diff options
author | Android Build Coastguard Worker <android-build-coastguard-worker@google.com> | 2021-11-15 06:18:44 +0000 |
---|---|---|
committer | Android Build Coastguard Worker <android-build-coastguard-worker@google.com> | 2021-11-15 06:18:44 +0000 |
commit | bbd778d873e393f4cdf4c9941da8c3aa1c5c2abe (patch) | |
tree | d3eb3151d8423432630f0da95b4027c153006dde | |
parent | 9811caae0f785ece20ca9cc923a0c987ca011318 (diff) | |
parent | 20cde80f5c0371bf993ab19b7ce3d300d789fab5 (diff) | |
download | cts-android12-mainline-networkstack-release.tar.gz |
Snap for 7914678 from 20cde80f5c0371bf993ab19b7ce3d300d789fab5 to mainline-networking-releaseandroid-mainline-12.0.0_r49android12-mainline-networkstack-release
Change-Id: I264300a3340830c8636d8934299e34372f7cfb00
16 files changed, 462 insertions, 88 deletions
diff --git a/hostsidetests/securitybulletin/securityPatch/CVE-2021-0956/Android.bp b/hostsidetests/securitybulletin/securityPatch/CVE-2021-0956/Android.bp new file mode 100644 index 00000000000..9cd2b813f68 --- /dev/null +++ b/hostsidetests/securitybulletin/securityPatch/CVE-2021-0956/Android.bp @@ -0,0 +1,44 @@ +/* + * Copyright (C) 2021 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at: + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +package { + default_applicable_licenses: ["Android-Apache-2.0"], +} + +cc_test { + name: "CVE-2021-0956", + defaults: [ + "cts_hostsidetests_securitybulletin_defaults" + ], + srcs: [ + "poc.cpp" + ], + shared_libs: [ + "libnfc_nci_jni", + ], + header_libs: [ + "jni_headers" + ], + include_dirs: [ + "packages/apps/Nfc/nci/jni", + "system/nfc/src/nfa/include", + "system/nfc/src/gki/common", + "system/nfc/src/include", + "system/nfc/src/gki/ulinux", + "system/nfc/src/nfc/include", + ], +} diff --git a/hostsidetests/securitybulletin/securityPatch/CVE-2021-0956/poc.cpp b/hostsidetests/securitybulletin/securityPatch/CVE-2021-0956/poc.cpp new file mode 100644 index 00000000000..1d5d5e5f749 --- /dev/null +++ b/hostsidetests/securitybulletin/securityPatch/CVE-2021-0956/poc.cpp @@ -0,0 +1,46 @@ +/** + * Copyright (C) 2021 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#define private public +#include "NfcTag.h" + +bool isTestInProgress = false; + +struct sigaction new_action, old_action; + +void sigabrt_handler(int signum, siginfo_t* info, void* context) { + if (isTestInProgress && info->si_signo == SIGABRT) { + (*old_action.sa_sigaction)(signum, info, context); + return; + } + exit(EXIT_FAILURE); +} + +int main() { + sigemptyset(&new_action.sa_mask); + new_action.sa_flags = SA_SIGINFO; + new_action.sa_sigaction = sigabrt_handler; + sigaction(SIGABRT, &new_action, &old_action); + + NfcTag tag = {}; + tag.mTechListTail = NfcTag::MAX_NUM_TECHNOLOGY; + tag.mNumTechList = NfcTag::MAX_NUM_TECHNOLOGY; + tNFA_ACTIVATED activationData = {}; + isTestInProgress = true; + tag.discoverTechnologies(activationData); + isTestInProgress = false; + return EXIT_SUCCESS; +} diff --git a/hostsidetests/securitybulletin/src/android/security/cts/CVE_2021_0956.java b/hostsidetests/securitybulletin/src/android/security/cts/CVE_2021_0956.java new file mode 100644 index 00000000000..80fa239bc71 --- /dev/null +++ b/hostsidetests/securitybulletin/src/android/security/cts/CVE_2021_0956.java @@ -0,0 +1,47 @@ +/* + * Copyright (C) 2021 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package android.security.cts; + +import android.platform.test.annotations.AsbSecurityTest; +import com.android.compatibility.common.util.CrashUtils; +import com.android.tradefed.device.ITestDevice; +import com.android.tradefed.testtype.DeviceJUnit4ClassRunner; +import org.junit.Test; +import