blob: 279bce871bf8bd4a090d945df864717c09eab52a [file] [log] [blame]
Calin Juravle7d765462017-09-04 15:57:10 -07001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Calin Juravle0d0a4922018-01-23 19:54:11 -080017#include <cstdlib>
Calin Juravle29591732017-11-20 17:46:19 -080018#include <fcntl.h>
Calin Juravle7d765462017-09-04 15:57:10 -070019#include <stdlib.h>
20#include <string.h>
Calin Juravle29591732017-11-20 17:46:19 -080021#include <sys/types.h>
22#include <sys/stat.h>
Calin Juravle7d765462017-09-04 15:57:10 -070023
Calin Juravle29591732017-11-20 17:46:19 -080024#include <android-base/file.h>
Calin Juravle7d765462017-09-04 15:57:10 -070025#include <android-base/logging.h>
26#include <android-base/stringprintf.h>
Calin Juravle29591732017-11-20 17:46:19 -080027#include <android-base/unique_fd.h>
28
Calin Juravle7d765462017-09-04 15:57:10 -070029#include <cutils/properties.h>
Calin Juravle29591732017-11-20 17:46:19 -080030
Calin Juravle7d765462017-09-04 15:57:10 -070031#include <gtest/gtest.h>
32
Calin Juravle29591732017-11-20 17:46:19 -080033#include <selinux/android.h>
34#include <selinux/avc.h>
35
Calin Juravle7d765462017-09-04 15:57:10 -070036#include "dexopt.h"
37#include "InstalldNativeService.h"
38#include "globals.h"
39#include "tests/test_utils.h"
40#include "utils.h"
41
Calin Juravle29591732017-11-20 17:46:19 -080042using android::base::ReadFully;
43using android::base::unique_fd;
44
Calin Juravle7d765462017-09-04 15:57:10 -070045namespace android {
46namespace installd {
47
48// TODO(calin): try to dedup this code.
49#if defined(__arm__)
50static const std::string kRuntimeIsa = "arm";
51#elif defined(__aarch64__)
52static const std::string kRuntimeIsa = "arm64";
53#elif defined(__mips__) && !defined(__LP64__)
54static const std::string kRuntimeIsa = "mips";
55#elif defined(__mips__) && defined(__LP64__)
56static const std::string kRuntimeIsa = "mips64";
57#elif defined(__i386__)
58static const std::string kRuntimeIsa = "x86";
59#elif defined(__x86_64__)
60static const std::string kRuntimeIsa = "x86_64";
61#else
62static const std::string kRuntimeIsa = "none";
63#endif
64
65int get_property(const char *key, char *value, const char *default_value) {
66 return property_get(key, value, default_value);
67}
68
69bool calculate_oat_file_path(char path[PKG_PATH_MAX], const char *oat_dir, const char *apk_path,
70 const char *instruction_set) {
71 return calculate_oat_file_path_default(path, oat_dir, apk_path, instruction_set);
72}
73
74bool calculate_odex_file_path(char path[PKG_PATH_MAX], const char *apk_path,
75 const char *instruction_set) {
76 return calculate_odex_file_path_default(path, apk_path, instruction_set);
77}
78
79bool create_cache_path(char path[PKG_PATH_MAX], const char *src, const char *instruction_set) {
80 return create_cache_path_default(path, src, instruction_set);
81}
82
83static void run_cmd(const std::string& cmd) {
84 system(cmd.c_str());
85}
86
87static void mkdir(const std::string& path, uid_t owner, gid_t group, mode_t mode) {
88 ::mkdir(path.c_str(), mode);
89 ::chown(path.c_str(), owner, group);
90 ::chmod(path.c_str(), mode);
91}
92
Calin Juravle29591732017-11-20 17:46:19 -080093static int log_callback(int type, const char *fmt, ...) { // NOLINT
94 va_list ap;
95 int priority;
96
97 switch (type) {
98 case SELINUX_WARNING:
99 priority = ANDROID_LOG_WARN;
100 break;
101 case SELINUX_INFO:
102 priority = ANDROID_LOG_INFO;
103 break;
104 default:
105 priority = ANDROID_LOG_ERROR;
106 break;
107 }
108 va_start(ap, fmt);
109 LOG_PRI_VA(priority, "SELinux", fmt, ap);
110 va_end(ap);
111 return 0;
112}
113
114static bool init_selinux() {
115 int selinux_enabled = (is_selinux_enabled() > 0);
116
117 union selinux_callback cb;
118 cb.func_log = log_callback;
119 selinux_set_callback(SELINUX_CB_LOG, cb);
120
121 if (selinux_enabled && selinux_status_open(true) < 0) {
122 LOG(ERROR) << "Could not open selinux status; exiting";
123 return false;
124 }
125
126 return true;
127}
128
Calin Juravle7d765462017-09-04 15:57:10 -0700129// Base64 encoding of a simple dex files with 2 methods.
130static const char kDexFile[] =
131 "UEsDBBQAAAAIAOiOYUs9y6BLCgEAABQCAAALABwAY2xhc3Nlcy5kZXhVVAkAA/Ns+lkOHv1ZdXgL"
132 "AAEEI+UCAASIEwAAS0mt4DIwNmX4qpn7j/2wA7v7N+ZvoQpCJRlVx5SWa4YaiDAxMBQwMDBUhJkI"
133 "MUBBDyMDAzsDRJwFxAdioBDDHAYEYAbiFUAM1M5wAIhFGCGKDIDYAogdgNgDiH2BOAiI0xghekDm"
134 "sQIxGxQzM6ACRijNhCbOhCZfyohdPYyuh8szgtVkMkLsLhAAqeCDi+ejibPZZOZlltgxsDnqZSWW"
135 "JTKwOUFoZh9HayDhZM0g5AMS0M9JzEvX90/KSk0usWZgDAMaws5nAyXBzmpoYGlgAjsAyJoBMp0b"
136 "zQ8gGhbOTEhhzYwU3qxIYc2GFN6MClC/AhUyKUDMAYU9M1Qc5F8GKBscVgIQM0FxCwBQSwECHgMU"
137 "AAAACADojmFLPcugSwoBAAAUAgAACwAYAAAAAAAAAAAAoIEAAAAAY2xhc3Nlcy5kZXhVVAUAA/Ns"
138 "+ll1eAsAAQQj5QIABIgTAABQSwUGAAAAAAEAAQBRAAAATwEAAAAA";
139
140
141class DexoptTest : public testing::Test {
142protected:
143 static constexpr bool kDebug = false;
144 static constexpr uid_t kSystemUid = 1000;
145 static constexpr uid_t kSystemGid = 1000;
146 static constexpr int32_t kOSdkVersion = 25;
147 static constexpr int32_t kAppDataFlags = FLAG_STORAGE_CE | FLAG_STORAGE_DE;
Calin Juravle7d765462017-09-04 15:57:10 -0700148 static constexpr int32_t kTestUserId = 0;
Calin Juravled2affb82017-11-28 17:41:43 -0800149 static constexpr uid_t kTestAppId = 19999;
150
151 const gid_t kTestAppUid = multiuser_get_uid(kTestUserId, kTestAppId);
152 const uid_t kTestAppGid = multiuser_get_shared_gid(kTestUserId, kTestAppId);
Calin Juravle7d765462017-09-04 15:57:10 -0700153
154 InstalldNativeService* service_;
155 std::unique_ptr<std::string> volume_uuid_;
156 std::string package_name_;
Calin Juravle0d0a4922018-01-23 19:54:11 -0800157 std::string apk_path_;
Calin Juravle7d765462017-09-04 15:57:10 -0700158 std::string app_apk_dir_;
159 std::string app_private_dir_ce_;
160 std::string app_private_dir_de_;
161 std::string se_info_;
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000162 std::string app_oat_dir_;
Calin Juravle7d765462017-09-04 15:57:10 -0700163
164 int64_t ce_data_inode_;
165
166 std::string secondary_dex_ce_;
167 std::string secondary_dex_ce_link_;
168 std::string secondary_dex_de_;
169
170 virtual void SetUp() {
171 setenv("ANDROID_LOG_TAGS", "*:v", 1);
172 android::base::InitLogging(nullptr);
Calin Juravle29591732017-11-20 17:46:19 -0800173 // Initialize the globals holding the file system main paths (/data/, /system/ etc..).
