| /* | 
 |  * Copyright (C) 2017 The Android Open Source Project | 
 |  * | 
 |  * Licensed under the Apache License, Version 2.0 (the "License"); | 
 |  * you may not use this file except in compliance with the License. | 
 |  * You may obtain a copy of the License at | 
 |  * | 
 |  *      http://www.apache.org/licenses/LICENSE-2.0 | 
 |  * | 
 |  * Unless required by applicable law or agreed to in writing, software | 
 |  * distributed under the License is distributed on an "AS IS" BASIS, | 
 |  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 |  * See the License for the specific language governing permissions and | 
 |  * limitations under the License. | 
 |  */ | 
 |  | 
 | #include <fstream> | 
 | #include <functional> | 
 | #include <string_view> | 
 | #include <thread> | 
 | #include <type_traits> | 
 |  | 
 | #include <android-base/file.h> | 
 | #include <android-base/logging.h> | 
 | #include <android-base/properties.h> | 
 | #include <android-base/stringprintf.h> | 
 | #include <android/api-level.h> | 
 | #include <gtest/gtest.h> | 
 | #include <selinux/selinux.h> | 
 | #include <sys/resource.h> | 
 |  | 
 | #include "action.h" | 
 | #include "action_manager.h" | 
 | #include "action_parser.h" | 
 | #include "builtin_arguments.h" | 
 | #include "builtins.h" | 
 | #include "import_parser.h" | 
 | #include "init.h" | 
 | #include "keyword_map.h" | 
 | #include "parser.h" | 
 | #include "service.h" | 
 | #include "service_list.h" | 
 | #include "service_parser.h" | 
 | #include "util.h" | 
 |  | 
 | using android::base::GetIntProperty; | 
 | using android::base::GetProperty; | 
 | using android::base::SetProperty; | 
 | using android::base::StringPrintf; | 
 | using android::base::StringReplace; | 
 | using android::base::WaitForProperty; | 
 | using namespace std::literals; | 
 |  | 
 | namespace android { | 
 | namespace init { | 
 |  | 
 | using ActionManagerCommand = std::function<void(ActionManager&)>; | 
 |  | 
 | void TestInit(const std::string& init_script_file, const BuiltinFunctionMap& test_function_map, | 
 |               const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager, | 
 |               ServiceList* service_list) { | 
 |     Action::set_function_map(&test_function_map); | 
 |  | 
 |     Parser parser; | 
 |     parser.AddSectionParser("service", | 
 |                             std::make_unique<ServiceParser>(service_list, nullptr, std::nullopt)); | 
 |     parser.AddSectionParser("on", std::make_unique<ActionParser>(action_manager, nullptr)); | 
 |     parser.AddSectionParser("import", std::make_unique<ImportParser>(&parser)); | 
 |  | 
 |     ASSERT_TRUE(parser.ParseConfig(init_script_file)); | 
 |  | 
 |     for (const auto& command : commands) { | 
 |         command(*action_manager); | 
 |     } | 
 |  | 
 |     while (action_manager->HasMoreCommands()) { | 
 |         action_manager->ExecuteOneCommand(); | 
 |     } | 
 | } | 
 |  | 
 | void TestInitText(const std::string& init_script, const BuiltinFunctionMap& test_function_map, | 
 |                   const std::vector<ActionManagerCommand>& commands, ActionManager* action_manager, | 
 |                   ServiceList* service_list) { | 
 |     TemporaryFile tf; | 
 |     ASSERT_TRUE(tf.fd != -1); | 
 |     ASSERT_TRUE(android::base::WriteStringToFd(init_script, tf.fd)); | 
 |     TestInit(tf.path, test_function_map, commands, action_manager, service_list); | 
 | } | 
 |  | 
 | TEST(init, SimpleEventTrigger) { | 
 |     bool expect_true = false; | 
 |     std::string init_script = | 
 |         R"init( | 
 | on boot | 
 | pass_test | 
 | )init"; | 
 |  | 
 |     auto do_pass_test = [&expect_true](const BuiltinArguments&) { | 
 |         expect_true = true; | 
 |         return Result<void>{}; | 
 |     }; | 
 |     BuiltinFunctionMap test_function_map = { | 
