blob: 1999fbf9d6bf71f1f0ebda424f06893fb63baff1 [file] [log] [blame]
Narayan Kamatha5ace892017-01-06 15:10:02 +00001/*
2 * Copyright 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
waynema334e3662021-12-01 16:04:27 +080017#define LOG_TAG "IptablesRestoreControllerTest"
18#include "IptablesRestoreController.h"
19
Lorenzo Colitti173da322017-02-05 01:56:40 +090020#include <fcntl.h>
Bernie Innocenti196f1b82019-05-20 16:34:16 +090021#include <gmock/gmock.h>
22#include <gtest/gtest.h>
Lorenzo Colitti2bd804a2017-03-10 12:19:08 +090023#include <sys/file.h>
Lorenzo Colittia701afb2017-02-28 01:47:11 +090024#include <sys/socket.h>
25#include <sys/un.h>
Narayan Kamatha5ace892017-01-06 15:10:02 +000026
Bernie Innocenti196f1b82019-05-20 16:34:16 +090027#include <cinttypes>
28#include <iostream>
29#include <string>
Narayan Kamatha5ace892017-01-06 15:10:02 +000030
Lorenzo Colitti173da322017-02-05 01:56:40 +090031#include <android-base/stringprintf.h>
Lorenzo Colitticd283772017-01-31 19:00:49 +090032#include <android-base/strings.h>
Mike Yue7e332f2019-03-13 17:15:48 +080033#include <log/log.h>
Lorenzo Colitti2103b6b2017-08-14 11:38:18 +090034#include <netdutils/MockSyscalls.h>
Paul Hu1c64f082022-06-21 03:42:50 +000035#include <netdutils/NetNativeTestBase.h>
Mike Yue7e332f2019-03-13 17:15:48 +080036#include <netdutils/Stopwatch.h>
Lorenzo Colitti173da322017-02-05 01:56:40 +090037
Narayan Kamatha5ace892017-01-06 15:10:02 +000038#include "NetdConstants.h"
39
Lorenzo Colitti2bd804a2017-03-10 12:19:08 +090040#define XT_LOCK_NAME "/system/etc/xtables.lock"
41#define XT_LOCK_ATTEMPTS 10
42#define XT_LOCK_POLL_INTERVAL_MS 100
Lorenzo Colittia701afb2017-02-28 01:47:11 +090043
Lorenzo Colitti10819c52020-09-17 21:32:44 +090044#define PROC_STAT_MIN_ELEMENTS 52U
45#define PROC_STAT_RSS_INDEX 23U
46
47#define IPTABLES_COMM "(iptables-restor)"
48#define IP6TABLES_COMM "(ip6tables-resto)"
49
Lorenzo Colitticd283772017-01-31 19:00:49 +090050using android::base::Join;
Lorenzo Colitti10819c52020-09-17 21:32:44 +090051using android::base::StringAppendF;
Lorenzo Colitti173da322017-02-05 01:56:40 +090052using android::base::StringPrintf;
Lorenzo Colitti2103b6b2017-08-14 11:38:18 +090053using android::netdutils::ScopedMockSyscalls;
Mike Yue7e332f2019-03-13 17:15:48 +080054using android::netdutils::Stopwatch;
Lorenzo Colitti2103b6b2017-08-14 11:38:18 +090055using testing::Return;
56using testing::StrictMock;
Narayan Kamatha5ace892017-01-06 15:10:02 +000057
Paul Hu1c64f082022-06-21 03:42:50 +000058class IptablesRestoreControllerTest : public NetNativeTestBase {
Lorenzo Colitti173da322017-02-05 01:56:40 +090059public:
60 IptablesRestoreController con;
Lorenzo Colittia701afb2017-02-28 01:47:11 +090061 int mDefaultMaxRetries = con.MAX_RETRIES;
62 int mDefaultPollTimeoutMs = con.POLL_TIMEOUT_MS;
63 int mIptablesLock = -1;
64 std::string mChainName;
65
Nick Desaulniers485a4772019-10-11 09:25:59 -070066 static void SetUpTestSuite() { blockSigpipe(); }
Lorenzo Colitti839d7d62017-04-03 15:37:19 +090067
Lorenzo Colittia701afb2017-02-28 01:47:11 +090068 void SetUp() {
69 ASSERT_EQ(0, createTestChain());
70 }
71
72 void TearDown() {
73 con.MAX_RETRIES = mDefaultMaxRetries;
74 con.POLL_TIMEOUT_MS = mDefaultPollTimeoutMs;
