blob: 864d08d5279bd08bc66be111f158b907f9487809 [file] [log] [blame]
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +09001/*
2 * Copyright 2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 *
16 * sock_diag_test.cpp - unit tests for SockDiag.cpp
17 */
18
Lorenzo Colitti0726fec2016-07-26 17:53:50 +090019#include <sys/socket.h>
20#include <netdb.h>
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090021#include <arpa/inet.h>
22#include <netinet/in.h>
Lorenzo Colitti0726fec2016-07-26 17:53:50 +090023#include <netinet/tcp.h>
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090024#include <linux/inet_diag.h>
25
26#include <gtest/gtest.h>
Paul Hu1c64f082022-06-21 03:42:50 +000027#include <netdutils/NetNativeTestBase.h>
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090028
Lorenzo Colittic6201c32016-09-14 02:25:05 +090029#include "Fwmark.h"
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090030#include "NetdConstants.h"
31#include "SockDiag.h"
Lorenzo Colittifff4bd32016-04-14 00:56:01 +090032#include "UidRanges.h"
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090033
Lorenzo Colitti7035f222017-02-13 18:29:00 +090034namespace android {
35namespace net {
36
Paul Hu1c64f082022-06-21 03:42:50 +000037class SockDiagTest : public NetNativeTestBase {
Lorenzo Colitti0726fec2016-07-26 17:53:50 +090038protected:
39 static bool isLoopbackSocket(const inet_diag_msg *msg) {
40 return SockDiag::isLoopbackSocket(msg);
41 };
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090042};
43
44uint16_t bindAndListen(int s) {
45 for (int i = 0; i < 10; i++) {
46 uint16_t port = 1024 + arc4random_uniform(0xffff - 1024);
47 sockaddr_in6 sin6 = { .sin6_family = AF_INET6, .sin6_port = htons(port) };
48 if (bind(s, (sockaddr *) &sin6, sizeof(sin6)) == 0) {
49 listen(s, 1);
50 return port;
51 }
52 }
53 close(s);
54 return 0;
55}
56
57const char *tcpStateName(uint8_t state) {
58 static const char *states[] = {
59 "???",
60 "TCP_ESTABLISHED",
61 "TCP_SYN_SENT",
62 "TCP_SYN_RECV",
63 "TCP_FIN_WAIT1",
64 "TCP_FIN_WAIT2",
65 "TCP_TIME_WAIT",
66 "TCP_CLOSE",
67 "TCP_CLOSE_WAIT",
68 "TCP_LAST_ACK",
69 "TCP_LISTEN",
70 "TCP_CLOSING",
71 "TCP_NEW_SYN_RECV",
72 };
73 return states[(state < ARRAY_SIZE(states)) ? state : 0];
74}
75
76TEST_F(SockDiagTest, TestDump) {
Bernie Innocenti15bb55c2018-06-03 16:19:51 +090077 int v4socket = socket(AF_INET, SOCK_STREAM | SOCK_CLOEXEC, 0);
Pierre Imaib19fcc72016-03-11 17:54:48 +090078 ASSERT_NE(-1, v4socket) << "Failed to open IPv4 socket: " << strerror(errno);
Bernie Innocenti15bb55c2018-06-03 16:19:51 +090079 int v6socket = socket(AF_INET6, SOCK_STREAM | SOCK_CLOEXEC, 0);
Pierre Imaib19fcc72016-03-11 17:54:48 +090080 ASSERT_NE(-1, v6socket) << "Failed to open IPv6 socket: " << strerror(errno);
Bernie Innocenti15bb55c2018-06-03 16:19:51 +090081 int listensocket = socket(AF_INET6, SOCK_STREAM | SOCK_CLOEXEC, 0);
Pierre Imaib19fcc72016-03-11 17:54:48 +090082 ASSERT_NE(-1, listensocket) << "Failed to open listen socket: " << strerror(errno);
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090083
84 uint16_t port = bindAndListen(listensocket);
85 ASSERT_NE(0, port) << "Can't bind to server port";
86
87 // Connect to loopback.