 |             {"pass_test", {0, 0, {false, do_pass_test}}}, | 
 |     }; | 
 |  | 
 |     ActionManagerCommand trigger_boot = [](ActionManager& am) { am.QueueEventTrigger("boot"); }; | 
 |     std::vector<ActionManagerCommand> commands{trigger_boot}; | 
 |  | 
 |     ActionManager action_manager; | 
 |     ServiceList service_list; | 
 |     TestInitText(init_script, test_function_map, commands, &action_manager, &service_list); | 
 |  | 
 |     EXPECT_TRUE(expect_true); | 
 | } | 
 |  | 
 | TEST(init, WrongEventTrigger) { | 
 |     std::string init_script = | 
 |             R"init( | 
 | on boot: | 
 | pass_test | 
 | )init"; | 
 |  | 
 |     TemporaryFile tf; | 
 |     ASSERT_TRUE(tf.fd != -1); | 
 |     ASSERT_TRUE(android::base::WriteStringToFd(init_script, tf.fd)); | 
 |  | 
 |     ActionManager am; | 
 |  | 
 |     Parser parser; | 
 |     parser.AddSectionParser("on", std::make_unique<ActionParser>(&am, nullptr)); | 
 |  | 
 |     ASSERT_TRUE(parser.ParseConfig(tf.path)); | 
 |     ASSERT_EQ(1u, parser.parse_error_count()); | 
 | } | 
 |  | 
 | TEST(init, EventTriggerOrder) { | 
 |     std::string init_script = | 
 |         R"init( | 
 | on boot | 
 | execute_first | 
 |  | 
 | on boot && property:ro.hardware=* | 
 | execute_second | 
 |  | 
 | on boot | 
 | execute_third | 
 |  | 
 | )init"; | 
 |  | 
 |     int num_executed = 0; | 
 |     auto do_execute_first = [&num_executed](const BuiltinArguments&) { | 
 |         EXPECT_EQ(0, num_executed++); | 
 |         return Result<void>{}; | 
 |     }; | 
 |     auto do_execute_second = [&num_executed](const BuiltinArguments&) { | 
 |         EXPECT_EQ(1, num_executed++); | 
 |         return Result<void>{}; | 
 |     }; | 
 |     auto do_execute_third = [&num_executed](const BuiltinArguments&) { | 
 |         EXPECT_EQ(2, num_executed++); | 
 |         return Result<void>{}; | 
 |     }; | 
 |  | 
 |     BuiltinFunctionMap test_function_map = { | 
 |             {"execute_first", {0, 0, {false, do_execute_first}}}, | 
 |             {"execute_second", {0, 0, {false, do_execute_second}}}, | 
 |             {"execute_third", {0, 0, {false, do_execute_third}}}, | 
 |     }; | 
 |  | 
 |     ActionManagerCommand trigger_boot = [](ActionManager& am) { am.QueueEventTrigger("boot"); }; | 
 |     std::vector<ActionManagerCommand> commands{trigger_boot}; | 
 |  | 
 |     ActionManager action_manager; | 
 |     ServiceList service_list; | 
 |     TestInitText(init_script, test_function_map, commands, &action_manager, &service_list); | 
 |     EXPECT_EQ(3, num_executed); | 
 | } | 
 |  | 
 | TEST(init, OverrideService) { | 
 |     std::string init_script = R"init( | 
 | service A something | 
 |     class first | 
 |     user nobody | 
 |  | 
 | service A something | 
 |     class second | 
 |     user nobody | 
 |     override | 
 |  | 
 | )init"; | 
 |  | 
 |     ActionManager action_manager; | 
 |     ServiceList service_list; | 
 |     TestInitText(init_script, BuiltinFunctionMap(), {}, &action_manager, &service_list); | 
 |     ASSERT_EQ(1, std::distance(service_list.begin(), service_list.end())); | 
 |  | 
 |     auto service = service_list.begin()->get(); | 
 |     ASSERT_NE(nullptr, service); | 
 |     EXPECT_EQ(std::set<std::string>({"second"}), service->classnames()); | 
 |     EXPECT_EQ("A", service->name()); | 
 |     EXPECT_TRUE(service->is_override()); | 
 | } | 
 |  | 
 | TEST(init, StartConsole) { | 
 |     if (GetProperty("ro.build.type", "") == "user") { | 
 |         GTEST_SKIP() << "Must run on userdebug/eng builds. b/262090304"; | 
 |         return; | 
 |     } | 
 |     if (getuid() != 0) { | 
 |         GTEST_SKIP() << "Must be run as root."; | 
 |         return; | 
 |     } | 
 |     std::string init_script = R"init( | 
 | service console /system/bin/sh | 
