11 |
|
import java.io.ByteArrayOutputStream; |
12 |
|
import java.io.ObjectInputStream; |
13 |
|
import java.io.ObjectOutputStream; |
14 |
+ |
import java.lang.management.ManagementFactory; |
15 |
+ |
import java.lang.management.ThreadInfo; |
16 |
+ |
import java.lang.reflect.Method; |
17 |
+ |
import java.util.ArrayList; |
18 |
|
import java.util.Arrays; |
19 |
|
import java.util.Date; |
20 |
+ |
import java.util.Enumeration; |
21 |
+ |
import java.util.List; |
22 |
|
import java.util.NoSuchElementException; |
23 |
|
import java.util.PropertyPermission; |
24 |
|
import java.util.concurrent.*; |
26 |
|
import java.util.concurrent.atomic.AtomicReference; |
27 |
|
import static java.util.concurrent.TimeUnit.MILLISECONDS; |
28 |
|
import static java.util.concurrent.TimeUnit.NANOSECONDS; |
29 |
+ |
import java.util.regex.Pattern; |
30 |
|
import java.security.CodeSource; |
31 |
|
import java.security.Permission; |
32 |
|
import java.security.PermissionCollection; |
76 |
|
* |
77 |
|
* </ol> |
78 |
|
* |
79 |
< |
* <p> <b>Other notes</b> |
79 |
> |
* <p><b>Other notes</b> |
80 |
|
* <ul> |
81 |
|
* |
82 |
|
* <li> Usually, there is one testcase method per JSR166 method |
129 |
|
private static final long profileThreshold = |
130 |
|
Long.getLong("jsr166.profileThreshold", 100); |
131 |
|
|
132 |
+ |
/** |
133 |
+ |
* The number of repetitions per test (for tickling rare bugs). |
134 |
+ |
*/ |
135 |
+ |
private static final int runsPerTest = |
136 |
+ |
Integer.getInteger("jsr166.runsPerTest", 1); |
137 |
+ |
|
138 |
+ |
/** |
139 |
+ |
* A filter for tests to run, matching strings of the form |
140 |
+ |
* methodName(className), e.g. "testInvokeAll5(ForkJoinPoolTest)" |
141 |
+ |
* Usefully combined with jsr166.runsPerTest. |
142 |
+ |
*/ |
143 |
+ |
private static final Pattern methodFilter = methodFilter(); |
144 |
+ |
|
145 |
+ |
private static Pattern methodFilter() { |
146 |
+ |
String regex = System.getProperty("jsr166.methodFilter"); |
147 |
+ |
return (regex == null) ? null : Pattern.compile(regex); |
148 |
+ |
} |
149 |
+ |
|
150 |
|
protected void runTest() throws Throwable { |
151 |
< |
if (profileTests) |
152 |
< |
runTestProfiled(); |
153 |
< |
else |
154 |
< |
super.runTest(); |
151 |
> |
if (methodFilter == null |
152 |
> |
|| methodFilter.matcher(toString()).find()) { |
153 |
> |
for (int i = 0; i < runsPerTest; i++) { |
154 |
> |
if (profileTests) |
155 |
> |
runTestProfiled(); |
156 |
> |
else |
157 |
> |
super.runTest(); |
158 |
> |
} |
159 |
> |
} |
160 |
|
} |
161 |
|
|
162 |
|
protected void runTestProfiled() throws Throwable { |
163 |
+ |
// Warmup run, notably to trigger all needed classloading. |
164 |
+ |
super.runTest(); |
165 |
|
long t0 = System.nanoTime(); |
166 |
|
try { |
167 |
|
super.runTest(); |
168 |
|
} finally { |
169 |
< |
long elapsedMillis = |
138 |
< |
(System.nanoTime() - t0) / (1000L * 1000L); |
169 |
> |
long elapsedMillis = millisElapsedSince(t0); |
170 |
|
if (elapsedMillis >= profileThreshold) |
171 |
|
System.out.printf("%n%s: %d%n", toString(), elapsedMillis); |
172 |
|
} |
173 |
|
} |
174 |
|
|
175 |
|
/** |
176 |
< |
* Runs all JSR166 unit tests using junit.textui.TestRunner |
176 |
> |
* Runs all JSR166 unit tests using junit.textui.TestRunner. |
177 |
> |
