blob: f401636afa5ea91fd00e667f7013c54ffa1d2e80 [file] [log] [blame]
Wayne Ma4d692332022-01-19 16:04:04 +08001/*
Wayne Ma7be6bce2022-01-12 16:29:49 +08002 * Copyright 2022 The Android Open Source Project
Wayne Ma4d692332022-01-19 16:04:04 +08003 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 *
16 * TrafficControllerTest.cpp - unit tests for TrafficController.cpp
17 */
18
19#include <cstdint>
20#include <string>
21#include <vector>
22
23#include <fcntl.h>
24#include <inttypes.h>
25#include <linux/inet_diag.h>
26#include <linux/sock_diag.h>
27#include <sys/socket.h>
28#include <sys/types.h>
29#include <unistd.h>
30
31#include <gtest/gtest.h>
32
33#include <android-base/stringprintf.h>
34#include <android-base/strings.h>
Wayne Ma7be6bce2022-01-12 16:29:49 +080035#include <binder/Status.h>
Wayne Ma4d692332022-01-19 16:04:04 +080036
37#include <netdutils/MockSyscalls.h>
38
39#include "TrafficController.h"
40#include "bpf/BpfUtils.h"
41
42using namespace android::bpf; // NOLINT(google-build-using-namespace): grandfathered
43
44namespace android {
45namespace net {
46
Wayne Ma7be6bce2022-01-12 16:29:49 +080047using android::netdutils::Status;
Wayne Ma4d692332022-01-19 16:04:04 +080048using base::Result;
49using netdutils::isOk;
50
51constexpr int TEST_MAP_SIZE = 10;
Wayne Ma4d692332022-01-19 16:04:04 +080052constexpr uid_t TEST_UID = 10086;
53constexpr uid_t TEST_UID2 = 54321;
54constexpr uid_t TEST_UID3 = 98765;
55constexpr uint32_t TEST_TAG = 42;
56constexpr uint32_t TEST_COUNTERSET = 1;
57constexpr uint32_t DEFAULT_COUNTERSET = 0;
Wayne Ma4d692332022-01-19 16:04:04 +080058
59#define ASSERT_VALID(x) ASSERT_TRUE((x).isValid())
60
61class TrafficControllerTest : public ::testing::Test {
62 protected:
Wayne Ma92d80792022-01-20 13:20:34 +080063 TrafficControllerTest() {}
Wayne Ma4d692332022-01-19 16:04:04 +080064 TrafficController mTc;
65 BpfMap<uint64_t, UidTagValue> mFakeCookieTagMap;
66 BpfMap<uint32_t, uint8_t> mFakeUidCounterSetMap;
67 BpfMap<uint32_t, StatsValue> mFakeAppUidStatsMap;
68 BpfMap<StatsKey, StatsValue> mFakeStatsMapA;
69 BpfMap<uint32_t, uint8_t> mFakeConfigurationMap;
70 BpfMap<uint32_t, UidOwnerValue> mFakeUidOwnerMap;
71 BpfMap<uint32_t, uint8_t> mFakeUidPermissionMap;
72
73 void SetUp() {
74 std::lock_guard guard(mTc.mMutex);
75 ASSERT_EQ(0, setrlimitForTest());
76
77 mFakeCookieTagMap.reset(createMap(BPF_MAP_TYPE_HASH, sizeof(uint64_t), sizeof(UidTagValue),
78 TEST_MAP_SIZE, 0));
79 ASSERT_VALID(mFakeCookieTagMap);
80
81 mFakeUidCounterSetMap.reset(
82 createMap(BPF_MAP_TYPE_HASH, sizeof(uint32_t), sizeof(uint8_t), TEST_MAP_SIZE, 0));
83 ASSERT_VALID(mFakeUidCounterSetMap);
84
85 mFakeAppUidStatsMap.reset(createMap(BPF_MAP_TYPE_HASH, sizeof(uint32_t), sizeof(StatsValue),
86 TEST_MAP_SIZE, 0));
87 ASSERT_VALID(mFakeAppUidStatsMap);
88
89 mFakeStatsMapA.reset(createMap(BPF_MAP_TYPE_HASH, sizeof(StatsKey), sizeof(StatsValue),
90 TEST_MAP_SIZE, 0));
91 ASSERT_VALID(mFakeStatsMapA);
92
93 mFakeConfigurationMap.reset(
94 createMap(BPF_MAP_TYPE_HASH, sizeof(uint32_t), sizeof(uint8_t), 1, 0));
95 ASSERT_VALID(mFakeConfigurationMap);
96
97 mFakeUidOwnerMap.reset(createMap(BPF_MAP_TYPE_HASH, sizeof(uint32_t), sizeof(UidOwnerValue),
98 TEST_MAP_SIZE, 0));
99 ASSERT_VALID(mFakeUidOwnerMap);
100 mFakeUidPermissionMap.reset(
101 createMap(BPF_MAP_TYPE_HASH, sizeof(uint32_t), sizeof(uint8_t), TEST_MAP_SIZE, 0));
102 ASSERT_VALID(mFakeUidPermissionMap);
103
104 mTc.mCookieTagMap.reset(dupFd(mFakeCookieTagMap.getMap()));
105 ASSERT_VALID(mTc.mCookieTagMap);
106 mTc.mUidCounterSetMap.reset(dupFd(mFakeUidCounterSetMap.getMap()));
107 ASSERT_VALID(mTc.mUidCounterSetMap);
108 mTc.mAppUidStatsMap.reset(dupFd(mFakeAppUidStatsMap.getMap()));
109 ASSERT_VALID(mTc.mAppUidStatsMap);
110 mTc.mStatsMapA.reset(dupFd(mFakeStatsMapA.getMap()));
111 ASSERT_VALID(mTc.mStatsMapA);
112 mTc.mConfigurationMap.reset(dupFd(mFakeConfigurationMap.getMap()));
113 ASSERT_VALID(mTc.mConfigurationMap);
114
115 // Always write to stats map A by default.
