blob: d839a5d4f5af488711787521a18b2b534224727c [file] [log] [blame]
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +09001/*
2 * Copyright 2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 *
16 * sock_diag_test.cpp - unit tests for SockDiag.cpp
17 */
18
Lorenzo Colitti0726fec2016-07-26 17:53:50 +090019#include <sys/socket.h>
20#include <netdb.h>
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090021#include <arpa/inet.h>
22#include <netinet/in.h>
Lorenzo Colitti0726fec2016-07-26 17:53:50 +090023#include <netinet/tcp.h>
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090024#include <linux/inet_diag.h>
25
26#include <gtest/gtest.h>
27
Lorenzo Colittic6201c32016-09-14 02:25:05 +090028#include "Fwmark.h"
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090029#include "NetdConstants.h"
30#include "SockDiag.h"
Lorenzo Colittifff4bd32016-04-14 00:56:01 +090031#include "UidRanges.h"
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090032
Lorenzo Colitti7035f222017-02-13 18:29:00 +090033namespace android {
34namespace net {
35
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090036class SockDiagTest : public ::testing::Test {
Lorenzo Colitti0726fec2016-07-26 17:53:50 +090037protected:
38 static bool isLoopbackSocket(const inet_diag_msg *msg) {
39 return SockDiag::isLoopbackSocket(msg);
40 };
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090041};
42
43uint16_t bindAndListen(int s) {
44 for (int i = 0; i < 10; i++) {
45 uint16_t port = 1024 + arc4random_uniform(0xffff - 1024);
46 sockaddr_in6 sin6 = { .sin6_family = AF_INET6, .sin6_port = htons(port) };
47 if (bind(s, (sockaddr *) &sin6, sizeof(sin6)) == 0) {
48 listen(s, 1);
49 return port;
50 }
51 }
52 close(s);
53 return 0;
54}
55
56const char *tcpStateName(uint8_t state) {
57 static const char *states[] = {
58 "???",
59 "TCP_ESTABLISHED",
60 "TCP_SYN_SENT",
61 "TCP_SYN_RECV",
62 "TCP_FIN_WAIT1",
63 "TCP_FIN_WAIT2",
64 "TCP_TIME_WAIT",
65 "TCP_CLOSE",
66 "TCP_CLOSE_WAIT",
67 "TCP_LAST_ACK",
68 "TCP_LISTEN",
69 "TCP_CLOSING",
70 "TCP_NEW_SYN_RECV",
71 };
72 return states[(state < ARRAY_SIZE(states)) ? state : 0];
73}
74
75TEST_F(SockDiagTest, TestDump) {
76 int v4socket = socket(AF_INET, SOCK_STREAM, 0);
Pierre Imaib19fcc72016-03-11 17:54:48 +090077 ASSERT_NE(-1, v4socket) << "Failed to open IPv4 socket: " << strerror(errno);
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090078 int v6socket = socket(AF_INET6, SOCK_STREAM, 0);
Pierre Imaib19fcc72016-03-11 17:54:48 +090079 ASSERT_NE(-1, v6socket) << "Failed to open IPv6 socket: " << strerror(errno);
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090080 int listensocket = socket(AF_INET6, SOCK_STREAM, 0);
Pierre Imaib19fcc72016-03-11 17:54:48 +090081 ASSERT_NE(-1, listensocket) << "Failed to open listen socket: " << strerror(errno);
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +090082
83 uint16_t port = bindAndListen(listensocket);
84 ASSERT_NE(0, port) << "Can't bind to server port";
85
86 // Connect to loopback.