 |     class core | 
 |     console null | 
 |     disabled | 
 |     user root | 
 |     group root shell log readproc | 
 |     seclabel u:r:shell:s0 | 
 |     setenv HOSTNAME console | 
 | )init"; | 
 |  | 
 |     ActionManager action_manager; | 
 |     ServiceList service_list; | 
 |     TestInitText(init_script, BuiltinFunctionMap(), {}, &action_manager, &service_list); | 
 |     ASSERT_EQ(std::distance(service_list.begin(), service_list.end()), 1); | 
 |  | 
 |     auto service = service_list.begin()->get(); | 
 |     ASSERT_NE(service, nullptr); | 
 |     ASSERT_RESULT_OK(service->Start()); | 
 |     const pid_t pid = service->pid(); | 
 |     ASSERT_GT(pid, 0); | 
 |     EXPECT_NE(getsid(pid), 0); | 
 |     service->Stop(); | 
 | } | 
 |  | 
 | static std::string GetSecurityContext() { | 
 |     char* ctx; | 
 |     if (getcon(&ctx) == -1) { | 
 |         ADD_FAILURE() << "Failed to call getcon : " << strerror(errno); | 
 |     } | 
 |     std::string result = std::string(ctx); | 
 |     freecon(ctx); | 
 |     return result; | 
 | } | 
 |  | 
 | void TestStartApexServices(const std::vector<std::string>& service_names, | 
 |         const std::string& apex_name) { | 
 |     for (auto const& svc : service_names) { | 
 |         auto service = ServiceList::GetInstance().FindService(svc); | 
 |         ASSERT_NE(nullptr, service); | 
 |         ASSERT_RESULT_OK(service->Start()); | 
 |         ASSERT_TRUE(service->IsRunning()); | 
 |         LOG(INFO) << "Service " << svc << " is running"; | 
 |         if (!apex_name.empty()) { | 
 |             service->set_filename("/apex/" + apex_name + "/init_test.rc"); | 
 |         } else { | 
 |             service->set_filename(""); | 
 |         } | 
 |     } | 
 |     if (!apex_name.empty()) { | 
 |         auto apex_services = ServiceList::GetInstance().FindServicesByApexName(apex_name); | 
 |         EXPECT_EQ(service_names.size(), apex_services.size()); | 
 |     } | 
 | } | 
 |  | 
 | void TestStopApexServices(const std::vector<std::string>& service_names, bool expect_to_run) { | 
 |     for (auto const& svc : service_names) { | 
 |         auto service = ServiceList::GetInstance().FindService(svc); | 
 |         ASSERT_NE(nullptr, service); | 
 |         EXPECT_EQ(expect_to_run, service->IsRunning()); | 
 |     } | 
 | } | 
 |  | 
 | void TestRemoveApexService(const std::vector<std::string>& service_names, bool exist) { | 
 |     for (auto const& svc : service_names) { | 
 |         auto service = ServiceList::GetInstance().FindService(svc); | 
 |         ASSERT_EQ(exist, service != nullptr); | 
 |     } | 
 | } | 
 |  | 
 | void InitApexService(const std::string_view& init_template) { | 
 |     std::string init_script = StringReplace(init_template, "$selabel", | 
 |                                     GetSecurityContext(), true); | 
 |  | 
 |     TestInitText(init_script, BuiltinFunctionMap(), {}, &ActionManager::GetInstance(), | 
 |             &ServiceList::GetInstance()); | 
 | } | 
 |  | 
 | void CleanupApexServices() { | 
 |     std::vector<std::string> names; | 
 |     for (const auto& s : ServiceList::GetInstance()) { | 
 |         names.push_back(s->name()); | 
 |     } | 
 |  | 
 |     for (const auto& name : names) { | 
 |         auto s = ServiceList::GetInstance().FindService(name); | 
 |         auto pid = s->pid(); | 
 |         ServiceList::GetInstance().RemoveService(*s); | 
 |         if (pid > 0) { | 
 |             kill(pid, SIGTERM); | 
 |             kill(pid, SIGKILL); | 
 |         } | 
 |     } | 
 |  | 
 |     ActionManager::GetInstance().RemoveActionIf([&](const std::unique_ptr<Action>& s) -> bool { | 
 |         return true; | 
 |     }); | 
 | } | 
 |  | 
 | void TestApexServicesInit(const std::vector<std::string>& apex_services, | 
 |             const std::vector<std::string>& other_apex_services, | 
