upload android base code part6
This commit is contained in:
parent
421e214c7d
commit
4e516ec6ed
35396 changed files with 9188716 additions and 0 deletions
459
android/kernel/tests/net/test/net_test.py
Executable file
459
android/kernel/tests/net/test/net_test.py
Executable file
|
@ -0,0 +1,459 @@
|
|||
#!/usr/bin/python
|
||||
#
|
||||
# Copyright 2014 The Android Open Source Project
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
import fcntl
|
||||
import os
|
||||
import random
|
||||
import re
|
||||
from socket import * # pylint: disable=wildcard-import
|
||||
import struct
|
||||
import unittest
|
||||
|
||||
from scapy import all as scapy
|
||||
|
||||
import csocket
|
||||
|
||||
# TODO: Move these to csocket.py.
|
||||
SOL_IPV6 = 41
|
||||
IP_RECVERR = 11
|
||||
IPV6_RECVERR = 25
|
||||
IP_TRANSPARENT = 19
|
||||
IPV6_TRANSPARENT = 75
|
||||
IPV6_TCLASS = 67
|
||||
IPV6_FLOWLABEL_MGR = 32
|
||||
IPV6_FLOWINFO_SEND = 33
|
||||
|
||||
SO_BINDTODEVICE = 25
|
||||
SO_MARK = 36
|
||||
SO_PROTOCOL = 38
|
||||
SO_DOMAIN = 39
|
||||
SO_COOKIE = 57
|
||||
|
||||
ETH_P_IP = 0x0800
|
||||
ETH_P_IPV6 = 0x86dd
|
||||
|
||||
IPPROTO_GRE = 47
|
||||
|
||||
SIOCSIFHWADDR = 0x8924
|
||||
|
||||
IPV6_FL_A_GET = 0
|
||||
IPV6_FL_A_PUT = 1
|
||||
IPV6_FL_A_RENEW = 1
|
||||
|
||||
IPV6_FL_F_CREATE = 1
|
||||
IPV6_FL_F_EXCL = 2
|
||||
|
||||
IPV6_FL_S_NONE = 0
|
||||
IPV6_FL_S_EXCL = 1
|
||||
IPV6_FL_S_ANY = 255
|
||||
|
||||
IFNAMSIZ = 16
|
||||
|
||||
IPV4_PING = "\x08\x00\x00\x00\x0a\xce\x00\x03"
|
||||
IPV6_PING = "\x80\x00\x00\x00\x0a\xce\x00\x03"
|
||||
|
||||
IPV4_ADDR = "8.8.8.8"
|
||||
IPV6_ADDR = "2001:4860:4860::8888"
|
||||
|
||||
IPV6_SEQ_DGRAM_HEADER = (" sl "
|
||||
"local_address "
|
||||
"remote_address "
|
||||
"st tx_queue rx_queue tr tm->when retrnsmt"
|
||||
" uid timeout inode ref pointer drops\n")
|
||||
|
||||
# Arbitrary packet payload.
|
||||
UDP_PAYLOAD = str(scapy.DNS(rd=1,
|
||||
id=random.randint(0, 65535),
|
||||
qd=scapy.DNSQR(qname="wWW.GoOGle.CoM",
|
||||
qtype="AAAA")))
|
||||
|
||||
# Unix group to use if we want to open sockets as non-root.
|
||||
AID_INET = 3003
|
||||
|
||||
# Kernel log verbosity levels.
|
||||
KERN_INFO = 6
|
||||
|
||||
LINUX_VERSION = csocket.LinuxVersion()
|
||||
|
||||
|
||||
def SetSocketTimeout(sock, ms):
|
||||
s = ms / 1000
|
||||
us = (ms % 1000) * 1000
|
||||
sock.setsockopt(SOL_SOCKET, SO_RCVTIMEO, struct.pack("LL", s, us))
|
||||
|
||||
|
||||
def SetSocketTos(s, tos):
|
||||
level = {AF_INET: SOL_IP, AF_INET6: SOL_IPV6}[s.family]
|
||||
option = {AF_INET: IP_TOS, AF_INET6: IPV6_TCLASS}[s.family]
|
||||
s.setsockopt(level, option, tos)
|
||||
|
||||
|
||||
def SetNonBlocking(fd):
|
||||
flags = fcntl.fcntl(fd, fcntl.F_GETFL, 0)
|
||||
fcntl.fcntl(fd, fcntl.F_SETFL, flags | os.O_NONBLOCK)
