Merge master@5428150 into git_qt-dev-plus-aosp.

Change-Id: Icd07411ce45f7aa4f6bd284a6260f19e28781ac6
BUG: 129345239
This commit is contained in:
Bill Rassieur
2019-04-02 18:26:52 +00:00
8 changed files with 206 additions and 53 deletions

View File

@@ -16,6 +16,11 @@
package com.android.cts.net.hostside; package com.android.cts.net.hostside;
import static android.system.OsConstants.ICMP6_ECHO_REPLY;
import static android.system.OsConstants.ICMP6_ECHO_REQUEST;
import static android.system.OsConstants.ICMP_ECHO;
import static android.system.OsConstants.ICMP_ECHOREPLY;
import android.system.ErrnoException; import android.system.ErrnoException;
import android.system.Os; import android.system.Os;
import android.util.Log; import android.util.Log;
@@ -47,8 +52,6 @@ public class PacketReflector extends Thread {
private static final byte ICMP_ECHO = 8; private static final byte ICMP_ECHO = 8;
private static final byte ICMP_ECHOREPLY = 0; private static final byte ICMP_ECHOREPLY = 0;
private static final byte ICMPV6_ECHO_REQUEST = (byte) 128;
private static final byte ICMPV6_ECHO_REPLY = (byte) 129;
private static String TAG = "PacketReflector"; private static String TAG = "PacketReflector";
@@ -125,7 +128,7 @@ public class PacketReflector extends Thread {
byte type = buf[hdrLen]; byte type = buf[hdrLen];
if (!(version == 4 && type == ICMP_ECHO) && if (!(version == 4 && type == ICMP_ECHO) &&
!(version == 6 && type == ICMPV6_ECHO_REQUEST)) { !(version == 6 && type == (byte) ICMP6_ECHO_REQUEST)) {
return; return;
} }
@@ -145,10 +148,18 @@ public class PacketReflector extends Thread {
return; return;
} }
byte replyType = buf[hdrLen];
if ((type == ICMP_ECHO && replyType != ICMP_ECHOREPLY)
|| (type == (byte) ICMP6_ECHO_REQUEST && replyType != (byte) ICMP6_ECHO_REPLY)) {
Log.i(TAG, "Received unexpected ICMP reply: original " + type
+ ", reply " + replyType);
return;
}
// Compare the response we got with the original packet. // Compare the response we got with the original packet.
// The only thing that should have changed are addresses, type and checksum. // The only thing that should have changed are addresses, type and checksum.
// Overwrite them with the received bytes and see if the packet is otherwise identical. // Overwrite them with the received bytes and see if the packet is otherwise identical.
request[hdrLen] = buf[hdrLen]; // Type. request[hdrLen] = buf[hdrLen]; // Type
request[hdrLen + 2] = buf[hdrLen + 2]; // Checksum byte 1. request[hdrLen + 2] = buf[hdrLen + 2]; // Checksum byte 1.
request[hdrLen + 3] = buf[hdrLen + 3]; // Checksum byte 2. request[hdrLen + 3] = buf[hdrLen + 3]; // Checksum byte 2.

View File

@@ -120,8 +120,8 @@ JNIEXPORT jboolean Java_android_net_cts_DnsTest_testNativeDns(JNIEnv* env, jclas
gai_strerror(res)); gai_strerror(res));
return JNI_FALSE; return JNI_FALSE;
} }
if (strstr(buf, "google.com") == NULL) { if (strstr(buf, "google.com") == NULL && strstr(buf, "dns.google") == NULL) {
ALOGD("getnameinfo(%s (GoogleDNS) ) didn't return google.com: %s", ALOGD("getnameinfo(%s (GoogleDNS) ) didn't return google.com or dns.google: %s",
GoogleDNSIpV4Address, buf); GoogleDNSIpV4Address, buf);
return JNI_FALSE; return JNI_FALSE;
} }
@@ -133,8 +133,9 @@ JNIEXPORT jboolean Java_android_net_cts_DnsTest_testNativeDns(JNIEnv* env, jclas
res, gai_strerror(res)); res, gai_strerror(res));
return JNI_FALSE; return JNI_FALSE;
} }
if (strstr(buf, "google.com") == NULL) { if (strstr(buf, "google.com") == NULL && strstr(buf, "dns.google") == NULL) {
ALOGD("getnameinfo(%s) didn't return google.com: %s", GoogleDNSIpV6Address2, buf); ALOGD("getnameinfo(%s (GoogleDNS) ) didn't return google.com or dns.google: %s",
GoogleDNSIpV6Address2, buf);
return JNI_FALSE; return JNI_FALSE;
} }