* Optional command line arg provides the number of iterations to |
178 |
> |
* repeat running the tests. |
179 |
|
*/ |
180 |
|
public static void main(String[] args) { |
181 |
|
if (useSecurityManager) { |
207 |
|
return suite; |
208 |
|
} |
209 |
|
|
210 |
+ |
public static void addNamedTestClasses(TestSuite suite, |
211 |
+ |
String... testClassNames) { |
212 |
+ |
for (String testClassName : testClassNames) { |
213 |
+ |
try { |
214 |
+ |
Class<?> testClass = Class.forName(testClassName); |
215 |
+ |
Method m = testClass.getDeclaredMethod("suite", |
216 |
+ |
new Class<?>[0]); |
217 |
+ |
suite.addTest(newTestSuite((Test)m.invoke(null))); |
218 |
+ |
} catch (Exception e) { |
219 |
+ |
throw new Error("Missing test class", e); |
220 |
+ |
} |
221 |
+ |
} |
222 |
+ |
} |
223 |
+ |
|
224 |
+ |
public static final double JAVA_CLASS_VERSION; |
225 |
+ |
public static final String JAVA_SPECIFICATION_VERSION; |
226 |
+ |
static { |
227 |
+ |
try { |
228 |
+ |
JAVA_CLASS_VERSION = java.security.AccessController.doPrivileged( |
229 |
+ |
new java.security.PrivilegedAction<Double>() { |
230 |
+ |
public Double run() { |
231 |
+ |
return Double.valueOf(System.getProperty("java.class.version"));}}); |
232 |
+ |
JAVA_SPECIFICATION_VERSION = java.security.AccessController.doPrivileged( |
233 |
+ |
new java.security.PrivilegedAction<String>() { |
234 |
+ |
public String run() { |
235 |
+ |
return System.getProperty("java.specification.version");}}); |
236 |
+ |
} catch (Throwable t) { |
237 |
+ |
throw new Error(t); |
238 |
+ |
} |
239 |
+ |
} |
240 |
+ |
|
241 |
+ |
public static boolean atLeastJava6() { return JAVA_CLASS_VERSION >= 50.0; } |
242 |
+ |
public static boolean atLeastJava7() { return JAVA_CLASS_VERSION >= 51.0; } |
243 |
+ |
public static boolean atLeastJava8() { return JAVA_CLASS_VERSION >= 52.0; } |
244 |
+ |
public static boolean atLeastJava9() { |
245 |
+ |
// As of 2014-05, java9 still uses 52.0 class file version |
246 |
+ |
return JAVA_SPECIFICATION_VERSION.startsWith("1.9"); |
247 |
+ |
} |
248 |
+ |
|
249 |
|
/** |
250 |
|
* Collects all JSR166 unit tests as one suite. |
251 |
|
*/ |
252 |
|
public static Test suite() { |
253 |
< |
return newTestSuite( |
253 |
> |
// Java7+ test classes |
254 |
> |
TestSuite suite = newTestSuite( |
255 |
|
ForkJoinPoolTest.suite(), |
256 |
|
ForkJoinTaskTest.suite(), |
257 |
|
RecursiveActionTest.suite(), |
316 |
|
TreeSetTest.suite(), |
317 |
|
TreeSubMapTest.suite(), |
318 |
|
TreeSubSetTest.suite()); |
319 |
+ |
|
320 |
+ |
// Java8+ test classes |
321 |
+ |
if (atLeastJava8()) { |
322 |
+ |
String[] java8TestClassNames = { |
323 |
+ |
"Atomic8Test", |
324 |
+ |
"CompletableFutureTest", |
325 |
+ |
"ConcurrentHashMap8Test", |
326 |
+ |
"CountedCompleterTest", |
327 |
+ |
"DoubleAccumulatorTest", |
328 |
+ |
"DoubleAdderTest", |
329 |
+ |
"ForkJoinPool8Test", |
330 |
+ |
"ForkJoinTask8Test", |
331 |
+ |
"LongAccumulatorTest", |
332 |
+ |
"LongAdderTest", |
333 |
+ |
"SplittableRandomTest", |
334 |
+ |
"StampedLockTest", |
335 |
+ |
"ThreadLocalRandom8Test", |
336 |
+ |
}; |
337 |
+ |
addNamedTestClasses(suite, java8TestClassNames); |
338 |
+ |
} |
339 |
+ |
|
340 |
+ |
// Java9+ test classes |
341 |
+ |
if (atLeastJava9()) { |
342 |
+ |
String[] java9TestClassNames = { |
343 |
+ |
"ThreadPoolExecutor9Test", |
