ActionManagerCommand> commands{trigger_boot};
|
|
TestInit(start.path, test_function_map, commands, &action_manager, &service_list);
|
|
|
|
EXPECT_EQ(2, num_executed);
|
|
}
|
|
|
|
TEST(init, RejectsNoUserStartingInV) {
|
|
std::string init_script =
|
|
R"init(
|
|
service A something
|
|
class first
|
|
)init";
|
|
|
|
TemporaryFile tf;
|
|
ASSERT_TRUE(tf.fd != -1);
|
|
ASSERT_TRUE(android::base::WriteStringToFd(init_script, tf.fd));
|
|
|
|
ServiceList service_list;
|
|
Parser parser;
|
|
parser.AddSectionParser("service",
|
|
std::make_unique<ServiceParser>(&service_list, nullptr, std::nullopt));
|
|
|
|
ASSERT_TRUE(parser.ParseConfig(tf.path));
|
|
|
|
if (GetIntProperty("ro.vendor.api_level", 0) > __ANDROID_API_V__) {
|
|
ASSERT_EQ(1u, parser.parse_error_count());
|
|
} else {
|
|
ASSERT_EQ(0u, parser.parse_error_count());
|
|
}
|
|
}
|
|
|
|
TEST(init, RejectsCriticalAndOneshotService) {
|
|
if (GetIntProperty("ro.product.first_api_level", 10000) < 30) {
|
|
GTEST_SKIP() << "Test only valid for devices launching with R or later";
|
|
}
|
|
|
|
std::string init_script =
|
|
R"init(
|
|
service A something
|
|
class first
|
|
user root
|
|
critical
|
|
oneshot
|
|
)init";
|
|
|
|
TemporaryFile tf;
|
|
ASSERT_TRUE(tf.fd != -1);
|
|
ASSERT_TRUE(android::base::WriteStringToFd(init_script, tf.fd));
|
|
|
|
ServiceList service_list;
|
|
Parser parser;
|
|
parser.AddSectionParser("service",
|
|
std::make_unique<ServiceParser>(&service_list, nullptr, std::nullopt));
|
|
|
|
ASSERT_TRUE(parser.ParseConfig(tf.path));
|
|
ASSERT_EQ(1u, parser.parse_error_count());
|
|
}
|
|
|
|
TEST(init, MemLockLimit) {
|
|
// Test is enforced only for U+ devices
|
|
if (android::base::GetIntProperty("ro.vendor.api_level", 0) < __ANDROID_API_U__) {
|
|
GTEST_SKIP();
|
|
}
|
|
|
|
// Verify we are running memlock at, or under, 64KB
|
|
const unsigned long max_limit = 65536;
|
|
struct rlimit curr_limit;
|
|
ASSERT_EQ(getrlimit(RLIMIT_MEMLOCK, &curr_limit), 0);
|
|
ASSERT_LE(curr_limit.rlim_cur, max_limit);
|
|
ASSERT_LE(curr_limit.rlim_max, max_limit);
|
|
}
|
|
|
|
void CloseAllFds() {
|
|
DIR* dir;
|
|
struct dirent* ent;
|
|
int fd;
|
|
|
|
if ((dir = opendir("/proc/self/fd"))) {
|
|
while ((ent = readdir(dir))) {
|
|
if (sscanf(ent->d_name, "%d", &fd) == 1) {
|
|
close(fd);
|
|
}
|
|
}
|
|
closedir(dir);
|
|
}
|
|
}
|
|
|
|
pid_t ForkExecvpAsync(const char* argv[]) {
|
|
pid_t pid = fork();
|
|
if (pid == 0) {
|
|
// Child process.
|
|
CloseAllFds();
|
|
|
|
execvp(argv[0], const_cast<char**>(argv));
|
|
PLOG(ERROR) << "exec in ForkExecvpAsync init test";
|
|
_exit(EXIT_FAILURE);
|
|
}
|
|
// Parent process.