|
||||
|
||||
|
||||
# Convenience functions to create sockets.
|
||||
def Socket(family, sock_type, protocol):
|
||||
s = socket(family, sock_type, protocol)
|
||||
SetSocketTimeout(s, 5000)
|
||||
return s
|
||||
|
||||
|
||||
def PingSocket(family):
|
||||
proto = {AF_INET: IPPROTO_ICMP, AF_INET6: IPPROTO_ICMPV6}[family]
|
||||
return Socket(family, SOCK_DGRAM, proto)
|
||||
|
||||
|
||||
def IPv4PingSocket():
|
||||
return PingSocket(AF_INET)
|
||||
|
||||
|
||||
def IPv6PingSocket():
|
||||
return PingSocket(AF_INET6)
|
||||
|
||||
|
||||
def TCPSocket(family):
|
||||
s = Socket(family, SOCK_STREAM, IPPROTO_TCP)
|
||||
SetNonBlocking(s.fileno())
|
||||
return s
|
||||
|
||||
|
||||
def IPv4TCPSocket():
|
||||
return TCPSocket(AF_INET)
|
||||
|
||||
|
||||
def IPv6TCPSocket():
|
||||
return TCPSocket(AF_INET6)
|
||||
|
||||
|
||||
def UDPSocket(family):
|
||||
return Socket(family, SOCK_DGRAM, IPPROTO_UDP)
|
||||
|
||||
|
||||
def RawGRESocket(family):
|
||||
s = Socket(family, SOCK_RAW, IPPROTO_GRE)
|
||||
return s
|
||||
|
||||
|
||||
def BindRandomPort(version, sock):
|
||||
addr = {4: "0.0.0.0", 5: "::", 6: "::"}[version]
|
||||
sock.setsockopt(SOL_SOCKET, SO_REUSEADDR, 1)
|
||||
sock.bind((addr, 0))
|
||||
if sock.getsockopt(SOL_SOCKET, SO_PROTOCOL) == IPPROTO_TCP:
|
||||
sock.listen(100)
|
||||
port = sock.getsockname()[1]
|
||||
return port
|
||||
|
||||
|
||||
def EnableFinWait(sock):
|
||||
# Disabling SO_LINGER causes sockets to go into FIN_WAIT on close().
|
||||
sock.setsockopt(SOL_SOCKET, SO_LINGER, struct.pack("ii", 0, 0))
|
||||
|
||||
|
||||
def DisableFinWait(sock):
|
||||
# Enabling SO_LINGER with a timeout of zero causes close() to send RST.
|
||||
sock.setsockopt(SOL_SOCKET, SO_LINGER, struct.pack("ii", 1, 0))
|
||||
|
||||
|
||||
def CreateSocketPair(family, socktype, addr):
|
||||
clientsock = socket(family, socktype, 0)
|
||||
listensock = socket(family, socktype, 0)
|
||||
listensock.bind((addr, 0))
|
||||
addr = listensock.getsockname()
|
||||
if socktype == SOCK_STREAM:
|
||||
listensock.listen(1)
|
||||
clientsock.connect(listensock.getsockname())
|
||||
if socktype == SOCK_STREAM:
|
||||
acceptedsock, _ = listensock.accept()
|
||||
DisableFinWait(clientsock)
|
||||
DisableFinWait(acceptedsock)
|
||||
listensock.close()
|
||||
else:
|
||||
listensock.connect(clientsock.getsockname())
|
||||
acceptedsock = listensock
|
||||
return clientsock, acceptedsock
|
||||
|
||||
|
||||
def GetInterfaceIndex(ifname):
|
||||
s = IPv4PingSocket()
|
||||
ifr = struct.pack("%dsi" % IFNAMSIZ, ifname, 0)
|
||||
ifr = fcntl.ioctl(s, scapy.SIOCGIFINDEX, ifr)
|
||||