View File

@@ -245,13 +245,12 @@ JNIEXPORT jint Java_android_net_cts_MultinetworkApiTest_runResNcancelCheck(
net_handle_t handle = (net_handle_t) nethandle; net_handle_t handle = (net_handle_t) nethandle;
int fd = android_res_nquery(handle, kGoogleName, ns_c_in, ns_t_a, 0); int fd = android_res_nquery(handle, kGoogleName, ns_c_in, ns_t_a, 0);
int rcode = -1; errno = 0;
uint8_t buf[MAXPACKET] = {};
android_res_cancel(fd); android_res_cancel(fd);
EXPECT_EQ(env, -EBADF, android_res_nresult(fd, &rcode, buf, MAXPACKET), "res_cancel"); int err = errno;
EXPECT_EQ(env, 0, err, "res_cancel");
android_res_cancel(fd); // DO NOT call cancel or result with the same fd more than once,
EXPECT_EQ(env, -EBADF, android_res_nresult(fd, &rcode, buf, MAXPACKET), "res_cancel"); // otherwise it will hit fdsan double-close fd.
return 0; return 0;
} }
@@ -288,10 +287,10 @@ JNIEXPORT jint Java_android_net_cts_MultinetworkApiTest_runResNapiMalformedCheck
fd = android_res_nsend(handle, largeBuf, sizeof(largeBuf), 0); fd = android_res_nsend(handle, largeBuf, sizeof(largeBuf), 0);
EXPECT_EQ(env, -EMSGSIZE, fd, "res_nsend buffer larger than 8KB"); EXPECT_EQ(env, -EMSGSIZE, fd, "res_nsend buffer larger than 8KB");
// 1000 bytes filled with 0. This returns EMSGSIZE because FrameworkListener limits the size of // 5000 bytes filled with 0. This returns EMSGSIZE because FrameworkListener limits the size of
// commands to 1024 bytes. TODO: b/126307309 // commands to 4096 bytes.
fd = android_res_nsend(handle, largeBuf, 1000, 0); fd = android_res_nsend(handle, largeBuf, 5000, 0);
EXPECT_EQ(env, -EMSGSIZE, fd, "res_nsend 1000 bytes filled with 0"); EXPECT_EQ(env, -EMSGSIZE, fd, "res_nsend 5000 bytes filled with 0");
// 500 bytes filled with 0 // 500 bytes filled with 0
fd = android_res_nsend(handle, largeBuf, 500, 0); fd = android_res_nsend(handle, largeBuf, 500, 0);
@@ -299,16 +298,16 @@ JNIEXPORT jint Java_android_net_cts_MultinetworkApiTest_runResNapiMalformedCheck
EXPECT_EQ(env, 0, expectAnswersNotValid(env, fd, -EINVAL), EXPECT_EQ(env, 0, expectAnswersNotValid(env, fd, -EINVAL),
"res_nsend 500 bytes filled with 0 check answers"); "res_nsend 500 bytes filled with 0 check answers");
// 1000 bytes filled with 0xFF // 5000 bytes filled with 0xFF
uint8_t ffBuf[1001] = {}; uint8_t ffBuf[5001] = {};
memset(ffBuf, 0xFF, sizeof(ffBuf)); memset(ffBuf, 0xFF, sizeof(ffBuf));
ffBuf[1000] = '\0'; ffBuf[5000] = '\0';
fd = android_res_nsend(handle, ffBuf, sizeof(ffBuf), 0); fd = android_res_nsend(handle, ffBuf, sizeof(ffBuf), 0);
EXPECT_EQ(env, -EMSGSIZE, fd, "res_nsend 1000 bytes filled with 0xFF"); EXPECT_EQ(env, -EMSGSIZE, fd, "res_nsend 5000 bytes filled with 0xFF");
// 500 bytes filled with 0xFF // 500 bytes filled with 0xFF
ffBuf[501] = '\0'; ffBuf[500] = '\0';
fd = android_res_nsend(handle, ffBuf, 500, 0); fd = android_res_nsend(handle, ffBuf, 501, 0);
EXPECT_GE(env, fd, 0, "res_nsend 500 bytes filled with 0xFF"); EXPECT_GE(env, fd, 0, "res_nsend 500 bytes filled with 0xFF");
EXPECT_EQ(env, 0, expectAnswersNotValid(env, fd, -EINVAL), EXPECT_EQ(env, 0, expectAnswersNotValid(env, fd, -EINVAL),
"res_nsend 500 bytes filled with 0xFF check answers"); "res_nsend 500 bytes filled with 0xFF check answers");

