Snap for 9368510 from 05e757b414f9eb56a25d3c573554356c6b52bd75 to mainline-sdkext-release
Change-Id: If7b4d647ed412f1a0c1d7bdd3d182e6311bad141
diff --git a/Android.bp b/Android.bp
index e851f82..11d0597 100644
--- a/Android.bp
+++ b/Android.bp
@@ -150,6 +150,22 @@
},
}
+cc_defaults {
+ // Similar to resolv_test_mts_coverage_defaults, but it's for the tests that don't need
+ // root access.
+ name: "resolv_test_mts_coverage_without_root_defaults",
+ test_config_template: ":resolv_test_config_without_root_template",
+ compile_multilib: "both",
+ multilib: {
+ lib32: {
+ suffix: "32",
+ },
+ lib64: {
+ suffix: "64",
+ },
+ },
+}
+
cc_library {
name: "libnetd_resolv",
version_script: "libnetd_resolv.map.txt",
@@ -308,6 +324,13 @@
}
filegroup {
+ name: "resolv_test_config_without_root_template",
+ srcs: [
+ "resolv_test_config_without_root_template.xml",
+ ],
+}
+
+filegroup {
name: "resolv_unit_test_files",
srcs: [
"DnsQueryLogTest.cpp",
diff --git a/resolv_test_config_template.xml b/resolv_test_config_template.xml
index e649970..f4a4413 100644
--- a/resolv_test_config_template.xml
+++ b/resolv_test_config_template.xml
@@ -21,6 +21,13 @@
<configuration description="Configuration for {MODULE} tests">
<option name="test-suite-tag" value="mts" />
<option name="config-descriptor:metadata" key="mainline-param" value="CaptivePortalLoginGoogle.apk+NetworkStackGoogle.apk+com.google.android.resolv.apex+com.google.android.tethering.apex" />
+
+ <!-- To avoid module rollbacks due to "adbd exits 4 times in 4 minutes" caused by repeated
+ root/unroot, reboot the device to reset the crash counter in init service.
+ See b/260180513 for more details.
+ -->
+ <target_preparer class="com.android.tradefed.targetprep.RebootTargetPreparer" />
+
<target_preparer class="com.android.tradefed.targetprep.RootTargetPreparer"/>
<target_preparer class="com.android.testutils.DisableConfigSyncTargetPreparer" />
<target_preparer class="com.android.compatibility.common.tradefed.targetprep.FilePusher">
diff --git a/resolv_test_config_without_root_template.xml b/resolv_test_config_without_root_template.xml
new file mode 100644
index 0000000..ffc88ca
--- /dev/null
+++ b/resolv_test_config_without_root_template.xml
@@ -0,0 +1,37 @@
+<?xml version="1.0" encoding="utf-8"?>
+<!-- Copyright (C) 2022 The Android Open Source Project
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+-->
+<!-- Workaround for MTS coverage because test infra is running the 64 bit
+ test suite on cf_x86_phone (32-bit). See b/147785146 for details.
+ We need to push the correct binary against the architecture of
+ test device with "append-bitness" option.
+-->
+<configuration description="Configuration for {MODULE} tests">
+ <option name="test-suite-tag" value="mts" />
+ <option name="config-descriptor:metadata" key="mainline-param" value="CaptivePortalLoginGoogle.apk+NetworkStackGoogle.apk+com.google.android.resolv.apex+com.google.android.tethering.apex" />
+ <target_preparer class="com.android.testutils.DisableConfigSyncTargetPreparer" />
+ <target_preparer class="com.android.compatibility.common.tradefed.targetprep.FilePusher">
+ <option name="cleanup" value="true" />
+ <option name="push" value="{MODULE}->/data/local/tmp/{MODULE}" />
+ <option name="append-bitness" value="true" />
+ </target_preparer>
+ <test class="com.android.tradefed.testtype.GTest" >
+ <option name="native-test-device-path" value="/data/local/tmp" />
+ <option name="module-name" value="{MODULE}" />
+ <option name="runtime-hint" value="10m" />
+ <!-- test-timeout unit is ms, value = 10 min -->
+ <option name="native-test-timeout" value="600000" />
+ </test>
+</configuration>
diff --git a/tests/Android.bp b/tests/Android.bp
index 9df15d3..f3ec842 100644
--- a/tests/Android.bp
+++ b/tests/Android.bp
@@ -314,7 +314,7 @@
"connectivity-mainline-presubmit-cc-defaults",
"netd_defaults",
"resolv_test_defaults",
- "resolv_test_mts_coverage_defaults",
+ "resolv_test_mts_coverage_without_root_defaults",
],
header_libs: [
"libnetd_resolv_internal_headers",
@@ -340,6 +340,7 @@
],
srcs: [
"doh_frontend.cpp",
+ "fuzzer/resolv_fuzzer_utils.cpp",
],
header_libs: [
"libnetd_resolv_headers",
diff --git a/tests/fuzzer/resolv_fuzzer_utils.cpp b/tests/fuzzer/resolv_fuzzer_utils.cpp
new file mode 100644
index 0000000..6fda744
--- /dev/null
+++ b/tests/fuzzer/resolv_fuzzer_utils.cpp
@@ -0,0 +1,90 @@
+/*
+ * Copyright (C) 2022 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ *
+ */
+
+#include "resolv_fuzzer_utils.h"
+
+namespace android::net {
+
+// Initializes servers to simulate the DNS over UDP/TLS/HTTPS.