116 ASSERT_RESULT_OK(mTc.mConfigurationMap.writeValue(CURRENT_STATS_MAP_CONFIGURATION_KEY,
117 SELECT_MAP_A, BPF_ANY));
118 mTc.mUidOwnerMap.reset(dupFd(mFakeUidOwnerMap.getMap()));
119 ASSERT_VALID(mTc.mUidOwnerMap);
120 mTc.mUidPermissionMap.reset(dupFd(mFakeUidPermissionMap.getMap()));
121 ASSERT_VALID(mTc.mUidPermissionMap);
122 mTc.mPrivilegedUser.clear();
123 }
124
125 int dupFd(const android::base::unique_fd& mapFd) {
126 return fcntl(mapFd.get(), F_DUPFD_CLOEXEC, 0);
127 }
128
Wayne Ma4d692332022-01-19 16:04:04 +0800129 void populateFakeStats(uint64_t cookie, uint32_t uid, uint32_t tag, StatsKey* key) {
130 UidTagValue cookieMapkey = {.uid = (uint32_t)uid, .tag = tag};
131 EXPECT_RESULT_OK(mFakeCookieTagMap.writeValue(cookie, cookieMapkey, BPF_ANY));
132 *key = {.uid = uid, .tag = tag, .counterSet = TEST_COUNTERSET, .ifaceIndex = 1};
133 StatsValue statsMapValue = {.rxPackets = 1, .rxBytes = 100};
134 uint8_t counterSet = TEST_COUNTERSET;
135 EXPECT_RESULT_OK(mFakeUidCounterSetMap.writeValue(uid, counterSet, BPF_ANY));
136 EXPECT_RESULT_OK(mFakeStatsMapA.writeValue(*key, statsMapValue, BPF_ANY));
137 key->tag = 0;
138 EXPECT_RESULT_OK(mFakeStatsMapA.writeValue(*key, statsMapValue, BPF_ANY));
139 EXPECT_RESULT_OK(mFakeAppUidStatsMap.writeValue(uid, statsMapValue, BPF_ANY));
140 // put tag information back to statsKey
141 key->tag = tag;
142 }
143
144 void checkUidOwnerRuleForChain(ChildChain chain, UidOwnerMatchType match) {
145 uint32_t uid = TEST_UID;
146 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, DENYLIST));
147 Result<UidOwnerValue> value = mFakeUidOwnerMap.readValue(uid);
148 EXPECT_RESULT_OK(value);
149 EXPECT_TRUE(value.value().rule & match);
150
151 uid = TEST_UID2;
152 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, ALLOWLIST));
153 value = mFakeUidOwnerMap.readValue(uid);
154 EXPECT_RESULT_OK(value);
155 EXPECT_TRUE(value.value().rule & match);
156
157 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, ALLOWLIST));
158 value = mFakeUidOwnerMap.readValue(uid);
159 EXPECT_FALSE(value.ok());
160 EXPECT_EQ(ENOENT, value.error().code());
161
162 uid = TEST_UID;
163 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, DENYLIST));
164 value = mFakeUidOwnerMap.readValue(uid);
165 EXPECT_FALSE(value.ok());
166 EXPECT_EQ(ENOENT, value.error().code());
167
168 uid = TEST_UID3;
169 EXPECT_EQ(-ENOENT, mTc.changeUidOwnerRule(chain, uid, ALLOW, DENYLIST));
170 value = mFakeUidOwnerMap.readValue(uid);
171 EXPECT_FALSE(value.ok());
172 EXPECT_EQ(ENOENT, value.error().code());
173 }
174
175 void checkEachUidValue(const std::vector<int32_t>& uids, UidOwnerMatchType match) {
176 for (uint32_t uid : uids) {
177 Result<UidOwnerValue> value = mFakeUidOwnerMap.readValue(uid);
178 EXPECT_RESULT_OK(value);
179 EXPECT_TRUE(value.value().rule & match);
180 }
181 std::set<uint32_t> uidSet(uids.begin(), uids.end());
182 const auto checkNoOtherUid = [&uidSet](const int32_t& key,
183 const BpfMap<uint32_t, UidOwnerValue>&) {
184 EXPECT_NE(uidSet.end(), uidSet.find(key));
185 return Result<void>();
186 };
187 EXPECT_RESULT_OK(mFakeUidOwnerMap.iterate(checkNoOtherUid));
188 }
189
190 void checkUidMapReplace(const std::string& name, const std::vector<int32_t>& uids,
191 UidOwnerMatchType match) {
192 bool isAllowlist = true;
193 EXPECT_EQ(0, mTc.replaceUidOwnerMap(name, isAllowlist, uids));
194 checkEachUidValue(uids, match);
195
196 isAllowlist = false;
197 EXPECT_EQ(0, mTc.replaceUidOwnerMap(name, isAllowlist, uids));
198 checkEachUidValue(uids, match);
199 }
200
201 void expectUidOwnerMapValues(const std::vector<uint32_t>& appUids, uint8_t expectedRule,
202 uint32_t expectedIif) {
203 for (uint32_t uid : appUids) {
204 Result<UidOwnerValue> value = mFakeUidOwnerMap.readValue(uid);
205 EXPECT_RESULT_OK(value);
206 EXPECT_EQ(expectedRule, value.value().rule)
207 << "Expected rule for UID " << uid << " to be " << expectedRule << ", but was "
208 << value.value().rule;
209 EXPECT_EQ(expectedIif, value.value().iif)
210 << "Expected iif for UID " << uid << " to be " << expectedIif << ", but was "
211 << value.value().iif;
212 }
213 }
214
215 template <class Key, class Value>
