11 |
|
import java.io.ByteArrayOutputStream; |
12 |
|
import java.io.ObjectInputStream; |
13 |
|
import java.io.ObjectOutputStream; |
14 |
+ |
import java.lang.management.ManagementFactory; |
15 |
+ |
import java.lang.management.ThreadInfo; |
16 |
+ |
import java.lang.reflect.Method; |
17 |
+ |
import java.util.ArrayList; |
18 |
|
import java.util.Arrays; |
19 |
|
import java.util.Date; |
20 |
+ |
import java.util.Enumeration; |
21 |
+ |
import java.util.List; |
22 |
|
import java.util.NoSuchElementException; |
23 |
|
import java.util.PropertyPermission; |
24 |
|
import java.util.concurrent.*; |
148 |
|
} |
149 |
|
|
150 |
|
/** |
151 |
< |
* Runs all JSR166 unit tests using junit.textui.TestRunner |
151 |
> |
* Runs all JSR166 unit tests using junit.textui.TestRunner. |
152 |
> |
* Optional command line arg provides the number of iterations to |
153 |
> |
* repeat running the tests. |
154 |
|
*/ |
155 |
|
public static void main(String[] args) { |
156 |
|
if (useSecurityManager) { |
182 |
|
return suite; |
183 |
|
} |
184 |
|
|
185 |
+ |
public static void addNamedTestClasses(TestSuite suite, |
186 |
+ |
String... testClassNames) { |
187 |
+ |
for (String testClassName : testClassNames) { |
188 |
+ |
try { |
189 |
+ |
Class<?> testClass = Class.forName(testClassName); |
190 |
+ |
Method m = testClass.getDeclaredMethod("suite", |
191 |
+ |
new Class<?>[0]); |
192 |
+ |
suite.addTest(newTestSuite((Test)m.invoke(null))); |
193 |
+ |
} catch (Exception e) { |
194 |
+ |
throw new Error("Missing test class", e); |
195 |
+ |
} |
196 |
+ |
} |
197 |
+ |
} |
198 |
+ |
|
199 |
+ |
public static final double JAVA_CLASS_VERSION; |
200 |
+ |
static { |
201 |
+ |
try { |
202 |
+ |
JAVA_CLASS_VERSION = java.security.AccessController.doPrivileged( |
203 |
+ |
new java.security.PrivilegedAction<Double>() { |
204 |
+ |
public Double run() { |
205 |
+ |
return Double.valueOf(System.getProperty("java.class.version"));}}); |
206 |
+ |
} catch (Throwable t) { |
207 |
+ |
throw new Error(t); |
208 |
+ |
} |
209 |
+ |
} |
210 |
+ |
|
211 |
+ |
public static boolean atLeastJava6() { return JAVA_CLASS_VERSION >= 50.0; } |
212 |
+ |
public static boolean atLeastJava7() { return JAVA_CLASS_VERSION >= 51.0; } |
213 |
+ |
public static boolean atLeastJava8() { return JAVA_CLASS_VERSION >= 52.0; } |
214 |
+ |
|
215 |
|
/** |
216 |
|
* Collects all JSR166 unit tests as one suite. |
217 |
|
*/ |
218 |
|
public static Test suite() { |
219 |
< |
return newTestSuite( |
219 |
> |
// Java7+ test classes |
220 |
> |
TestSuite suite = newTestSuite( |
221 |
|
ForkJoinPoolTest.suite(), |
222 |
|
ForkJoinTaskTest.suite(), |
223 |
|
RecursiveActionTest.suite(), |
282 |
|
TreeSetTest.suite(), |
283 |
|
TreeSubMapTest.suite(), |
284 |
|
TreeSubSetTest.suite()); |
285 |
+ |
|
286 |
+ |
// Java8+ test classes |
287 |
+ |
if (atLeastJava8()) { |
288 |
+ |
String[] java8TestClassNames = { |
289 |
+ |
"LongAdderTest", |
290 |
+ |
"LongAccumulatorTest", |
291 |
+ |
"DoubleAdderTest", |
292 |
+ |
"DoubleAccumulatorTest", |
293 |
+ |
"CompletableFutureTest", |
294 |
+ |
"ForkJoinPool8Test", |
295 |
+ |
"StampedLockTest", |
296 |
+ |
}; |
297 |
+ |
addNamedTestClasses(suite, java8TestClassNames); |
298 |
+ |
} |