+test::DNSResponder dns{kDefaultServer, kDnsPortString};
+test::DohFrontend doh{kDefaultServer, kDohPortString, "127.0.1.3", kDnsPortString};
+test::DNSResponder doh_backend{"127.0.1.3", kDnsPortString};
+test::DnsTlsFrontend dot{kDefaultServer, kDotPortString, "127.0.2.3", kDnsPortString};
+test::DNSResponder dot_backend{"127.0.2.3", kDnsPortString};
+ResolverController resolverCtrl;
+
+// TODO: Consider moving to packages/modules/DnsResolver/tests/resolv_test_utils.h.
+void StartDns(test::DNSResponder& dns, const std::vector<DnsRecord>& records) {
+ for (const auto& r : records) {
+ dns.addMapping(r.host_name, r.type, r.addr);
+ }
+
+ ASSERT_TRUE(dns.startServer());
+ dns.clearQueries();
+}
+
+int RandomSocketType(FuzzedDataProvider& fdp) {
+ int socktype = fdp.PickValueInArray(
+ {SOCK_STREAM, SOCK_DGRAM, SOCK_RAW, SOCK_RDM, SOCK_SEQPACKET, SOCK_DCCP, SOCK_PACKET});
+ if (fdp.ConsumeBool()) socktype |= SOCK_CLOEXEC;
+ if (fdp.ConsumeBool()) socktype |= SOCK_NONBLOCK;
+ return socktype;
+}
+
+// Initializes the callback functions to createNetworkCache.
+void InitDnsResolverCallbacks() {
+ gResNetdCallbacks.check_calling_permission = [](const char*) -> bool { return true; };
+ gResNetdCallbacks.get_network_context = [](uint32_t, uint32_t, android_net_context*) {};
+ gResNetdCallbacks.log = [](const char*) {};
+}
+
+void InitServers() {
+ StartDns(dns, records);
+ doh.startServer();
+ StartDns(doh_backend, records);
+ dot.startServer();
+ StartDns(dot_backend, records);
+}
+
+void CleanServers() {
+ dns.clearQueries();
+ doh.clearQueries();
+ doh_backend.clearQueries();
+ dot.clearQueries();
+ dot_backend.clearQueries();
+}
+
+// Initializes servers only one time.
+bool DoInit() {
+ // Sets log level to WARNING to lower I/O time cost.
+ resolv_set_log_severity(android::base::WARNING);
+ doh_init_logger(DOH_LOG_LEVEL_WARN);
+
+ // Needs to init callback and create netework cache.
+ InitDnsResolverCallbacks();
+ resolverCtrl.createNetworkCache(TEST_NETID);
+ InitServers();
+
+ return true;
+}
+
+void CleanUp() {
+ CleanServers();
+ resolverCtrl.flushNetworkCache(TEST_NETID);
+}
+
+} // namespace android::net
\ No newline at end of file
diff --git a/tests/fuzzer/resolv_fuzzer_utils.h b/tests/fuzzer/resolv_fuzzer_utils.h
index f8da743..2a15a30 100644
--- a/tests/fuzzer/resolv_fuzzer_utils.h
+++ b/tests/fuzzer/resolv_fuzzer_utils.h
@@ -39,73 +39,16 @@
.uid = TEST_UID,
};
-// Initializes servers to simulate the DNS over UDP/TLS/HTTPS.
-test::DNSResponder dns{kDefaultServer, kDnsPortString};
-test::DohFrontend doh{kDefaultServer, kDohPortString, "127.0.1.3", kDnsPortString};
-test::DNSResponder doh_backend{"127.0.1.3", kDnsPortString};
-test::DnsTlsFrontend dot{kDefaultServer, kDotPortString, "127.0.2.3", kDnsPortString};
-test::DNSResponder dot_backend{"127.0.2.3", kDnsPortString};
-ResolverController resolverCtrl;
+extern test::DnsTlsFrontend dot;
+extern ResolverController resolverCtrl;
-// TODO: Consider moving to packages/modules/DnsResolver/tests/resolv_test_utils.h.