87 sockaddr_in server4 = { .sin_family = AF_INET, .sin_port = htons(port) };
88 sockaddr_in6 server6 = { .sin6_family = AF_INET6, .sin6_port = htons(port) };
89 ASSERT_EQ(0, connect(v4socket, (sockaddr *) &server4, sizeof(server4)))
90 << "IPv4 connect failed: " << strerror(errno);
91 ASSERT_EQ(0, connect(v6socket, (sockaddr *) &server6, sizeof(server6)))
92 << "IPv6 connect failed: " << strerror(errno);
93
94 sockaddr_in6 client46, client6;
95 socklen_t clientlen = std::max(sizeof(client46), sizeof(client6));
96 int accepted4 = accept(listensocket, (sockaddr *) &client46, &clientlen);
97 int accepted6 = accept(listensocket, (sockaddr *) &client6, &clientlen);
98 ASSERT_NE(-1, accepted4);
99 ASSERT_NE(-1, accepted6);
100
101 int v4SocketsSeen = 0;
102 bool seenclient46 = false;
103 bool seenNull = false;
104 char src[INET6_ADDRSTRLEN], dst[INET6_ADDRSTRLEN];
105
106 fprintf(stderr, "Ports:\n server=%d. client46=%d, client6=%d\n",
107 port, ntohs(client46.sin6_port), ntohs(client6.sin6_port));
108
109 auto checkIPv4Dump = [&] (uint8_t /* proto */, const inet_diag_msg *msg) {
110 if (msg == nullptr) {
111 EXPECT_FALSE(seenNull);
112 seenNull = true;
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900113 return false;
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900114 }
115 EXPECT_EQ(htonl(INADDR_LOOPBACK), msg->id.idiag_src[0]);
116 v4SocketsSeen++;
117 seenclient46 |= (msg->id.idiag_sport == client46.sin6_port);
118 inet_ntop(AF_INET, msg->id.idiag_src, src, sizeof(src));
119 inet_ntop(AF_INET, msg->id.idiag_src, dst, sizeof(dst));
120 fprintf(stderr, " v4 %s:%d -> %s:%d %s\n",
121 src, htons(msg->id.idiag_sport),
122 dst, htons(msg->id.idiag_dport),
123 tcpStateName(msg->idiag_state));
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900124 if (msg->idiag_state == TCP_ESTABLISHED) {
125 EXPECT_TRUE(isLoopbackSocket(msg));
126 }
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900127 return false;
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900128 };
129
130 int v6SocketsSeen = 0;
131 bool seenClient6 = false, seenServer46 = false, seenServer6 = false;
132
133 auto checkIPv6Dump = [&] (uint8_t /* proto */, const inet_diag_msg *msg) {
134 if (msg == nullptr) {
135 EXPECT_FALSE(seenNull);
136 seenNull = true;
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900137 return false;
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900138 }
139 struct in6_addr *saddr = (struct in6_addr *) msg->id.idiag_src;
140 EXPECT_TRUE(
141 IN6_IS_ADDR_LOOPBACK(saddr) ||
142 (IN6_IS_ADDR_V4MAPPED(saddr) && saddr->s6_addr32[3] == htonl(INADDR_LOOPBACK)));
143 v6SocketsSeen++;
144 seenClient6 |= (msg->id.idiag_sport == client6.sin6_port);
145 seenServer46 |= (msg->id.idiag_sport == htons(port));
146 seenServer6 |= (msg->id.idiag_sport == htons(port));
147 inet_ntop(AF_INET6, msg->id.idiag_src, src, sizeof(src));
148 inet_ntop(AF_INET6, msg->id.idiag_src, dst, sizeof(dst));
149 fprintf(stderr, " v6 [%s]:%d -> [%s]:%d %s\n",
150 src, htons(msg->id.idiag_sport),
151 dst, htons(msg->id.idiag_dport),
152 tcpStateName(msg->idiag_state));
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900153 if (msg->idiag_state == TCP_ESTABLISHED) {
154 EXPECT_TRUE(isLoopbackSocket(msg));
155 }
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900156 return false;
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900157 };
158
159 SockDiag sd;
160 ASSERT_TRUE(sd.open()) << "Failed to open SOCK_DIAG socket";
161
162 seenNull = false;
163 int ret = sd.sendDumpRequest(IPPROTO_TCP, AF_INET, "127.0.0.1");
164 ASSERT_EQ(0, ret) << "Failed to send IPv4 dump request: " << strerror(-ret);
165 fprintf(stderr, "Sent IPv4 dump\n");