174 // This is needed in order to compute the application and profile paths.
175 ASSERT_TRUE(init_globals_from_data_and_root());
176 // Initialize selinux log callbacks.
177 // This ensures that selinux is up and running and re-directs the selinux messages
178 // to logcat (in order to make it easier to investigate test results).
179 ASSERT_TRUE(init_selinux());
Calin Juravle7d765462017-09-04 15:57:10 -0700180 service_ = new InstalldNativeService();
181
182 volume_uuid_ = nullptr;
183 package_name_ = "com.installd.test.dexopt";
184 se_info_ = "default";
Calin Juravle7d765462017-09-04 15:57:10 -0700185 app_apk_dir_ = android_app_dir + package_name_;
186
187 create_mock_app();
188 }
189
190 virtual void TearDown() {
191 if (!kDebug) {
192 service_->destroyAppData(
193 volume_uuid_, package_name_, kTestUserId, kAppDataFlags, ce_data_inode_);
194 run_cmd("rm -rf " + app_apk_dir_);
195 run_cmd("rm -rf " + app_private_dir_ce_);
196 run_cmd("rm -rf " + app_private_dir_de_);
197 }
198 delete service_;
199 }
200
201 void create_mock_app() {
202 // Create the oat dir.
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000203 app_oat_dir_ = app_apk_dir_ + "/oat";
Calin Juravle7d765462017-09-04 15:57:10 -0700204 mkdir(app_apk_dir_, kSystemUid, kSystemGid, 0755);
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000205 service_->createOatDir(app_oat_dir_, kRuntimeIsa);
Calin Juravle7d765462017-09-04 15:57:10 -0700206
207 // Copy the primary apk.
Calin Juravle0d0a4922018-01-23 19:54:11 -0800208 apk_path_ = app_apk_dir_ + "/base.jar";
209 ASSERT_TRUE(WriteBase64ToFile(kDexFile, apk_path_, kSystemUid, kSystemGid, 0644));
Calin Juravle7d765462017-09-04 15:57:10 -0700210
211 // Create the app user data.
212 ASSERT_TRUE(service_->createAppData(
213 volume_uuid_,
214 package_name_,
215 kTestUserId,
216 kAppDataFlags,
217 kTestAppUid,
218 se_info_,
219 kOSdkVersion,
220 &ce_data_inode_).isOk());
221
222 // Create a secondary dex file on CE storage
223 const char* volume_uuid_cstr = volume_uuid_ == nullptr ? nullptr : volume_uuid_->c_str();
224 app_private_dir_ce_ = create_data_user_ce_package_path(
225 volume_uuid_cstr, kTestUserId, package_name_.c_str());
226 secondary_dex_ce_ = app_private_dir_ce_ + "/secondary_ce.jar";
227 ASSERT_TRUE(WriteBase64ToFile(kDexFile, secondary_dex_ce_, kTestAppUid, kTestAppGid, 0600));
228 std::string app_private_dir_ce_link = create_data_user_ce_package_path_as_user_link(
229 volume_uuid_cstr, kTestUserId, package_name_.c_str());
230 secondary_dex_ce_link_ = app_private_dir_ce_link + "/secondary_ce.jar";
231
232 // Create a secondary dex file on DE storage.
233 app_private_dir_de_ = create_data_user_de_package_path(
234 volume_uuid_cstr, kTestUserId, package_name_.c_str());
235 secondary_dex_de_ = app_private_dir_de_ + "/secondary_de.jar";
236 ASSERT_TRUE(WriteBase64ToFile(kDexFile, secondary_dex_de_, kTestAppUid, kTestAppGid, 0600));
237
238 // Fix app data uid.
239 ASSERT_TRUE(service_->fixupAppData(volume_uuid_, kTestUserId).isOk());
240 }
241
242
Calin Juravle29591732017-11-20 17:46:19 -0800243 std::string GetSecondaryDexArtifact(const std::string& path, const std::string& type) {
Calin Juravle7d765462017-09-04 15:57:10 -0700244 std::string::size_type end = path.rfind('.');
245 std::string::size_type start = path.rfind('/', end);
246 return path.substr(0, start) + "/oat/" + kRuntimeIsa + "/" +
247 path.substr(start + 1, end - start) + type;
248 }
249
Calin Juravle29591732017-11-20 17:46:19 -0800250 void CompileSecondaryDex(const std::string& path, int32_t dex_storage_flag,
Calin Juravle7d765462017-09-04 15:57:10 -0700251 bool should_binder_call_succeed, bool should_dex_be_compiled = true,
Andreas Gampe023b2242018-02-28 16:03:25 -0800252 /*out */ binder::Status* binder_result = nullptr, int32_t uid = -1) {
Calin Juravled2affb82017-11-28 17:41:43 -0800253 if (uid == -1) {
254 uid = kTestAppUid;
255 }
Calin Juravle7d765462017-09-04 15:57:10 -0700256 std::unique_ptr<std::string> package_name_ptr(new std::string(package_name_));
257 int32_t dexopt_needed = 0; // does not matter;
258 std::unique_ptr<std::string> out_path = nullptr; // does not matter
259 int32_t dex_flags = DEXOPT_SECONDARY_DEX | dex_storage_flag;
260 std::string compiler_filter = "speed-profile";
261 std::unique_ptr<std::string> class_loader_context_ptr(new std::string("&"));
262 std::unique_ptr<std::string> se_info_ptr(new std::string(se_info_));
263 bool downgrade = false;
David Brazdil570d3982018-01-16 20:15:43 +0000264 int32_t target_sdk_version = 0; // default
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000265 std::unique_ptr<std::string> profile_name_ptr = nullptr;
Calin Juravle62c5a372018-02-01 17:03:23 +0000266 std::unique_ptr<std::string> dm_path_ptr = nullptr;
Calin Juravle2efc4022018-02-13 18:31:32 -0800267 std::unique_ptr<std::string> compilation_reason_ptr = nullptr;
Calin Juravle7d765462017-09-04 15:57:10 -0700268
269 binder::Status result = service_->dexopt(path,
270 uid,
271 package_name_ptr,
272 kRuntimeIsa,
273 dexopt_needed,
274 out_path,
275 dex_flags,
276 compiler_filter,
277 volume_uuid_,
278 class_loader_context_ptr,
279 se_info_ptr,
David Brazdil570d3982018-01-16 20:15:43 +0000280 downgrade,
Calin Juravle408cd4a2018-01-20 23:34:18 -0800281 target_sdk_version,
Calin Juravle62c5a372018-02-01 17:03:23 +0000282 profile_name_ptr,
Calin Juravle2efc4022018-02-13 18:31:32 -0800283 dm_path_ptr,
284 compilation_reason_ptr);
Andreas Gampef6a93b12018-02-27 09:51:15 -0800285 ASSERT_EQ(should_binder_call_succeed, result.isOk()) << result.toString8().c_str();
Calin Juravle7d765462017-09-04 15:57:10 -0700286 int expected_access = should_dex_be_compiled ? 0 : -1;
Calin Juravle29591732017-11-20 17:46:19 -0800287 std::string odex = GetSecondaryDexArtifact(path, "odex");
288 std::string vdex = GetSecondaryDexArtifact(path, "vdex");
289 std::string art = GetSecondaryDexArtifact(path, "art");
Calin Juravle7d765462017-09-04 15:57:10 -0700290 ASSERT_EQ(expected_access, access(odex.c_str(), R_OK));