75 deleteTestChain();
76 }
Lorenzo Colitti173da322017-02-05 01:56:40 +090077
Lorenzo Colitti2103b6b2017-08-14 11:38:18 +090078 void Init() {
79 con.Init();
80 }
81
Lorenzo Colitti173da322017-02-05 01:56:40 +090082 pid_t getIpRestorePid(const IptablesRestoreController::IptablesProcessType type) {
83 return con.getIpRestorePid(type);
84 };
85
Lorenzo Colitti10819c52020-09-17 21:32:44 +090086 const std::string getProcStatPath(pid_t pid) { return StringPrintf("/proc/%d/stat", pid); }
87
88 std::vector<std::string> parseProcStat(int fd, const std::string& path) {
89 std::vector<std::string> procStat;
90
91 char statBuf[1024];
92 EXPECT_NE(-1, read(fd, statBuf, sizeof(statBuf)))
93 << "Could not read from " << path << ": " << strerror(errno);
94
95 std::stringstream stream(statBuf);
96 std::string item;
97 while (std::getline(stream, item, ' ')) {
98 procStat.push_back(item);
99 }
100
101 EXPECT_LE(PROC_STAT_MIN_ELEMENTS, procStat.size()) << "Too few elements in " << path;
102 return procStat;
103 }
104
Lorenzo Colitti173da322017-02-05 01:56:40 +0900105 void expectNoIptablesRestoreProcess(pid_t pid) {
106 // We can't readlink /proc/PID/exe, because zombie processes don't have it.
107 // Parse /proc/PID/stat instead.
Lorenzo Colitti10819c52020-09-17 21:32:44 +0900108 std::string statPath = getProcStatPath(pid);
Bernie Innocenti15bb55c2018-06-03 16:19:51 +0900109 int fd = open(statPath.c_str(), O_RDONLY | O_CLOEXEC);
Lorenzo Colitti173da322017-02-05 01:56:40 +0900110 if (fd == -1) {
111 // ENOENT means the process is gone (expected).
112 ASSERT_EQ(errno, ENOENT)
113 << "Unexpected error opening " << statPath << ": " << strerror(errno);
114 return;
115 }
116
117 // If the PID exists, it's possible (though very unlikely) that the PID was reused. Check the
118 // binary name as well, to ensure the test isn't flaky.
Lorenzo Colitti10819c52020-09-17 21:32:44 +0900119 std::vector<std::string> procStat = parseProcStat(fd, statPath);
120 EXPECT_FALSE(procStat[1] == IPTABLES_COMM || procStat[1] == IP6TABLES_COMM)
121 << "Previous iptables-restore or ip6tables-restore pid " << pid
122 << " still alive: " << Join(procStat, " ");
Lorenzo Colitti173da322017-02-05 01:56:40 +0900123
Lorenzo Colitti10819c52020-09-17 21:32:44 +0900124 close(fd);
125 }
126
Evgenii Stepanov693c6712021-04-21 14:40:12 -0700127 int getRssPages(pid_t pid) {
Lorenzo Colitti10819c52020-09-17 21:32:44 +0900128 std::string statPath = getProcStatPath(pid);
129 int fd = open(statPath.c_str(), O_RDONLY | O_CLOEXEC);
130 EXPECT_NE(-1, fd) << "Unexpected error opening " << statPath << ": " << strerror(errno);
131 if (fd == -1) return 0;
132
133 const auto& procStat = parseProcStat(fd, statPath);
134 close(fd);
135
136 if (procStat.size() < PROC_STAT_MIN_ELEMENTS) return 0;
137 EXPECT_TRUE(procStat[1] == IPTABLES_COMM || procStat[1] == IP6TABLES_COMM)
138 << statPath << " is for unexpected process: " << procStat[1];
139
140 return std::atoi(procStat[PROC_STAT_RSS_INDEX].c_str());
Lorenzo Colitti173da322017-02-05 01:56:40 +0900141 }
Lorenzo Colittia701afb2017-02-28 01:47:11 +0900142
143 int createTestChain() {
144 mChainName = StringPrintf("netd_unit_test_%u", arc4random_uniform(10000)).c_str();
145
146 // Create a chain to list.