216 void expectMapEmpty(BpfMap<Key, Value>& map) {
217 auto isEmpty = map.isEmpty();
218 EXPECT_RESULT_OK(isEmpty);
219 EXPECT_TRUE(isEmpty.value());
220 }
221
222 void expectUidPermissionMapValues(const std::vector<uid_t>& appUids, uint8_t expectedValue) {
223 for (uid_t uid : appUids) {
224 Result<uint8_t> value = mFakeUidPermissionMap.readValue(uid);
225 EXPECT_RESULT_OK(value);
226 EXPECT_EQ(expectedValue, value.value())
227 << "Expected value for UID " << uid << " to be " << expectedValue
228 << ", but was " << value.value();
229 }
230 }
231
232 void expectPrivilegedUserSet(const std::vector<uid_t>& appUids) {
233 std::lock_guard guard(mTc.mMutex);
234 EXPECT_EQ(appUids.size(), mTc.mPrivilegedUser.size());
235 for (uid_t uid : appUids) {
236 EXPECT_NE(mTc.mPrivilegedUser.end(), mTc.mPrivilegedUser.find(uid));
237 }
238 }
239
240 void expectPrivilegedUserSetEmpty() {
241 std::lock_guard guard(mTc.mMutex);
242 EXPECT_TRUE(mTc.mPrivilegedUser.empty());
243 }
244
245 void addPrivilegedUid(uid_t uid) {
246 std::vector privilegedUid = {uid};
247 mTc.setPermissionForUids(INetd::PERMISSION_UPDATE_DEVICE_STATS, privilegedUid);
248 }
249
250 void removePrivilegedUid(uid_t uid) {
251 std::vector privilegedUid = {uid};
252 mTc.setPermissionForUids(INetd::PERMISSION_NONE, privilegedUid);
253 }
254
255 void expectFakeStatsUnchanged(uint64_t cookie, uint32_t tag, uint32_t uid,
256 StatsKey tagStatsMapKey) {
257 Result<UidTagValue> cookieMapResult = mFakeCookieTagMap.readValue(cookie);
258 EXPECT_RESULT_OK(cookieMapResult);
259 EXPECT_EQ(uid, cookieMapResult.value().uid);
260 EXPECT_EQ(tag, cookieMapResult.value().tag);
261 Result<uint8_t> counterSetResult = mFakeUidCounterSetMap.readValue(uid);
262 EXPECT_RESULT_OK(counterSetResult);
263 EXPECT_EQ(TEST_COUNTERSET, counterSetResult.value());
264 Result<StatsValue> statsMapResult = mFakeStatsMapA.readValue(tagStatsMapKey);
265 EXPECT_RESULT_OK(statsMapResult);
266 EXPECT_EQ((uint64_t)1, statsMapResult.value().rxPackets);
267 EXPECT_EQ((uint64_t)100, statsMapResult.value().rxBytes);
268 tagStatsMapKey.tag = 0;
269 statsMapResult = mFakeStatsMapA.readValue(tagStatsMapKey);
270 EXPECT_RESULT_OK(statsMapResult);
271 EXPECT_EQ((uint64_t)1, statsMapResult.value().rxPackets);
272 EXPECT_EQ((uint64_t)100, statsMapResult.value().rxBytes);
273 auto appStatsResult = mFakeAppUidStatsMap.readValue(uid);
274 EXPECT_RESULT_OK(appStatsResult);
275 EXPECT_EQ((uint64_t)1, appStatsResult.value().rxPackets);
276 EXPECT_EQ((uint64_t)100, appStatsResult.value().rxBytes);
277 }
Wayne Ma7be6bce2022-01-12 16:29:49 +0800278
279 Status updateUidOwnerMaps(const std::vector<uint32_t>& appUids,
280 UidOwnerMatchType matchType, TrafficController::IptOp op) {
281 Status ret(0);
282 for (auto uid : appUids) {
283 ret = mTc.updateUidOwnerMap(uid, matchType, op);
284 if(!isOk(ret)) break;
285 }
286 return ret;
287 }
288
Wayne Ma4d692332022-01-19 16:04:04 +0800289};
290
Wayne Ma4d692332022-01-19 16:04:04 +0800291TEST_F(TrafficControllerTest, TestSetCounterSet) {
292 uid_t callingUid = TEST_UID2;
293 addPrivilegedUid(callingUid);
294 ASSERT_EQ(0, mTc.setCounterSet(TEST_COUNTERSET, TEST_UID, callingUid));
295 uid_t uid = TEST_UID;
296 Result<uint8_t> counterSetResult = mFakeUidCounterSetMap.readValue(uid);
297 ASSERT_RESULT_OK(counterSetResult);
298 ASSERT_EQ(TEST_COUNTERSET, counterSetResult.value());
299 ASSERT_EQ(0, mTc.setCounterSet(DEFAULT_COUNTERSET, TEST_UID, callingUid));
300 ASSERT_FALSE(mFakeUidCounterSetMap.readValue(uid).ok());
301 expectMapEmpty(mFakeUidCounterSetMap);
302}
303
304TEST_F(TrafficControllerTest, TestSetCounterSetWithoutPermission) {
305 ASSERT_EQ(-EPERM, mTc.setCounterSet(TEST_COUNTERSET, TEST_UID, TEST_UID2));
306 uid_t uid = TEST_UID;
307 ASSERT_FALSE(mFakeUidCounterSetMap.readValue(uid).ok());
308 expectMapEmpty(mFakeUidCounterSetMap);
309}
310
311TEST_F(TrafficControllerTest, TestSetInvalidCounterSet) {
312 uid_t callingUid = TEST_UID2;
313 addPrivilegedUid(callingUid);
314 ASSERT_GT(0, mTc.setCounterSet(OVERFLOW_COUNTERSET, TEST_UID, callingUid));
315 uid_t uid = TEST_UID;
316 ASSERT_FALSE(mFakeUidCounterSetMap.readValue(uid).ok());