344 |
+ |
}; |
345 |
+ |
addNamedTestClasses(suite, java9TestClassNames); |
346 |
+ |
} |
347 |
+ |
|
348 |
+ |
return suite; |
349 |
|
} |
350 |
|
|
351 |
+ |
// Delays for timing-dependent tests, in milliseconds. |
352 |
|
|
353 |
|
public static long SHORT_DELAY_MS; |
354 |
|
public static long SMALL_DELAY_MS; |
355 |
|
public static long MEDIUM_DELAY_MS; |
356 |
|
public static long LONG_DELAY_MS; |
357 |
|
|
254 |
– |
|
358 |
|
/** |
359 |
|
* Returns the shortest timed delay. This could |
360 |
|
* be reimplemented to use for example a Property. |
437 |
|
|
438 |
|
if (Thread.interrupted()) |
439 |
|
throw new AssertionFailedError("interrupt status set in main thread"); |
440 |
+ |
|
441 |
+ |
checkForkJoinPoolThreadLeaks(); |
442 |
+ |
} |
443 |
+ |
|
444 |
+ |
/** |
445 |
+ |
* Find missing try { ... } finally { joinPool(e); } |
446 |
+ |
*/ |
447 |
+ |
void checkForkJoinPoolThreadLeaks() throws InterruptedException { |
448 |
+ |
Thread[] survivors = new Thread[5]; |
449 |
+ |
int count = Thread.enumerate(survivors); |
450 |
+ |
for (int i = 0; i < count; i++) { |
451 |
+ |
Thread thread = survivors[i]; |
452 |
+ |
String name = thread.getName(); |
453 |
+ |
if (name.startsWith("ForkJoinPool-")) { |
454 |
+ |
// give thread some time to terminate |
455 |
+ |
thread.join(LONG_DELAY_MS); |
456 |
+ |
if (!thread.isAlive()) continue; |
457 |
+ |
thread.stop(); |
458 |
+ |
throw new AssertionFailedError |
459 |
+ |
(String.format("Found leaked ForkJoinPool thread test=%s thread=%s%n", |
460 |
+ |
toString(), name)); |
461 |
+ |
} |
462 |
+ |
} |
463 |
|
} |
464 |
|
|
465 |
|
/** |
633 |
|
} |
634 |
|
|
635 |
|
/** |
636 |
+ |
* A debugging tool to print all stack traces, as jstack does. |
637 |
+ |
*/ |
638 |
+ |
static void printAllStackTraces() { |
639 |
+ |
for (ThreadInfo info : |
640 |
+ |
ManagementFactory.getThreadMXBean() |
641 |
+ |
.dumpAllThreads(true, true)) |
642 |
+ |
System.err.print(info); |
643 |
+ |
} |
644 |
+ |
|
645 |
+ |
/** |
646 |
|
* Checks that thread does not terminate within the default |
647 |
|
* millisecond delay of {@code timeoutMillis()}. |
648 |
|
*/ |
664 |
|
} |
665 |
|
|
666 |
|
/** |
667 |
+ |
* Checks that the threads do not terminate within the default |
668 |
+ |
* millisecond delay of {@code timeoutMillis()}. |
669 |
+ |
*/ |
670 |
+ |
void assertThreadsStayAlive(Thread... threads) { |
671 |
+ |
assertThreadsStayAlive(timeoutMillis(), threads); |
672 |
+ |
} |
673 |
+ |
|
674 |
+ |
/** |
675 |
+ |
* Checks that the threads do not terminate within the given millisecond delay. |
676 |
+ |
*/ |
677 |
+ |
void assertThreadsStayAlive(long millis, Thread... threads) { |
678 |
+ |
try { |
679 |
+ |
// No need to optimize the failing case via Thread.join. |
680 |
+ |
delay(millis); |
681 |
+ |
for (Thread thread : threads) |
682 |
+ |
assertTrue(thread.isAlive()); |
683 |
+ |
} catch (InterruptedException ie) { |
684 |
+ |
fail("Unexpected InterruptedException"); |
685 |
+ |
} |
686 |
+ |
} |
687 |
+ |
|
688 |
+ |
/** |
689 |
|
* Checks that future.get times out, with the default timeout of |
690 |
|
* {@code timeoutMillis()}. |
691 |
|
*/ |
747 |
|
public static final Integer m6 = new Integer(-6); |
748 |
|
public static final Integer m10 = new Integer(-10); |
749 |
|
|
592 |