88 sockaddr_in server4 = { .sin_family = AF_INET, .sin_port = htons(port) };
89 sockaddr_in6 server6 = { .sin6_family = AF_INET6, .sin6_port = htons(port) };
90 ASSERT_EQ(0, connect(v4socket, (sockaddr *) &server4, sizeof(server4)))
91 << "IPv4 connect failed: " << strerror(errno);
92 ASSERT_EQ(0, connect(v6socket, (sockaddr *) &server6, sizeof(server6)))
93 << "IPv6 connect failed: " << strerror(errno);
94
95 sockaddr_in6 client46, client6;
96 socklen_t clientlen = std::max(sizeof(client46), sizeof(client6));
Bernie Innocenti15bb55c2018-06-03 16:19:51 +090097 int accepted4 = accept4(
98 listensocket, (sockaddr *) &client46, &clientlen, SOCK_CLOEXEC);
99 int accepted6 = accept4(
100 listensocket, (sockaddr *) &client6, &clientlen, SOCK_CLOEXEC);
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900101 ASSERT_NE(-1, accepted4);
102 ASSERT_NE(-1, accepted6);
103
104 int v4SocketsSeen = 0;
105 bool seenclient46 = false;
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900106 char src[INET6_ADDRSTRLEN], dst[INET6_ADDRSTRLEN];
107
108 fprintf(stderr, "Ports:\n server=%d. client46=%d, client6=%d\n",
109 port, ntohs(client46.sin6_port), ntohs(client6.sin6_port));
110
111 auto checkIPv4Dump = [&] (uint8_t /* proto */, const inet_diag_msg *msg) {
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900112 EXPECT_EQ(htonl(INADDR_LOOPBACK), msg->id.idiag_src[0]);
113 v4SocketsSeen++;
114 seenclient46 |= (msg->id.idiag_sport == client46.sin6_port);
115 inet_ntop(AF_INET, msg->id.idiag_src, src, sizeof(src));
116 inet_ntop(AF_INET, msg->id.idiag_src, dst, sizeof(dst));
117 fprintf(stderr, " v4 %s:%d -> %s:%d %s\n",
118 src, htons(msg->id.idiag_sport),
119 dst, htons(msg->id.idiag_dport),
120 tcpStateName(msg->idiag_state));
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900121 if (msg->idiag_state == TCP_ESTABLISHED) {
122 EXPECT_TRUE(isLoopbackSocket(msg));
123 }
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900124 return false;
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900125 };
126
127 int v6SocketsSeen = 0;
128 bool seenClient6 = false, seenServer46 = false, seenServer6 = false;
129
130 auto checkIPv6Dump = [&] (uint8_t /* proto */, const inet_diag_msg *msg) {
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900131 struct in6_addr *saddr = (struct in6_addr *) msg->id.idiag_src;
132 EXPECT_TRUE(
133 IN6_IS_ADDR_LOOPBACK(saddr) ||
134 (IN6_IS_ADDR_V4MAPPED(saddr) && saddr->s6_addr32[3] == htonl(INADDR_LOOPBACK)));
135 v6SocketsSeen++;
136 seenClient6 |= (msg->id.idiag_sport == client6.sin6_port);
137 seenServer46 |= (msg->id.idiag_sport == htons(port));
138 seenServer6 |= (msg->id.idiag_sport == htons(port));
139 inet_ntop(AF_INET6, msg->id.idiag_src, src, sizeof(src));
140 inet_ntop(AF_INET6, msg->id.idiag_src, dst, sizeof(dst));
141 fprintf(stderr, " v6 [%s]:%d -> [%s]:%d %s\n",
142 src, htons(msg->id.idiag_sport),
143 dst, htons(msg->id.idiag_dport),
144 tcpStateName(msg->idiag_state));
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900145 if (msg->idiag_state == TCP_ESTABLISHED) {
146 EXPECT_TRUE(isLoopbackSocket(msg));
147 }
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900148 return false;
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900149 };
150
151 SockDiag sd;
152 ASSERT_TRUE(sd.open()) << "Failed to open SOCK_DIAG socket";
153
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900154 int ret = sd.sendDumpRequest(IPPROTO_TCP, AF_INET, "127.0.0.1");
155 ASSERT_EQ(0, ret) << "Failed to send IPv4 dump request: " << strerror(-ret);
156 fprintf(stderr, "Sent IPv4 dump\n");
157 sd.readDiagMsg(IPPROTO_TCP, checkIPv4Dump);
158 EXPECT_GE(v4SocketsSeen, 1);