org.junit.runner.RunWith; + +@RunWith(DeviceJUnit4ClassRunner.class) +public class CVE_2021_0956 extends SecurityTestCase { + + /** + * b/189942532 + * Vulnerability Behaviour: SIGABRT in self + */ + @AsbSecurityTest(cveBugId = 189942532) + @Test + public void testPocCVE_2021_0956() throws Exception { + pocPusher.only64(); + ITestDevice device = getDevice(); + AdbUtils.assumeHasNfc(device); + assumeIsSupportedNfcDevice(device); + String binaryName = "CVE-2021-0956"; + String signals[] = {CrashUtils.SIGABRT}; + AdbUtils.pocConfig testConfig = new AdbUtils.pocConfig(binaryName, device); + testConfig.config = new CrashUtils.Config().setProcessPatterns(binaryName); + testConfig.config.setSignals(signals); + AdbUtils.runPocAssertNoCrashesNotVulnerable(testConfig); + } +} diff --git a/hostsidetests/securitybulletin/src/android/security/cts/CVE_2021_0965.java b/hostsidetests/securitybulletin/src/android/security/cts/CVE_2021_0965.java new file mode 100644 index 00000000000..a242904c0c2 --- /dev/null +++ b/hostsidetests/securitybulletin/src/android/security/cts/CVE_2021_0965.java @@ -0,0 +1,54 @@ +/** + * Copyright (C) 2021 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package android.security.cts; + +import static org.junit.Assert.assertFalse; +import android.platform.test.annotations.AppModeFull; +import android.platform.test.annotations.AsbSecurityTest; +import com.android.tradefed.testtype.DeviceJUnit4ClassRunner; +import com.android.tradefed.testtype.junit4.BaseHostJUnit4Test; +import org.junit.Before; +import org.junit.Test; +import org.junit.runner.RunWith; +import java.util.regex.Pattern; + +@RunWith(DeviceJUnit4ClassRunner.class) +public class CVE_2021_0965 extends BaseHostJUnit4Test { + private static final String TEST_PKG = "android.security.cts.CVE_2021_0965"; + private static final String TEST_CLASS = TEST_PKG + "." + "DeviceTest"; + private static final String TEST_APP = "CVE-2021-0965.apk"; + + @Before + public void setUp() throws Exception { + uninstallPackage(getDevice(), TEST_PKG); + } + + /** + * b/194300867 + */ + @AppModeFull + @AsbSecurityTest(cveBugId = 194300867) + @Test + public void testPocCVE_2021_0965() throws Exception { + installPackage(TEST_APP, new String[0]); + runDeviceTests(TEST_PKG, TEST_CLASS, "testPermission"); + String errorLog = "Vulnerable to b/194300867 !!"; + String logcat = AdbUtils.runCommandLine("logcat -d AndroidRuntime:E *:S", getDevice()); + Pattern pattern = Pattern.compile(errorLog, Pattern.MULTILINE); + assertFalse(pattern.matcher(logcat).find()); + } +} diff --git a/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/Android.bp b/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/Android.bp new file mode 100644 index 00000000000..ab1f6278b4f --- /dev/null +++ b/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/Android.bp @@ -0,0 +1,37 @@ +/* + * Copyright (C) 2021 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at: + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + * + */ + +android_test_helper_app { + name: "CVE-2021-0965", + defaults: [ + "cts_support_defaults", + ], + srcs: [ + "src/**/*.java", + ], + test_suites: [ + "cts", + "vts10", + "sts", + ], + static_libs: [ + "androidx.test.core", + "androidx.test.rules", + "androidx.test.uiautomator_uiautomator", + ], + sdk_version: "current", +} diff --git a/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/AndroidManifest.xml b/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/AndroidManifest.xml new file mode 100644 index 00000000000..ae1d2f9ed5e --- /dev/null +++ b/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/AndroidManifest.xml @@ -0,0 +1,37 @@ +<?xml version="1.0" encoding="utf-8"?> +<!