147 std::vector<std::string> createCommands = {
148 "*filter",
149 StringPrintf(":%s -", mChainName.c_str()),
150 StringPrintf("-A %s -j RETURN", mChainName.c_str()),
151 "COMMIT",
152 ""
153 };
154
155 int ret = con.execute(V4V6, Join(createCommands, "\n"), nullptr);
156 if (ret) mChainName = "";
157 return ret;
158 }
159
160 void deleteTestChain() {
161 std::vector<std::string> deleteCommands = {
162 "*filter",
163 StringPrintf(":%s -", mChainName.c_str()), // Flush chain (otherwise we can't delete it).
164 StringPrintf("-X %s", mChainName.c_str()), // Delete it.
165 "COMMIT",
166 ""
167 };
168 con.execute(V4V6, Join(deleteCommands, "\n"), nullptr);
169 mChainName = "";
170 }
171
172 int acquireIptablesLock() {
Bernie Innocenti15bb55c2018-06-03 16:19:51 +0900173 mIptablesLock = open(XT_LOCK_NAME, O_CREAT | O_CLOEXEC, 0600);
Lorenzo Colitti2bd804a2017-03-10 12:19:08 +0900174 if (mIptablesLock == -1) return mIptablesLock;
175 int attempts;
176 for (attempts = 0; attempts < XT_LOCK_ATTEMPTS; attempts++) {
177 if (flock(mIptablesLock, LOCK_EX | LOCK_NB) == 0) {
178 return 0;
179 }
180 usleep(XT_LOCK_POLL_INTERVAL_MS * 1000);
Lorenzo Colittia701afb2017-02-28 01:47:11 +0900181 }
Lorenzo Colitti2bd804a2017-03-10 12:19:08 +0900182 EXPECT_LT(attempts, XT_LOCK_ATTEMPTS) <<
183 "Could not acquire iptables lock after " << XT_LOCK_ATTEMPTS << " attempts " <<
184 XT_LOCK_POLL_INTERVAL_MS << "ms apart";
185 return -1;
Lorenzo Colittia701afb2017-02-28 01:47:11 +0900186 }
187
188 void releaseIptablesLock() {
189 if (mIptablesLock != -1) {
190 close(mIptablesLock);
191 }
192 }
193
194 void setRetryParameters(int maxRetries, int pollTimeoutMs) {
195 con.MAX_RETRIES = maxRetries;
196 con.POLL_TIMEOUT_MS = pollTimeoutMs;
197 }
Narayan Kamatha5ace892017-01-06 15:10:02 +0000198};
199
Lorenzo Colitti173da322017-02-05 01:56:40 +0900200TEST_F(IptablesRestoreControllerTest, TestBasicCommand) {
Lorenzo Colitticd283772017-01-31 19:00:49 +0900201 std::string output;
202
203 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr));
Lorenzo Colitti173da322017-02-05 01:56:40 +0900204
205 pid_t pid4 = getIpRestorePid(IptablesRestoreController::IPTABLES_PROCESS);
206 pid_t pid6 = getIpRestorePid(IptablesRestoreController::IP6TABLES_PROCESS);
207
Lorenzo Colitticd283772017-01-31 19:00:49 +0900208 EXPECT_EQ(0, con.execute(IptablesTarget::V6, "#Test\n", nullptr));
209 EXPECT_EQ(0, con.execute(IptablesTarget::V4, "#Test\n", nullptr));
210
211 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output));
212 EXPECT_EQ("#Test\n#Test\n", output); // One for IPv4 and one for IPv6.
Lorenzo Colitti173da322017-02-05 01:56:40 +0900213
214 // Check the PIDs are the same as they were before. If they're not, the child processes were
215 // restarted, which causes a 30-60ms delay.