-void StartDns(test::DNSResponder& dns, const std::vector<DnsRecord>& records) {
- for (const auto& r : records) {
- dns.addMapping(r.host_name, r.type, r.addr);
- }
-
- ASSERT_TRUE(dns.startServer());
- dns.clearQueries();
-}
-
-int RandomSocketType(FuzzedDataProvider& fdp) {
- int socktype = fdp.PickValueInArray(
- {SOCK_STREAM, SOCK_DGRAM, SOCK_RAW, SOCK_RDM, SOCK_SEQPACKET, SOCK_DCCP, SOCK_PACKET});
- if (fdp.ConsumeBool()) socktype |= SOCK_CLOEXEC;
- if (fdp.ConsumeBool()) socktype |= SOCK_NONBLOCK;
- return socktype;
-}
-
-// Initializes the callback functions to createNetworkCache.
-void InitDnsResolverCallbacks() {
- gResNetdCallbacks.check_calling_permission = [](const char*) -> bool { return true; };
- gResNetdCallbacks.get_network_context = [](uint32_t, uint32_t, android_net_context*) {};
- gResNetdCallbacks.log = [](const char*) {};
-}
-
-void InitServers() {
- StartDns(dns, records);
- doh.startServer();
- StartDns(doh_backend, records);
- dot.startServer();
- StartDns(dot_backend, records);
-}
-
-void CleanServers() {
- dns.clearQueries();
- doh.clearQueries();
- doh_backend.clearQueries();
- dot.clearQueries();
- dot_backend.clearQueries();
-}
-
-// Initializes servers only one time.
-bool DoInit() {
- // Sets log level to WARNING to lower I/O time cost.
- resolv_set_log_severity(android::base::WARNING);
- doh_init_logger(DOH_LOG_LEVEL_WARN);
-
- // Needs to init callback and create netework cache.
- InitDnsResolverCallbacks();
- resolverCtrl.createNetworkCache(TEST_NETID);
- InitServers();
-
- return true;
-}
-
-void CleanUp() {
- CleanServers();
- resolverCtrl.flushNetworkCache(TEST_NETID);
-}
+void StartDns(test::DNSResponder& dns, const std::vector<DnsRecord>& records);
+int RandomSocketType(FuzzedDataProvider& fdp);
+void InitDnsResolverCallbacks();
+void InitServers();
+void CleanServers();
+bool DoInit();
+void CleanUp();
} // namespace android::net
diff --git a/tests/resolv_gold_test_config.xml b/tests/resolv_gold_test_config.xml
index 3c34d6c..653c9c8 100644
--- a/tests/resolv_gold_test_config.xml
+++ b/tests/resolv_gold_test_config.xml
@@ -16,6 +16,13 @@
<configuration description="Configuration for resolv gold tests">
<option name="test-suite-tag" value="mts" />
<option name="config-descriptor:metadata" key="mainline-param" value="CaptivePortalLoginGoogle.apk+NetworkStackGoogle.apk+com.google.android.resolv.apex+com.google.android.tethering.apex" />
+
+ <!-- To avoid module rollbacks due to "adbd exits 4 times in 4 minutes" caused by repeated
+ root/unroot, reboot the device to reset the crash counter in init service.
+ See b/260180513 for more details.
+ -->
+ <target_preparer class="com.android.tradefed.targetprep.RebootTargetPreparer" />
+
<target_preparer class="com.android.tradefed.targetprep.RootTargetPreparer"/>
<target_preparer class="com.android.compatibility.common.tradefed.targetprep.FilePusher">
<option name="cleanup" value="true" />
diff --git a/tests/resolv_integration_test.cpp b/tests/resolv_integration_test.cpp
index 3dbe359..0fe7fc5 100644
--- a/tests/resolv_integration_test.cpp
+++ b/tests/resolv_integration_test.cpp
@@ -7730,6 +7730,10 @@
// Test if the "do not send AAAA query when IPv6 address is link-local with a default route" feature
// can be toggled by flag.
TEST_F(ResolverMultinetworkTest, IPv6LinkLocalWithDefaultRouteFlag) {
+ // Kernel 4.4 does not provide an IPv6 link-local address when an interface is added to a
+ // network. Skip it because v6 link-local address is a prerequisite for this test.
+ SKIP_IF_KERNEL_VERSION_LOWER_THAN(4, 9, 0);
+
constexpr char host_name[] = "ohayou.example.com.";
const struct TestConfig {
std::string flagValue;