blob: fae3bc4e10cea4b29b1d3179362774bd6a2200d4 [file] [log] [blame]
Ken Chen1647f602021-10-05 21:55:22 +08001/*
2 * Copyright 2021 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 *
16 * BpfHandlerTest.cpp - unit tests for BpfHandler.cpp
17 */
18
Hungming Chen436547e2022-02-18 17:52:11 +080019#include <private/android_filesystem_config.h>
Ken Chen1647f602021-10-05 21:55:22 +080020#include <sys/socket.h>
21
22#include <gtest/gtest.h>
23
24#include "BpfHandler.h"
25
26using namespace android::bpf; // NOLINT(google-build-using-namespace): exempted
27
28namespace android {
29namespace net {
30
31using base::Result;
32
33constexpr int TEST_MAP_SIZE = 10;
34constexpr int TEST_COOKIE = 1;
35constexpr uid_t TEST_UID = 10086;
36constexpr uid_t TEST_UID2 = 54321;
37constexpr uint32_t TEST_TAG = 42;
38constexpr uint32_t TEST_COUNTERSET = 1;
39constexpr uint32_t TEST_PER_UID_STATS_ENTRIES_LIMIT = 3;
40constexpr uint32_t TEST_TOTAL_UID_STATS_ENTRIES_LIMIT = 7;
41
42#define ASSERT_VALID(x) ASSERT_TRUE((x).isValid())
43
44class BpfHandlerTest : public ::testing::Test {
45 protected:
46 BpfHandlerTest()
47 : mBh(TEST_PER_UID_STATS_ENTRIES_LIMIT, TEST_TOTAL_UID_STATS_ENTRIES_LIMIT) {}
48 BpfHandler mBh;
49 BpfMap<uint64_t, UidTagValue> mFakeCookieTagMap;
50 BpfMap<StatsKey, StatsValue> mFakeStatsMapA;
Lorenzo Colitti90c0c3f2022-03-03 17:49:01 +090051 BpfMap<uint32_t, uint32_t> mFakeConfigurationMap;
Ken Chen1647f602021-10-05 21:55:22 +080052 BpfMap<uint32_t, uint8_t> mFakeUidPermissionMap;
53
54 void SetUp() {
55 std::lock_guard guard(mBh.mMutex);
56 ASSERT_EQ(0, setrlimitForTest());
57
58 mFakeCookieTagMap.reset(createMap(BPF_MAP_TYPE_HASH, sizeof(uint64_t), sizeof(UidTagValue),
59 TEST_MAP_SIZE, 0));
60 ASSERT_VALID(mFakeCookieTagMap);
61
62 mFakeStatsMapA.reset(createMap(BPF_MAP_TYPE_HASH, sizeof(StatsKey), sizeof(StatsValue),
63 TEST_MAP_SIZE, 0));
64 ASSERT_VALID(mFakeStatsMapA);
65
66 mFakeConfigurationMap.reset(
67 createMap(BPF_MAP_TYPE_HASH, sizeof(uint32_t), sizeof(uint8_t), 1, 0));
68 ASSERT_VALID(mFakeConfigurationMap);
69
70 mFakeUidPermissionMap.reset(
71 createMap(BPF_MAP_TYPE_HASH, sizeof(uint32_t), sizeof(uint8_t), TEST_MAP_SIZE, 0));
72 ASSERT_VALID(mFakeUidPermissionMap);
73
Maciej Żenczykowski787de012022-05-31 03:15:12 -070074 mBh.mCookieTagMap = mFakeCookieTagMap;
Ken Chen1647f602021-10-05 21:55:22 +080075 ASSERT_VALID(mBh.mCookieTagMap);
Maciej Żenczykowski787de012022-05-31 03:15:12 -070076 mBh.mStatsMapA = mFakeStatsMapA;
Ken Chen1647f602021-10-05 21:55:22 +080077 ASSERT_VALID(mBh.mStatsMapA);
Maciej Żenczykowski787de012022-05-31 03:15:12 -070078 mBh.mConfigurationMap = mFakeConfigurationMap;
Ken Chen1647f602021-10-05 21:55:22 +080079 ASSERT_VALID(mBh.mConfigurationMap);
80 // Always write to stats map A by default.