216 EXPECT_EQ(pid4, getIpRestorePid(IptablesRestoreController::IPTABLES_PROCESS));
217 EXPECT_EQ(pid6, getIpRestorePid(IptablesRestoreController::IP6TABLES_PROCESS));
Narayan Kamatha5ace892017-01-06 15:10:02 +0000218}
219
Lorenzo Colitti173da322017-02-05 01:56:40 +0900220TEST_F(IptablesRestoreControllerTest, TestRestartOnMalformedCommand) {
Lorenzo Colitticd283772017-01-31 19:00:49 +0900221 std::string buffer;
Lorenzo Colitti173da322017-02-05 01:56:40 +0900222 for (int i = 0; i < 50; i++) {
223 IptablesTarget target = (IptablesTarget) (i % 3);
Lorenzo Colitticd283772017-01-31 19:00:49 +0900224 std::string *output = (i % 2) ? &buffer : nullptr;
225 ASSERT_EQ(-1, con.execute(target, "malformed command\n", output)) <<
Lorenzo Colitti173da322017-02-05 01:56:40 +0900226 "Malformed command did not fail at iteration " << i;
Lorenzo Colitticd283772017-01-31 19:00:49 +0900227 ASSERT_EQ(0, con.execute(target, "#Test\n", output)) <<
Lorenzo Colitti173da322017-02-05 01:56:40 +0900228 "No-op command did not succeed at iteration " << i;
229 }
230}
231
232TEST_F(IptablesRestoreControllerTest, TestRestartOnProcessDeath) {
Lorenzo Colitticd283772017-01-31 19:00:49 +0900233 std::string output;
234
Lorenzo Colitti173da322017-02-05 01:56:40 +0900235 // Run a command to ensure that the processes are running.
Lorenzo Colitticd283772017-01-31 19:00:49 +0900236 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output));
Lorenzo Colitti173da322017-02-05 01:56:40 +0900237
238 pid_t pid4 = getIpRestorePid(IptablesRestoreController::IPTABLES_PROCESS);
239 pid_t pid6 = getIpRestorePid(IptablesRestoreController::IP6TABLES_PROCESS);
240
241 ASSERT_EQ(0, kill(pid4, 0)) << "iptables-restore pid " << pid4 << " does not exist";
242 ASSERT_EQ(0, kill(pid6, 0)) << "ip6tables-restore pid " << pid6 << " does not exist";
243 ASSERT_EQ(0, kill(pid4, SIGTERM)) << "Failed to send SIGTERM to iptables-restore pid " << pid4;
244 ASSERT_EQ(0, kill(pid6, SIGTERM)) << "Failed to send SIGTERM to ip6tables-restore pid " << pid6;
245
246 // Wait 100ms for processes to terminate.
247 TEMP_FAILURE_RETRY(usleep(100 * 1000));
248
249 // Ensure that running a new command properly restarts the processes.
Lorenzo Colitticd283772017-01-31 19:00:49 +0900250 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr));
Lorenzo Colitti173da322017-02-05 01:56:40 +0900251 EXPECT_NE(pid4, getIpRestorePid(IptablesRestoreController::IPTABLES_PROCESS));
252 EXPECT_NE(pid6, getIpRestorePid(IptablesRestoreController::IP6TABLES_PROCESS));
253
254 // Check there are no zombies.
255 expectNoIptablesRestoreProcess(pid4);
256 expectNoIptablesRestoreProcess(pid6);
Narayan Kamatha5ace892017-01-06 15:10:02 +0000257}
Lorenzo Colitticd283772017-01-31 19:00:49 +0900258
Lorenzo Colittia701afb2017-02-28 01:47:11 +0900259TEST_F(IptablesRestoreControllerTest, TestCommandTimeout) {
260 // Don't wait 10 seconds for this test to fail.
Evgenii Stepanov3a388062021-05-21 15:13:08 -0700261 setRetryParameters(3, 100);
Lorenzo Colitticd283772017-01-31 19:00:49 +0900262
263 // Expected contents of the chain.