 |             const std::vector<std::string> non_apex_services) { | 
 |     auto num_svc = apex_services.size() + other_apex_services.size() + non_apex_services.size(); | 
 |     ASSERT_EQ(num_svc, ServiceList::GetInstance().size()); | 
 |  | 
 |     TestStartApexServices(apex_services, "com.android.apex.test_service"); | 
 |     TestStartApexServices(other_apex_services, "com.android.other_apex.test_service"); | 
 |     TestStartApexServices(non_apex_services, /*apex_anme=*/ ""); | 
 |  | 
 |     StopServicesFromApex("com.android.apex.test_service"); | 
 |     TestStopApexServices(apex_services, /*expect_to_run=*/ false); | 
 |     TestStopApexServices(other_apex_services, /*expect_to_run=*/ true); | 
 |     TestStopApexServices(non_apex_services, /*expect_to_run=*/ true); | 
 |  | 
 |     RemoveServiceAndActionFromApex("com.android.apex.test_service"); | 
 |     ASSERT_EQ(other_apex_services.size() + non_apex_services.size(), | 
 |         ServiceList::GetInstance().size()); | 
 |  | 
 |     // TODO(b/244232142): Add test to check if actions are removed | 
 |     TestRemoveApexService(apex_services, /*exist*/ false); | 
 |     TestRemoveApexService(other_apex_services, /*exist*/ true); | 
 |     TestRemoveApexService(non_apex_services, /*exist*/ true); | 
 |  | 
 |     CleanupApexServices(); | 
 | } | 
 |  | 
 | TEST(init, StopServiceByApexName) { | 
 |     if (getuid() != 0) { | 
 |         GTEST_SKIP() << "Must be run as root."; | 
 |         return; | 
 |     } | 
 |     std::string_view script_template = R"init( | 
 | service apex_test_service /system/bin/yes | 
 |     user shell | 
 |     group shell | 
 |     seclabel $selabel | 
 | )init"; | 
 |     InitApexService(script_template); | 
 |     TestApexServicesInit({"apex_test_service"}, {}, {}); | 
 | } | 
 |  | 
 | TEST(init, StopMultipleServicesByApexName) { | 
 |     if (getuid() != 0) { | 
 |         GTEST_SKIP() << "Must be run as root."; | 
 |         return; | 
 |     } | 
 |     std::string_view script_template = R"init( | 
 | service apex_test_service_multiple_a /system/bin/yes | 
 |     user shell | 
 |     group shell | 
 |     seclabel $selabel | 
 | service apex_test_service_multiple_b /system/bin/id | 
 |     user shell | 
 |     group shell | 
 |     seclabel $selabel | 
 | )init"; | 
 |     InitApexService(script_template); | 
 |     TestApexServicesInit({"apex_test_service_multiple_a", | 
 |             "apex_test_service_multiple_b"}, {}, {}); | 
 | } | 
 |  | 
 | TEST(init, StopServicesFromMultipleApexes) { | 
 |     if (getuid() != 0) { | 
 |         GTEST_SKIP() << "Must be run as root."; | 
 |         return; | 
 |     } | 
 |     std::string_view apex_script_template = R"init( | 
 | service apex_test_service_multi_apex_a /system/bin/yes | 
 |     user shell | 
 |     group shell | 
 |     seclabel $selabel | 
 | service apex_test_service_multi_apex_b /system/bin/id | 
 |     user shell | 
 |     group shell | 
 |     seclabel $selabel | 
 | )init"; | 
 |     InitApexService(apex_script_template); | 
 |  | 
 |     std::string_view other_apex_script_template = R"init( | 
 | service apex_test_service_multi_apex_c /system/bin/yes | 
 |     user shell | 
 |     group shell | 
 |     seclabel $selabel | 
 | )init"; | 
 |     InitApexService(other_apex_script_template); | 
 |  | 
 |     TestApexServicesInit({"apex_test_service_multi_apex_a", | 
 |             "apex_test_service_multi_apex_b"}, {"apex_test_service_multi_apex_c"}, {}); | 
 | } | 
 |  | 
 | TEST(init, StopServicesFromApexAndNonApex) { | 
 |     if (getuid() != 0) { | 
 |         GTEST_SKIP() << "Must be run as root."; | 
 |         return; | 
 |     } | 
 |     std::string_view apex_script_template = R"init( | 
 | service apex_test_service_apex_a /system/bin/yes | 
 |     user shell | 
