blob: db59c7cf329dc1c8cf060ece7d882871c04813a3 [file] [log] [blame]
Ken Chen1647f602021-10-05 21:55:22 +08001/*
2 * Copyright 2021 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 *
16 * BpfHandlerTest.cpp - unit tests for BpfHandler.cpp
17 */
18
19#include <sys/socket.h>
20
21#include <gtest/gtest.h>
22
23#include "BpfHandler.h"
24
25using namespace android::bpf; // NOLINT(google-build-using-namespace): exempted
26
27namespace android {
28namespace net {
29
30using base::Result;
31
32constexpr int TEST_MAP_SIZE = 10;
33constexpr int TEST_COOKIE = 1;
34constexpr uid_t TEST_UID = 10086;
35constexpr uid_t TEST_UID2 = 54321;
36constexpr uint32_t TEST_TAG = 42;
37constexpr uint32_t TEST_COUNTERSET = 1;
38constexpr uint32_t TEST_PER_UID_STATS_ENTRIES_LIMIT = 3;
39constexpr uint32_t TEST_TOTAL_UID_STATS_ENTRIES_LIMIT = 7;
40
41#define ASSERT_VALID(x) ASSERT_TRUE((x).isValid())
42
43class BpfHandlerTest : public ::testing::Test {
44 protected:
45 BpfHandlerTest()
46 : mBh(TEST_PER_UID_STATS_ENTRIES_LIMIT, TEST_TOTAL_UID_STATS_ENTRIES_LIMIT) {}
47 BpfHandler mBh;
48 BpfMap<uint64_t, UidTagValue> mFakeCookieTagMap;
49 BpfMap<StatsKey, StatsValue> mFakeStatsMapA;
50 BpfMap<uint32_t, uint8_t> mFakeConfigurationMap;
51 BpfMap<uint32_t, uint8_t> mFakeUidPermissionMap;
52
53 void SetUp() {
54 std::lock_guard guard(mBh.mMutex);
55 ASSERT_EQ(0, setrlimitForTest());
56
57 mFakeCookieTagMap.reset(createMap(BPF_MAP_TYPE_HASH, sizeof(uint64_t), sizeof(UidTagValue),
58 TEST_MAP_SIZE, 0));
59 ASSERT_VALID(mFakeCookieTagMap);
60
61 mFakeStatsMapA.reset(createMap(BPF_MAP_TYPE_HASH, sizeof(StatsKey), sizeof(StatsValue),
62 TEST_MAP_SIZE, 0));
63 ASSERT_VALID(mFakeStatsMapA);
64
65 mFakeConfigurationMap.reset(
66 createMap(BPF_MAP_TYPE_HASH, sizeof(uint32_t), sizeof(uint8_t), 1, 0));
67 ASSERT_VALID(mFakeConfigurationMap);
68
69 mFakeUidPermissionMap.reset(
70 createMap(BPF_MAP_TYPE_HASH, sizeof(uint32_t), sizeof(uint8_t), TEST_MAP_SIZE, 0));
71 ASSERT_VALID(mFakeUidPermissionMap);
72
73 mBh.mCookieTagMap.reset(dupFd(mFakeCookieTagMap.getMap()));
74 ASSERT_VALID(mBh.mCookieTagMap);
75 mBh.mStatsMapA.reset(dupFd(mFakeStatsMapA.getMap()));
76 ASSERT_VALID(mBh.mStatsMapA);
77 mBh.mConfigurationMap.reset(dupFd(mFakeConfigurationMap.getMap()));
78 ASSERT_VALID(mBh.mConfigurationMap);
79 // Always write to stats map A by default.