-- + Copyright 2021 The Android Open Source Project + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. + --> +<manifest xmlns:android="http://schemas.android.com/apk/res/android" + package="android.security.cts.CVE_2021_0965" + android:versionCode="1" + android:versionName="1.0"> + <application + android:allowBackup="true" + android:label="CVE-2021-0965" + android:supportsRtl="true"> + + <activity android:exported="true" android:name=".PocActivity"> + <intent-filter> + <action android:name="android.intent.action.MAIN" /> + <category android:name="android.intent.category.LAUNCHER" /> + </intent-filter> + </activity> + </application> + + <instrumentation + android:name="androidx.test.runner.AndroidJUnitRunner" + android:targetPackage="android.security.cts.CVE_2021_0965" /> +</manifest> diff --git a/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/res/layout/activity_main.xml b/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/res/layout/activity_main.xml new file mode 100644 index 00000000000..a85bec90a5a --- /dev/null +++ b/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/res/layout/activity_main.xml @@ -0,0 +1,26 @@ +<?xml version="1.0" encoding="utf-8"?> +<!-- + Copyright 2021 The Android Open Source Project + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. + --> +<LinearLayout + xmlns:android="http://schemas.android.com/apk/res/android" + android:orientation="vertical" + android:layout_width="match_parent" + android:layout_height="match_parent"> + <View + android:id="@+id/drawableview" + android:layout_width="match_parent" + android:layout_height="300dp" /> +</LinearLayout> diff --git a/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/src/android/security/cts/CVE_2021_0965/DeviceTest.java b/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/src/android/security/cts/CVE_2021_0965/DeviceTest.java new file mode 100644 index 00000000000..e709d0a8044 --- /dev/null +++ b/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/src/android/security/cts/CVE_2021_0965/DeviceTest.java @@ -0,0 +1,56 @@ +/** + * Copyright (C) 2021 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package android.security.cts.CVE_2021_0965; + +import static androidx.test.core.app.ApplicationProvider.getApplicationContext; +import static androidx.test.platform.app.InstrumentationRegistry.getInstrumentation; +import android.content.Intent; +import androidx.test.runner.AndroidJUnit4; +import androidx.test.uiautomator.UiDevice; +import org.junit.Before; +import org.junit.Test; +import org.junit.runner.RunWith; + +@RunWith(AndroidJUnit4.class) +public class DeviceTest { + + @Before + public void startMainActivityFromHomeScreen() { + UiDevice device = UiDevice.getInstance(getInstrumentation()); + try { + device.wakeUp(); + } catch (Exception e) { + } + device.pressHome(); + } + + @Test + public void testPermission() { + try { + Intent intent = new Intent(Intent.ACTION_MAIN); + intent.setClassName("com.android.settings", + "com.android.settings.bluetooth.BluetoothPairingDialog"); + intent.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK); + getApplicationContext().startActivity(intent); + } catch (SecurityException e) { + return; + } + + /* If SecurityException is not thrown, it indicates absence of fix */ + throw new RuntimeException("Vulnerable to b/194300867 !!"); + } +} diff --git a/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/src/android/security/cts/CVE_2021_0965/PocActivity.java b/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/src/android/security/cts/CVE_2021_0965/PocActivity.java new file mode 100644 index 00000000000..04baf7789fe --- /dev/null +++ b/hostsidetests/securitybulletin/test-apps/CVE-2021-0965/src/android/security/cts/CVE_2021_0965/PocActivity.java @@ -0,0 +1,22 @@ +/* + * Copyright (C) 2021 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package android.security.cts.CVE_2021_0965; + +import android.app.Activity; + +public class PocActivity extends Activity { +} diff --git a/tests/PhotoPicker/Android.bp b/tests/PhotoPicker/Android.bp index dac10dca7c8..37b049b36c2 100644 --- a/tests/PhotoPicker/Android.bp +++ b/tests/PhotoPicker/Android.bp @@ -23,9 +23,14 @@ android_test { srcs: ["src/**/*.java", "helper/**/*.java", ":CtsProviderTestUtils",], compile_multilib: "both", test_suites: ["device-tests", "mts-mediaprovider", "cts"], - sdk_version: "test_current", + sdk_version: "core_current", min_sdk_version: "30", - libs: ["android.test.base", "android.test.runner",], + libs: [ + "android.test.base", + "android.test.runner", + "framework-mediaprovider.impl", + "framework-res", + "android_test_stubs_current"], static_libs: [ "androidx.test.rules", "cts-install-lib", diff --git a/tests/PhotoPicker/src/android/photopicker/cts/PhotoPickerBaseTest.java b/tests/PhotoPicker/src/android/photopicker/cts/PhotoPickerBaseTest.java index e51ff082ce3..49a1acbd772 100644 --- a/tests/PhotoPicker/src/android/photopicker/cts/PhotoPickerBaseTest.java +++ b/tests/PhotoPicker/src/android/photopicker/cts/PhotoPickerBaseTest.java @@ -16,9 +16,11 @@ package android.photopicker.cts; +import android.Manifest; import android.app.Instrumentation; import android.content.Context; import android.content.Intent; +import android.provider.DeviceConfig; import androidx.test.InstrumentationRegistry; import androidx.test.uiautomator.UiDevice; @@ -39,6 +41,9 @@ public class PhotoPickerBaseTest { @Before public void setUp() throws Exception { final Instrumentation inst = InstrumentationRegistry.getInstrumentation(); + + enablePhotoPickerFlag(inst); + mContext = inst.getContext(); final Intent intent = new Intent(mContext, GetResultActivity.class); intent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK); @@ -54,4 +59,14 @@ public class PhotoPickerBaseTest { mActivity.clearResult(); mDevice.waitForIdle(); } + + private void enablePhotoPickerFlag(Instrumentation inst) { + inst.getUiAutomation().adoptShellPermissionIdentity( + Manifest.permission.WRITE_DEVICE_CONFIG); + DeviceConfig.setProperty( + DeviceConfig.NAMESPACE_STORAGE_NATIVE_BOOT, + "picker_intent_enabled" /* name */, + "true" /* value */, + false /* makeDefault */); + } } diff --git a/tests/PhotoPicker/src/android/photopicker/cts/PhotoPickerTest.java b/tests/PhotoPicker/src/android/photopicker/cts/PhotoPickerTest.java index fd84b2834a8..761511abf87 100644 --- a/tests/PhotoPicker/src/android/photopicker/cts/PhotoPickerTest.java +++ b/tests/PhotoPicker/src/android/photopicker/cts/PhotoPickerTest.java @@ -106,7 +106,8 @@ public class PhotoPickerTest extends PhotoPickerBaseTest { @Test public void testMultiSelect_invalidParam() throws Exception { final Intent intent = new Intent(MediaStore.ACTION_PICK_IMAGES); - intent.putExtra(MediaStore.EXTRA_PICK_IMAGES_MAX, MediaStore.getPickImagesMaxLimit() + 1); + // TODO(b/205291616): Replace 101 with MediaStore.getPickImagesMaxLimit() + 1 + intent.putExtra(MediaStore.EXTRA_PICK_IMAGES_MAX, 101); mActivity.startActivityForResult(intent, REQUEST_CODE); final GetResultActivity.Result res = mActivity.getResult(); assertThat(res.resultCode).isEqualTo(Activity.RESULT_CANCELED); @@ -183,7 +184,8 @@ public class PhotoPickerTest extends PhotoPickerBaseTest { final int imageCount = 4; createImages(imageCount, mContext.getUserId(), mUriList); final Intent intent = new Intent(MediaStore.ACTION_PICK_IMAGES); - intent.putExtra(MediaStore.EXTRA_PICK_IMAGES_MAX, MediaStore.getPickImagesMaxLimit()); + // TODO(b/205291616): Replace 