View File

@@ -194,13 +194,12 @@ TEST (NativeDnsAsyncTest, Async_NXDOMAIN) {
TEST (NativeDnsAsyncTest, Async_Cancel) { TEST (NativeDnsAsyncTest, Async_Cancel) {
int fd = android_res_nquery( int fd = android_res_nquery(
NETWORK_UNSPECIFIED, "www.google.com", ns_c_in, ns_t_a, 0); NETWORK_UNSPECIFIED, "www.google.com", ns_c_in, ns_t_a, 0);
int rcode = -1; errno = 0;
uint8_t buf[MAXPACKET] = {};
android_res_cancel(fd); android_res_cancel(fd);
android_res_cancel(fd); int err = errno;
EXPECT_EQ(err, 0);
int res = android_res_nresult(fd, &rcode, buf, MAXPACKET); // DO NOT call cancel or result with the same fd more than once,
EXPECT_EQ(-EBADF, res); // otherwise it will hit fdsan double-close fd.
} }
TEST (NativeDnsAsyncTest, Async_Query_MALFORMED) { TEST (NativeDnsAsyncTest, Async_Query_MALFORMED) {
@@ -235,9 +234,9 @@ TEST (NativeDnsAsyncTest, Async_Send_MALFORMED) {
NETWORK_UNSPECIFIED, largeBuf.data(), largeBuf.size(), 0); NETWORK_UNSPECIFIED, largeBuf.data(), largeBuf.size(), 0);
EXPECT_EQ(-EMSGSIZE, fd); EXPECT_EQ(-EMSGSIZE, fd);
// 1000 bytes filled with 0. This returns EMSGSIZE because FrameworkListener limits the size of // 5000 bytes filled with 0. This returns EMSGSIZE because FrameworkListener limits the size of
// commands to 1024 bytes. TODO: fix this. // commands to 4096 bytes.
fd = android_res_nsend(NETWORK_UNSPECIFIED, largeBuf.data(), 1000, 0); fd = android_res_nsend(NETWORK_UNSPECIFIED, largeBuf.data(), 5000, 0);
EXPECT_EQ(-EMSGSIZE, fd); EXPECT_EQ(-EMSGSIZE, fd);
// 500 bytes filled with 0 // 500 bytes filled with 0
@@ -245,8 +244,8 @@ TEST (NativeDnsAsyncTest, Async_Send_MALFORMED) {
EXPECT_GE(fd, 0); EXPECT_GE(fd, 0);
expectAnswersNotValid(fd, -EINVAL); expectAnswersNotValid(fd, -EINVAL);
// 1000 bytes filled with 0xFF // 5000 bytes filled with 0xFF
std::vector<uint8_t> ffBuf(1000, 0xFF); std::vector<uint8_t> ffBuf(5000, 0xFF);
fd = android_res_nsend( fd = android_res_nsend(
NETWORK_UNSPECIFIED, ffBuf.data(), ffBuf.size(), 0); NETWORK_UNSPECIFIED, ffBuf.data(), ffBuf.size(), 0);
EXPECT_EQ(-EMSGSIZE, fd); EXPECT_EQ(-EMSGSIZE, fd);