81 ASSERT_RESULT_OK(mBh.mConfigurationMap.writeValue(CURRENT_STATS_MAP_CONFIGURATION_KEY,
82 SELECT_MAP_A, BPF_ANY));
Maciej Żenczykowski787de012022-05-31 03:15:12 -070083 mBh.mUidPermissionMap = mFakeUidPermissionMap;
Ken Chen1647f602021-10-05 21:55:22 +080084 ASSERT_VALID(mBh.mUidPermissionMap);
85 }
86
Ken Chen1647f602021-10-05 21:55:22 +080087 int setUpSocketAndTag(int protocol, uint64_t* cookie, uint32_t tag, uid_t uid,
88 uid_t realUid) {
89 int sock = socket(protocol, SOCK_STREAM | SOCK_CLOEXEC, 0);
90 EXPECT_LE(0, sock);
91 *cookie = getSocketCookie(sock);
92 EXPECT_NE(NONEXISTENT_COOKIE, *cookie);
93 EXPECT_EQ(0, mBh.tagSocket(sock, tag, uid, realUid));
94 return sock;
95 }
96
97 void expectUidTag(uint64_t cookie, uid_t uid, uint32_t tag) {
98 Result<UidTagValue> tagResult = mFakeCookieTagMap.readValue(cookie);
99 ASSERT_RESULT_OK(tagResult);
100 EXPECT_EQ(uid, tagResult.value().uid);
101 EXPECT_EQ(tag, tagResult.value().tag);
102 }
103
104 void expectNoTag(uint64_t cookie) { EXPECT_FALSE(mFakeCookieTagMap.readValue(cookie).ok()); }
105
106 void populateFakeStats(uint64_t cookie, uint32_t uid, uint32_t tag, StatsKey* key) {
107 UidTagValue cookieMapkey = {.uid = (uint32_t)uid, .tag = tag};
108 EXPECT_RESULT_OK(mFakeCookieTagMap.writeValue(cookie, cookieMapkey, BPF_ANY));
109 *key = {.uid = uid, .tag = tag, .counterSet = TEST_COUNTERSET, .ifaceIndex = 1};
110 StatsValue statsMapValue = {.rxPackets = 1, .rxBytes = 100};
111 EXPECT_RESULT_OK(mFakeStatsMapA.writeValue(*key, statsMapValue, BPF_ANY));
112 key->tag = 0;
113 EXPECT_RESULT_OK(mFakeStatsMapA.writeValue(*key, statsMapValue, BPF_ANY));
114 // put tag information back to statsKey
115 key->tag = tag;
116 }
117
118 template <class Key, class Value>
119 void expectMapEmpty(BpfMap<Key, Value>& map) {
120 auto isEmpty = map.isEmpty();
121 EXPECT_RESULT_OK(isEmpty);
122 EXPECT_TRUE(isEmpty.value());
123 }
124
125 void expectTagSocketReachLimit(uint32_t tag, uint32_t uid) {
126 int sock = socket(AF_INET6, SOCK_STREAM | SOCK_CLOEXEC, 0);
127 EXPECT_LE(0, sock);
128 if (sock < 0) return;
129 uint64_t sockCookie = getSocketCookie(sock);
130 EXPECT_NE(NONEXISTENT_COOKIE, sockCookie);
131 EXPECT_EQ(-EMFILE, mBh.tagSocket(sock, tag, uid, uid));
132 expectNoTag(sockCookie);
133
134 // Delete stats entries then tag socket success
135 StatsKey key = {.uid = uid, .tag = 0, .counterSet = TEST_COUNTERSET, .ifaceIndex = 1};
136 ASSERT_RESULT_OK(mFakeStatsMapA.deleteValue(key));
137 EXPECT_EQ(0, mBh.tagSocket(sock, tag, uid, uid));
138 expectUidTag(sockCookie, uid, tag);
139 }
140};
141
142TEST_F(BpfHandlerTest, TestTagSocketV4) {
143 uint64_t sockCookie;
144 int v4socket = setUpSocketAndTag(AF_INET, &sockCookie, TEST_TAG, TEST_UID, TEST_UID);
145 expectUidTag(sockCookie, TEST_UID, TEST_TAG);
146 ASSERT_EQ(0, mBh.untagSocket(v4socket));
147 expectNoTag(sockCookie);