 |     group shell | 
 |     seclabel $selabel | 
 | service apex_test_service_apex_b /system/bin/id | 
 |     user shell | 
 |     group shell | 
 |     seclabel $selabel | 
 | )init"; | 
 |     InitApexService(apex_script_template); | 
 |  | 
 |     std::string_view non_apex_script_template = R"init( | 
 | service apex_test_service_non_apex /system/bin/yes | 
 |     user shell | 
 |     group shell | 
 |     seclabel $selabel | 
 | )init"; | 
 |     InitApexService(non_apex_script_template); | 
 |  | 
 |     TestApexServicesInit({"apex_test_service_apex_a", | 
 |             "apex_test_service_apex_b"}, {}, {"apex_test_service_non_apex"}); | 
 | } | 
 |  | 
 | TEST(init, StopServicesFromApexMixed) { | 
 |     if (getuid() != 0) { | 
 |         GTEST_SKIP() << "Must be run as root."; | 
 |         return; | 
 |     } | 
 |     std::string_view script_template = R"init( | 
 | service apex_test_service_mixed_a /system/bin/yes | 
 |     user shell | 
 |     group shell | 
 |     seclabel $selabel | 
 | )init"; | 
 |     InitApexService(script_template); | 
 |  | 
 |     std::string_view other_apex_script_template = R"init( | 
 | service apex_test_service_mixed_b /system/bin/yes | 
 |     user shell | 
 |     group shell | 
 |     seclabel $selabel | 
 | )init"; | 
 |     InitApexService(other_apex_script_template); | 
 |  | 
 |     std::string_view non_apex_script_template = R"init( | 
 | service apex_test_service_mixed_c /system/bin/yes | 
 |     user shell | 
 |     group shell | 
 |     seclabel $selabel | 
 | )init"; | 
 |     InitApexService(non_apex_script_template); | 
 |  | 
 |     TestApexServicesInit({"apex_test_service_mixed_a"}, | 
 |             {"apex_test_service_mixed_b"}, {"apex_test_service_mixed_c"}); | 
 | } | 
 |  | 
 | TEST(init, EventTriggerOrderMultipleFiles) { | 
 |     // 6 total files, which should have their triggers executed in the following order: | 
 |     // 1: start - original script parsed | 
 |     // 2: first_import - immediately imported by first_script | 
 |     // 3: dir_a - file named 'a.rc' in dir; dir is imported after first_import | 
 |     // 4: a_import - file imported by dir_a | 
 |     // 5: dir_b - file named 'b.rc' in dir | 
 |     // 6: last_import - imported after dir is imported | 
 |  | 
 |     TemporaryFile first_import; | 
 |     ASSERT_TRUE(first_import.fd != -1); | 
 |     ASSERT_TRUE(android::base::WriteStringToFd("on boot\nexecute 2", first_import.fd)); | 
 |  | 
 |     TemporaryFile dir_a_import; | 
 |     ASSERT_TRUE(dir_a_import.fd != -1); | 
 |     ASSERT_TRUE(android::base::WriteStringToFd("on boot\nexecute 4", dir_a_import.fd)); | 
 |  | 
 |     TemporaryFile last_import; | 
 |     ASSERT_TRUE(last_import.fd != -1); | 
 |     ASSERT_TRUE(android::base::WriteStringToFd("on boot\nexecute 6", last_import.fd)); | 
 |  | 
 |     TemporaryDir dir; | 
 |     // clang-format off | 
 |     std::string dir_a_script = "import " + std::string(dir_a_import.path) + "\n" | 
 |                                "on boot\n" | 
 |                                "execute 3"; | 
 |     // clang-format on | 
 |     // WriteFile() ensures the right mode is set | 
 |     ASSERT_RESULT_OK(WriteFile(std::string(dir.path) + "/a.rc", dir_a_script)); | 
 |  | 
 |     ASSERT_RESULT_OK(WriteFile(std::string(dir.path) + "/b.rc", "on boot\nexecute 5")); | 
 |  | 
 |     // clang-format off | 
 |     std::string start_script = "import " + std::string(first_import.path) + "\n" | 
 |                                "import " + std::string(dir.path) + "\n" | 
 |                                "import " + std::string(last_import.path) + "\n" | 
 |                                "on boot\n" | 
 |                                "execute 1"; | 
 |     // clang-format on | 
 |     TemporaryFile start; | 