291 ASSERT_EQ(expected_access, access(vdex.c_str(), R_OK));
292 ASSERT_EQ(-1, access(art.c_str(), R_OK)); // empty profiles do not generate an image.
Andreas Gampe023b2242018-02-28 16:03:25 -0800293 if (binder_result != nullptr) {
294 *binder_result = result;
295 }
Calin Juravle7d765462017-09-04 15:57:10 -0700296 }
297
298 void reconcile_secondary_dex(const std::string& path, int32_t storage_flag,
299 bool should_binder_call_succeed, bool should_dex_exist, bool should_dex_be_deleted,
Calin Juravled2affb82017-11-28 17:41:43 -0800300 int32_t uid = -1, std::string* package_override = nullptr) {
301 if (uid == -1) {
302 uid = kTestAppUid;
303 }
Calin Juravle7d765462017-09-04 15:57:10 -0700304 std::vector<std::string> isas;
305 isas.push_back(kRuntimeIsa);
306 bool out_secondary_dex_exists = false;
307 binder::Status result = service_->reconcileSecondaryDexFile(
308 path,
309 package_override == nullptr ? package_name_ : *package_override,
310 uid,
311 isas,
312 volume_uuid_,
313 storage_flag,
314 &out_secondary_dex_exists);
315
Andreas Gampef6a93b12018-02-27 09:51:15 -0800316 ASSERT_EQ(should_binder_call_succeed, result.isOk()) << result.toString8().c_str();
Calin Juravle7d765462017-09-04 15:57:10 -0700317 ASSERT_EQ(should_dex_exist, out_secondary_dex_exists);
318
319 int expected_access = should_dex_be_deleted ? -1 : 0;
Calin Juravle29591732017-11-20 17:46:19 -0800320 std::string odex = GetSecondaryDexArtifact(path, "odex");
321 std::string vdex = GetSecondaryDexArtifact(path, "vdex");
322 std::string art = GetSecondaryDexArtifact(path, "art");
Calin Juravle7d765462017-09-04 15:57:10 -0700323 ASSERT_EQ(expected_access, access(odex.c_str(), F_OK));
324 ASSERT_EQ(expected_access, access(vdex.c_str(), F_OK));
325 ASSERT_EQ(-1, access(art.c_str(), R_OK)); // empty profiles do not generate an image.
326 }
Calin Juravle29591732017-11-20 17:46:19 -0800327
328 void CheckFileAccess(const std::string& file, uid_t uid, gid_t gid, mode_t mode) {
329 struct stat st;
330 ASSERT_EQ(0, stat(file.c_str(), &st));
331 ASSERT_EQ(uid, st.st_uid);
332 ASSERT_EQ(gid, st.st_gid);
333 ASSERT_EQ(mode, st.st_mode);
334 }
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000335
336 void CompilePrimaryDexOk(std::string compiler_filter,
337 int32_t dex_flags,
338 const char* oat_dir,
339 int32_t uid,
340 int32_t dexopt_needed,
Andreas Gampe023b2242018-02-28 16:03:25 -0800341 binder::Status* binder_result = nullptr,
Calin Juravle62c5a372018-02-01 17:03:23 +0000342 const char* dm_path = nullptr,
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000343 bool downgrade = false) {
Andreas Gampe023b2242018-02-28 16:03:25 -0800344 CompilePrimaryDex(compiler_filter,
345 dex_flags,
346 oat_dir,
347 uid,
348 dexopt_needed,
349 dm_path,
350 downgrade,
351 true,
352 binder_result);
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000353 }
354
355 void CompilePrimaryDexFail(std::string compiler_filter,
356 int32_t dex_flags,
357 const char* oat_dir,
358 int32_t uid,
359 int32_t dexopt_needed,
Andreas Gampe023b2242018-02-28 16:03:25 -0800360 binder::Status* binder_result = nullptr,
Calin Juravle62c5a372018-02-01 17:03:23 +0000361 const char* dm_path = nullptr,
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000362 bool downgrade = false) {
Andreas Gampe023b2242018-02-28 16:03:25 -0800363 CompilePrimaryDex(compiler_filter,
364 dex_flags,
365 oat_dir,
366 uid,
367 dexopt_needed,
368 dm_path,
369 downgrade,
370 false,
371 binder_result);
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000372 }
373
374 void CompilePrimaryDex(std::string compiler_filter,
375 int32_t dex_flags,
376 const char* oat_dir,
377 int32_t uid,
378 int32_t dexopt_needed,
Calin Juravle62c5a372018-02-01 17:03:23 +0000379 const char* dm_path,
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000380 bool downgrade,
Andreas Gampe023b2242018-02-28 16:03:25 -0800381 bool should_binder_call_succeed,
382 /*out */ binder::Status* binder_result) {
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000383 std::unique_ptr<std::string> package_name_ptr(new std::string(package_name_));
384 std::unique_ptr<std::string> out_path(
385 oat_dir == nullptr ? nullptr : new std::string(oat_dir));
386 std::unique_ptr<std::string> class_loader_context_ptr(new std::string("&"));
387 std::unique_ptr<std::string> se_info_ptr(new std::string(se_info_));
388 int32_t target_sdk_version = 0; // default
389 std::unique_ptr<std::string> profile_name_ptr(new std::string("primary.prof"));
Calin Juravle62c5a372018-02-01 17:03:23 +0000390 std::unique_ptr<std::string> dm_path_ptr = nullptr;
391 if (dm_path != nullptr) {
392 dm_path_ptr.reset(new std::string(dm_path));
393 }
Calin Juravle2efc4022018-02-13 18:31:32 -0800394 std::unique_ptr<std::string> compilation_reason_ptr(new std::string("test-reason"));
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000395
396 bool prof_result;
397 binder::Status prof_binder_result = service_->prepareAppProfile(
Jeff Sharkey1ebe77f2018-02-27 11:40:45 -0700398 package_name_, kTestUserId, kTestAppId, *profile_name_ptr, apk_path_,
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000399 /*dex_metadata*/ nullptr, &prof_result);
400
Andreas Gampef6a93b12018-02-27 09:51:15 -0800401 ASSERT_TRUE(prof_binder_result.isOk()) << prof_binder_result.toString8().c_str();
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000402 ASSERT_TRUE(prof_result);
403
404 binder::Status result = service_->dexopt(apk_path_,
405 uid,
406 package_name_ptr,
407 kRuntimeIsa,
408 dexopt_needed,
409 out_path,
410 dex_flags,
411 compiler_filter,
412 volume_uuid_,
413 class_loader_context_ptr,
414 se_info_ptr,
415 downgrade,
416 target_sdk_version,
Calin Juravle62c5a372018-02-01 17:03:23 +0000417 profile_name_ptr,
Calin Juravle2efc4022018-02-13 18:31:32 -0800418 dm_path_ptr,
419 compilation_reason_ptr);
Andreas Gampef6a93b12018-02-27 09:51:15 -0800420 ASSERT_EQ(should_binder_call_succeed, result.isOk()) << result.toString8().c_str();
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000421
422 if (!should_binder_call_succeed) {
Andreas Gampe023b2242018-02-28 16:03:25 -0800423 if (binder_result != nullptr) {
424 *binder_result = result;
425 }
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000426 return;
427 }
428 // Check the access to the compiler output.