148 expectMapEmpty(mFakeCookieTagMap);
149}
150
151TEST_F(BpfHandlerTest, TestReTagSocket) {
152 uint64_t sockCookie;
153 int v4socket = setUpSocketAndTag(AF_INET, &sockCookie, TEST_TAG, TEST_UID, TEST_UID);
154 expectUidTag(sockCookie, TEST_UID, TEST_TAG);
155 ASSERT_EQ(0, mBh.tagSocket(v4socket, TEST_TAG + 1, TEST_UID + 1, TEST_UID + 1));
156 expectUidTag(sockCookie, TEST_UID + 1, TEST_TAG + 1);
157}
158
159TEST_F(BpfHandlerTest, TestTagTwoSockets) {
160 uint64_t sockCookie1;
161 uint64_t sockCookie2;
162 int v4socket1 = setUpSocketAndTag(AF_INET, &sockCookie1, TEST_TAG, TEST_UID, TEST_UID);
163 setUpSocketAndTag(AF_INET, &sockCookie2, TEST_TAG, TEST_UID, TEST_UID);
164 expectUidTag(sockCookie1, TEST_UID, TEST_TAG);
165 expectUidTag(sockCookie2, TEST_UID, TEST_TAG);
166 ASSERT_EQ(0, mBh.untagSocket(v4socket1));
167 expectNoTag(sockCookie1);
168 expectUidTag(sockCookie2, TEST_UID, TEST_TAG);
169 ASSERT_FALSE(mFakeCookieTagMap.getNextKey(sockCookie2).ok());
170}
171
172TEST_F(BpfHandlerTest, TestTagSocketV6) {
173 uint64_t sockCookie;
174 int v6socket = setUpSocketAndTag(AF_INET6, &sockCookie, TEST_TAG, TEST_UID, TEST_UID);
175 expectUidTag(sockCookie, TEST_UID, TEST_TAG);
176 ASSERT_EQ(0, mBh.untagSocket(v6socket));
177 expectNoTag(sockCookie);
178 expectMapEmpty(mFakeCookieTagMap);
179}
180
181TEST_F(BpfHandlerTest, TestTagInvalidSocket) {
182 int invalidSocket = -1;
183 ASSERT_GT(0, mBh.tagSocket(invalidSocket, TEST_TAG, TEST_UID, TEST_UID));
184 expectMapEmpty(mFakeCookieTagMap);
185}
186
Hungming Chenbcc0f5b2022-03-07 14:13:49 +0800187TEST_F(BpfHandlerTest, TestTagSocketWithUnsupportedFamily) {
188 int packetSocket = socket(AF_PACKET, SOCK_DGRAM | SOCK_CLOEXEC, 0);
189 EXPECT_LE(0, packetSocket);
190 EXPECT_NE(NONEXISTENT_COOKIE, getSocketCookie(packetSocket));
191 EXPECT_EQ(-EAFNOSUPPORT, mBh.tagSocket(packetSocket, TEST_TAG, TEST_UID, TEST_UID));
192}
193
Hungming Chen478c0eb2022-03-04 21:16:59 +0800194TEST_F(BpfHandlerTest, TestTagSocketWithUnsupportedProtocol) {
195 int rawSocket = socket(AF_INET, SOCK_RAW | SOCK_CLOEXEC, IPPROTO_RAW);
196 EXPECT_LE(0, rawSocket);
Hungming Chenbcc0f5b2022-03-07 14:13:49 +0800197 EXPECT_NE(NONEXISTENT_COOKIE, getSocketCookie(rawSocket));
Hungming Chen478c0eb2022-03-04 21:16:59 +0800198 EXPECT_EQ(-EPROTONOSUPPORT, mBh.tagSocket(rawSocket, TEST_TAG, TEST_UID, TEST_UID));
199}
200
Ken Chen1647f602021-10-05 21:55:22 +0800201TEST_F(BpfHandlerTest, TestTagSocketWithoutPermission) {
202 int sock = socket(AF_INET6, SOCK_STREAM | SOCK_CLOEXEC, 0);
203 ASSERT_NE(-1, sock);
204 ASSERT_EQ(-EPERM, mBh.tagSocket(sock, TEST_TAG, TEST_UID, TEST_UID2));
205 expectMapEmpty(mFakeCookieTagMap);
206}
207
208TEST_F(BpfHandlerTest, TestTagSocketWithPermission) {
209 // Grant permission to real uid. In practice, the uid permission map will be updated by
210 // TrafficController::setPermissionForUids().