159 EXPECT_TRUE(seenclient46);
160 EXPECT_FALSE(seenServer46);
161
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900162 ret = sd.sendDumpRequest(IPPROTO_TCP, AF_INET6, "127.0.0.1");
163 ASSERT_EQ(0, ret) << "Failed to send mapped dump request: " << strerror(-ret);
164 fprintf(stderr, "Sent mapped dump\n");
165 sd.readDiagMsg(IPPROTO_TCP, checkIPv6Dump);
166 EXPECT_TRUE(seenServer46);
167
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900168 ret = sd.sendDumpRequest(IPPROTO_TCP, AF_INET6, "::1");
169 ASSERT_EQ(0, ret) << "Failed to send IPv6 dump request: " << strerror(-ret);
170 fprintf(stderr, "Sent IPv6 dump\n");
171
172 sd.readDiagMsg(IPPROTO_TCP, checkIPv6Dump);
173 EXPECT_GE(v6SocketsSeen, 1);
174 EXPECT_TRUE(seenClient6);
175 EXPECT_TRUE(seenServer6);
176
177 close(v4socket);
178 close(v6socket);
179 close(listensocket);
180 close(accepted4);
181 close(accepted6);
182}
183
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900184bool fillDiagAddr(__be32 addr[4], const sockaddr *sa) {
185 switch (sa->sa_family) {
186 case AF_INET: {
187 sockaddr_in *sin = (sockaddr_in *) sa;
188 memcpy(addr, &sin->sin_addr, sizeof(sin->sin_addr));
189 return true;
190 }
191 case AF_INET6: {
192 sockaddr_in6 *sin6 = (sockaddr_in6 *) sa;
193 memcpy(addr, &sin6->sin6_addr, sizeof(sin6->sin6_addr));
194 return true;
195 }
196 default:
197 return false;
198 }
199}
200
201inet_diag_msg makeDiagMessage(__u8 family, const sockaddr *src, const sockaddr *dst) {
202 inet_diag_msg msg = {
Nick Desaulniers6b357502019-10-11 09:26:44 -0700203 .idiag_family = family,
204 .idiag_state = TCP_ESTABLISHED,
205 .id =
206 {
207 .idiag_sport = 1234,
208 .idiag_dport = 4321,
209 },
210 .idiag_uid = AID_APP + 123,
211 .idiag_inode = 123456789,
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900212 };
213 EXPECT_TRUE(fillDiagAddr(msg.id.idiag_src, src));
214 EXPECT_TRUE(fillDiagAddr(msg.id.idiag_dst, dst));
215 return msg;
216}
217
218inet_diag_msg makeDiagMessage(const char* srcstr, const char* dststr) {
219 addrinfo hints = { .ai_flags = AI_NUMERICHOST }, *src, *dst;
Yi Kongbdfd57e2018-07-25 13:26:10 -0700220 EXPECT_EQ(0, getaddrinfo(srcstr, nullptr, &hints, &src));
221 EXPECT_EQ(0, getaddrinfo(dststr, nullptr, &hints, &dst));
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900222 EXPECT_EQ(src->ai_addr->sa_family, dst->ai_addr->sa_family);
223 inet_diag_msg msg = makeDiagMessage(src->ai_addr->sa_family, src->ai_addr, dst->ai_addr);
224 freeaddrinfo(src);
225 freeaddrinfo(dst);
226 return msg;
227}
228
229TEST_F(SockDiagTest, TestIsLoopbackSocket) {
230 inet_diag_msg msg;
231
232 msg = makeDiagMessage("127.0.0.1", "127.0.0.1");
233 EXPECT_TRUE(isLoopbackSocket(&msg));
234
235 msg = makeDiagMessage("::1", "::1");
236 EXPECT_TRUE(isLoopbackSocket(&msg));
237
238 msg = makeDiagMessage("::1", "::ffff:127.0.0.1");
239 EXPECT_TRUE(isLoopbackSocket(&msg));
240
241 msg = makeDiagMessage("192.0.2.1", "192.0.2.1");
242 EXPECT_TRUE(isLoopbackSocket(&msg));
243
244 msg = makeDiagMessage("192.0.2.1", "8.8.8.8");
245 EXPECT_FALSE(isLoopbackSocket(&msg));
246
247 msg = makeDiagMessage("192.0.2.1", "127.0.0.1");
248 EXPECT_TRUE(isLoopbackSocket(&msg));
249
250 msg = makeDiagMessage("2001:db8::1", "2001:db8::1");
251 EXPECT_TRUE(isLoopbackSocket(&msg));
252
253 msg = makeDiagMessage("2001:db8::1", "2001:4860:4860::6464");
254 EXPECT_FALSE(isLoopbackSocket(&msg));
255
256 // While isLoopbackSocket returns true on these sockets, we usually don't want to close them
257 // because they aren't specific to any particular network and thus don't become unusable when
258 // an app's routing changes or its network access is removed.