 |     ASSERT_TRUE(android::base::WriteStringToFd(start_script, start.fd)); | 
 |  | 
 |     int num_executed = 0; | 
 |     auto execute_command = [&num_executed](const BuiltinArguments& args) { | 
 |         EXPECT_EQ(2U, args.size()); | 
 |         EXPECT_EQ(++num_executed, std::stoi(args[1])); | 
 |         return Result<void>{}; | 
 |     }; | 
 |  | 
 |     BuiltinFunctionMap test_function_map = { | 
 |             {"execute", {1, 1, {false, execute_command}}}, | 
 |     }; | 
 |  | 
 |     ActionManagerCommand trigger_boot = [](ActionManager& am) { am.QueueEventTrigger("boot"); }; | 
 |     std::vector<ActionManagerCommand> commands{trigger_boot}; | 
 |  | 
 |     ActionManager action_manager; | 
 |     ServiceList service_list; | 
 |     TestInit(start.path, test_function_map, commands, &action_manager, &service_list); | 
 |  | 
 |     EXPECT_EQ(6, num_executed); | 
 | } | 
 |  | 
 | BuiltinFunctionMap GetTestFunctionMapForLazyLoad(int& num_executed, ActionManager& action_manager) { | 
 |     auto execute_command = [&num_executed](const BuiltinArguments& args) { | 
 |         EXPECT_EQ(2U, args.size()); | 
 |         EXPECT_EQ(++num_executed, std::stoi(args[1])); | 
 |         return Result<void>{}; | 
 |     }; | 
 |     auto load_command = [&action_manager](const BuiltinArguments& args) -> Result<void> { | 
 |         EXPECT_EQ(2U, args.size()); | 
 |         Parser parser; | 
 |         parser.AddSectionParser("on", std::make_unique<ActionParser>(&action_manager, nullptr)); | 
 |         if (!parser.ParseConfig(args[1])) { | 
 |             return Error() << "Failed to load"; | 
 |         } | 
 |         return Result<void>{}; | 
 |     }; | 
 |     auto trigger_command = [&action_manager](const BuiltinArguments& args) { | 
 |         EXPECT_EQ(2U, args.size()); | 
 |         LOG(INFO) << "Queue event trigger: " << args[1]; | 
 |         action_manager.QueueEventTrigger(args[1]); | 
 |         return Result<void>{}; | 
 |     }; | 
 |     BuiltinFunctionMap test_function_map = { | 
 |             {"execute", {1, 1, {false, execute_command}}}, | 
 |             {"load", {1, 1, {false, load_command}}}, | 
 |             {"trigger", {1, 1, {false, trigger_command}}}, | 
 |     }; | 
 |     return test_function_map; | 
 | } | 
 |  | 
 | TEST(init, LazilyLoadedActionsCantBeTriggeredByTheSameTrigger) { | 
 |     // "start" script loads "lazy" script. Even though "lazy" scripts | 
 |     // defines "on boot" action, it's not executed by the current "boot" | 
 |     // event because it's already processed. | 
 |     TemporaryFile lazy; | 
 |     ASSERT_TRUE(lazy.fd != -1); | 
 |     ASSERT_TRUE(android::base::WriteStringToFd("on boot\nexecute 2", lazy.fd)); | 
 |  | 
 |     TemporaryFile start; | 
 |     // clang-format off | 
 |     std::string start_script = "on boot\n" | 
 |                                "load " + std::string(lazy.path) + "\n" | 
 |                                "execute 1"; | 
 |     // clang-format on | 
 |     ASSERT_TRUE(android::base::WriteStringToFd(start_script, start.fd)); | 
 |  | 
 |     int num_executed = 0; | 
 |     ActionManager action_manager; | 
 |     ServiceList service_list; | 
 |     BuiltinFunctionMap test_function_map = | 
 |             GetTestFunctionMapForLazyLoad(num_executed, action_manager); | 
 |  | 
 |     ActionManagerCommand trigger_boot = [](ActionManager& am) { am.QueueEventTrigger("boot"); }; | 
 |     std::vector<ActionManagerCommand> commands{trigger_boot}; | 
 |     TestInit(start.path, test_function_map, commands, &action_manager, &service_list); | 
 |  | 
 |     EXPECT_EQ(1, num_executed); | 
 | } | 
 |  | 
 | TEST(init, LazilyLoadedActionsCanBeTriggeredByTheNextTrigger) { | 
 |     // "start" script loads "lazy" script and then triggers "next" event | 
 |     // which executes "on next" action loaded by the previous command. | 