317 expectMapEmpty(mFakeUidCounterSetMap);
318}
319
320TEST_F(TrafficControllerTest, TestDeleteTagDataWithoutPermission) {
321 uint64_t cookie = 1;
322 uid_t uid = TEST_UID;
323 uint32_t tag = TEST_TAG;
324 StatsKey tagStatsMapKey;
325 populateFakeStats(cookie, uid, tag, &tagStatsMapKey);
326 ASSERT_EQ(-EPERM, mTc.deleteTagData(0, TEST_UID, TEST_UID2));
327
328 expectFakeStatsUnchanged(cookie, tag, uid, tagStatsMapKey);
329}
330
331TEST_F(TrafficControllerTest, TestDeleteTagData) {
332 uid_t callingUid = TEST_UID2;
333 addPrivilegedUid(callingUid);
334 uint64_t cookie = 1;
335 uid_t uid = TEST_UID;
336 uint32_t tag = TEST_TAG;
337 StatsKey tagStatsMapKey;
338 populateFakeStats(cookie, uid, tag, &tagStatsMapKey);
339 ASSERT_EQ(0, mTc.deleteTagData(TEST_TAG, TEST_UID, callingUid));
340 ASSERT_FALSE(mFakeCookieTagMap.readValue(cookie).ok());
341 Result<uint8_t> counterSetResult = mFakeUidCounterSetMap.readValue(uid);
342 ASSERT_RESULT_OK(counterSetResult);
343 ASSERT_EQ(TEST_COUNTERSET, counterSetResult.value());
344 ASSERT_FALSE(mFakeStatsMapA.readValue(tagStatsMapKey).ok());
345 tagStatsMapKey.tag = 0;
346 Result<StatsValue> statsMapResult = mFakeStatsMapA.readValue(tagStatsMapKey);
347 ASSERT_RESULT_OK(statsMapResult);
348 ASSERT_EQ((uint64_t)1, statsMapResult.value().rxPackets);
349 ASSERT_EQ((uint64_t)100, statsMapResult.value().rxBytes);
350 auto appStatsResult = mFakeAppUidStatsMap.readValue(TEST_UID);
351 ASSERT_RESULT_OK(appStatsResult);
352 ASSERT_EQ((uint64_t)1, appStatsResult.value().rxPackets);
353 ASSERT_EQ((uint64_t)100, appStatsResult.value().rxBytes);
354}
355
356TEST_F(TrafficControllerTest, TestDeleteAllUidData) {
357 uid_t callingUid = TEST_UID2;
358 addPrivilegedUid(callingUid);
359 uint64_t cookie = 1;
360 uid_t uid = TEST_UID;
361 uint32_t tag = TEST_TAG;
362 StatsKey tagStatsMapKey;
363 populateFakeStats(cookie, uid, tag, &tagStatsMapKey);
364 ASSERT_EQ(0, mTc.deleteTagData(0, TEST_UID, callingUid));
365 ASSERT_FALSE(mFakeCookieTagMap.readValue(cookie).ok());
366 ASSERT_FALSE(mFakeUidCounterSetMap.readValue(uid).ok());
367 ASSERT_FALSE(mFakeStatsMapA.readValue(tagStatsMapKey).ok());
368 tagStatsMapKey.tag = 0;
369 ASSERT_FALSE(mFakeStatsMapA.readValue(tagStatsMapKey).ok());
370 ASSERT_FALSE(mFakeAppUidStatsMap.readValue(TEST_UID).ok());
371}
372
373TEST_F(TrafficControllerTest, TestDeleteDataWithTwoTags) {
374 uid_t callingUid = TEST_UID2;
375 addPrivilegedUid(callingUid);
376 uint64_t cookie1 = 1;
377 uint64_t cookie2 = 2;
378 uid_t uid = TEST_UID;
379 uint32_t tag1 = TEST_TAG;
380 uint32_t tag2 = TEST_TAG + 1;
381 StatsKey tagStatsMapKey1;
382 StatsKey tagStatsMapKey2;
383 populateFakeStats(cookie1, uid, tag1, &tagStatsMapKey1);
384 populateFakeStats(cookie2, uid, tag2, &tagStatsMapKey2);
385 ASSERT_EQ(0, mTc.deleteTagData(TEST_TAG, TEST_UID, callingUid));
386 ASSERT_FALSE(mFakeCookieTagMap.readValue(cookie1).ok());
387 Result<UidTagValue> cookieMapResult = mFakeCookieTagMap.readValue(cookie2);
388 ASSERT_RESULT_OK(cookieMapResult);
389 ASSERT_EQ(TEST_UID, cookieMapResult.value().uid);
390 ASSERT_EQ(TEST_TAG + 1, cookieMapResult.value().tag);
391 Result<uint8_t> counterSetResult = mFakeUidCounterSetMap.readValue(uid);
392 ASSERT_RESULT_OK(counterSetResult);
393 ASSERT_EQ(TEST_COUNTERSET, counterSetResult.value());
394 ASSERT_FALSE(mFakeStatsMapA.readValue(tagStatsMapKey1).ok());
395 Result<StatsValue> statsMapResult = mFakeStatsMapA.readValue(tagStatsMapKey2);
396 ASSERT_RESULT_OK(statsMapResult);
397 ASSERT_EQ((uint64_t)1, statsMapResult.value().rxPackets);
398 ASSERT_EQ((uint64_t)100, statsMapResult.value().rxBytes);
399}
400
401TEST_F(TrafficControllerTest, TestDeleteDataWithTwoUids) {
402 uid_t callingUid = TEST_UID2;
403 addPrivilegedUid(callingUid);
404 uint64_t cookie1 = 1;
405 uint64_t cookie2 = 2;
406 uid_t uid1 = TEST_UID;
407 uid_t uid2 = TEST_UID + 1;
408 uint32_t tag = TEST_TAG;
409 StatsKey tagStatsMapKey1;
410 StatsKey tagStatsMapKey2;
411 populateFakeStats(cookie1, uid1, tag, &tagStatsMapKey1);
412 populateFakeStats(cookie2, uid2, tag, &tagStatsMapKey2);
413
414 // Delete the stats of one of the uid. Check if it is properly collected by
415 // removedStats.