259 //
260 // This isn't a problem, as anything that calls destroyLiveSockets will skip them because
261 // destroyLiveSockets only enumerates ESTABLISHED, SYN_SENT, and SYN_RECV sockets.
262 msg = makeDiagMessage("127.0.0.1", "0.0.0.0");
263 EXPECT_TRUE(isLoopbackSocket(&msg));
264
265 msg = makeDiagMessage("::1", "::");
266 EXPECT_TRUE(isLoopbackSocket(&msg));
267}
268
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900269enum MicroBenchmarkTestType {
270 ADDRESS,
271 UID,
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900272 UID_EXCLUDE_LOOPBACK,
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900273 UIDRANGE,
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900274 UIDRANGE_EXCLUDE_LOOPBACK,
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900275 PERMISSION,
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900276};
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900277
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900278const char *testTypeName(MicroBenchmarkTestType mode) {
279#define TO_STRING_TYPE(x) case ((x)): return #x;
280 switch((mode)) {
281 TO_STRING_TYPE(ADDRESS);
282 TO_STRING_TYPE(UID);
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900283 TO_STRING_TYPE(UID_EXCLUDE_LOOPBACK);
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900284 TO_STRING_TYPE(UIDRANGE);
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900285 TO_STRING_TYPE(UIDRANGE_EXCLUDE_LOOPBACK);
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900286 TO_STRING_TYPE(PERMISSION);
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900287 }
288#undef TO_STRING_TYPE
289}
290
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900291static struct {
292 unsigned netId;
293 bool explicitlySelected;
294 Permission permission;
295} permissionTestcases[] = {
296 { 42, false, PERMISSION_NONE, },
297 { 42, false, PERMISSION_NETWORK, },
298 { 42, false, PERMISSION_SYSTEM, },
299 { 42, true, PERMISSION_NONE, },
300 { 42, true, PERMISSION_NETWORK, },
301 { 42, true, PERMISSION_SYSTEM, },
302 { 43, false, PERMISSION_NONE, },
303 { 43, false, PERMISSION_NETWORK, },
304 { 43, false, PERMISSION_SYSTEM, },
305 { 43, true, PERMISSION_NONE, },
306 { 43, true, PERMISSION_NETWORK, },
307 { 43, true, PERMISSION_SYSTEM, },
308};
309
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900310class SockDiagMicroBenchmarkTest : public ::testing::TestWithParam<MicroBenchmarkTestType> {
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900311
312public:
313 void SetUp() {
314 ASSERT_TRUE(mSd.open()) << "Failed to open SOCK_DIAG socket";
315 }
316
317protected:
318 SockDiag mSd;
319
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900320 constexpr static int MAX_SOCKETS = 500;
321 constexpr static int ADDRESS_SOCKETS = 500;
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900322 constexpr static int UID_SOCKETS = 50;
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900323 constexpr static int PERMISSION_SOCKETS = 16;
324
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900325 constexpr static uid_t START_UID = 8000; // START_UID + number of sockets must be <= 9999.
326 constexpr static int CLOSE_UID = START_UID + UID_SOCKETS - 42; // Close to the end
327 static_assert(START_UID + MAX_SOCKETS < 9999, "Too many sockets");
328
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900329 constexpr static int TEST_NETID = 42; // One of the OEM netIds.