return struct.unpack("%dsi" % IFNAMSIZ, ifr)[1]
|
||||
|
||||
|
||||
def SetInterfaceHWAddr(ifname, hwaddr):
|
||||
s = IPv4PingSocket()
|
||||
hwaddr = hwaddr.replace(":", "")
|
||||
hwaddr = hwaddr.decode("hex")
|
||||
if len(hwaddr) != 6:
|
||||
raise ValueError("Unknown hardware address length %d" % len(hwaddr))
|
||||
ifr = struct.pack("%dsH6s" % IFNAMSIZ, ifname, scapy.ARPHDR_ETHER, hwaddr)
|
||||
fcntl.ioctl(s, SIOCSIFHWADDR, ifr)
|
||||
|
||||
|
||||
def SetInterfaceState(ifname, up):
|
||||
s = IPv4PingSocket()
|
||||
ifr = struct.pack("%dsH" % IFNAMSIZ, ifname, 0)
|
||||
ifr = fcntl.ioctl(s, scapy.SIOCGIFFLAGS, ifr)
|
||||
_, flags = struct.unpack("%dsH" % IFNAMSIZ, ifr)
|
||||
if up:
|
||||
flags |= scapy.IFF_UP
|
||||
else:
|
||||
flags &= ~scapy.IFF_UP
|
||||
ifr = struct.pack("%dsH" % IFNAMSIZ, ifname, flags)
|
||||
ifr = fcntl.ioctl(s, scapy.SIOCSIFFLAGS, ifr)
|
||||
|
||||
|
||||
def SetInterfaceUp(ifname):
|
||||
return SetInterfaceState(ifname, True)
|
||||
|
||||
|
||||
def SetInterfaceDown(ifname):
|
||||
return SetInterfaceState(ifname, False)
|
||||
|
||||
|
||||
def CanonicalizeIPv6Address(addr):
|
||||
return inet_ntop(AF_INET6, inet_pton(AF_INET6, addr))
|
||||
|
||||
|
||||
def FormatProcAddress(unformatted):
|
||||
groups = []
|
||||
for i in xrange(0, len(unformatted), 4):
|
||||
groups.append(unformatted[i:i+4])
|
||||
formatted = ":".join(groups)
|
||||
# Compress the address.
|
||||
address = CanonicalizeIPv6Address(formatted)
|
||||
return address
|
||||
|
||||
|
||||
def FormatSockStatAddress(address):
|
||||
if ":" in address:
|
||||
family = AF_INET6
|
||||
else:
|
||||
family = AF_INET
|
||||
binary = inet_pton(family, address)
|
||||
out = ""
|
||||
for i in xrange(0, len(binary), 4):
|
||||
out += "%08X" % struct.unpack("=L", binary[i:i+4])
|
||||
return out
|
||||
|
||||
|
||||
def GetLinkAddress(ifname, linklocal):
|
||||
addresses = open("/proc/net/if_inet6").readlines()
|
||||
for address in addresses:
|
||||
address = [s for s in address.strip().split(" ") if s]
|
||||
if address[5] == ifname:
|
||||
if (linklocal and address[0].startswith("fe80")
|
||||
or not linklocal and not address[0].startswith("fe80")):
|
||||
# Convert the address from raw hex to something with colons in it.
|
||||
return FormatProcAddress(address[0])
|
||||
return None
|
||||
|
||||
|
||||
def GetDefaultRoute(version=6):
|
||||
if version == 6:
|
||||
routes = open("/proc/net/ipv6_route").readlines()
|
||||
for route in routes:
|
||||
route = [s for s in route.strip().split(" ") if s]
|
||||
if (route[0] == "00000000000000000000000000000000" and route[1] == "00"