416 ASSERT_EQ(0, mTc.deleteTagData(0, uid2, callingUid));
417 ASSERT_FALSE(mFakeCookieTagMap.readValue(cookie2).ok());
418 Result<uint8_t> counterSetResult = mFakeUidCounterSetMap.readValue(uid1);
419 ASSERT_RESULT_OK(counterSetResult);
420 ASSERT_EQ(TEST_COUNTERSET, counterSetResult.value());
421 ASSERT_FALSE(mFakeUidCounterSetMap.readValue(uid2).ok());
422 ASSERT_FALSE(mFakeStatsMapA.readValue(tagStatsMapKey2).ok());
423 tagStatsMapKey2.tag = 0;
424 ASSERT_FALSE(mFakeStatsMapA.readValue(tagStatsMapKey2).ok());
425 ASSERT_FALSE(mFakeAppUidStatsMap.readValue(uid2).ok());
426 tagStatsMapKey1.tag = 0;
427 Result<StatsValue> statsMapResult = mFakeStatsMapA.readValue(tagStatsMapKey1);
428 ASSERT_RESULT_OK(statsMapResult);
429 ASSERT_EQ((uint64_t)1, statsMapResult.value().rxPackets);
430 ASSERT_EQ((uint64_t)100, statsMapResult.value().rxBytes);
431 auto appStatsResult = mFakeAppUidStatsMap.readValue(uid1);
432 ASSERT_RESULT_OK(appStatsResult);
433 ASSERT_EQ((uint64_t)1, appStatsResult.value().rxPackets);
434 ASSERT_EQ((uint64_t)100, appStatsResult.value().rxBytes);
435
436 // Delete the stats of the other uid.
437 ASSERT_EQ(0, mTc.deleteTagData(0, uid1, callingUid));
438 ASSERT_FALSE(mFakeStatsMapA.readValue(tagStatsMapKey1).ok());
439 ASSERT_FALSE(mFakeAppUidStatsMap.readValue(uid1).ok());
440}
441
442TEST_F(TrafficControllerTest, TestUpdateOwnerMapEntry) {
443 uint32_t uid = TEST_UID;
444 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, DENY, DENYLIST)));
445 Result<UidOwnerValue> value = mFakeUidOwnerMap.readValue(uid);
446 ASSERT_RESULT_OK(value);
447 ASSERT_TRUE(value.value().rule & STANDBY_MATCH);
448
449 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, ALLOW, ALLOWLIST)));
450 value = mFakeUidOwnerMap.readValue(uid);
451 ASSERT_RESULT_OK(value);
452 ASSERT_TRUE(value.value().rule & DOZABLE_MATCH);
453
454 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, DENY, ALLOWLIST)));
455 value = mFakeUidOwnerMap.readValue(uid);
456 ASSERT_RESULT_OK(value);
457 ASSERT_FALSE(value.value().rule & DOZABLE_MATCH);
458
459 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, ALLOW, DENYLIST)));
460 ASSERT_FALSE(mFakeUidOwnerMap.readValue(uid).ok());
461
462 uid = TEST_UID2;
463 ASSERT_FALSE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, ALLOW, DENYLIST)));
464 ASSERT_FALSE(mFakeUidOwnerMap.readValue(uid).ok());
465}
466
467TEST_F(TrafficControllerTest, TestChangeUidOwnerRule) {
468 checkUidOwnerRuleForChain(DOZABLE, DOZABLE_MATCH);
469 checkUidOwnerRuleForChain(STANDBY, STANDBY_MATCH);
470 checkUidOwnerRuleForChain(POWERSAVE, POWERSAVE_MATCH);
471 checkUidOwnerRuleForChain(RESTRICTED, RESTRICTED_MATCH);
472 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(NONE, TEST_UID, ALLOW, ALLOWLIST));
473 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(INVALID_CHAIN, TEST_UID, ALLOW, ALLOWLIST));
474}
475
476TEST_F(TrafficControllerTest, TestReplaceUidOwnerMap) {
477 std::vector<int32_t> uids = {TEST_UID, TEST_UID2, TEST_UID3};
478 checkUidMapReplace("fw_dozable", uids, DOZABLE_MATCH);
479 checkUidMapReplace("fw_standby", uids, STANDBY_MATCH);
480 checkUidMapReplace("fw_powersave", uids, POWERSAVE_MATCH);
481 checkUidMapReplace("fw_restricted", uids, RESTRICTED_MATCH);
482 ASSERT_EQ(-EINVAL, mTc.replaceUidOwnerMap("unknow", true, uids));
483}
484
485TEST_F(TrafficControllerTest, TestReplaceSameChain) {
486 std::vector<int32_t> uids = {TEST_UID, TEST_UID2, TEST_UID3};
487 checkUidMapReplace("fw_dozable", uids, DOZABLE_MATCH);
488 std::vector<int32_t> newUids = {TEST_UID2, TEST_UID3};
489 checkUidMapReplace("fw_dozable", newUids, DOZABLE_MATCH);
490}
491
492TEST_F(TrafficControllerTest, TestDenylistUidMatch) {
493 std::vector<uint32_t> appUids = {1000, 1001, 10012};
Wayne Ma7be6bce2022-01-12 16:29:49 +0800494 ASSERT_TRUE(isOk(updateUidOwnerMaps(appUids, PENALTY_BOX_MATCH,
495 TrafficController::IptOpInsert)));
Wayne Ma4d692332022-01-19 16:04:04 +0800496 expectUidOwnerMapValues(appUids, PENALTY_BOX_MATCH, 0);
Wayne Ma7be6bce2022-01-12 16:29:49 +0800497 ASSERT_TRUE(isOk(updateUidOwnerMaps(appUids, PENALTY_BOX_MATCH,
498 TrafficController::IptOpDelete)));
Wayne Ma4d692332022-01-19 16:04:04 +0800499 expectMapEmpty(mFakeUidOwnerMap);
500}
501
502TEST_F(TrafficControllerTest, TestAllowlistUidMatch) {
503 std::vector<uint32_t> appUids = {1000, 1001, 10012};
Wayne Ma7be6bce2022-01-12 16:29:49 +0800504 ASSERT_TRUE(isOk(updateUidOwnerMaps(appUids, HAPPY_BOX_MATCH, TrafficController::IptOpInsert)));
Wayne Ma4d692332022-01-19 16:04:04 +0800505 expectUidOwnerMapValues(appUids, HAPPY_BOX_MATCH, 0);
Wayne Ma7be6bce2022-01-12 16:29:49 +0800506 ASSERT_TRUE(isOk(updateUidOwnerMaps(appUids, HAPPY_BOX_MATCH, TrafficController::IptOpDelete)));
Wayne Ma4d692332022-01-19 16:04:04 +0800507 expectMapEmpty(mFakeUidOwnerMap);
508}
509
510TEST_F(TrafficControllerTest, TestReplaceMatchUid) {
511 std::vector<uint32_t> appUids = {1000, 1001, 10012};
512 // Add appUids to the denylist and expect that their values are all PENALTY_BOX_MATCH.