View File

@@ -370,7 +370,6 @@ public class DnsResolverTest extends AndroidTestCase {
@Override @Override
public void onQueryException(@NonNull ErrnoException e) { public void onQueryException(@NonNull ErrnoException e) {
if (mCancelSignal.isCanceled() && e.errno == EBADF) return;
fail(mMsg + e.getMessage()); fail(mMsg + e.getMessage());
} }
} }
@@ -380,7 +379,7 @@ public class DnsResolverTest extends AndroidTestCase {
final String msg = "Test cancel query " + dname; final String msg = "Test cancel query " + dname;
// Start a DNS query and the cancel it immediately. Use VerifyCancelCallback to expect // Start a DNS query and the cancel it immediately. Use VerifyCancelCallback to expect
// that the query is cancelled before it succeeds. If it is not cancelled before it // that the query is cancelled before it succeeds. If it is not cancelled before it
// succeeds, retry the until it is. // succeeds, retry the test until it is.
for (Network network : getTestableNetworks()) { for (Network network : getTestableNetworks()) {
boolean retry = false; boolean retry = false;
int round = 0; int round = 0;
@@ -426,7 +425,7 @@ public class DnsResolverTest extends AndroidTestCase {
final String msg = "Test cancel raw Query " + byteArrayToHexString(blob); final String msg = "Test cancel raw Query " + byteArrayToHexString(blob);
// Start a DNS query and the cancel it immediately. Use VerifyCancelCallback to expect // Start a DNS query and the cancel it immediately. Use VerifyCancelCallback to expect
// that the query is cancelled before it succeeds. If it is not cancelled before it // that the query is cancelled before it succeeds. If it is not cancelled before it
// succeeds, retry the until it is. // succeeds, retry the test until it is.
for (Network network : getTestableNetworks()) { for (Network network : getTestableNetworks()) {
boolean retry = false; boolean retry = false;
int round = 0; int round = 0;
@@ -470,4 +469,108 @@ public class DnsResolverTest extends AndroidTestCase {
} }
} }
} }
/**
* A query callback for InetAddress that ensures that the query is
* cancelled and that onAnswer is never called. If the query succeeds
* before it is cancelled, needRetry will return true so the
* test can retry.
*/
class VerifyCancelInetAddressCallback extends DnsResolver.InetAddressAnswerCallback {
private static final int CANCEL_TIMEOUT = 3_000;
private final CountDownLatch mLatch = new CountDownLatch(1);
private final String mMsg;
private final List<InetAddress> mAnswers;
private final CancellationSignal mCancelSignal;
VerifyCancelInetAddressCallback(@NonNull String msg, @Nullable CancellationSignal cancel) {
this.mMsg = msg;
this.mCancelSignal = cancel;
mAnswers = new ArrayList<>();
}
public boolean waitForAnswer() throws InterruptedException {
return mLatch.await(TIMEOUT_MS, TimeUnit.MILLISECONDS);
}
public boolean needRetry() throws InterruptedException {
return mLatch.await(CANCEL_TIMEOUT, TimeUnit.MILLISECONDS);
}
public boolean isAnswerEmpty() {
return mAnswers.isEmpty();
}
@Override
public void onAnswer(@NonNull List<InetAddress> answerList) {
if (mCancelSignal != null && mCancelSignal.isCanceled()) {
fail(mMsg + " should not have returned any answers");
}
mAnswers.clear();
mAnswers.addAll(answerList);
mLatch.countDown();
}
@Override
public void onParseException(@NonNull ParseException e) {
fail(mMsg + e.getMessage());
}
@Override
public void onQueryException(@NonNull ErrnoException e) {
fail(mMsg + e.getMessage());
}
}
public void testQueryForInetAddress() {
final String dname = "www.google.com";
final String msg = "Test query for InetAddress " + dname;
for (Network network : getTestableNetworks()) {
final VerifyCancelInetAddressCallback callback =
new VerifyCancelInetAddressCallback(msg, null);
mDns.query(network, dname, FLAG_NO_CACHE_LOOKUP,
mExecutor, null, callback);
try {
assertTrue(msg + " but no answer after " + TIMEOUT_MS + "ms.",
callback.waitForAnswer());
assertTrue(msg + " returned 0 results", !callback.isAnswerEmpty());
} catch (InterruptedException e) {
fail(msg + " Waiting for DNS lookup was interrupted");
}
}
}
public void testQueryCancelForInetAddress() throws ErrnoException {
final String dname = "www.google.com";
final String msg = "Test cancel query for InetAddress " + dname;
// Start a DNS query and the cancel it immediately. Use VerifyCancelCallback to expect
// that the query is cancelled before it succeeds. If it is not cancelled before it
// succeeds, retry the test until it is.
for (Network network : getTestableNetworks()) {
boolean retry = false;
int round = 0;
do {
if (++round > CANCEL_RETRY_TIMES) {
fail(msg + " cancel failed " + CANCEL_RETRY_TIMES + " times");
}
final CountDownLatch latch = new CountDownLatch(1);
final CancellationSignal cancelSignal = new CancellationSignal();
final VerifyCancelInetAddressCallback callback =
new VerifyCancelInetAddressCallback(msg, cancelSignal);
mDns.query(network, dname, FLAG_EMPTY, mExecutor, cancelSignal, callback);
mExecutor.execute(() -> {
cancelSignal.cancel();
latch.countDown();
});
try {
retry = callback.needRetry();
assertTrue(msg + " query was not cancelled",
latch.await(TIMEOUT_MS, TimeUnit.MILLISECONDS));
} catch (InterruptedException e) {
fail(msg + "Waiting for DNS lookup was interrupted");
}
} while (retry);
}
}
} }