264 std::vector<std::string> expectedLines = {
Lorenzo Colittia701afb2017-02-28 01:47:11 +0900265 StringPrintf("Chain %s (0 references)", mChainName.c_str()),
Lorenzo Colitticd283772017-01-31 19:00:49 +0900266 "target prot opt source destination ",
267 "RETURN all -- 0.0.0.0/0 0.0.0.0/0 ",
Lorenzo Colittia701afb2017-02-28 01:47:11 +0900268 StringPrintf("Chain %s (0 references)", mChainName.c_str()),
Lorenzo Colitticd283772017-01-31 19:00:49 +0900269 "target prot opt source destination ",
270 "RETURN all ::/0 ::/0 ",
271 ""
272 };
273 std::string expected = Join(expectedLines, "\n");
274
Lorenzo Colitticd283772017-01-31 19:00:49 +0900275 std::vector<std::string> listCommands = {
276 "*filter",
Lorenzo Colittia701afb2017-02-28 01:47:11 +0900277 StringPrintf("-n -L %s", mChainName.c_str()), // List chain.
Lorenzo Colitticd283772017-01-31 19:00:49 +0900278 "COMMIT",
279 ""
280 };
Lorenzo Colittia701afb2017-02-28 01:47:11 +0900281 std::string commandString = Join(listCommands, "\n");
Lorenzo Colitticd283772017-01-31 19:00:49 +0900282 std::string output;
Lorenzo Colittia701afb2017-02-28 01:47:11 +0900283
284 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, commandString, &output));
285 EXPECT_EQ(expected, output);
286
287 ASSERT_EQ(0, acquireIptablesLock());
288 EXPECT_EQ(-1, con.execute(IptablesTarget::V4V6, commandString, &output));
289 EXPECT_EQ(-1, con.execute(IptablesTarget::V4V6, commandString, &output));
290 releaseIptablesLock();
291
292 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, commandString, &output));
Lorenzo Colitticd283772017-01-31 19:00:49 +0900293 EXPECT_EQ(expected, output);
294}
Lorenzo Colittia7357652017-04-25 00:16:36 +0900295
Chenbo Feng89c12f12018-03-21 10:29:18 -0700296
Lorenzo Colittia7357652017-04-25 00:16:36 +0900297TEST_F(IptablesRestoreControllerTest, TestUidRuleBenchmark) {
298 const std::vector<int> ITERATIONS = { 1, 5, 10 };
299
300 const std::string IPTABLES_RESTORE_ADD =
Chenbo Feng89c12f12018-03-21 10:29:18 -0700301 StringPrintf("*filter\n-I %s -m owner --uid-owner 2000000000 -j RETURN\nCOMMIT\n",
302 mChainName.c_str());
Lorenzo Colittia7357652017-04-25 00:16:36 +0900303 const std::string IPTABLES_RESTORE_DEL =
Chenbo Feng89c12f12018-03-21 10:29:18 -0700304 StringPrintf("*filter\n-D %s -m owner --uid-owner 2000000000 -j RETURN\nCOMMIT\n",
305 mChainName.c_str());
Lorenzo Colittia7357652017-04-25 00:16:36 +0900306
307 for (const int iterations : ITERATIONS) {
308 Stopwatch s;
309 for (int i = 0; i < iterations; i++) {
310 EXPECT_EQ(0, con.execute(V4V6, IPTABLES_RESTORE_ADD, nullptr));
311 EXPECT_EQ(0, con.execute(V4V6, IPTABLES_RESTORE_DEL, nullptr));
312 }
Bernie Innocenti196f1b82019-05-20 16:34:16 +0900313 int64_t timeTaken = s.getTimeAndResetUs();
314 std::cerr << " Add/del " << iterations << " UID rules via restore: " << timeTaken
315 << "us (" << (timeTaken / 2 / iterations) << "us per operation)" << std::endl;
Lorenzo Colittia7357652017-04-25 00:16:36 +0900316 }
317}
Lorenzo Colitti2103b6b2017-08-14 11:38:18 +0900318
319TEST_F(IptablesRestoreControllerTest, TestStartup) {
320 // Tests that IptablesRestoreController::Init never sets its processes to null pointers if
321 // fork() succeeds.
322 {
323 // Mock fork(), and check that initializing 100 times never results in a null pointer.
324 constexpr int NUM_ITERATIONS = 100; // Takes 100-150ms on angler.