429 // - speed-profile artifacts are not world-wide readable.
430 // - files are owned by the system uid.
431 std::string odex = GetPrimaryDexArtifact(oat_dir, apk_path_, "odex");
432 std::string vdex = GetPrimaryDexArtifact(oat_dir, apk_path_, "vdex");
433 std::string art = GetPrimaryDexArtifact(oat_dir, apk_path_, "art");
434
Calin Juravle5bd1c722018-02-01 17:23:54 +0000435 bool is_public = (dex_flags & DEXOPT_PUBLIC) != 0;
436 mode_t mode = S_IFREG | (is_public ? 0644 : 0640);
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000437 CheckFileAccess(odex, kSystemUid, uid, mode);
438 CheckFileAccess(vdex, kSystemUid, uid, mode);
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000439
Calin Juravle5bd1c722018-02-01 17:23:54 +0000440 if (compiler_filter == "speed-profile") {
441 CheckFileAccess(art, kSystemUid, uid, mode);
442 }
Andreas Gampe023b2242018-02-28 16:03:25 -0800443 if (binder_result != nullptr) {
444 *binder_result = result;
445 }
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000446 }
447
448 std::string GetPrimaryDexArtifact(const char* oat_dir,
449 const std::string& dex_path,
450 const std::string& type) {
451 if (oat_dir == nullptr) {
452 std::string path = dex_path;
453 for (auto it = path.begin() + 1; it < path.end(); ++it) {
454 if (*it == '/') {
455 *it = '@';
456 }
457 }
458 return android_data_dir + DALVIK_CACHE + '/' + kRuntimeIsa + "/" + path
459 + "@classes.dex";
460 } else {
461 std::string::size_type name_end = dex_path.rfind('.');
462 std::string::size_type name_start = dex_path.rfind('/');
463 return std::string(oat_dir) + "/" + kRuntimeIsa + "/" +
464 dex_path.substr(name_start + 1, name_end - name_start) + type;
465 }
466 }
Calin Juravle7d765462017-09-04 15:57:10 -0700467};
468
469
470TEST_F(DexoptTest, DexoptSecondaryCe) {
471 LOG(INFO) << "DexoptSecondaryCe";
Calin Juravle29591732017-11-20 17:46:19 -0800472 CompileSecondaryDex(secondary_dex_ce_, DEXOPT_STORAGE_CE,
Calin Juravle7d765462017-09-04 15:57:10 -0700473 /*binder_ok*/ true, /*compile_ok*/ true);
474}
475
476TEST_F(DexoptTest, DexoptSecondaryCeLink) {
477 LOG(INFO) << "DexoptSecondaryCeLink";
Calin Juravle29591732017-11-20 17:46:19 -0800478 CompileSecondaryDex(secondary_dex_ce_link_, DEXOPT_STORAGE_CE,
Calin Juravle7d765462017-09-04 15:57:10 -0700479 /*binder_ok*/ true, /*compile_ok*/ true);
480}
481
482TEST_F(DexoptTest, DexoptSecondaryDe) {
483 LOG(INFO) << "DexoptSecondaryDe";
Calin Juravle29591732017-11-20 17:46:19 -0800484 CompileSecondaryDex(secondary_dex_de_, DEXOPT_STORAGE_DE,
Calin Juravle7d765462017-09-04 15:57:10 -0700485 /*binder_ok*/ true, /*compile_ok*/ true);
486}
487
488TEST_F(DexoptTest, DexoptSecondaryDoesNotExist) {
489 LOG(INFO) << "DexoptSecondaryDoesNotExist";
490 // If the file validates but does not exist we do not treat it as an error.
Andreas Gampe023b2242018-02-28 16:03:25 -0800491 binder::Status status;
Calin Juravle29591732017-11-20 17:46:19 -0800492 CompileSecondaryDex(secondary_dex_ce_ + "not.there", DEXOPT_STORAGE_CE,
Andreas Gampe023b2242018-02-28 16:03:25 -0800493 /*binder_ok*/ true, /*compile_ok*/ false, &status);
494 EXPECT_STREQ(status.toString8().c_str(), "No error");
Calin Juravle7d765462017-09-04 15:57:10 -0700495}
496
497TEST_F(DexoptTest, DexoptSecondaryStorageValidationError) {
498 LOG(INFO) << "DexoptSecondaryStorageValidationError";
Andreas Gampe023b2242018-02-28 16:03:25 -0800499 binder::Status status;
Calin Juravle29591732017-11-20 17:46:19 -0800500 CompileSecondaryDex(secondary_dex_ce_, DEXOPT_STORAGE_DE,
Andreas Gampe023b2242018-02-28 16:03:25 -0800501 /*binder_ok*/ false, /*compile_ok*/ false, &status);
Andreas Gampe3008bbe2018-02-28 20:24:48 -0800502 EXPECT_STREQ(status.toString8().c_str(),
503 "Status(-8): '-1: Dexoptanalyzer path validation failed'");
Calin Juravle7d765462017-09-04 15:57:10 -0700504}
505
506TEST_F(DexoptTest, DexoptSecondaryAppOwnershipValidationError) {
507 LOG(INFO) << "DexoptSecondaryAppOwnershipValidationError";
Andreas Gampe023b2242018-02-28 16:03:25 -0800508 binder::Status status;
Calin Juravle29591732017-11-20 17:46:19 -0800509 CompileSecondaryDex("/data/data/random.app/secondary.jar", DEXOPT_STORAGE_CE,
Andreas Gampe023b2242018-02-28 16:03:25 -0800510 /*binder_ok*/ false, /*compile_ok*/ false, &status);
Andreas Gampe3008bbe2018-02-28 20:24:48 -0800511 EXPECT_STREQ(status.toString8().c_str(),
512 "Status(-8): '-1: Dexoptanalyzer path validation failed'");
Calin Juravle7d765462017-09-04 15:57:10 -0700513}
514
515TEST_F(DexoptTest, DexoptSecondaryAcessViaDifferentUidError) {
516 LOG(INFO) << "DexoptSecondaryAcessViaDifferentUidError";
Andreas Gampe023b2242018-02-28 16:03:25 -0800517 binder::Status status;
Calin Juravle29591732017-11-20 17:46:19 -0800518 CompileSecondaryDex(secondary_dex_ce_, DEXOPT_STORAGE_CE,
Andreas Gampe023b2242018-02-28 16:03:25 -0800519 /*binder_ok*/ false, /*compile_ok*/ false, &status, kSystemUid);
Andreas Gampe3008bbe2018-02-28 20:24:48 -0800520 EXPECT_STREQ(status.toString8().c_str(), "Status(-8): '-1: Dexoptanalyzer open zip failed'");
Calin Juravle7d765462017-09-04 15:57:10 -0700521}
522
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000523TEST_F(DexoptTest, DexoptPrimaryPublic) {
524 LOG(INFO) << "DexoptPrimaryPublic";
525 CompilePrimaryDexOk("verify",
526 DEXOPT_BOOTCOMPLETE | DEXOPT_PUBLIC,
527 app_oat_dir_.c_str(),
528 kTestAppGid,
529 DEX2OAT_FROM_SCRATCH);
530}
531
Calin Juravle5bd1c722018-02-01 17:23:54 +0000532TEST_F(DexoptTest, DexoptPrimaryFailedInvalidFilter) {