166 sd.readDiagMsg(IPPROTO_TCP, checkIPv4Dump);
167 EXPECT_GE(v4SocketsSeen, 1);
168 EXPECT_TRUE(seenclient46);
169 EXPECT_FALSE(seenServer46);
170
171 seenNull = false;
172 ret = sd.sendDumpRequest(IPPROTO_TCP, AF_INET6, "127.0.0.1");
173 ASSERT_EQ(0, ret) << "Failed to send mapped dump request: " << strerror(-ret);
174 fprintf(stderr, "Sent mapped dump\n");
175 sd.readDiagMsg(IPPROTO_TCP, checkIPv6Dump);
176 EXPECT_TRUE(seenServer46);
177
178 seenNull = false;
179 ret = sd.sendDumpRequest(IPPROTO_TCP, AF_INET6, "::1");
180 ASSERT_EQ(0, ret) << "Failed to send IPv6 dump request: " << strerror(-ret);
181 fprintf(stderr, "Sent IPv6 dump\n");
182
183 sd.readDiagMsg(IPPROTO_TCP, checkIPv6Dump);
184 EXPECT_GE(v6SocketsSeen, 1);
185 EXPECT_TRUE(seenClient6);
186 EXPECT_TRUE(seenServer6);
187
188 close(v4socket);
189 close(v6socket);
190 close(listensocket);
191 close(accepted4);
192 close(accepted6);
193}
194
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900195bool fillDiagAddr(__be32 addr[4], const sockaddr *sa) {
196 switch (sa->sa_family) {
197 case AF_INET: {
198 sockaddr_in *sin = (sockaddr_in *) sa;
199 memcpy(addr, &sin->sin_addr, sizeof(sin->sin_addr));
200 return true;
201 }
202 case AF_INET6: {
203 sockaddr_in6 *sin6 = (sockaddr_in6 *) sa;
204 memcpy(addr, &sin6->sin6_addr, sizeof(sin6->sin6_addr));
205 return true;
206 }
207 default:
208 return false;
209 }
210}
211
212inet_diag_msg makeDiagMessage(__u8 family, const sockaddr *src, const sockaddr *dst) {
213 inet_diag_msg msg = {
214 .idiag_family = family,
215 .idiag_state = TCP_ESTABLISHED,
216 .idiag_uid = AID_APP + 123,
217 .idiag_inode = 123456789,
218 .id = {
219 .idiag_sport = 1234,
220 .idiag_dport = 4321,
221 }
222 };
223 EXPECT_TRUE(fillDiagAddr(msg.id.idiag_src, src));
224 EXPECT_TRUE(fillDiagAddr(msg.id.idiag_dst, dst));
225 return msg;
226}
227
228inet_diag_msg makeDiagMessage(const char* srcstr, const char* dststr) {
229 addrinfo hints = { .ai_flags = AI_NUMERICHOST }, *src, *dst;
230 EXPECT_EQ(0, getaddrinfo(srcstr, NULL, &hints, &src));
231 EXPECT_EQ(0, getaddrinfo(dststr, NULL, &hints, &dst));
232 EXPECT_EQ(src->ai_addr->sa_family, dst->ai_addr->sa_family);
233 inet_diag_msg msg = makeDiagMessage(src->ai_addr->sa_family, src->ai_addr, dst->ai_addr);
234 freeaddrinfo(src);
235 freeaddrinfo(dst);
236 return msg;
237}
238
239TEST_F(SockDiagTest, TestIsLoopbackSocket) {
240 inet_diag_msg msg;
241
242 msg = makeDiagMessage("127.0.0.1", "127.0.0.1");
243 EXPECT_TRUE(isLoopbackSocket(&msg));
244
245 msg = makeDiagMessage("::1", "::1");
246 EXPECT_TRUE(isLoopbackSocket(&msg));
247
248 msg = makeDiagMessage("::1", "::ffff:127.0.0.1");
249 EXPECT_TRUE(isLoopbackSocket(&msg));
250
251 msg = makeDiagMessage("192.0.2.1", "192.0.2.1");
252 EXPECT_TRUE(isLoopbackSocket(&msg));
253
254 msg = makeDiagMessage("192.0.2.1", "8.8.8.8");
255 EXPECT_FALSE(isLoopbackSocket(&msg));
256
257 msg = makeDiagMessage("192.0.2.1", "127.0.0.1");
258 EXPECT_TRUE(isLoopbackSocket(&msg));
259
260 msg = makeDiagMessage("2001:db8::1", "2001:db8::1");
261 EXPECT_TRUE(isLoopbackSocket(&msg));
262
263 msg = makeDiagMessage("2001:db8::1", "2001:4860:4860::6464");
264 EXPECT_FALSE(isLoopbackSocket(&msg));
265
266 // While isLoopbackSocket returns true on these sockets, we usually don't want to close them
267 // because they aren't specific to any particular network and thus don't become unusable when
268 // an app's routing changes or its network access is removed.
269 //
270 // This isn't a problem, as anything that calls destroyLiveSockets will skip them because
271 // destroyLiveSockets only enumerates ESTABLISHED, SYN_SENT, and SYN_RECV sockets.