100 with MediaStore.getPickImagesMaxLimit() + intent.putExtra(MediaStore.EXTRA_PICK_IMAGES_MAX, 100); mActivity.startActivityForResult(intent, REQUEST_CODE); final List<UiObject> itemList = findItemList(imageCount); @@ -214,7 +216,8 @@ public class PhotoPickerTest extends PhotoPickerBaseTest { final int imageCount = 3; createImages(imageCount, mContext.getUserId(), mUriList); final Intent intent = new Intent(MediaStore.ACTION_PICK_IMAGES); - intent.putExtra(MediaStore.EXTRA_PICK_IMAGES_MAX, MediaStore.getPickImagesMaxLimit()); + // TODO(b/205291616): Replace 100 with MediaStore.getPickImagesMaxLimit() + intent.putExtra(MediaStore.EXTRA_PICK_IMAGES_MAX, 100); mActivity.startActivityForResult(intent, REQUEST_CODE); final List<UiObject> itemList = findItemList(imageCount); @@ -260,7 +263,8 @@ public class PhotoPickerTest extends PhotoPickerBaseTest { final int imageCount = 4; createImages(imageCount, mContext.getUserId(), mUriList); final Intent intent = new Intent(MediaStore.ACTION_PICK_IMAGES); - intent.putExtra(MediaStore.EXTRA_PICK_IMAGES_MAX, MediaStore.getPickImagesMaxLimit()); + // TODO(b/205291616): Replace 100 with MediaStore.getPickImagesMaxLimit() + intent.putExtra(MediaStore.EXTRA_PICK_IMAGES_MAX, 100); mActivity.startActivityForResult(intent, REQUEST_CODE); final List<UiObject> itemList = findItemList(imageCount); @@ -312,7 +316,8 @@ public class PhotoPickerTest extends PhotoPickerBaseTest { final String mimeType = "video/dng"; final Intent intent = new Intent(MediaStore.ACTION_PICK_IMAGES); - intent.putExtra(MediaStore.EXTRA_PICK_IMAGES_MAX, MediaStore.getPickImagesMaxLimit()); + // TODO(b/205291616): Replace 100 with MediaStore.getPickImagesMaxLimit() + intent.putExtra(MediaStore.EXTRA_PICK_IMAGES_MAX, 100); intent.setType(mimeType); mActivity.startActivityForResult(intent, REQUEST_CODE); diff --git a/tests/tests/neuralnetworks/Android.mk b/tests/tests/neuralnetworks/Android.mk index 7ac51eaeaf8..d8b6ee3f962 100644 --- a/tests/tests/neuralnetworks/Android.mk +++ b/tests/tests/neuralnetworks/Android.mk @@ -43,4 +43,3 @@ LOCAL_MIN_SDK_VERSION := 30 include $(BUILD_CTS_EXECUTABLE) include $(nnapi_cts_dir)/benchmark/Android.mk -include $(nnapi_cts_dir)/tflite_delegate/Android.mk diff --git a/tests/tests/neuralnetworks/tflite_delegate/Android.bp b/tests/tests/neuralnetworks/tflite_delegate/Android.bp new file mode 100644 index 00000000000..6acce1d74ed --- /dev/null +++ b/tests/tests/neuralnetworks/tflite_delegate/Android.bp @@ -0,0 +1,58 @@ +// Copyright (C) 2019 The Android Open Source Project +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +package { + // See: http://go/android-license-faq + default_applicable_licenses: ["Android-Apache-2.0"], +} + +// The "CtsTfliteNnapiDelegateTests_static" has been moved to +// external/tensorflow/Android.bp, due to the fact that the srcs files +// are not in the current directory. + +// Build the actual CTS module with the static lib above. +// This is necessary for the build system to pickup the AndroidTest.xml. + +cc_test { + name: "CtsTfliteNnapiDelegateTestCases", + compile_multilib: "both", + multilib: { + lib32: { + suffix: "32", + }, + lib64: { + suffix: "64", + }, + }, + whole_static_libs: ["TfliteNnapiDelegateTests_static"], + shared_libs: [ + "libandroid", + "liblog", + "libneuralnetworks", + ], + static_libs: [ + "libgtest_ndk_c++", + "libgmock_ndk", + "libtflite_static", + ], + // Tag this module as a cts test artifact + test_suites: [ + "cts", + "mts", + "mts-neuralnetworks", + "general-tests", + ], + sdk_version: "current", + stl: "c++_static", +} diff --git