Wayne Ma7be6bce2022-01-12 16:29:49 +0800513 ASSERT_TRUE(isOk(updateUidOwnerMaps(appUids, PENALTY_BOX_MATCH,
514 TrafficController::IptOpInsert)));
Wayne Ma4d692332022-01-19 16:04:04 +0800515 expectUidOwnerMapValues(appUids, PENALTY_BOX_MATCH, 0);
516
517 // Add the same UIDs to the allowlist and expect that we get PENALTY_BOX_MATCH |
518 // HAPPY_BOX_MATCH.
Wayne Ma7be6bce2022-01-12 16:29:49 +0800519 ASSERT_TRUE(isOk(updateUidOwnerMaps(appUids, HAPPY_BOX_MATCH, TrafficController::IptOpInsert)));
Wayne Ma4d692332022-01-19 16:04:04 +0800520 expectUidOwnerMapValues(appUids, HAPPY_BOX_MATCH | PENALTY_BOX_MATCH, 0);
521
522 // Remove the same UIDs from the allowlist and check the PENALTY_BOX_MATCH is still there.
Wayne Ma7be6bce2022-01-12 16:29:49 +0800523 ASSERT_TRUE(isOk(updateUidOwnerMaps(appUids, HAPPY_BOX_MATCH, TrafficController::IptOpDelete)));
Wayne Ma4d692332022-01-19 16:04:04 +0800524 expectUidOwnerMapValues(appUids, PENALTY_BOX_MATCH, 0);
525
526 // Remove the same UIDs from the denylist and check the map is empty.
Wayne Ma7be6bce2022-01-12 16:29:49 +0800527 ASSERT_TRUE(isOk(updateUidOwnerMaps(appUids, PENALTY_BOX_MATCH,
528 TrafficController::IptOpDelete)));
Wayne Ma4d692332022-01-19 16:04:04 +0800529 ASSERT_FALSE(mFakeUidOwnerMap.getFirstKey().ok());
530}
531
532TEST_F(TrafficControllerTest, TestDeleteWrongMatchSilentlyFails) {
533 std::vector<uint32_t> appUids = {1000, 1001, 10012};
534 // If the uid does not exist in the map, trying to delete a rule about it will fail.
Wayne Ma7be6bce2022-01-12 16:29:49 +0800535 ASSERT_FALSE(isOk(updateUidOwnerMaps(appUids, HAPPY_BOX_MATCH,
536 TrafficController::IptOpDelete)));
Wayne Ma4d692332022-01-19 16:04:04 +0800537 expectMapEmpty(mFakeUidOwnerMap);
538
539 // Add denylist rules for appUids.
Wayne Ma7be6bce2022-01-12 16:29:49 +0800540 ASSERT_TRUE(isOk(updateUidOwnerMaps(appUids, HAPPY_BOX_MATCH,
541 TrafficController::IptOpInsert)));
Wayne Ma4d692332022-01-19 16:04:04 +0800542 expectUidOwnerMapValues(appUids, HAPPY_BOX_MATCH, 0);
543
544 // Delete (non-existent) denylist rules for appUids, and check that this silently does
545 // nothing if the uid is in the map but does not have denylist match. This is required because
546 // NetworkManagementService will try to remove a uid from denylist after adding it to the
547 // allowlist and if the remove fails it will not update the uid status.