– |
|
750 |
|
/** |
751 |
|
* Runs Runnable r with a security policy that permits precisely |
752 |
|
* the specified permissions. If there is no current security |
758 |
|
SecurityManager sm = System.getSecurityManager(); |
759 |
|
if (sm == null) { |
760 |
|
r.run(); |
761 |
+ |
} |
762 |
+ |
runWithSecurityManagerWithPermissions(r, permissions); |
763 |
+ |
} |
764 |
+ |
|
765 |
+ |
/** |
766 |
+ |
* Runs Runnable r with a security policy that permits precisely |
767 |
+ |
* the specified permissions. If there is no current security |
768 |
+ |
* manager, a temporary one is set for the duration of the |
769 |
+ |
* Runnable. We require that any security manager permit |
770 |
+ |
* getPolicy/setPolicy. |
771 |
+ |
*/ |
772 |
+ |
public void runWithSecurityManagerWithPermissions(Runnable r, |
773 |
+ |
Permission... permissions) { |
774 |
+ |
SecurityManager sm = System.getSecurityManager(); |
775 |
+ |
if (sm == null) { |
776 |
|
Policy savedPolicy = Policy.getPolicy(); |
777 |
|
try { |
778 |
|
Policy.setPolicy(permissivePolicy()); |
779 |
|
System.setSecurityManager(new SecurityManager()); |
780 |
< |
runWithPermissions(r, permissions); |
780 |
> |
runWithSecurityManagerWithPermissions(r, permissions); |
781 |
|
} finally { |
782 |
|
System.setSecurityManager(null); |
783 |
|
Policy.setPolicy(savedPolicy); |
825 |
|
return perms.implies(p); |
826 |
|
} |
827 |
|
public void refresh() {} |
828 |
+ |
public String toString() { |
829 |
+ |
List<Permission> ps = new ArrayList<Permission>(); |
830 |
+ |
for (Enumeration<Permission> e = perms.elements(); e.hasMoreElements();) |
831 |
+ |
ps.add(e.nextElement()); |
832 |
+ |
return "AdjustablePolicy with permissions " + ps; |
833 |
+ |
} |
834 |
|
} |
835 |
|
|
836 |
|
/** |
868 |
|
} |
869 |
|
|
870 |
|
/** |
871 |
< |
* Waits up to the specified number of milliseconds for the given |
871 |
> |
* Spin-waits up to the specified number of milliseconds for the given |
872 |
|
* thread to enter a wait state: BLOCKED, WAITING, or TIMED_WAITING. |
873 |
|
*/ |
874 |
|
void waitForThreadToEnterWaitState(Thread thread, long timeoutMillis) { |
875 |
< |
long timeoutNanos = timeoutMillis * 1000L * 1000L; |
698 |
< |
long t0 = System.nanoTime(); |
875 |
> |
long startTime = System.nanoTime(); |
876 |
|
for (;;) { |
877 |
|
Thread.State s = thread.getState(); |
878 |
|
if (s == Thread.State.BLOCKED || |
881 |
|
return; |
882 |
|
else if (s == Thread.State.TERMINATED) |
883 |
|
fail("Unexpected thread termination"); |
884 |
< |
else if (System.nanoTime() - t0 > timeoutNanos) { |
884 |
> |
else if (millisElapsedSince(startTime) > timeoutMillis) { |
885 |
|
threadAssertTrue(thread.isAlive()); |
886 |
|
return; |
887 |
|
} |
902 |
|
* startNanoTime, which must have been previously returned from a |
903 |
|
* call to {@link System.nanoTime()}. |
904 |
|
*/ |
905 |
< |
long millisElapsedSince(long startNanoTime) { |
905 |
> |
static long millisElapsedSince(long startNanoTime) { |
906 |
|
return NANOSECONDS.toMillis(System.nanoTime() - startNanoTime); |
907 |
|
} |
908 |
|
|
1082 |
|
} |
1083 |
|
} |
1084 |
|
|
1085 |
+ |
public void await(Semaphore semaphore) { |
1086 |
+ |
try { |
1087 |
+ |
assertTrue(semaphore.tryAcquire(LONG_DELAY_MS, MILLISECONDS)); |
1088 |
+ |
} catch (Throwable t) { |