a/tests/tests/neuralnetworks/tflite_delegate/Android.mk b/tests/tests/neuralnetworks/tflite_delegate/Android.mk deleted file mode 100644 index 785f7bd5ad4..00000000000 --- a/tests/tests/neuralnetworks/tflite_delegate/Android.mk +++ /dev/null @@ -1,80 +0,0 @@ -# Copyright (C) 2019 The Android Open Source Project -# -# Licensed under the Apache License, Version 2.0 (the "License"); -# you may not use this file except in compliance with the License. -# You may obtain a copy of the License at -# -# http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software -# distributed under the License is distributed on an "AS IS" BASIS, -# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -# See the License for the specific language governing permissions and -# limitations under the License. - -my_dir := $(call my-dir) - -LOCAL_PATH:= external/tensorflow/ -include $(CLEAR_VARS) -LOCAL_MODULE := CtsTfliteNnapiDelegateTests_static -LOCAL_LICENSE_KINDS := SPDX-license-identifier-Apache-2.0 -LOCAL_LICENSE_CONDITIONS := notice -LOCAL_SRC_FILES := \ - tensorflow/lite/delegates/nnapi/nnapi_delegate_test.cc \ - tensorflow/lite/kernels/test_util.cc \ - tensorflow/core/platform/default/logging.cc \ - tensorflow/core/platform/default/env_time.cc \ - tensorflow/lite/kernels/acceleration_test_util.cc \ - tensorflow/lite/kernels/acceleration_test_util_internal.cc \ - tensorflow/lite/delegates/nnapi/acceleration_test_list.cc \ - tensorflow/lite/delegates/nnapi/acceleration_test_util.cc -LOCAL_CPP_EXTENSION := .cc - -LOCAL_C_INCLUDES += external/flatbuffers/include -LOCAL_C_INCLUDES += external/tensorflow -LOCAL_C_INCLUDES += external/ruy - -LOCAL_CFLAGS := \ - -DPLATFORM_POSIX_ANDROID \ - -Wall \ - -Werror \ - -Wextra \ - -Wno-extern-c-compat \ - -Wno-sign-compare \ - -Wno-unused-parameter \ - -Wno-unused-private-field \ - -LOCAL_SHARED_LIBRARIES := libandroid liblog libneuralnetworks -LOCAL_STATIC_LIBRARIES := libgtest_ndk_c++ libgmock_ndk libtflite_static -LOCAL_HEADER_LIBRARIES := libeigen gemmlowp_headers libtflite_schema_headers -LOCAL_SDK_VERSION := current -LOCAL_NDK_STL_VARIANT := c++_static -include $(BUILD_STATIC_LIBRARY) - - -# Build the actual CTS module with the static lib above. -# This is necessary for the build system to pickup the AndroidTest.xml. -LOCAL_PATH:= $(my_dir) - -include $(CLEAR_VARS) -LOCAL_MODULE := CtsTfliteNnapiDelegateTestCases -LOCAL_LICENSE_KINDS := SPDX-license-identifier-Apache-2.0 -LOCAL_LICENSE_CONDITIONS := notice -LOCAL_MODULE_PATH := $(TARGET_OUT_DATA)/nativetest -LOCAL_MULTILIB := both -LOCAL_MODULE_STEM_32 := $(LOCAL_MODULE)32 -LOCAL_MODULE_STEM_64 := $(LOCAL_MODULE)64 - -LOCAL_WHOLE_STATIC_LIBRARIES := CtsTfliteNnapiDelegateTests_static - -LOCAL_SHARED_LIBRARIES := libandroid liblog libneuralnetworks -LOCAL_STATIC_LIBRARIES := libgtest_ndk_c++ libgmock_ndk libtflite_static -LOCAL_CTS_TEST_PACKAGE := android.neuralnetworks - -# Tag this module as a cts test artifact -LOCAL_COMPATIBILITY_SUITE := cts mts mts-neuralnetworks general-tests - -LOCAL_SDK_VERSION := current -LOCAL_NDK_STL_VARIANT := c++_static - -include $(BUILD_CTS_EXECUTABLE) diff --git a/tools/cts-tradefed/res/config/cts-on-gsi-exclude.xml b/tools/cts-tradefed/res/config/cts-on-gsi-exclude.xml index 0145e55b870..2faf29bb307 100644 --- a/tools/cts-tradefed/res/config/cts-on-gsi-exclude.xml +++ b/tools/cts-tradefed/res/config/cts-on-gsi-exclude.xml @@ -92,4 +92,7 @@ <!-- b/199996926 - No UWB stack support in AOSP for Android S --> <option name="compatibility:exclude-filter" value="CtsUwbTestCases" /> + + <!-- b/183653612: CtsTransitionTestCases --> + <option name="compatibility:exclude-filter" value="CtsTransitionTestCases" /> </configuration> |