272 msg = makeDiagMessage("127.0.0.1", "0.0.0.0");
273 EXPECT_TRUE(isLoopbackSocket(&msg));
274
275 msg = makeDiagMessage("::1", "::");
276 EXPECT_TRUE(isLoopbackSocket(&msg));
277}
278
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900279enum MicroBenchmarkTestType {
280 ADDRESS,
281 UID,
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900282 UID_EXCLUDE_LOOPBACK,
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900283 UIDRANGE,
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900284 UIDRANGE_EXCLUDE_LOOPBACK,
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900285 PERMISSION,
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900286};
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900287
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900288const char *testTypeName(MicroBenchmarkTestType mode) {
289#define TO_STRING_TYPE(x) case ((x)): return #x;
290 switch((mode)) {
291 TO_STRING_TYPE(ADDRESS);
292 TO_STRING_TYPE(UID);
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900293 TO_STRING_TYPE(UID_EXCLUDE_LOOPBACK);
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900294 TO_STRING_TYPE(UIDRANGE);
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900295 TO_STRING_TYPE(UIDRANGE_EXCLUDE_LOOPBACK);
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900296 TO_STRING_TYPE(PERMISSION);
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900297 }
298#undef TO_STRING_TYPE
299}
300
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900301static struct {
302 unsigned netId;
303 bool explicitlySelected;
304 Permission permission;
305} permissionTestcases[] = {
306 { 42, false, PERMISSION_NONE, },
307 { 42, false, PERMISSION_NETWORK, },
308 { 42, false, PERMISSION_SYSTEM, },
309 { 42, true, PERMISSION_NONE, },
310 { 42, true, PERMISSION_NETWORK, },
311 { 42, true, PERMISSION_SYSTEM, },
312 { 43, false, PERMISSION_NONE, },
313 { 43, false, PERMISSION_NETWORK, },
314 { 43, false, PERMISSION_SYSTEM, },
315 { 43, true, PERMISSION_NONE, },
316 { 43, true, PERMISSION_NETWORK, },
317 { 43, true, PERMISSION_SYSTEM, },
318};
319
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900320class SockDiagMicroBenchmarkTest : public ::testing::TestWithParam<MicroBenchmarkTestType> {
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900321
322public:
323 void SetUp() {
324 ASSERT_TRUE(mSd.open()) << "Failed to open SOCK_DIAG socket";
325 }
326
327protected:
328 SockDiag mSd;
329
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900330 constexpr static int MAX_SOCKETS = 500;
331 constexpr static int ADDRESS_SOCKETS = 500;
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900332 constexpr static int UID_SOCKETS = 50;
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900333 constexpr static int PERMISSION_SOCKETS = 16;
334
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900335 constexpr static uid_t START_UID = 8000; // START_UID + number of sockets must be <= 9999.
336 constexpr static int CLOSE_UID = START_UID + UID_SOCKETS - 42; // Close to the end
337 static_assert(START_UID + MAX_SOCKETS < 9999, "Too many sockets");
338
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900339 constexpr static int TEST_NETID = 42; // One of the OEM netIds.