|
||||
# Routes in non-default tables end up in /proc/net/ipv6_route!!!
|
||||
and route[9] != "lo" and not route[9].startswith("nettest")):
|
||||
return FormatProcAddress(route[4]), route[9]
|
||||
raise ValueError("No IPv6 default route found")
|
||||
elif version == 4:
|
||||
routes = open("/proc/net/route").readlines()
|
||||
for route in routes:
|
||||
route = [s for s in route.strip().split("\t") if s]
|
||||
if route[1] == "00000000" and route[7] == "00000000":
|
||||
gw, iface = route[2], route[0]
|
||||
gw = inet_ntop(AF_INET, gw.decode("hex")[::-1])
|
||||
return gw, iface
|
||||
raise ValueError("No IPv4 default route found")
|
||||
else:
|
||||
raise ValueError("Don't know about IPv%s" % version)
|
||||
|
||||
|
||||
def GetDefaultRouteInterface():
|
||||
unused_gw, iface = GetDefaultRoute()
|
||||
return iface
|
||||
|
||||
|
||||
def MakeFlowLabelOption(addr, label):
|
||||
# struct in6_flowlabel_req {
|
||||
# struct in6_addr flr_dst;
|
||||
# __be32 flr_label;
|
||||
# __u8 flr_action;
|
||||
# __u8 flr_share;
|
||||
# __u16 flr_flags;
|
||||
# __u16 flr_expires;
|
||||
# __u16 flr_linger;
|
||||
# __u32 __flr_pad;
|
||||
# /* Options in format of IPV6_PKTOPTIONS */
|
||||
# };
|
||||
fmt = "16sIBBHHH4s"
|
||||
assert struct.calcsize(fmt) == 32
|
||||
addr = inet_pton(AF_INET6, addr)
|
||||
assert len(addr) == 16
|
||||
label = htonl(label & 0xfffff)
|
||||
action = IPV6_FL_A_GET
|
||||
share = IPV6_FL_S_ANY
|
||||
flags = IPV6_FL_F_CREATE
|
||||
pad = "\x00" * 4
|
||||
return struct.pack(fmt, addr, label, action, share, flags, 0, 0, pad)
|
||||
|
||||
|
||||
def SetFlowLabel(s, addr, label):
|
||||
opt = MakeFlowLabelOption(addr, label)
|
||||
s.setsockopt(SOL_IPV6, IPV6_FLOWLABEL_MGR, opt)
|
||||
# Caller also needs to do s.setsockopt(SOL_IPV6, IPV6_FLOWINFO_SEND, 1).
|
||||
|
||||
|
||||
def RunIptablesCommand(version, args):
|
||||
iptables = {4: "iptables", 6: "ip6tables"}[version]
|
||||
iptables_path = "/sbin/" + iptables
|
||||
if not os.access(iptables_path, os.X_OK):
|
||||
iptables_path = "/system/bin" + iptables
|
||||
return os.spawnvp(os.P_WAIT, iptables_path, [iptables_path] + args.split(" "))
|
||||
|
||||
|
||||
# Determine network configuration.
|
||||
try:
|
||||
GetDefaultRoute(version=4)
|
||||
HAVE_IPV4 = True
|
||||
except ValueError:
|
||||
HAVE_IPV4 = False
|
||||
|
||||
try:
|
||||
GetDefaultRoute(version=6)
|
||||
HAVE_IPV6 = True
|
||||
except ValueError:
|
||||
HAVE_IPV6 = False
|
||||
|
||||
class RunAsUidGid(object):
|
||||
"""Context guard to run a code block as a given UID."""
|
||||
|
||||
def __init__(self, uid, gid):
|
||||
self.uid = uid
|
||||
self.gid = gid
|
||||
|
||||
def __enter__(self):
|
||||
if self.uid:
|
||||
self.saved_uid = os.geteuid()
|
||||
self.saved_groups = os.getgroups()
|
||||
os.setgroups(self.saved_groups + [AID_INET])
|
||||
os.seteuid(self.uid)
|
||||
if self.gid:
|
||||
self.saved_gid = os.getgid()
|
||||
os.setgid(self.gid)
|
||||
|
||||
def __exit__(self, unused_type, unused_value, unused_traceback):
|
||||
if self.uid:
|
||||
os.seteuid(self.saved_uid)
|
||||
os.setgroups(self.saved_groups)
|
||||
if self.gid:
|
||||
os.setgid(self.saved_gid)
|
||||
|
||||
class RunAsUid(RunAsUidGid):
|
||||
"""Context guard to run a code block as a given GID and UID."""