 |     TemporaryFile lazy; | 
 |     ASSERT_TRUE(lazy.fd != -1); | 
 |     ASSERT_TRUE(android::base::WriteStringToFd("on next\nexecute 2", lazy.fd)); | 
 |  | 
 |     TemporaryFile start; | 
 |     // clang-format off | 
 |     std::string start_script = "on boot\n" | 
 |                                "load " + std::string(lazy.path) + "\n" | 
 |                                "execute 1\n" | 
 |                                "trigger next"; | 
 |     // clang-format on | 
 |     ASSERT_TRUE(android::base::WriteStringToFd(start_script, start.fd)); | 
 |  | 
 |     int num_executed = 0; | 
 |     ActionManager action_manager; | 
 |     ServiceList service_list; | 
 |     BuiltinFunctionMap test_function_map = | 
 |             GetTestFunctionMapForLazyLoad(num_executed, action_manager); | 
 |  | 
 |     ActionManagerCommand trigger_boot = [](ActionManager& am) { am.QueueEventTrigger("boot"); }; | 
 |     std::vector<ActionManagerCommand> commands{trigger_boot}; | 
 |     TestInit(start.path, test_function_map, commands, &action_manager, &service_list); | 
 |  | 
 |     EXPECT_EQ(2, num_executed); | 
 | } | 
 |  | 
 | TEST(init, RejectsNoUserStartingInV) { | 
 |     std::string init_script = | 
 |             R"init( | 
 | service A something | 
 |     class first | 
 | )init"; | 
 |  | 
 |     TemporaryFile tf; | 
 |     ASSERT_TRUE(tf.fd != -1); | 
 |     ASSERT_TRUE(android::base::WriteStringToFd(init_script, tf.fd)); | 
 |  | 
 |     ServiceList service_list; | 
 |     Parser parser; | 
 |     parser.AddSectionParser("service", | 
 |                             std::make_unique<ServiceParser>(&service_list, nullptr, std::nullopt)); | 
 |  | 
 |     ASSERT_TRUE(parser.ParseConfig(tf.path)); | 
 |  | 
 |     if (GetIntProperty("ro.vendor.api_level", 0) > __ANDROID_API_U__) { | 
 |         ASSERT_EQ(1u, parser.parse_error_count()); | 
 |     } else { | 
 |         ASSERT_EQ(0u, parser.parse_error_count()); | 
 |     } | 
 | } | 
 |  | 
 | TEST(init, RejectsCriticalAndOneshotService) { | 
 |     if (GetIntProperty("ro.product.first_api_level", 10000) < 30) { | 
 |         GTEST_SKIP() << "Test only valid for devices launching with R or later"; | 
 |     } | 
 |  | 
 |     std::string init_script = | 
 |             R"init( | 
 | service A something | 
 |   class first | 
 |   user root | 
 |   critical | 
 |   oneshot | 
 | )init"; | 
 |  | 
 |     TemporaryFile tf; | 
 |     ASSERT_TRUE(tf.fd != -1); | 
 |     ASSERT_TRUE(android::base::WriteStringToFd(init_script, tf.fd)); | 
 |  | 
 |     ServiceList service_list; | 
 |     Parser parser; | 
 |     parser.AddSectionParser("service", | 
 |                             std::make_unique<ServiceParser>(&service_list, nullptr, std::nullopt)); | 
 |  | 
 |     ASSERT_TRUE(parser.ParseConfig(tf.path)); | 
 |     ASSERT_EQ(1u, parser.parse_error_count()); | 
 | } | 
 |  | 
 | TEST(init, MemLockLimit) { | 
 |     // Test is enforced only for U+ devices | 
 |     if (android::base::GetIntProperty("ro.vendor.api_level", 0) < __ANDROID_API_U__) { | 
 |         GTEST_SKIP(); | 
 |     } | 
 |  | 
 |     // Verify we are running memlock at, or under, 64KB | 
 |     const unsigned long max_limit = 65536; | 
 |     struct rlimit curr_limit; | 
 |     ASSERT_EQ(getrlimit(RLIMIT_MEMLOCK, &curr_limit), 0); | 
 |     ASSERT_LE(curr_limit.rlim_cur, max_limit); | 
 |     ASSERT_LE(curr_limit.rlim_max, max_limit); | 
 | } | 
 |  | 
 | void CloseAllFds() { | 
 |     DIR* dir; | 
 |     struct dirent* ent; | 
 |     int fd; | 
 |  | 
 |     if ((dir = opendir("/proc/self/fd"))) { | 
 |         while ((ent = readdir(dir))) { | 
 |             if (sscanf(ent->d_name, "%d", &fd) == 1) { | 
 |                 close(fd); | 
 |             } | 
 |         } | 
 |         closedir(dir); | 