340
341
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900342 int howManySockets() {
343 MicroBenchmarkTestType mode = GetParam();
344 switch (mode) {
345 case ADDRESS:
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900346 return ADDRESS_SOCKETS;
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900347 case UID:
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900348 case UID_EXCLUDE_LOOPBACK:
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900349 case UIDRANGE:
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900350 case UIDRANGE_EXCLUDE_LOOPBACK:
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900351 return UID_SOCKETS;
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900352 case PERMISSION:
353 return ARRAY_SIZE(permissionTestcases);
354 }
355 }
356
357 int modifySocketForTest(int s, int i) {
358 MicroBenchmarkTestType mode = GetParam();
359 switch (mode) {
360 case UID:
361 case UID_EXCLUDE_LOOPBACK:
362 case UIDRANGE:
363 case UIDRANGE_EXCLUDE_LOOPBACK: {
364 uid_t uid = START_UID + i;
365 return fchown(s, uid, -1);
366 }
367 case PERMISSION: {
368 Fwmark fwmark;
369 fwmark.netId = permissionTestcases[i].netId;
370 fwmark.explicitlySelected = permissionTestcases[i].explicitlySelected;
371 fwmark.permission = permissionTestcases[i].permission;
372 return setsockopt(s, SOL_SOCKET, SO_MARK, &fwmark.intValue, sizeof(fwmark.intValue));
373 }
374 default:
375 return 0;
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900376 }
377 }
378
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900379 int destroySockets() {
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900380 MicroBenchmarkTestType mode = GetParam();
381 int ret;
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900382 switch (mode) {
383 case ADDRESS:
384 ret = mSd.destroySockets("::1");
385 EXPECT_LE(0, ret) << ": Failed to destroy sockets on ::1: " << strerror(-ret);
386 break;
387 case UID:
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900388 case UID_EXCLUDE_LOOPBACK: {
389 bool excludeLoopback = (mode == UID_EXCLUDE_LOOPBACK);
390 ret = mSd.destroySockets(IPPROTO_TCP, CLOSE_UID, excludeLoopback);
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900391 EXPECT_LE(0, ret) << ": Failed to destroy sockets for UID " << CLOSE_UID << ": " <<
392 strerror(-ret);
393 break;
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900394 }
395 case UIDRANGE:
396 case UIDRANGE_EXCLUDE_LOOPBACK: {
397 bool excludeLoopback = (mode == UIDRANGE_EXCLUDE_LOOPBACK);
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900398 const char *uidRangeStrings[] = { "8005-8012", "8042", "8043", "8090-8099" };
399 std::set<uid_t> skipUids { 8007, 8043, 8098, 8099 };
400 UidRanges uidRanges;
401 uidRanges.parseFrom(ARRAY_SIZE(uidRangeStrings), (char **) uidRangeStrings);
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900402 ret = mSd.destroySockets(uidRanges, skipUids, excludeLoopback);
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900403 break;
404 }
405 case PERMISSION: {
406 ret = mSd.destroySocketsLackingPermission(TEST_NETID, PERMISSION_NETWORK, false);
407 break;
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900408 }
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900409 }
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900410 return ret;
411 }
412
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900413 bool shouldHaveClosedSocket(int i) {
414 MicroBenchmarkTestType mode = GetParam();
415 switch (mode) {
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900416 case ADDRESS:
417 return true;
418 case UID:
419 return i == CLOSE_UID - START_UID;
420 case UIDRANGE: {
421 uid_t uid = i + START_UID;
422 // Skip UIDs in skipUids.
423 if (uid == 8007 || uid == 8043 || uid == 8098 || uid == 8099) {
424 return false;
425 }
426 // Include UIDs in uidRanges.
427 if ((8005 <= uid && uid <= 8012) || uid == 8042 || (8090 <= uid && uid <= 8099)) {
428 return true;
429 }
430 return false;
431 }
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900432 case UID_EXCLUDE_LOOPBACK:
433 case UIDRANGE_EXCLUDE_LOOPBACK:
434 return false;
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900435 case PERMISSION:
436 if (permissionTestcases[i].netId != 42) return false;
437 if (permissionTestcases[i].explicitlySelected != 1) return true;
438 Permission permission = permissionTestcases[i].permission;
439 return permission != PERMISSION_NETWORK && permission != PERMISSION_SYSTEM;
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900440 }
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900441 }
442
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900443 bool checkSocketState(int i, int sock, const char *msg) {
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900444 const char data[] = "foo";
445 const int ret = send(sock, data, sizeof(data), 0);
446 const int err = errno;
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900447 if (!shouldHaveClosedSocket(i)) {
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900448 EXPECT_EQ((ssize_t) sizeof(data), ret) <<
449 "Write on open socket failed: " << strerror(err);
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900450 return false;
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900451 }
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900452
453 EXPECT_EQ(-1, ret) << msg << " " << i << " not closed";
454 if (ret != -1) {
455 return false;
456 }
457
458 // Since we're connected to ourselves, the error might be ECONNABORTED (if we destroyed the
459 // socket) or ECONNRESET (if the other end was destroyed and sent a RST).
460 EXPECT_TRUE(err == ECONNABORTED || err == ECONNRESET)
461 << msg << ": unexpected error: " << strerror(err);
462 return (err == ECONNABORTED); // Return true iff. SOCK_DESTROY closed this socket.