533 LOG(INFO) << "DexoptPrimaryFailedInvalidFilter";
Andreas Gampe023b2242018-02-28 16:03:25 -0800534 binder::Status status;
Calin Juravle5bd1c722018-02-01 17:23:54 +0000535 CompilePrimaryDexFail("awesome-filter",
536 DEXOPT_IDLE_BACKGROUND_JOB | DEXOPT_PUBLIC,
537 app_oat_dir_.c_str(),
538 kTestAppGid,
Andreas Gampe023b2242018-02-28 16:03:25 -0800539 DEX2OAT_FROM_SCRATCH,
540 &status);
541 EXPECT_STREQ(status.toString8().c_str(),
542 "Status(-8): \'256: Dex2oat invocation for "
Andreas Gampefa2dadd2018-02-28 19:52:47 -0800543 "/data/app/com.installd.test.dexopt/base.jar failed: unspecified dex2oat error'");
Calin Juravle5bd1c722018-02-01 17:23:54 +0000544}
545
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000546TEST_F(DexoptTest, DexoptPrimaryProfileNonPublic) {
547 LOG(INFO) << "DexoptPrimaryProfileNonPublic";
548 CompilePrimaryDexOk("speed-profile",
Mathieu Chartier2d5a1bc2018-04-03 14:55:43 -0700549 DEXOPT_BOOTCOMPLETE | DEXOPT_PROFILE_GUIDED | DEXOPT_GENERATE_APP_IMAGE,
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000550 app_oat_dir_.c_str(),
551 kTestAppGid,
552 DEX2OAT_FROM_SCRATCH);
553}
554
555TEST_F(DexoptTest, DexoptPrimaryProfilePublic) {
556 LOG(INFO) << "DexoptPrimaryProfilePublic";
Calin Juravle5bd1c722018-02-01 17:23:54 +0000557 CompilePrimaryDexOk("speed-profile",
Mathieu Chartier2d5a1bc2018-04-03 14:55:43 -0700558 DEXOPT_BOOTCOMPLETE | DEXOPT_PROFILE_GUIDED | DEXOPT_PUBLIC |
559 DEXOPT_GENERATE_APP_IMAGE,
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000560 app_oat_dir_.c_str(),
561 kTestAppGid,
562 DEX2OAT_FROM_SCRATCH);
563}
564
565TEST_F(DexoptTest, DexoptPrimaryBackgroundOk) {
566 LOG(INFO) << "DexoptPrimaryBackgroundOk";
567 CompilePrimaryDexOk("speed-profile",
Mathieu Chartier2d5a1bc2018-04-03 14:55:43 -0700568 DEXOPT_IDLE_BACKGROUND_JOB | DEXOPT_PROFILE_GUIDED |
569 DEXOPT_GENERATE_APP_IMAGE,
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000570 app_oat_dir_.c_str(),
571 kTestAppGid,
572 DEX2OAT_FROM_SCRATCH);
573}
574
Calin Juravlec4f6a0b2018-02-01 01:27:24 +0000575class PrimaryDexReCompilationTest : public DexoptTest {
576 public:
577 virtual void SetUp() {
578 DexoptTest::SetUp();
579 CompilePrimaryDexOk("verify",
580 DEXOPT_BOOTCOMPLETE | DEXOPT_PUBLIC,
581 app_oat_dir_.c_str(),
582 kTestAppGid,
583 DEX2OAT_FROM_SCRATCH);
584 std::string odex = GetSecondaryDexArtifact(apk_path_, "odex");
585 std::string vdex = GetSecondaryDexArtifact(apk_path_, "vdex");
586
587 first_compilation_odex_fd_.reset(open(odex.c_str(), O_RDONLY));
588 first_compilation_vdex_fd_.reset(open(vdex.c_str(), O_RDONLY));
589 }
590
591 virtual void TearDown() {
592 first_compilation_odex_fd_.reset(-1);
593 first_compilation_vdex_fd_.reset(-1);
594 DexoptTest::TearDown();
595 }
596
597 protected:
598 unique_fd first_compilation_odex_fd_;
599 unique_fd first_compilation_vdex_fd_;
600};
601
602TEST_F(PrimaryDexReCompilationTest, DexoptPrimaryUpdateInPlaceVdex) {
603 LOG(INFO) << "DexoptPrimaryUpdateInPlaceVdex";
604
605 CompilePrimaryDexOk("verify",
606 DEXOPT_IDLE_BACKGROUND_JOB | DEXOPT_PUBLIC,
607 app_oat_dir_.c_str(),
608 kTestAppGid,
609 DEX2OAT_FOR_BOOT_IMAGE);
610}
Calin Juravle7d765462017-09-04 15:57:10 -0700611
612class ReconcileTest : public DexoptTest {
613 virtual void SetUp() {
614 DexoptTest::SetUp();
Calin Juravle29591732017-11-20 17:46:19 -0800615 CompileSecondaryDex(secondary_dex_ce_, DEXOPT_STORAGE_CE,
Calin Juravle7d765462017-09-04 15:57:10 -0700616 /*binder_ok*/ true, /*compile_ok*/ true);
Calin Juravle29591732017-11-20 17:46:19 -0800617 CompileSecondaryDex(secondary_dex_de_, DEXOPT_STORAGE_DE,
Calin Juravle7d765462017-09-04 15:57:10 -0700618 /*binder_ok*/ true, /*compile_ok*/ true);
619 }
620};
621
622TEST_F(ReconcileTest, ReconcileSecondaryCeExists) {
623 LOG(INFO) << "ReconcileSecondaryCeExists";
624 reconcile_secondary_dex(secondary_dex_ce_, FLAG_STORAGE_CE,
625 /*binder_ok*/ true, /*dex_ok */ true, /*odex_deleted*/ false);
626}
627
628TEST_F(ReconcileTest, ReconcileSecondaryCeLinkExists) {
629 LOG(INFO) << "ReconcileSecondaryCeLinkExists";
630 reconcile_secondary_dex(secondary_dex_ce_link_, FLAG_STORAGE_CE,
631 /*binder_ok*/ true, /*dex_ok */ true, /*odex_deleted*/ false);
632}
633
634TEST_F(ReconcileTest, ReconcileSecondaryDeExists) {
635 LOG(INFO) << "ReconcileSecondaryDeExists";
636 reconcile_secondary_dex(secondary_dex_de_, FLAG_STORAGE_DE,
637 /*binder_ok*/ true, /*dex_ok */ true, /*odex_deleted*/ false);
638}
639
640TEST_F(ReconcileTest, ReconcileSecondaryDeDoesNotExist) {
641 LOG(INFO) << "ReconcileSecondaryDeDoesNotExist";
642 run_cmd("rm -rf " + secondary_dex_de_);
643 reconcile_secondary_dex(secondary_dex_de_, FLAG_STORAGE_DE,
644 /*binder_ok*/ true, /*dex_ok */ false, /*odex_deleted*/ true);
645}
646
647TEST_F(ReconcileTest, ReconcileSecondaryStorageValidationError) {
648 // Validation errors will not clean the odex/vdex/art files but will mark
649 // the file as non existent so that the PM knows it should purge it from its
650 // records.
651 LOG(INFO) << "ReconcileSecondaryStorageValidationError";
652 reconcile_secondary_dex(secondary_dex_ce_, FLAG_STORAGE_DE,
653 /*binder_ok*/ true, /*dex_ok */ false, /*odex_deleted*/ false);
654}
655
656TEST_F(ReconcileTest, ReconcileSecondaryAppOwnershipValidationError) {
657 LOG(INFO) << "ReconcileSecondaryAppOwnershipValidationError";
658 // Attempt to reconcile the dex files of the test app from a different app.