325 constexpr pid_t FAKE_PID = 2000000001;
326 StrictMock<ScopedMockSyscalls> sys;
327
328 EXPECT_CALL(sys, fork()).Times(NUM_ITERATIONS * 2).WillRepeatedly(Return(FAKE_PID));
329 for (int i = 0; i < NUM_ITERATIONS; i++) {
330 Init();
331 EXPECT_NE(0, getIpRestorePid(IptablesRestoreController::IPTABLES_PROCESS));
332 EXPECT_NE(0, getIpRestorePid(IptablesRestoreController::IP6TABLES_PROCESS));
333 }
334 }
335
336 // The controller is now in an invalid state: the pipes are connected to working iptables
337 // processes, but the PIDs are set to FAKE_PID. Send a malformed command to ensure that the
338 // processes terminate and close the pipes, then send a valid command to have the controller
339 // re-initialize properly now that fork() is no longer mocked.
340 EXPECT_EQ(-1, con.execute(V4V6, "malformed command\n", nullptr));
341 EXPECT_EQ(0, con.execute(V4V6, "#Test\n", nullptr));
342}
Lorenzo Colitti10819c52020-09-17 21:32:44 +0900343
344TEST_F(IptablesRestoreControllerTest, TestMemoryLeak) {
345 std::string cmd = "*filter\n";
346
347 // Keep command within PIPE_BUF (4096) just to make sure. Each line is 60 bytes including \n:
348 // -I netd_unit_test_9999 -p udp -m udp --sport 12345 -j DROP
349 for (int i = 0; i < 33; i++) {
350 StringAppendF(&cmd, "-I %s -p udp -m udp --sport 12345 -j DROP\n", mChainName.c_str());
351 StringAppendF(&cmd, "-D %s -p udp -m udp --sport 12345 -j DROP\n", mChainName.c_str());
352 }
353 StringAppendF(&cmd, "COMMIT\n");
354 ASSERT_GE(4096U, cmd.size());
355
356 // Run the command once in case it causes the first allocations for these iptables-restore
357 // processes, and check they don't crash.
358 pid_t pid4 = getIpRestorePid(IptablesRestoreController::IPTABLES_PROCESS);
359 pid_t pid6 = getIpRestorePid(IptablesRestoreController::IP6TABLES_PROCESS);
360 std::string output;
361 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, cmd, nullptr));
362 EXPECT_EQ(pid4, getIpRestorePid(IptablesRestoreController::IPTABLES_PROCESS));
363 EXPECT_EQ(pid6, getIpRestorePid(IptablesRestoreController::IP6TABLES_PROCESS));
364
365 // Check how much RAM the processes are using.
Evgenii Stepanov693c6712021-04-21 14:40:12 -0700366 int pages4 = getRssPages(pid4);
367 ASSERT_NE(0, pages4);
368 int pages6 = getRssPages(pid6);
369 ASSERT_NE(0, pages6);
Lorenzo Colitti10819c52020-09-17 21:32:44 +0900370
371 // Run the command a few times and check that it doesn't crash.
372 for (int i = 0; i < 10; i++) {
373 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, cmd, nullptr));
374 }
375 EXPECT_EQ(pid4, getIpRestorePid(IptablesRestoreController::IPTABLES_PROCESS));
376 EXPECT_EQ(pid6, getIpRestorePid(IptablesRestoreController::IP6TABLES_PROCESS));
377
Evgenii Stepanov693c6712021-04-21 14:40:12 -0700378 // Don't allow a leak of more than 25 pages (100kB).
Lorenzo Colitti10819c52020-09-17 21:32:44 +0900379 // This is more than enough for accuracy: the leak in b/162925719 fails with:
Evgenii Stepanov693c6712021-04-21 14:40:12 -0700380 // Expected: (25U) >= (getRssPages(pid4) - pages4), actual: 5 vs 66
381 EXPECT_GE(25, getRssPages(pid4) - pages4) << "iptables-restore leaked too many pages";
382 EXPECT_GE(25, getRssPages(pid6) - pages6) << "ip6tables-restore leaked too many pages";
Lorenzo Colitti10819c52020-09-17 21:32:44 +0900383}