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900463 }
464};
465
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900466TEST_P(SockDiagMicroBenchmarkTest, TestMicroBenchmark) {
467 MicroBenchmarkTestType mode = GetParam();
468
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900469 int numSockets = howManySockets();
470
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900471 fprintf(stderr, "Benchmarking closing %d sockets based on %s\n",
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900472 numSockets, testTypeName(mode));
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900473
474 int listensocket = socket(AF_INET6, SOCK_STREAM, 0);
475 ASSERT_NE(-1, listensocket) << "Failed to open listen socket";
476
477 uint16_t port = bindAndListen(listensocket);
478 ASSERT_NE(0, port) << "Can't bind to server port";
479 sockaddr_in6 server = { .sin6_family = AF_INET6, .sin6_port = htons(port) };
480
481 using ms = std::chrono::duration<float, std::ratio<1, 1000>>;
482
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900483 int clientsockets[MAX_SOCKETS], serversockets[MAX_SOCKETS];
484 uint16_t clientports[MAX_SOCKETS];
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900485 sockaddr_in6 client;
486 socklen_t clientlen;
487
488 auto start = std::chrono::steady_clock::now();
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900489 for (int i = 0; i < numSockets; i++) {
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900490 int s = socket(AF_INET6, SOCK_STREAM, 0);
491 clientlen = sizeof(client);
492 ASSERT_EQ(0, connect(s, (sockaddr *) &server, sizeof(server)))
493 << "Connecting socket " << i << " failed " << strerror(errno);
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900494 ASSERT_EQ(0, modifySocketForTest(s, i));
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900495 serversockets[i] = accept(listensocket, (sockaddr *) &client, &clientlen);
496 ASSERT_NE(-1, serversockets[i])
497 << "Accepting socket " << i << " failed " << strerror(errno);
498 clientports[i] = client.sin6_port;
499 clientsockets[i] = s;
500 }
501 fprintf(stderr, " Connecting: %6.1f ms\n",
502 std::chrono::duration_cast<ms>(std::chrono::steady_clock::now() - start).count());
503
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900504 start = std::chrono::steady_clock::now();
Lorenzo Colitti1f457712016-03-24 17:19:28 +0900505 destroySockets();
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900506 fprintf(stderr, " Destroying: %6.1f ms\n",
507 std::chrono::duration_cast<ms>(std::chrono::steady_clock::now() - start).count());
508
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900509 start = std::chrono::steady_clock::now();
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900510 int socketsClosed = 0;
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900511 for (int i = 0; i < numSockets; i++) {
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900512 socketsClosed += checkSocketState(i, clientsockets[i], "Client socket");
513 socketsClosed += checkSocketState(i, serversockets[i], "Server socket");
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900514 }
Lorenzo Colitti6bdc41f2016-06-10 01:54:52 +0900515 fprintf(stderr, " Verifying: %6.1f ms (%d sockets destroyed)\n",
516 std::chrono::duration_cast<ms>(std::chrono::steady_clock::now() - start).count(),
517 socketsClosed);
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900518 if (strstr(testTypeName(mode), "_EXCLUDE_LOOPBACK") == nullptr) {
519 EXPECT_GT(socketsClosed, 0); // Just in case there's a bug in the test.
520 }
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900521
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900522 start = std::chrono::steady_clock::now();
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900523 for (int i = 0; i < numSockets; i++) {
Lorenzo Colitti8464e1e2016-02-05 00:57:26 +0900524 close(clientsockets[i]);
525 close(serversockets[i]);
526 }
527 fprintf(stderr, " Closing: %6.1f ms\n",
528 std::chrono::duration_cast<ms>(std::chrono::steady_clock::now() - start).count());
529
530 close(listensocket);
531}
Lorenzo Colitti94a7b432016-03-24 16:47:12 +0900532
Lorenzo Colittifff4bd32016-04-14 00:56:01 +0900533// "SockDiagTest.cpp:232: error: undefined reference to 'SockDiagMicroBenchmarkTest::CLOSE_UID'".
534constexpr int SockDiagMicroBenchmarkTest::CLOSE_UID;
535
536INSTANTIATE_TEST_CASE_P(Address, SockDiagMicroBenchmarkTest,
Lorenzo Colitti0726fec2016-07-26 17:53:50 +0900537 testing::Values(ADDRESS, UID, UIDRANGE,
Lorenzo Colittic6201c32016-09-14 02:25:05 +0900538 UID_EXCLUDE_LOOPBACK, UIDRANGE_EXCLUDE_LOOPBACK,
539 PERMISSION));
Lorenzo Colitti7035f222017-02-13 18:29:00 +0900540
541} // namespace net
542} // namespace android