330
331
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900332 int howManySockets() {
333 MicroBenchmarkTestType mode = GetParam();
334 switch (mode) {
335 case ADDRESS:
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900336 return ADDRESS_SOCKETS;
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900337 case UID:
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900338 case UID_EXCLUDE_LOOPBACK:
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900339 case UIDRANGE:
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900340 case UIDRANGE_EXCLUDE_LOOPBACK:
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900341 return UID_SOCKETS;
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900342 case PERMISSION:
343 return ARRAY_SIZE(permissionTestcases);
344 }
345 }
346
347 int modifySocketForTest(int s, int i) {
348 MicroBenchmarkTestType mode = GetParam();
349 switch (mode) {
350 case UID:
351 case UID_EXCLUDE_LOOPBACK:
352 case UIDRANGE:
353 case UIDRANGE_EXCLUDE_LOOPBACK: {
354 uid_t uid = START_UID + i;
355 return fchown(s, uid, -1);
356 }
357 case PERMISSION: {
358 Fwmark fwmark;
359 fwmark.netId = permissionTestcases[i].netId;
360 fwmark.explicitlySelected = permissionTestcases[i].explicitlySelected;
361 fwmark.permission = permissionTestcases[i].permission;
362 return setsockopt(s, SOL_SOCKET, SO_MARK, &fwmark.intValue, sizeof(fwmark.intValue));
363 }
364 default:
365 return 0;
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900366 }
367 }
368
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900369 int destroySockets() {
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900370 MicroBenchmarkTestType mode = GetParam();
371 int ret;
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900372 switch (mode) {
373 case ADDRESS:
Lorenzo Colitticaccab42021-06-17 12:16:37 +0900374 ret = mSd.destroySockets("::1", 0 /* ifindex */);
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900375 EXPECT_LE(0, ret) << ": Failed to destroy sockets on ::1: " << strerror(-ret);
376 break;
377 case UID:
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900378 case UID_EXCLUDE_LOOPBACK: {
379 bool excludeLoopback = (mode == UID_EXCLUDE_LOOPBACK);
380 ret = mSd.destroySockets(IPPROTO_TCP, CLOSE_UID, excludeLoopback);
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900381 EXPECT_LE(0, ret) << ": Failed to destroy sockets for UID " << CLOSE_UID << ": " <<
382 strerror(-ret);
383 break;
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900384 }
385 case UIDRANGE:
386 case UIDRANGE_EXCLUDE_LOOPBACK: {
387 bool excludeLoopback = (mode == UIDRANGE_EXCLUDE_LOOPBACK);
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900388 const char *uidRangeStrings[] = { "8005-8012", "8042", "8043", "8090-8099" };
389 std::set<uid_t> skipUids { 8007, 8043, 8098, 8099 };
390 UidRanges uidRanges;
391 uidRanges.parseFrom(ARRAY_SIZE(uidRangeStrings), (char **) uidRangeStrings);
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900392 ret = mSd.destroySockets(uidRanges, skipUids, excludeLoopback);
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900393 break;
394 }
395 case PERMISSION: {
396 ret = mSd.destroySocketsLackingPermission(TEST_NETID, PERMISSION_NETWORK, false);
397 break;
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900398 }
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900399 }
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900400 return ret;
401 }
402
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900403 bool shouldHaveClosedSocket(int i) {
404 MicroBenchmarkTestType mode = GetParam();
405 switch (mode) {
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900406 case ADDRESS:
407 return true;
408 case UID:
409 return i == CLOSE_UID - START_UID;
410 case UIDRANGE: {
411 uid_t uid = i + START_UID;
412 // Skip UIDs in skipUids.
413 if (uid == 8007 || uid == 8043 || uid == 8098 || uid == 8099) {
414 return false;
415 }
416 // Include UIDs in uidRanges.
417 if ((8005 <= uid && uid <= 8012) || uid == 8042 || (8090 <= uid && uid <= 8099)) {
418 return true;
419 }
420 return false;
421 }
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900422 case UID_EXCLUDE_LOOPBACK:
423 case UIDRANGE_EXCLUDE_LOOPBACK:
424 return false;
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900425 case PERMISSION:
426 if (permissionTestcases[i].netId != 42) return false;
427 if (permissionTestcases[i].explicitlySelected != 1) return true;
428 Permission permission = permissionTestcases[i].permission;
429 return permission != PERMISSION_NETWORK && permission != PERMISSION_SYSTEM;
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900430 }
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900431 }
432
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900433 bool checkSocketState(int i, int sock, const char *msg) {
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900434 const char data[] = "foo";
435 const int ret = send(sock, data, sizeof(data), 0);
436 const int err = errno;
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900437 if (!shouldHaveClosedSocket(i)) {
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900438 EXPECT_EQ((ssize_t) sizeof(data), ret) <<
439 "Write on open socket failed: " << strerror(err);
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900440 return false;
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900441 }
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900442
443 EXPECT_EQ(-1, ret) << msg << " " << i << " not closed";
444 if (ret != -1) {
445 return false;
446 }
447
448 // Since we're connected to ourselves, the error might be ECONNABORTED (if we destroyed the
449 // socket) or ECONNRESET (if the other end was destroyed and sent a RST).
450 EXPECT_TRUE(err == ECONNABORTED || err == ECONNRESET)
451 << msg << ": unexpected error: " << strerror(err);
452 return (err == ECONNABORTED); // Return true iff. SOCK_DESTROY closed this socket.