211 uid_t realUid = TEST_UID2;
212 ASSERT_RESULT_OK(mFakeUidPermissionMap.writeValue(realUid,
213 BPF_PERMISSION_UPDATE_DEVICE_STATS, BPF_ANY));
214
215 // Tag a socket to a different uid other then realUid.
216 uint64_t sockCookie;
217 int v6socket = setUpSocketAndTag(AF_INET6, &sockCookie, TEST_TAG, TEST_UID, realUid);
218 expectUidTag(sockCookie, TEST_UID, TEST_TAG);
219 EXPECT_EQ(0, mBh.untagSocket(v6socket));
220 expectNoTag(sockCookie);
221 expectMapEmpty(mFakeCookieTagMap);
Hungming Chen436547e2022-02-18 17:52:11 +0800222
223 // Tag a socket to AID_CLAT other then realUid.
224 int sock = socket(AF_INET6, SOCK_STREAM | SOCK_CLOEXEC, 0);
225 ASSERT_NE(-1, sock);
226 ASSERT_EQ(-EPERM, mBh.tagSocket(sock, TEST_TAG, AID_CLAT, realUid));
227 expectMapEmpty(mFakeCookieTagMap);
Ken Chen1647f602021-10-05 21:55:22 +0800228}
229
230TEST_F(BpfHandlerTest, TestUntagInvalidSocket) {
231 int invalidSocket = -1;
232 ASSERT_GT(0, mBh.untagSocket(invalidSocket));
233 int v4socket = socket(AF_INET, SOCK_STREAM | SOCK_CLOEXEC, 0);
234 ASSERT_GT(0, mBh.untagSocket(v4socket));
235 expectMapEmpty(mFakeCookieTagMap);
236}
237
238TEST_F(BpfHandlerTest, TestTagSocketReachLimitFail) {
239 uid_t uid = TEST_UID;
240 StatsKey tagStatsMapKey[3];
241 for (int i = 0; i < 3; i++) {
242 uint64_t cookie = TEST_COOKIE + i;
243 uint32_t tag = TEST_TAG + i;
244 populateFakeStats(cookie, uid, tag, &tagStatsMapKey[i]);
245 }
246 expectTagSocketReachLimit(TEST_TAG, TEST_UID);
247}
248
249TEST_F(BpfHandlerTest, TestTagSocketReachTotalLimitFail) {
250 StatsKey tagStatsMapKey[4];
251 for (int i = 0; i < 4; i++) {
252 uint64_t cookie = TEST_COOKIE + i;
253 uint32_t tag = TEST_TAG + i;
254 uid_t uid = TEST_UID + i;
255 populateFakeStats(cookie, uid, tag, &tagStatsMapKey[i]);
256 }
257 expectTagSocketReachLimit(TEST_TAG, TEST_UID);
258}
259
260} // namespace net
261} // namespace android