1089 |
+ |
threadUnexpectedException(t); |
1090 |
+ |
} |
1091 |
+ |
} |
1092 |
+ |
|
1093 |
|
// /** |
1094 |
|
// * Spin-waits up to LONG_DELAY_MS until flag becomes true. |
1095 |
|
// */ |
1277 |
|
public abstract class CheckedRecursiveAction extends RecursiveAction { |
1278 |
|
protected abstract void realCompute() throws Throwable; |
1279 |
|
|
1280 |
< |
public final void compute() { |
1280 |
> |
@Override protected final void compute() { |
1281 |
|
try { |
1282 |
|
realCompute(); |
1283 |
|
} catch (Throwable t) { |
1292 |
|
public abstract class CheckedRecursiveTask<T> extends RecursiveTask<T> { |
1293 |
|
protected abstract T realCompute() throws Throwable; |
1294 |
|
|
1295 |
< |
public final T compute() { |
1295 |
> |
@Override protected final T compute() { |
1296 |
|
try { |
1297 |
|
return realCompute(); |
1298 |
|
} catch (Throwable t) { |
1358 |
|
} |
1359 |
|
} |
1360 |
|
|
1361 |
< |
@SuppressWarnings("unchecked") |
1362 |
< |
<T> T serialClone(T o) { |
1361 |
> |
void assertSerialEquals(Object x, Object y) { |
1362 |
> |
assertTrue(Arrays.equals(serialBytes(x), serialBytes(y))); |
1363 |
> |
} |
1364 |
> |
|
1365 |
> |
void assertNotSerialEquals(Object x, Object y) { |
1366 |
> |
assertFalse(Arrays.equals(serialBytes(x), serialBytes(y))); |
1367 |
> |
} |
1368 |
> |
|
1369 |
> |
byte[] serialBytes(Object o) { |
1370 |
|
try { |
1371 |
|
ByteArrayOutputStream bos = new ByteArrayOutputStream(); |
1372 |
|
ObjectOutputStream oos = new ObjectOutputStream(bos); |
1373 |
|
oos.writeObject(o); |
1374 |
|
oos.flush(); |
1375 |
|
oos.close(); |
1376 |
< |
ByteArrayInputStream bin = |
1377 |
< |
new ByteArrayInputStream(bos.toByteArray()); |
1378 |
< |
ObjectInputStream ois = new ObjectInputStream(bin); |
1379 |
< |
return (T) ois.readObject(); |
1376 |
> |
return bos.toByteArray(); |
1377 |
> |
} catch (Throwable t) { |
1378 |
> |
threadUnexpectedException(t); |
1379 |
> |
return new byte[0]; |
1380 |
> |
} |
1381 |
> |
} |
1382 |
> |
|
1383 |
> |
@SuppressWarnings("unchecked") |
1384 |
> |
<T> T serialClone(T o) { |
1385 |
> |
try { |
1386 |
> |
ObjectInputStream ois = new ObjectInputStream |
1387 |
> |
(new ByteArrayInputStream(serialBytes(o))); |
1388 |
> |
T clone = (T) ois.readObject(); |
1389 |
> |
assertSame(o.getClass(), clone.getClass()); |
1390 |
> |
return clone; |
1391 |
|
} catch (Throwable t) { |
1392 |
|
threadUnexpectedException(t); |
1393 |
|
return null; |
1394 |
|
} |
1395 |
|
} |
1396 |
+ |
|
1397 |
+ |
public void assertThrows(Class<? extends Throwable> expectedExceptionClass, |
1398 |
+ |
Runnable... throwingActions) { |
1399 |
+ |
for (Runnable throwingAction : throwingActions) { |
1400 |
+ |
boolean threw = false; |
1401 |
+ |
try { throwingAction.run(); } |
1402 |
+ |
catch (Throwable t) { |
1403 |
+ |
threw = true; |
1404 |
+ |
if (!expectedExceptionClass.isInstance(t)) { |
1405 |
+ |
AssertionFailedError afe = |
1406 |
+ |
new AssertionFailedError |
1407 |
+ |
("Expected " + expectedExceptionClass.getName() + |
1408 |
+ |
", got " + t.getClass().getName()); |
1409 |
+ |
afe.initCause(t); |
1410 |
+ |
threadUnexpectedException(afe); |
1411 |
+ |
} |
1412 |
+ |
} |
1413 |
+ |
if (!threw) |
1414 |
+ |
shouldThrow(expectedExceptionClass.getName()); |
1415 |
+ |
} |
1416 |
+ |
} |
1417 |
|
} |