Wayne Ma7be6bce2022-01-12 16:29:49 +0800548 ASSERT_TRUE(isOk(updateUidOwnerMaps(appUids, PENALTY_BOX_MATCH,
549 TrafficController::IptOpDelete)));
Wayne Ma4d692332022-01-19 16:04:04 +0800550 expectUidOwnerMapValues(appUids, HAPPY_BOX_MATCH, 0);
551}
552
553TEST_F(TrafficControllerTest, TestAddUidInterfaceFilteringRules) {
554 int iif0 = 15;
555 ASSERT_TRUE(isOk(mTc.addUidInterfaceRules(iif0, {1000, 1001})));
556 expectUidOwnerMapValues({1000, 1001}, IIF_MATCH, iif0);
557
558 // Add some non-overlapping new uids. They should coexist with existing rules
559 int iif1 = 16;
560 ASSERT_TRUE(isOk(mTc.addUidInterfaceRules(iif1, {2000, 2001})));
561 expectUidOwnerMapValues({1000, 1001}, IIF_MATCH, iif0);
562 expectUidOwnerMapValues({2000, 2001}, IIF_MATCH, iif1);
563
564 // Overwrite some existing uids
565 int iif2 = 17;
566 ASSERT_TRUE(isOk(mTc.addUidInterfaceRules(iif2, {1000, 2000})));
567 expectUidOwnerMapValues({1001}, IIF_MATCH, iif0);
568 expectUidOwnerMapValues({2001}, IIF_MATCH, iif1);
569 expectUidOwnerMapValues({1000, 2000}, IIF_MATCH, iif2);
570}
571
572TEST_F(TrafficControllerTest, TestRemoveUidInterfaceFilteringRules) {
573 int iif0 = 15;
574 int iif1 = 16;
575 ASSERT_TRUE(isOk(mTc.addUidInterfaceRules(iif0, {1000, 1001})));
576 ASSERT_TRUE(isOk(mTc.addUidInterfaceRules(iif1, {2000, 2001})));
577 expectUidOwnerMapValues({1000, 1001}, IIF_MATCH, iif0);
578 expectUidOwnerMapValues({2000, 2001}, IIF_MATCH, iif1);
579
580 // Rmove some uids
581 ASSERT_TRUE(isOk(mTc.removeUidInterfaceRules({1001, 2001})));
582 expectUidOwnerMapValues({1000}, IIF_MATCH, iif0);
583 expectUidOwnerMapValues({2000}, IIF_MATCH, iif1);
584 checkEachUidValue({1000, 2000}, IIF_MATCH); // Make sure there are only two uids remaining
585
586 // Remove non-existent uids shouldn't fail
587 ASSERT_TRUE(isOk(mTc.removeUidInterfaceRules({2000, 3000})));
588 expectUidOwnerMapValues({1000}, IIF_MATCH, iif0);
589 checkEachUidValue({1000}, IIF_MATCH); // Make sure there are only one uid remaining
590
591 // Remove everything
592 ASSERT_TRUE(isOk(mTc.removeUidInterfaceRules({1000})));
593 expectMapEmpty(mFakeUidOwnerMap);
594}
595
596TEST_F(TrafficControllerTest, TestUidInterfaceFilteringRulesCoexistWithExistingMatches) {
597 // Set up existing PENALTY_BOX_MATCH rules
Wayne Ma7be6bce2022-01-12 16:29:49 +0800598 ASSERT_TRUE(isOk(updateUidOwnerMaps({1000, 1001, 10012}, PENALTY_BOX_MATCH,
599 TrafficController::IptOpInsert)));
Wayne Ma4d692332022-01-19 16:04:04 +0800600 expectUidOwnerMapValues({1000, 1001, 10012}, PENALTY_BOX_MATCH, 0);
601
602 // Add some partially-overlapping uid owner rules and check result
603 int iif1 = 32;
604 ASSERT_TRUE(isOk(mTc.addUidInterfaceRules(iif1, {10012, 10013, 10014})));
605 expectUidOwnerMapValues({1000, 1001}, PENALTY_BOX_MATCH, 0);
606 expectUidOwnerMapValues({10012}, PENALTY_BOX_MATCH | IIF_MATCH, iif1);
607 expectUidOwnerMapValues({10013, 10014}, IIF_MATCH, iif1);
608
609 // Removing some PENALTY_BOX_MATCH rules should not change uid interface rule
Wayne Ma7be6bce2022-01-12 16:29:49 +0800610 ASSERT_TRUE(isOk(updateUidOwnerMaps({1001, 10012}, PENALTY_BOX_MATCH,
611 TrafficController::IptOpDelete)));
Wayne Ma4d692332022-01-19 16:04:04 +0800612 expectUidOwnerMapValues({1000}, PENALTY_BOX_MATCH, 0);
613 expectUidOwnerMapValues({10012, 10013, 10014}, IIF_MATCH, iif1);
614
615 // Remove all uid interface rules
616 ASSERT_TRUE(isOk(mTc.removeUidInterfaceRules({10012, 10013, 10014})));
617 expectUidOwnerMapValues({1000}, PENALTY_BOX_MATCH, 0);
618 // Make sure these are the only uids left
619 checkEachUidValue({1000}, PENALTY_BOX_MATCH);
620}
621
622TEST_F(TrafficControllerTest, TestUidInterfaceFilteringRulesCoexistWithNewMatches) {
623 int iif1 = 56;
624 // Set up existing uid interface rules
625 ASSERT_TRUE(isOk(mTc.addUidInterfaceRules(iif1, {10001, 10002})));
626 expectUidOwnerMapValues({10001, 10002}, IIF_MATCH, iif1);
627
628 // Add some partially-overlapping doze rules
629 EXPECT_EQ(0, mTc.replaceUidOwnerMap("fw_dozable", true, {10002, 10003}));
630 expectUidOwnerMapValues({10001}, IIF_MATCH, iif1);
631 expectUidOwnerMapValues({10002}, DOZABLE_MATCH | IIF_MATCH, iif1);
632 expectUidOwnerMapValues({10003}, DOZABLE_MATCH, 0);
633
634 // Introduce a third rule type (powersave) on various existing UIDs
635 EXPECT_EQ(0, mTc.replaceUidOwnerMap("fw_powersave", true, {10000, 10001, 10002, 10003}));
636 expectUidOwnerMapValues({10000}, POWERSAVE_MATCH, 0);
637 expectUidOwnerMapValues({10001}, POWERSAVE_MATCH | IIF_MATCH, iif1);