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900453 }
454};
455
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900456TEST_P(SockDiagMicroBenchmarkTest, TestMicroBenchmark) {
457 MicroBenchmarkTestType mode = GetParam();
458
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900459 int numSockets = howManySockets();
460
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900461 fprintf(stderr, "Benchmarking closing %d sockets based on %s\n",
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900462 numSockets, testTypeName(mode));
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900463
Bernie Innocenti15bb55c2018-06-03 16:19:51 +0900464 int listensocket = socket(AF_INET6, SOCK_STREAM | SOCK_CLOEXEC, 0);
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900465 ASSERT_NE(-1, listensocket) << "Failed to open listen socket";
466
467 uint16_t port = bindAndListen(listensocket);
468 ASSERT_NE(0, port) << "Can't bind to server port";
469 sockaddr_in6 server = { .sin6_family = AF_INET6, .sin6_port = htons(port) };
470
471 using ms = std::chrono::duration<float, std::ratio<1, 1000>>;
472
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900473 int clientsockets[MAX_SOCKETS], serversockets[MAX_SOCKETS];
474 uint16_t clientports[MAX_SOCKETS];
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900475 sockaddr_in6 client;
476 socklen_t clientlen;
477
478 auto start = std::chrono::steady_clock::now();
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900479 for (int i = 0; i < numSockets; i++) {
Bernie Innocenti15bb55c2018-06-03 16:19:51 +0900480 int s = socket(AF_INET6, SOCK_STREAM | SOCK_CLOEXEC, 0);
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900481 clientlen = sizeof(client);
482 ASSERT_EQ(0, connect(s, (sockaddr *) &server, sizeof(server)))
483 << "Connecting socket " << i << " failed " << strerror(errno);
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900484 ASSERT_EQ(0, modifySocketForTest(s, i));
Bernie Innocenti15bb55c2018-06-03 16:19:51 +0900485 serversockets[i] = accept4(
486 listensocket, (sockaddr *) &client, &clientlen, SOCK_CLOEXEC);
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900487 ASSERT_NE(-1, serversockets[i])
488 << "Accepting socket " << i << " failed " << strerror(errno);
489 clientports[i] = client.sin6_port;
490 clientsockets[i] = s;
491 }
492 fprintf(stderr, " Connecting: %6.1f ms\n",
493 std::chrono::duration_cast<ms>(std::chrono::steady_clock::now() - start).count());
494
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900495 start = std::chrono::steady_clock::now();
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900496 destroySockets();
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900497 fprintf(stderr, " Destroying: %6.1f ms\n",
498 std::chrono::duration_cast<ms>(std::chrono::steady_clock::now() - start).count());
499
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900500 start = std::chrono::steady_clock::now();
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900501 int socketsClosed = 0;
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900502 for (int i = 0; i < numSockets; i++) {
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900503 socketsClosed += checkSocketState(i, clientsockets[i], "Client socket");
504 socketsClosed += checkSocketState(i, serversockets[i], "Server socket");
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900505 }
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900506 fprintf(stderr, " Verifying: %6.1f ms (%d sockets destroyed)\n",
507 std::chrono::duration_cast<ms>(std::chrono::steady_clock::now() - start).count(),
508 socketsClosed);
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900509 if (strstr(testTypeName(mode), "_EXCLUDE_LOOPBACK") == nullptr) {
510 EXPECT_GT(socketsClosed, 0); // Just in case there's a bug in the test.
511 }
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900512
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900513 start = std::chrono::steady_clock::now();
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900514 for (int i = 0; i < numSockets; i++) {
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900515 close(clientsockets[i]);
516 close(serversockets[i]);
517 }
518 fprintf(stderr, " Closing: %6.1f ms\n",
519 std::chrono::duration_cast<ms>(std::chrono::steady_clock::now() - start).count());
520
521 close(listensocket);
522}
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900523
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900524// "SockDiagTest.cpp:232: error: undefined reference to 'SockDiagMicroBenchmarkTest::CLOSE_UID'".
525constexpr int SockDiagMicroBenchmarkTest::CLOSE_UID;
526
527INSTANTIATE_TEST_CASE_P(Address, SockDiagMicroBenchmarkTest,
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900528 testing::Values(ADDRESS, UID, UIDRANGE,
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900529 UID_EXCLUDE_LOOPBACK, UIDRANGE_EXCLUDE_LOOPBACK,
530 PERMISSION));
Lorenzo Colitti7035f222017-02-13 18:29:00 +0900531
532} // namespace net
533} // namespace android