View File

@@ -16,15 +16,14 @@
package android.net.cts; package android.net.cts;
import android.content.pm.PackageManager;
import android.net.NetworkStats; import android.net.NetworkStats;
import android.net.TrafficStats; import android.net.TrafficStats;
import android.os.Process; import android.os.Process;
import android.os.SystemProperties;
import android.test.AndroidTestCase; import android.test.AndroidTestCase;
import android.util.Log; import android.util.Log;
import java.io.BufferedReader;
import java.io.FileNotFoundException;
import java.io.FileReader;
import java.io.IOException; import java.io.IOException;
import java.io.InputStream; import java.io.InputStream;
import java.io.OutputStream; import java.io.OutputStream;
@@ -237,19 +236,37 @@ public class TrafficStatsTest extends AndroidTestCase {
uidRxDeltaBytes <= tcpPacketToIpBytes(packetCount, byteCount) + tcpPacketToIpBytes(packetCount + maxExpectedExtraPackets + deltaRxOtherPackets, 0)); uidRxDeltaBytes <= tcpPacketToIpBytes(packetCount, byteCount) + tcpPacketToIpBytes(packetCount + maxExpectedExtraPackets + deltaRxOtherPackets, 0));
// Localhost traffic *does* count against total stats. // Localhost traffic *does* count against total stats.
// Fudge by 132 packets of 1500 bytes not related to the test. // Check the total stats increased after test data transfer over localhost has been made.
assertTrue("ttxp: " + totalTxPacketsBefore + " -> " + totalTxPacketsAfter, assertTrue("ttxp: " + totalTxPacketsBefore + " -> " + totalTxPacketsAfter,
totalTxPacketsAfter >= totalTxPacketsBefore + uidTxDeltaPackets && totalTxPacketsAfter >= totalTxPacketsBefore + uidTxDeltaPackets);
totalTxPacketsAfter <= totalTxPacketsBefore + uidTxDeltaPackets + 132);
assertTrue("trxp: " + totalRxPacketsBefore + " -> " + totalRxPacketsAfter, assertTrue("trxp: " + totalRxPacketsBefore + " -> " + totalRxPacketsAfter,
totalRxPacketsAfter >= totalRxPacketsBefore + uidRxDeltaPackets && totalRxPacketsAfter >= totalRxPacketsBefore + uidRxDeltaPackets);
totalRxPacketsAfter <= totalRxPacketsBefore + uidRxDeltaPackets + 132);
assertTrue("ttxb: " + totalTxBytesBefore + " -> " + totalTxBytesAfter, assertTrue("ttxb: " + totalTxBytesBefore + " -> " + totalTxBytesAfter,
totalTxBytesAfter >= totalTxBytesBefore + uidTxDeltaBytes && totalTxBytesAfter >= totalTxBytesBefore + uidTxDeltaBytes);
totalTxBytesAfter <= totalTxBytesBefore + uidTxDeltaBytes + 132 * 1500);
assertTrue("trxb: " + totalRxBytesBefore + " -> " + totalRxBytesAfter, assertTrue("trxb: " + totalRxBytesBefore + " -> " + totalRxBytesAfter,
totalRxBytesAfter >= totalRxBytesBefore + uidRxDeltaBytes && totalRxBytesAfter >= totalRxBytesBefore + uidRxDeltaBytes);
totalRxBytesAfter <= totalRxBytesBefore + uidRxDeltaBytes + 132 * 1500);
// If the adb TCP port is opened, this test may be run by adb over network.
// Huge amount of data traffic might go through the network and accounted into total packets
// stats. The upper bound check would be meaningless.
// TODO: Consider precisely calculate the traffic accounted due to adb over network and
// subtract it when checking upper bound instead of skip checking.
final PackageManager pm = mContext.getPackageManager();
if (SystemProperties.getInt("persist.adb.tcp.port", -1) > -1
|| SystemProperties.getInt("service.adb.tcp.port", -1) > -1
|| !pm.hasSystemFeature(PackageManager.FEATURE_USB_ACCESSORY)) {
Log.i(LOG_TAG, "adb is running over the network, skip the upper bound check");
} else {
// Fudge by 132 packets of 1500 bytes not related to the test.
assertTrue("ttxp: " + totalTxPacketsBefore + " -> " + totalTxPacketsAfter,
totalTxPacketsAfter <= totalTxPacketsBefore + uidTxDeltaPackets + 132);
assertTrue("trxp: " + totalRxPacketsBefore + " -> " + totalRxPacketsAfter,
totalRxPacketsAfter <= totalRxPacketsBefore + uidRxDeltaPackets + 132);
assertTrue("ttxb: " + totalTxBytesBefore + " -> " + totalTxBytesAfter,
totalTxBytesAfter <= totalTxBytesBefore + uidTxDeltaBytes + 132 * 1500);
assertTrue("trxb: " + totalRxBytesBefore + " -> " + totalRxBytesAfter,
totalRxBytesAfter <= totalRxBytesBefore + uidRxDeltaBytes + 132 * 1500);
}
// Localhost traffic should *not* count against mobile stats, // Localhost traffic should *not* count against mobile stats,
// There might be some other traffic, but nowhere near 1MB. // There might be some other traffic, but nowhere near 1MB.
@@ -265,6 +282,5 @@ public class TrafficStatsTest extends AndroidTestCase {
assertTrue("mrxb: " + mobileRxBytesBefore + " -> " + mobileRxBytesAfter, assertTrue("mrxb: " + mobileRxBytesBefore + " -> " + mobileRxBytesAfter,
mobileRxBytesAfter >= mobileRxBytesBefore && mobileRxBytesAfter >= mobileRxBytesBefore &&
mobileRxBytesAfter <= mobileRxBytesBefore + 200000); mobileRxBytesAfter <= mobileRxBytesBefore + 200000);
} }
} }