|
|
if (pid == -1) {
|
|
PLOG(ERROR) << "fork in ForkExecvpAsync init test";
|
|
return -1;
|
|
}
|
|
return pid;
|
|
}
|
|
|
|
pid_t TracerPid(pid_t pid) {
|
|
static constexpr std::string_view prefix{"TracerPid:"};
|
|
std::ifstream is(StringPrintf("/proc/%d/status", pid));
|
|
std::string line;
|
|
while (std::getline(is, line)) {
|
|
if (line.find(prefix) == 0) {
|
|
return atoi(line.substr(prefix.length()).c_str());
|
|
}
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
TEST(init, GentleKill) {
|
|
if (getuid() != 0) {
|
|
GTEST_SKIP() << "Must be run as root.";
|
|
return;
|
|
}
|
|
std::string init_script = R"init(
|
|
service test_gentle_kill /system/bin/sleep 1000
|
|
disabled
|
|
oneshot
|
|
gentle_kill
|
|
user root
|
|
group root
|
|
seclabel u:r:toolbox:s0
|
|
)init";
|
|
|
|
ActionManager action_manager;
|
|
ServiceList service_list;
|
|
TestInitText(init_script, BuiltinFunctionMap(), {}, &action_manager, &service_list);
|
|
ASSERT_EQ(std::distance(service_list.begin(), service_list.end()), 1);
|
|
|
|
auto service = service_list.begin()->get();
|
|
ASSERT_NE(service, nullptr);
|
|
ASSERT_RESULT_OK(service->Start());
|
|
const pid_t pid = service->pid();
|
|
ASSERT_GT(pid, 0);
|
|
EXPECT_NE(getsid(pid), 0);
|
|
|
|
TemporaryFile logfile;
|
|
logfile.DoNotRemove();
|
|
ASSERT_TRUE(logfile.fd != -1);
|
|
|
|
std::string pid_str = std::to_string(pid);
|
|
const char* argv[] = {"/system/bin/strace", "-o", logfile.path, "-e", "signal", "-p",
|
|
pid_str.c_str(), nullptr};
|
|
pid_t strace_pid = ForkExecvpAsync(argv);
|
|
|
|
// Give strace the chance to connect
|
|
while (TracerPid(pid) == 0) {
|
|
std::this_thread::sleep_for(10ms);
|
|
}
|
|
service->Stop();
|
|
|
|
int status;
|
|
waitpid(strace_pid, &status, 0);
|
|
|
|
std::string logs;
|
|
android::base::ReadFdToString(logfile.fd, &logs);
|
|
ASSERT_NE(logs.find("killed by SIGTERM"), std::string::npos);
|
|
}
|
|
|
|
class TestCaseLogger : public ::testing::EmptyTestEventListener {
|
|
void OnTestStart(const ::testing::TestInfo& test_info) override {
|
|
#ifdef __ANDROID__
|
|
LOG(INFO) << "===== " << test_info.test_suite_name() << "::" << test_info.name() << " ("
|
|
<< test_info.file() << ":" << test_info.line() << ")";
|
|
#else
|
|
UNUSED(test_info);
|
|
#endif
|
|
}
|
|
};
|
|
|
|
} // namespace init
|
|
} // namespace android
|
|
|
|
int SubcontextTestChildMain(int, char**);
|
|
int FirmwareTestChildMain(int, char**);
|
|
|
|
int main(int argc, char** argv) {
|
|
if (argc > 1 && !strcmp(argv[1], "subcontext")) {
|
|
return SubcontextTestChildMain(argc, argv);
|
|
}
|
|
|
|
if (argc > 1 && !strcmp(argv[1], "firmware")) {
|
|
return FirmwareTestChildMain(argc, argv);
|
|
}
|
|
|
|
testing::InitGoogleTest(&argc, argv);
|
|
testing::UnitTest::GetInstance()->listeners().Append(new android::init::TestCaseLogger());
|
|
return RUN_ALL_TESTS();
|
|
}
|