659 std::string another_app = "another.app";
660 reconcile_secondary_dex(secondary_dex_ce_, FLAG_STORAGE_CE,
661 /*binder_ok*/ true, /*dex_ok */ false, /*odex_deleted*/ false, kSystemUid, &another_app);
662}
663
664TEST_F(ReconcileTest, ReconcileSecondaryAcessViaDifferentUidError) {
665 LOG(INFO) << "ReconcileSecondaryAcessViaDifferentUidError";
666 reconcile_secondary_dex(secondary_dex_ce_, FLAG_STORAGE_CE,
667 /*binder_ok*/ true, /*dex_ok */ false, /*odex_deleted*/ false, kSystemUid);
668}
669
Calin Juravle29591732017-11-20 17:46:19 -0800670class ProfileTest : public DexoptTest {
671 protected:
672 std::string cur_profile_;
673 std::string ref_profile_;
674 std::string snap_profile_;
675
Calin Juravle824a64d2018-01-18 20:23:17 -0800676 static constexpr const char* kPrimaryProfile = "primary.prof";
677
Calin Juravle29591732017-11-20 17:46:19 -0800678 virtual void SetUp() {
679 DexoptTest::SetUp();
680 cur_profile_ = create_current_profile_path(
Calin Juravle824a64d2018-01-18 20:23:17 -0800681 kTestUserId, package_name_, kPrimaryProfile, /*is_secondary_dex*/ false);
682 ref_profile_ = create_reference_profile_path(package_name_, kPrimaryProfile,
683 /*is_secondary_dex*/ false);
684 snap_profile_ = create_snapshot_profile_path(package_name_, kPrimaryProfile);
Calin Juravle29591732017-11-20 17:46:19 -0800685 }
686
Calin Juravle824a64d2018-01-18 20:23:17 -0800687 void SetupProfile(const std::string& path, uid_t uid, gid_t gid, mode_t mode,
688 int32_t num_dex) {
689 run_cmd("profman --generate-test-profile-seed=" + std::to_string(num_dex) +
690 " --generate-test-profile-num-dex=" + std::to_string(num_dex) +
691 " --generate-test-profile=" + path);
Calin Juravle29591732017-11-20 17:46:19 -0800692 ::chmod(path.c_str(), mode);
693 ::chown(path.c_str(), uid, gid);
694 }
695
696 void SetupProfiles(bool setup_ref) {
697 SetupProfile(cur_profile_, kTestAppUid, kTestAppGid, 0600, 1);
698 if (setup_ref) {
Calin Juravle824a64d2018-01-18 20:23:17 -0800699 SetupProfile(ref_profile_, kTestAppUid, kTestAppGid, 0600, 2);
Calin Juravle29591732017-11-20 17:46:19 -0800700 }
701 }
702
Calin Juravlec3596c32017-12-05 12:29:15 -0800703 void createProfileSnapshot(int32_t appid, const std::string& package_name,
704 bool expected_result) {
Calin Juravle29591732017-11-20 17:46:19 -0800705 bool result;
Calin Juravlec3596c32017-12-05 12:29:15 -0800706 binder::Status binder_result = service_->createProfileSnapshot(
Calin Juravle0d0a4922018-01-23 19:54:11 -0800707 appid, package_name, kPrimaryProfile, apk_path_, &result);
Andreas Gampef6a93b12018-02-27 09:51:15 -0800708 ASSERT_TRUE(binder_result.isOk()) << binder_result.toString8().c_str();
Calin Juravle29591732017-11-20 17:46:19 -0800709 ASSERT_EQ(expected_result, result);
710
711 if (!expected_result) {
712 // Do not check the files if we expect to fail.
713 return;
714 }
715
716 // Check that the snapshot was created witht he expected acess flags.
717 CheckFileAccess(snap_profile_, kSystemUid, kSystemGid, 0600 | S_IFREG);
718
719 // The snapshot should be equivalent to the merge of profiles.
720 std::string expected_profile_content = snap_profile_ + ".expected";
721 run_cmd("rm -f " + expected_profile_content);
722 run_cmd("touch " + expected_profile_content);
723 run_cmd("profman --profile-file=" + cur_profile_ +
724 " --profile-file=" + ref_profile_ +
Calin Juravle40b5f462018-02-07 04:11:52 -0800725 " --reference-profile-file=" + expected_profile_content +
726 " --apk=" + apk_path_);
Calin Juravle29591732017-11-20 17:46:19 -0800727
728 ASSERT_TRUE(AreFilesEqual(expected_profile_content, snap_profile_));
729
730 pid_t pid = fork();
731 if (pid == 0) {
732 /* child */
733 TransitionToSystemServer();
734
735 // System server should be able to open the the spanshot.
736 unique_fd fd(open(snap_profile_.c_str(), O_RDONLY));
737 ASSERT_TRUE(fd > -1) << "Failed to open profile as kSystemUid: " << strerror(errno);
738 _exit(0);
739 }
740 /* parent */
741 ASSERT_TRUE(WIFEXITED(wait_child(pid)));
742 }
743
Calin Juravle408cd4a2018-01-20 23:34:18 -0800744 void mergePackageProfiles(const std::string& package_name,
745 const std::string& code_path,
746 bool expected_result) {
Calin Juravle824a64d2018-01-18 20:23:17 -0800747 bool result;
748 binder::Status binder_result = service_->mergeProfiles(
Calin Juravle408cd4a2018-01-20 23:34:18 -0800749 kTestAppUid, package_name, code_path, &result);
Andreas Gampef6a93b12018-02-27 09:51:15 -0800750 ASSERT_TRUE(binder_result.isOk()) << binder_result.toString8().c_str();
Calin Juravle824a64d2018-01-18 20:23:17 -0800751 ASSERT_EQ(expected_result, result);
752
753 if (!expected_result) {
754 // Do not check the files if we expect to fail.
755 return;
756 }
757
758 // Check that the snapshot was created witht he expected acess flags.
759 CheckFileAccess(ref_profile_, kTestAppUid, kTestAppUid, 0600 | S_IFREG);
760
761 // The snapshot should be equivalent to the merge of profiles.
762 std::string ref_profile_content = ref_profile_ + ".expected";
763 run_cmd("rm -f " + ref_profile_content);
764 run_cmd("touch " + ref_profile_content);
765 run_cmd("profman --profile-file=" + cur_profile_ +
766 " --profile-file=" + ref_profile_ +
767 " --reference-profile-file=" + ref_profile_content);
768
769 ASSERT_TRUE(AreFilesEqual(ref_profile_content, ref_profile_));
770 }
771
Calin Juravlec3b049e2018-01-18 22:32:58 -0800772 // TODO(calin): add dex metadata tests once the ART change is merged.
773 void preparePackageProfile(const std::string& package_name, const std::string& profile_name,
774 bool expected_result) {
775 bool result;
776 binder::Status binder_result = service_->prepareAppProfile(
Jeff Sharkey1ebe77f2018-02-27 11:40:45 -0700777 package_name, kTestUserId, kTestAppId, profile_name, apk_path_,
Calin Juravlec3b049e2018-01-18 22:32:58 -0800778 /*dex_metadata*/ nullptr, &result);
Andreas Gampef6a93b12018-02-27 09:51:15 -0800779 ASSERT_TRUE(binder_result.isOk()) << binder_result.toString8().c_str();
Calin Juravlec3b049e2018-01-18 22:32:58 -0800780 ASSERT_EQ(expected_result, result);
781
782 if (!expected_result) {
783 // Do not check the files if we expect to fail.