View File

@@ -61,7 +61,7 @@ public class PingTest extends AndroidTestCase {
/** The beginning of an ICMPv6 echo request: type, code, and uninitialized checksum. */ /** The beginning of an ICMPv6 echo request: type, code, and uninitialized checksum. */
private static final byte[] PING_HEADER = new byte[] { private static final byte[] PING_HEADER = new byte[] {
(byte) 0x80, (byte) 0x00, (byte) 0x00, (byte) 0x00 (byte) ICMP6_ECHO_REQUEST, (byte) 0x00, (byte) 0x00, (byte) 0x00
}; };
/** /**
@@ -135,7 +135,7 @@ public class PingTest extends AndroidTestCase {
byte[] response = new byte[bytesRead]; byte[] response = new byte[bytesRead];
responseBuffer.flip(); responseBuffer.flip();
responseBuffer.get(response, 0, bytesRead); responseBuffer.get(response, 0, bytesRead);
assertEquals((byte) 0x81, response[0]); assertEquals((byte) ICMP6_ECHO_REPLY, response[0]);
// Find out what ICMP ID was used in the packet that was sent. // Find out what ICMP ID was used in the packet that was sent.
int id = ((InetSocketAddress) Os.getsockname(s)).getPort(); int id = ((InetSocketAddress) Os.getsockname(s)).getPort();

View File

@@ -881,6 +881,30 @@ public class WifiManagerTest extends AndroidTestCase {
} }
} }
/**
* Verify that the {@link android.Manifest.permission#NETWORK_CARRIER_PROVISIONING} permission
* is held by at most one application.
*/
public void testNetworkCarrierProvisioningPermission() {
final PackageManager pm = getContext().getPackageManager();
final List<PackageInfo> holding = pm.getPackagesHoldingPermissions(new String[] {
android.Manifest.permission.NETWORK_CARRIER_PROVISIONING
}, PackageManager.MATCH_UNINSTALLED_PACKAGES);
List<String> uniquePackageNames = holding
.stream()
.map(pi -> pi.packageName)
.distinct()
.collect(Collectors.toList());
if (uniquePackageNames.size() > 1) {
fail("The NETWORK_CARRIER_PROVISIONING permission must not be held by more than one "
+ "application, but is held by " + uniquePackageNames.size() + " applications: "
+ String.join(", ", uniquePackageNames));
}
}
/** /**
* Verify that the {@link android.Manifest.permission#WIFI_UPDATE_USABILITY_STATS_SCORE} * Verify that the {@link android.Manifest.permission#WIFI_UPDATE_USABILITY_STATS_SCORE}
* permission is held by at most one application. * permission is held by at most one application.