299 |
+ |
|
300 |
+ |
return suite; |
301 |
|
} |
302 |
|
|
303 |
|
|
389 |
|
|
390 |
|
if (Thread.interrupted()) |
391 |
|
throw new AssertionFailedError("interrupt status set in main thread"); |
392 |
+ |
|
393 |
+ |
checkForkJoinPoolThreadLeaks(); |
394 |
+ |
} |
395 |
+ |
|
396 |
+ |
/** |
397 |
+ |
* Find missing try { ... } finally { joinPool(e); } |
398 |
+ |
*/ |
399 |
+ |
void checkForkJoinPoolThreadLeaks() throws InterruptedException { |
400 |
+ |
Thread[] survivors = new Thread[5]; |
401 |
+ |
int count = Thread.enumerate(survivors); |
402 |
+ |
for (int i = 0; i < count; i++) { |
403 |
+ |
Thread thread = survivors[i]; |
404 |
+ |
String name = thread.getName(); |
405 |
+ |
if (name.startsWith("ForkJoinPool-")) { |
406 |
+ |
// give thread some time to terminate |
407 |
+ |
thread.join(LONG_DELAY_MS); |
408 |
+ |
if (!thread.isAlive()) continue; |
409 |
+ |
thread.stop(); |
410 |
+ |
throw new AssertionFailedError |
411 |
+ |
(String.format("Found leaked ForkJoinPool thread test=%s thread=%s%n", |
412 |
+ |
toString(), name)); |
413 |
+ |
} |
414 |
+ |
} |
415 |
|
} |
416 |
|
|
417 |
|
/** |
585 |
|
} |
586 |
|
|
587 |
|
/** |
588 |
+ |
* A debugging tool to print all stack traces, as jstack does. |
589 |
+ |
*/ |
590 |
+ |
static void printAllStackTraces() { |
591 |
+ |
for (ThreadInfo info : |
592 |
+ |
ManagementFactory.getThreadMXBean() |
593 |
+ |
.dumpAllThreads(true, true)) |
594 |
+ |
System.err.print(info); |
595 |
+ |
} |
596 |
+ |
|
597 |
+ |
/** |
598 |
|
* Checks that thread does not terminate within the default |
599 |
|
* millisecond delay of {@code timeoutMillis()}. |
600 |
|
*/ |
711 |
|
SecurityManager sm = System.getSecurityManager(); |
712 |
|
if (sm == null) { |
713 |
|
r.run(); |
714 |
+ |
} |
715 |
+ |
runWithSecurityManagerWithPermissions(r, permissions); |
716 |
+ |
} |
717 |
+ |
|
718 |
+ |
/** |
719 |
+ |
* Runs Runnable r with a security policy that permits precisely |
720 |
+ |
* the specified permissions. If there is no current security |
721 |
+ |
* manager, a temporary one is set for the duration of the |
722 |
+ |
* Runnable. We require that any security manager permit |
723 |
+ |
* getPolicy/setPolicy. |
724 |
+ |
*/ |
725 |
+ |
public void runWithSecurityManagerWithPermissions(Runnable r, |
726 |
+ |
Permission... permissions) { |
727 |
+ |
SecurityManager sm = System.getSecurityManager(); |
728 |
+ |
if (sm == null) { |
729 |
|
Policy savedPolicy = Policy.getPolicy(); |
730 |
|
try { |
731 |
|
Policy.setPolicy(permissivePolicy()); |
732 |
|
System.setSecurityManager(new SecurityManager()); |
733 |
< |
runWithPermissions(r, permissions); |
733 |
> |
runWithSecurityManagerWithPermissions(r, permissions); |
734 |
|
} finally { |
735 |
|
System.setSecurityManager(null); |
736 |
|
Policy.setPolicy(savedPolicy); |
778 |
|
return perms.implies(p); |
779 |
|
} |
780 |
|
public void refresh() {} |
781 |
+ |
public String toString() { |
782 |
+ |
List<Permission> ps = new ArrayList<Permission>(); |
783 |
+ |
for (Enumeration<Permission> e = perms.elements(); e.hasMoreElements();) |
784 |
+ |
ps.add(e.nextElement()); |
785 |
+ |
return "AdjustablePolicy with permissions " + ps; |
786 |
+ |
} |
787 |
|
} |
788 |
|
|
789 |
|
/** |