|
||||
|
||||
def __init__(self, uid):
|
||||
RunAsUidGid.__init__(self, uid, 0)
|
||||
|
||||
|
||||
class NetworkTest(unittest.TestCase):
|
||||
|
||||
def assertRaisesErrno(self, err_num, f=None, *args):
|
||||
"""Test that the system returns an errno error.
|
||||
|
||||
This works similarly to unittest.TestCase.assertRaises. You can call it as
|
||||
an assertion, or use it as a context manager.
|
||||
e.g.
|
||||
self.assertRaisesErrno(errno.ENOENT, do_things, arg1, arg2)
|
||||
or
|
||||
with self.assertRaisesErrno(errno.ENOENT):
|
||||
do_things(arg1, arg2)
|
||||
|
||||
Args:
|
||||
err_num: an errno constant
|
||||
f: (optional) A callable that should result in error
|
||||
*args: arguments passed to f
|
||||
"""
|
||||
msg = os.strerror(err_num)
|
||||
if f is None:
|
||||
return self.assertRaisesRegexp(EnvironmentError, msg)
|
||||
else:
|
||||
self.assertRaisesRegexp(EnvironmentError, msg, f, *args)
|
||||
|
||||
def ReadProcNetSocket(self, protocol):
|
||||
# Read file.
|
||||
filename = "/proc/net/%s" % protocol
|
||||
lines = open(filename).readlines()
|
||||
|
||||
# Possibly check, and strip, header.
|
||||
if protocol in ["icmp6", "raw6", "udp6"]:
|
||||
self.assertEqual(IPV6_SEQ_DGRAM_HEADER, lines[0])
|
||||
lines = lines[1:]
|
||||
|
||||
# Check contents.
|
||||
if protocol.endswith("6"):
|
||||
addrlen = 32
|
||||
else:
|
||||
addrlen = 8
|
||||
|
||||
if protocol.startswith("tcp"):
|
||||
# Real sockets have 5 extra numbers, timewait sockets have none.
|
||||
end_regexp = "(| +[0-9]+ [0-9]+ [0-9]+ [0-9]+ -?[0-9]+|)$"
|
||||
elif re.match("icmp|udp|raw", protocol):
|
||||
# Drops.
|
||||
end_regexp = " +([0-9]+) *$"
|
||||
else:
|
||||
raise ValueError("Don't know how to parse %s" % filename)
|
||||
|
||||
regexp = re.compile(r" *(\d+): " # bucket
|
||||
"([0-9A-F]{%d}:[0-9A-F]{4}) " # srcaddr, port
|
||||
"([0-9A-F]{%d}:[0-9A-F]{4}) " # dstaddr, port
|
||||
"([0-9A-F][0-9A-F]) " # state
|
||||
"([0-9A-F]{8}:[0-9A-F]{8}) " # mem
|
||||
"([0-9A-F]{2}:[0-9A-F]{8}) " # ?
|
||||
"([0-9A-F]{8}) +" # ?
|
||||
"([0-9]+) +" # uid
|
||||
"([0-9]+) +" # timeout
|
||||
"([0-9]+) +" # inode
|
||||
"([0-9]+) +" # refcnt
|
||||
"([0-9a-f]+)" # sp
|
||||
"%s" # icmp has spaces
|
||||
% (addrlen, addrlen, end_regexp))
|
||||
# Return a list of lists with only source / dest addresses for now.
|
||||
# TODO: consider returning a dict or namedtuple instead.
|
||||
out = []
|
||||
for line in lines:
|
||||
(_, src, dst, state, mem,
|
||||
_, _, uid, _, _, refcnt, _, extra) = regexp.match(line).groups()
|
||||
out.append([src, dst, state, mem, uid, refcnt, extra])
|
||||
return out
|
||||
|
||||
@staticmethod
|
||||
def GetConsoleLogLevel():
|
||||
return int(open("/proc/sys/kernel/printk").readline().split()[0])
|
||||
|
||||
@staticmethod
|
||||
def SetConsoleLogLevel(level):
|
||||
return open("/proc/sys/kernel/printk", "w").write("%s\n" % level)
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
unittest.main()
|
Loading…
Add table
Add a link
Reference in a new issue