638 expectUidOwnerMapValues({10002}, POWERSAVE_MATCH | DOZABLE_MATCH | IIF_MATCH, iif1);
639 expectUidOwnerMapValues({10003}, POWERSAVE_MATCH | DOZABLE_MATCH, 0);
640
641 // Remove all doze rules
642 EXPECT_EQ(0, mTc.replaceUidOwnerMap("fw_dozable", true, {}));
643 expectUidOwnerMapValues({10000}, POWERSAVE_MATCH, 0);
644 expectUidOwnerMapValues({10001}, POWERSAVE_MATCH | IIF_MATCH, iif1);
645 expectUidOwnerMapValues({10002}, POWERSAVE_MATCH | IIF_MATCH, iif1);
646 expectUidOwnerMapValues({10003}, POWERSAVE_MATCH, 0);
647
648 // Remove all powersave rules, expect ownerMap to only have uid interface rules left
649 EXPECT_EQ(0, mTc.replaceUidOwnerMap("fw_powersave", true, {}));
650 expectUidOwnerMapValues({10001, 10002}, IIF_MATCH, iif1);
651 // Make sure these are the only uids left
652 checkEachUidValue({10001, 10002}, IIF_MATCH);
653}
654
655TEST_F(TrafficControllerTest, TestGrantInternetPermission) {
656 std::vector<uid_t> appUids = {TEST_UID, TEST_UID2, TEST_UID3};
657
658 mTc.setPermissionForUids(INetd::PERMISSION_INTERNET, appUids);
659 expectMapEmpty(mFakeUidPermissionMap);
660 expectPrivilegedUserSetEmpty();
661}
662
663TEST_F(TrafficControllerTest, TestRevokeInternetPermission) {
664 std::vector<uid_t> appUids = {TEST_UID, TEST_UID2, TEST_UID3};
665
666 mTc.setPermissionForUids(INetd::PERMISSION_NONE, appUids);
667 expectUidPermissionMapValues(appUids, INetd::PERMISSION_NONE);
668}
669
670TEST_F(TrafficControllerTest, TestPermissionUninstalled) {
671 std::vector<uid_t> appUids = {TEST_UID, TEST_UID2, TEST_UID3};
672
673 mTc.setPermissionForUids(INetd::PERMISSION_UPDATE_DEVICE_STATS, appUids);
674 expectUidPermissionMapValues(appUids, INetd::PERMISSION_UPDATE_DEVICE_STATS);
675 expectPrivilegedUserSet(appUids);
676
677 std::vector<uid_t> uidToRemove = {TEST_UID};
678 mTc.setPermissionForUids(INetd::PERMISSION_UNINSTALLED, uidToRemove);
679
680 std::vector<uid_t> uidRemain = {TEST_UID3, TEST_UID2};
681 expectUidPermissionMapValues(uidRemain, INetd::PERMISSION_UPDATE_DEVICE_STATS);
682 expectPrivilegedUserSet(uidRemain);
683
684 mTc.setPermissionForUids(INetd::PERMISSION_UNINSTALLED, uidRemain);
685 expectMapEmpty(mFakeUidPermissionMap);
686 expectPrivilegedUserSetEmpty();
687}
688
689TEST_F(TrafficControllerTest, TestGrantUpdateStatsPermission) {
690 std::vector<uid_t> appUids = {TEST_UID, TEST_UID2, TEST_UID3};
691
692 mTc.setPermissionForUids(INetd::PERMISSION_UPDATE_DEVICE_STATS, appUids);
693 expectUidPermissionMapValues(appUids, INetd::PERMISSION_UPDATE_DEVICE_STATS);
694 expectPrivilegedUserSet(appUids);
695
696 mTc.setPermissionForUids(INetd::PERMISSION_NONE, appUids);
697 expectPrivilegedUserSetEmpty();
698 expectUidPermissionMapValues(appUids, INetd::PERMISSION_NONE);
699}
700
701TEST_F(TrafficControllerTest, TestRevokeUpdateStatsPermission) {
702 std::vector<uid_t> appUids = {TEST_UID, TEST_UID2, TEST_UID3};
703
704 mTc.setPermissionForUids(INetd::PERMISSION_UPDATE_DEVICE_STATS, appUids);
705 expectPrivilegedUserSet(appUids);
706
707 std::vector<uid_t> uidToRemove = {TEST_UID};
708 mTc.setPermissionForUids(INetd::PERMISSION_NONE, uidToRemove);
709
710 std::vector<uid_t> uidRemain = {TEST_UID3, TEST_UID2};
711 expectPrivilegedUserSet(uidRemain);
712
713 mTc.setPermissionForUids(INetd::PERMISSION_NONE, uidRemain);
714 expectPrivilegedUserSetEmpty();
715}
716
717TEST_F(TrafficControllerTest, TestGrantWrongPermission) {
718 std::vector<uid_t> appUids = {TEST_UID, TEST_UID2, TEST_UID3};
719
720 mTc.setPermissionForUids(INetd::PERMISSION_NONE, appUids);
721 expectPrivilegedUserSetEmpty();
722 expectUidPermissionMapValues(appUids, INetd::PERMISSION_NONE);
723}
724
725TEST_F(TrafficControllerTest, TestGrantDuplicatePermissionSlientlyFail) {
726 std::vector<uid_t> appUids = {TEST_UID, TEST_UID2, TEST_UID3};
727
728 mTc.setPermissionForUids(INetd::PERMISSION_INTERNET, appUids);
729 expectMapEmpty(mFakeUidPermissionMap);
730
731 std::vector<uid_t> uidToAdd = {TEST_UID};
732 mTc.setPermissionForUids(INetd::PERMISSION_INTERNET, uidToAdd);
733
734 expectPrivilegedUserSetEmpty();
735
736 mTc.setPermissionForUids(INetd::PERMISSION_NONE, appUids);
737 expectUidPermissionMapValues(appUids, INetd::PERMISSION_NONE);
738
739 mTc.setPermissionForUids(INetd::PERMISSION_UPDATE_DEVICE_STATS, appUids);
740 expectPrivilegedUserSet(appUids);
741
742 mTc.setPermissionForUids(INetd::PERMISSION_UPDATE_DEVICE_STATS, uidToAdd);
743 expectPrivilegedUserSet(appUids);
744
745 mTc.setPermissionForUids(INetd::PERMISSION_NONE, appUids);
746 expectPrivilegedUserSetEmpty();
747}
748
749} // namespace net
750} // namespace android