 |     } | 
 | } | 
 |  | 
 | pid_t ForkExecvpAsync(const char* argv[]) { | 
 |     pid_t pid = fork(); | 
 |     if (pid == 0) { | 
 |         // Child process. | 
 |         CloseAllFds(); | 
 |  | 
 |         execvp(argv[0], const_cast<char**>(argv)); | 
 |         PLOG(ERROR) << "exec in ForkExecvpAsync init test"; | 
 |         _exit(EXIT_FAILURE); | 
 |     } | 
 |     // Parent process. | 
 |     if (pid == -1) { | 
 |         PLOG(ERROR) << "fork in ForkExecvpAsync init test"; | 
 |         return -1; | 
 |     } | 
 |     return pid; | 
 | } | 
 |  | 
 | pid_t TracerPid(pid_t pid) { | 
 |     static constexpr std::string_view prefix{"TracerPid:"}; | 
 |     std::ifstream is(StringPrintf("/proc/%d/status", pid)); | 
 |     std::string line; | 
 |     while (std::getline(is, line)) { | 
 |         if (line.find(prefix) == 0) { | 
 |             return atoi(line.substr(prefix.length()).c_str()); | 
 |         } | 
 |     } | 
 |     return -1; | 
 | } | 
 |  | 
 | TEST(init, GentleKill) { | 
 |     if (getuid() != 0) { | 
 |         GTEST_SKIP() << "Must be run as root."; | 
 |         return; | 
 |     } | 
 |     std::string init_script = R"init( | 
 | service test_gentle_kill /system/bin/sleep 1000 | 
 |     disabled | 
 |     oneshot | 
 |     gentle_kill | 
 |     user root | 
 |     group root | 
 |     seclabel u:r:toolbox:s0 | 
 | )init"; | 
 |  | 
 |     ActionManager action_manager; | 
 |     ServiceList service_list; | 
 |     TestInitText(init_script, BuiltinFunctionMap(), {}, &action_manager, &service_list); | 
 |     ASSERT_EQ(std::distance(service_list.begin(), service_list.end()), 1); | 
 |  | 
 |     auto service = service_list.begin()->get(); | 
 |     ASSERT_NE(service, nullptr); | 
 |     ASSERT_RESULT_OK(service->Start()); | 
 |     const pid_t pid = service->pid(); | 
 |     ASSERT_GT(pid, 0); | 
 |     EXPECT_NE(getsid(pid), 0); | 
 |  | 
 |     TemporaryFile logfile; | 
 |     logfile.DoNotRemove(); | 
 |     ASSERT_TRUE(logfile.fd != -1); | 
 |  | 
 |     std::string pid_str = std::to_string(pid); | 
 |     const char* argv[] = {"/system/bin/strace", "-o", logfile.path, "-e", "signal", "-p", | 
 |                           pid_str.c_str(),      nullptr}; | 
 |     pid_t strace_pid = ForkExecvpAsync(argv); | 
 |  | 
 |     // Give strace the chance to connect | 
 |     while (TracerPid(pid) == 0) { | 
 |         std::this_thread::sleep_for(10ms); | 
 |     } | 
 |     service->Stop(); | 
 |  | 
 |     int status; | 
 |     waitpid(strace_pid, &status, 0); | 
 |  | 
 |     std::string logs; | 
 |     android::base::ReadFdToString(logfile.fd, &logs); | 
 |     ASSERT_NE(logs.find("killed by SIGTERM"), std::string::npos); | 
 | } | 
 |  | 
 | class TestCaseLogger : public ::testing::EmptyTestEventListener { | 
 |     void OnTestStart(const ::testing::TestInfo& test_info) override { | 
 | #ifdef __ANDROID__ | 
 |         LOG(INFO) << "===== " << test_info.test_suite_name() << "::" << test_info.name() << " (" | 
 |                   << test_info.file() << ":" << test_info.line() << ")"; | 
 | #else | 
 |         UNUSED(test_info); | 
 | #endif | 
 |     } | 
 | }; | 
 |  | 
 | }  // namespace init | 
 | }  // namespace android | 
 |  | 
 | int SubcontextTestChildMain(int, char**); | 
 | int FirmwareTestChildMain(int, char**); | 
 |  | 
 | int main(int argc, char** argv) { | 
 |     if (argc > 1 && !strcmp(argv[1], "subcontext")) { | 
 |         return SubcontextTestChildMain(argc, argv); | 
 |     } | 
 |  | 
 |     if (argc > 1 && !strcmp(argv[1], "firmware")) { | 
 |         return FirmwareTestChildMain(argc, argv); | 
 |     } | 
 |  | 
 |     testing::InitGoogleTest(&argc, argv); | 
 |     testing::UnitTest::GetInstance()->listeners().Append(new android::init::TestCaseLogger()); | 
 |     return RUN_ALL_TESTS(); | 
 | } |