784 return;
785 }
786
787 std::string code_path_cur_prof = create_current_profile_path(
788 kTestUserId, package_name, profile_name, /*is_secondary_dex*/ false);
789 std::string code_path_ref_profile = create_reference_profile_path(package_name,
790 profile_name, /*is_secondary_dex*/ false);
791
792 // Check that we created the current profile.
793 CheckFileAccess(code_path_cur_prof, kTestAppUid, kTestAppUid, 0600 | S_IFREG);
794
795 // Without dex metadata we don't generate a reference profile.
796 ASSERT_EQ(-1, access(code_path_ref_profile.c_str(), R_OK));
797 }
798
Calin Juravle0d0a4922018-01-23 19:54:11 -0800799 protected:
Calin Juravle29591732017-11-20 17:46:19 -0800800 void TransitionToSystemServer() {
801 ASSERT_TRUE(DropCapabilities(kSystemUid, kSystemGid));
802 int32_t res = selinux_android_setcontext(
803 kSystemUid, true, se_info_.c_str(), "system_server");
804 ASSERT_EQ(0, res) << "Failed to setcon " << strerror(errno);
805 }
806
807 bool AreFilesEqual(const std::string& file1, const std::string& file2) {
808 std::vector<uint8_t> content1;
809 std::vector<uint8_t> content2;
810
811 if (!ReadAll(file1, &content1)) return false;
812 if (!ReadAll(file2, &content2)) return false;
813 return content1 == content2;
814 }
815
816 bool ReadAll(const std::string& file, std::vector<uint8_t>* content) {
817 unique_fd fd(open(file.c_str(), O_RDONLY));
818 if (fd < 0) {
819 PLOG(ERROR) << "Failed to open " << file;
820 return false;
821 }
822 struct stat st;
823 if (fstat(fd, &st) != 0) {
824 PLOG(ERROR) << "Failed to stat " << file;
825 return false;
826 }
827 content->resize(st.st_size);
828 bool result = ReadFully(fd, content->data(), content->size());
829 if (!result) {
830 PLOG(ERROR) << "Failed to read " << file;
831 }
832 return result;
833 }
834};
835
836TEST_F(ProfileTest, ProfileSnapshotOk) {
837 LOG(INFO) << "ProfileSnapshotOk";
838
839 SetupProfiles(/*setup_ref*/ true);
Calin Juravlec3596c32017-12-05 12:29:15 -0800840 createProfileSnapshot(kTestAppId, package_name_, /*expected_result*/ true);
Calin Juravle29591732017-11-20 17:46:19 -0800841}
842
843// The reference profile is created on the fly. We need to be able to
844// snapshot without one.
845TEST_F(ProfileTest, ProfileSnapshotOkNoReference) {
846 LOG(INFO) << "ProfileSnapshotOkNoReference";
847
848 SetupProfiles(/*setup_ref*/ false);
Calin Juravlec3596c32017-12-05 12:29:15 -0800849 createProfileSnapshot(kTestAppId, package_name_, /*expected_result*/ true);
Calin Juravle29591732017-11-20 17:46:19 -0800850}
851
852TEST_F(ProfileTest, ProfileSnapshotFailWrongPackage) {
853 LOG(INFO) << "ProfileSnapshotFailWrongPackage";
854
855 SetupProfiles(/*setup_ref*/ true);
Calin Juravlec3596c32017-12-05 12:29:15 -0800856 createProfileSnapshot(kTestAppId, "not.there", /*expected_result*/ false);
Calin Juravle29591732017-11-20 17:46:19 -0800857}
858
859TEST_F(ProfileTest, ProfileSnapshotDestroySnapshot) {
860 LOG(INFO) << "ProfileSnapshotDestroySnapshot";
861
862 SetupProfiles(/*setup_ref*/ true);
Calin Juravlec3596c32017-12-05 12:29:15 -0800863 createProfileSnapshot(kTestAppId, package_name_, /*expected_result*/ true);
Calin Juravle29591732017-11-20 17:46:19 -0800864
Calin Juravle824a64d2018-01-18 20:23:17 -0800865 binder::Status binder_result = service_->destroyProfileSnapshot(package_name_, kPrimaryProfile);
Andreas Gampef6a93b12018-02-27 09:51:15 -0800866 ASSERT_TRUE(binder_result.isOk()) << binder_result.toString8().c_str();
Calin Juravle29591732017-11-20 17:46:19 -0800867 struct stat st;
868 ASSERT_EQ(-1, stat(snap_profile_.c_str(), &st));
869 ASSERT_EQ(ENOENT, errno);
870}
871
Calin Juravle824a64d2018-01-18 20:23:17 -0800872TEST_F(ProfileTest, ProfileMergeOk) {
873 LOG(INFO) << "ProfileMergeOk";
874
875 SetupProfiles(/*setup_ref*/ true);
Calin Juravle408cd4a2018-01-20 23:34:18 -0800876 mergePackageProfiles(package_name_, "primary.prof", /*expected_result*/ true);
Calin Juravle824a64d2018-01-18 20:23:17 -0800877}
878
879// The reference profile is created on the fly. We need to be able to
880// merge without one.
881TEST_F(ProfileTest, ProfileMergeOkNoReference) {
882 LOG(INFO) << "ProfileMergeOkNoReference";
883
884 SetupProfiles(/*setup_ref*/ false);
Calin Juravle408cd4a2018-01-20 23:34:18 -0800885 mergePackageProfiles(package_name_, "primary.prof", /*expected_result*/ true);
Calin Juravle824a64d2018-01-18 20:23:17 -0800886}
887
888TEST_F(ProfileTest, ProfileMergeFailWrongPackage) {
889 LOG(INFO) << "ProfileMergeFailWrongPackage";
890
891 SetupProfiles(/*setup_ref*/ true);
Calin Juravle408cd4a2018-01-20 23:34:18 -0800892 mergePackageProfiles("not.there", "primary.prof", /*expected_result*/ false);
Calin Juravle824a64d2018-01-18 20:23:17 -0800893}
894
Calin Juravled2affb82017-11-28 17:41:43 -0800895TEST_F(ProfileTest, ProfileDirOk) {
896 LOG(INFO) << "ProfileDirOk";
897
898 std::string cur_profile_dir = create_primary_current_profile_package_dir_path(
899 kTestUserId, package_name_);
900 std::string cur_profile_file = create_current_profile_path(kTestUserId, package_name_,
Calin Juravle824a64d2018-01-18 20:23:17 -0800901 kPrimaryProfile, /*is_secondary_dex*/false);
Calin Juravled2affb82017-11-28 17:41:43 -0800902 std::string ref_profile_dir = create_primary_reference_profile_package_dir_path(package_name_);
903
904 CheckFileAccess(cur_profile_dir, kTestAppUid, kTestAppUid, 0700 | S_IFDIR);
Calin Juravle6f06eb62017-11-28 18:44:53 -0800905 CheckFileAccess(ref_profile_dir, kSystemUid, kTestAppGid, 0770 | S_IFDIR);
906}
907
908// Verify that the profile directories are fixed up during an upgrade.
909// (The reference profile directory is prepared lazily).
910TEST_F(ProfileTest, ProfileDirOkAfterFixup) {
911 LOG(INFO) << "ProfileDirOkAfterFixup";
912
913 std::string cur_profile_dir = create_primary_current_profile_package_dir_path(
914 kTestUserId, package_name_);
915 std::string cur_profile_file = create_current_profile_path(kTestUserId, package_name_,
Calin Juravle824a64d2018-01-18 20:23:17 -0800916 kPrimaryProfile, /*is_secondary_dex*/false);
Calin Juravle6f06eb62017-11-28 18:44:53 -0800917 std::string ref_profile_dir = create_primary_reference_profile_package_dir_path(package_name_);
918
919 // Simulate a pre-P setup by changing the owner to kTestAppGid and permissions to 0700.
920 ASSERT_EQ(0, chown(ref_profile_dir.c_str(), kTestAppGid, kTestAppGid));
921 ASSERT_EQ(0, chmod(ref_profile_dir.c_str(), 0700));
922
923 // Run createAppData again which will offer to fix-up the profile directories.
924 ASSERT_TRUE(service_->createAppData(
925 volume_uuid_,
926 package_name_,
927 kTestUserId,
928 kAppDataFlags,
929 kTestAppUid,
930 se_info_,
931 kOSdkVersion,
932 &ce_data_inode_).isOk());
933
934 // Check the file access.
935 CheckFileAccess(cur_profile_dir, kTestAppUid, kTestAppUid, 0700 | S_IFDIR);
Calin Juravle6f06eb62017-11-28 18:44:53 -0800936 CheckFileAccess(ref_profile_dir, kSystemUid, kTestAppGid, 0770 | S_IFDIR);
Calin Juravled2affb82017-11-28 17:41:43 -0800937}
938
Calin Juravlec3b049e2018-01-18 22:32:58 -0800939TEST_F(ProfileTest, ProfilePrepareOk) {
940 LOG(INFO) << "ProfilePrepareOk";
941 preparePackageProfile(package_name_, "split.prof", /*expected_result*/ true);
942}
943
944TEST_F(ProfileTest, ProfilePrepareFailInvalidPackage) {
945 LOG(INFO) << "ProfilePrepareFailInvalidPackage";
946 preparePackageProfile("not.there.package", "split.prof", /*expected_result*/ false);
947}
948
949TEST_F(ProfileTest, ProfilePrepareFailProfileChangedUid) {
950 LOG(INFO) << "ProfilePrepareFailProfileChangedUid";
951 SetupProfiles(/*setup_ref*/ false);
952 // Change the uid on the profile to trigger a failure.
953 ::chown(cur_profile_.c_str(), kTestAppUid + 1, kTestAppGid + 1);
954 preparePackageProfile(package_name_, "primary.prof", /*expected_result*/ false);
955}
956
Calin Juravle0d0a4922018-01-23 19:54:11 -0800957
958class BootProfileTest : public ProfileTest {
959 public:
960 virtual void setup() {
961 ProfileTest::SetUp();
962 intial_android_profiles_dir = android_profiles_dir;
963 }
964
965 virtual void TearDown() {
966 android_profiles_dir = intial_android_profiles_dir;
967 ProfileTest::TearDown();
968 }
969
970 void UpdateAndroidProfilesDir(const std::string& profile_dir) {
971 android_profiles_dir = profile_dir;
972 // We need to create the reference profile directory in the new profile dir.
973 run_cmd("mkdir -p " + profile_dir + "/ref");
974 }
975
976 void createBootImageProfileSnapshot(const std::string& classpath, bool expected_result) {
977 bool result;
978 binder::Status binder_result = service_->createProfileSnapshot(
979 -1, "android", "android.prof", classpath, &result);
980 ASSERT_TRUE(binder_result.isOk());
981 ASSERT_EQ(expected_result, result);
982
983 if (!expected_result) {
984 // Do not check the files if we expect to fail.
985 return;
986 }
987
988 // Check that the snapshot was created with he expected access flags.
989 const std::string boot_profile = create_snapshot_profile_path("android", "android.prof");
990 CheckFileAccess(boot_profile, kSystemUid, kSystemGid, 0600 | S_IFREG);
991
992 pid_t pid = fork();
993 if (pid == 0) {
994 /* child */
995 TransitionToSystemServer();
996
997 // System server should be able to open the snapshot.
998 unique_fd fd(open(boot_profile.c_str(), O_RDONLY));
999 ASSERT_TRUE(fd > -1) << "Failed to open profile as kSystemUid: " << strerror(errno);
1000 _exit(0);
1001 }
1002 /* parent */
1003 ASSERT_TRUE(WIFEXITED(wait_child(pid)));
1004 }
1005 protected:
1006 std::string intial_android_profiles_dir;
1007};
1008
1009TEST_F(BootProfileTest, BootProfileSnapshotOk) {
1010 LOG(INFO) << "BootProfileSnapshotOk";
1011 char* boot_classpath = getenv("BOOTCLASSPATH");
1012 ASSERT_TRUE(boot_classpath != nullptr);
1013 createBootImageProfileSnapshot(boot_classpath, /*expected_result*/ true);
1014}
1015
1016TEST_F(BootProfileTest, BootProfileSnapshotFailEmptyClasspath) {
1017 LOG(INFO) << "BootProfileSnapshotFailEmptyClasspath";
1018
1019 createBootImageProfileSnapshot(/*boot_classpath*/ "", /*expected_result*/ false);
1020}
1021
1022TEST_F(BootProfileTest, BootProfileSnapshotOkNoProfiles) {
1023 LOG(INFO) << "BootProfileSnapshotOkNoProfiles";
1024 char* boot_classpath = getenv("BOOTCLASSPATH");
1025 ASSERT_TRUE(boot_classpath != nullptr);
1026
1027 // The app_apk_dir has no profiles. So we shouldn't be able to merge anything.
1028 // Still, this is not a failure case.
1029 UpdateAndroidProfilesDir(app_apk_dir_);
1030 createBootImageProfileSnapshot(boot_classpath, /*expected_result*/ true);
1031}
1032
1033// Verify that profile collection.
1034TEST_F(BootProfileTest, CollectProfiles) {
1035 LOG(INFO) << "CollectProfiles";
1036
1037 // Create some profile directories mimicking the real profile structure.
1038 run_cmd("mkdir -p " + app_private_dir_de_ + "/profiles/ref");
1039 run_cmd("mkdir -p " + app_private_dir_de_ + "/profiles/cur/0/");
1040 run_cmd("mkdir -p " + app_private_dir_de_ + "/profiles/cur/1/");
1041 // Create an empty profile.
1042 run_cmd("touch " + app_private_dir_de_ + "/profiles/cur/1/primary.prof");
1043 // Create a random file.
1044 run_cmd("touch " + app_private_dir_de_ + "/profiles/cur/0/non.profile.file");
1045
1046 // Create some non-empty profiles.
1047 std::string current_prof = app_private_dir_de_ + "/profiles/cur/0/primary.prof";
1048 run_cmd("echo 1 > " + current_prof);
1049 std::string ref_prof = app_private_dir_de_ + "/profiles/ref/primary.prof";
1050 run_cmd("echo 1 > " + ref_prof);
1051
1052 UpdateAndroidProfilesDir(app_private_dir_de_ + "/profiles");
1053
1054 std::vector<std::string> profiles;
1055 collect_profiles(&profiles);
1056
1057 // Only two profiles should be in the output.
1058 ASSERT_EQ(2u, profiles.size());
1059 ASSERT_TRUE(std::find(profiles.begin(), profiles.end(), current_prof) != profiles.end());
1060 ASSERT_TRUE(std::find(profiles.begin(), profiles.end(), ref_prof) != profiles.end());
1061}
1062
Calin Juravle7d765462017-09-04 15:57:10 -07001063} // namespace installd
1064} // namespace android