80 ASSERT_RESULT_OK(mBh.mConfigurationMap.writeValue(CURRENT_STATS_MAP_CONFIGURATION_KEY,
81 SELECT_MAP_A, BPF_ANY));
82 mBh.mUidPermissionMap.reset(dupFd(mFakeUidPermissionMap.getMap()));
83 ASSERT_VALID(mBh.mUidPermissionMap);
84 }
85
86 int dupFd(const android::base::unique_fd& mapFd) {
87 return fcntl(mapFd.get(), F_DUPFD_CLOEXEC, 0);
88 }
89
90 int setUpSocketAndTag(int protocol, uint64_t* cookie, uint32_t tag, uid_t uid,
91 uid_t realUid) {
92 int sock = socket(protocol, SOCK_STREAM | SOCK_CLOEXEC, 0);
93 EXPECT_LE(0, sock);
94 *cookie = getSocketCookie(sock);
95 EXPECT_NE(NONEXISTENT_COOKIE, *cookie);
96 EXPECT_EQ(0, mBh.tagSocket(sock, tag, uid, realUid));
97 return sock;
98 }
99
100 void expectUidTag(uint64_t cookie, uid_t uid, uint32_t tag) {
101 Result<UidTagValue> tagResult = mFakeCookieTagMap.readValue(cookie);
102 ASSERT_RESULT_OK(tagResult);
103 EXPECT_EQ(uid, tagResult.value().uid);
104 EXPECT_EQ(tag, tagResult.value().tag);
105 }
106
107 void expectNoTag(uint64_t cookie) { EXPECT_FALSE(mFakeCookieTagMap.readValue(cookie).ok()); }
108
109 void populateFakeStats(uint64_t cookie, uint32_t uid, uint32_t tag, StatsKey* key) {
110 UidTagValue cookieMapkey = {.uid = (uint32_t)uid, .tag = tag};
111 EXPECT_RESULT_OK(mFakeCookieTagMap.writeValue(cookie, cookieMapkey, BPF_ANY));
112 *key = {.uid = uid, .tag = tag, .counterSet = TEST_COUNTERSET, .ifaceIndex = 1};
113 StatsValue statsMapValue = {.rxPackets = 1, .rxBytes = 100};
114 EXPECT_RESULT_OK(mFakeStatsMapA.writeValue(*key, statsMapValue, BPF_ANY));
115 key->tag = 0;
116 EXPECT_RESULT_OK(mFakeStatsMapA.writeValue(*key, statsMapValue, BPF_ANY));
117 // put tag information back to statsKey
118 key->tag = tag;
119 }
120
121 template <class Key, class Value>
122 void expectMapEmpty(BpfMap<Key, Value>& map) {
123 auto isEmpty = map.isEmpty();
124 EXPECT_RESULT_OK(isEmpty);
125 EXPECT_TRUE(isEmpty.value());
126 }
127
128 void expectTagSocketReachLimit(uint32_t tag, uint32_t uid) {
129 int sock = socket(AF_INET6, SOCK_STREAM | SOCK_CLOEXEC, 0);
130 EXPECT_LE(0, sock);
131 if (sock < 0) return;
132 uint64_t sockCookie = getSocketCookie(sock);
133 EXPECT_NE(NONEXISTENT_COOKIE, sockCookie);
134 EXPECT_EQ(-EMFILE, mBh.tagSocket(sock, tag, uid, uid));
135 expectNoTag(sockCookie);
136
137 // Delete stats entries then tag socket success
138 StatsKey key = {.uid = uid, .tag = 0, .counterSet = TEST_COUNTERSET, .ifaceIndex = 1};
139 ASSERT_RESULT_OK(mFakeStatsMapA.deleteValue(key));
140 EXPECT_EQ(0, mBh.tagSocket(sock, tag, uid, uid));
141 expectUidTag(sockCookie, uid, tag);
142 }
143};
144
145TEST_F(BpfHandlerTest, TestTagSocketV4) {
146 uint64_t sockCookie;
147 int v4socket = setUpSocketAndTag(AF_INET, &sockCookie, TEST_TAG, TEST_UID, TEST_UID);
148 expectUidTag(sockCookie, TEST_UID, TEST_TAG);
149 ASSERT_EQ(0, mBh.untagSocket(v4socket));
150 expectNoTag(sockCookie);
151 expectMapEmpty(mFakeCookieTagMap);
152}
153
154TEST_F(BpfHandlerTest, TestReTagSocket) {
155 uint64_t sockCookie;
156 int v4socket = setUpSocketAndTag(AF_INET, &sockCookie, TEST_TAG, TEST_UID, TEST_UID);
157 expectUidTag(sockCookie, TEST_UID, TEST_TAG);
158 ASSERT_EQ(0, mBh.tagSocket(v4socket, TEST_TAG + 1, TEST_UID + 1, TEST_UID + 1));
159 expectUidTag(sockCookie, TEST_UID + 1, TEST_TAG + 1);
160}
161
162TEST_F(BpfHandlerTest, TestTagTwoSockets) {
163 uint64_t sockCookie1;
164 uint64_t sockCookie2;
165 int v4socket1 = setUpSocketAndTag(AF_INET, &sockCookie1, TEST_TAG, TEST_UID, TEST_UID);
166 setUpSocketAndTag(AF_INET, &sockCookie2, TEST_TAG, TEST_UID, TEST_UID);
167 expectUidTag(sockCookie1, TEST_UID, TEST_TAG);
168 expectUidTag(sockCookie2, TEST_UID, TEST_TAG);
169 ASSERT_EQ(0, mBh.untagSocket(v4socket1));
170 expectNoTag(sockCookie1);
171 expectUidTag(sockCookie2, TEST_UID, TEST_TAG);
172 ASSERT_FALSE(mFakeCookieTagMap.getNextKey(sockCookie2).ok());
173}
174
175TEST_F(BpfHandlerTest, TestTagSocketV6) {
176 uint64_t sockCookie;
177 int v6socket = setUpSocketAndTag(AF_INET6, &sockCookie, TEST_TAG, TEST_UID, TEST_UID);
178 expectUidTag(sockCookie, TEST_UID, TEST_TAG);
179 ASSERT_EQ(0, mBh.untagSocket(v6socket));
180 expectNoTag(sockCookie);
181 expectMapEmpty(mFakeCookieTagMap);
182}
183
184TEST_F(BpfHandlerTest, TestTagInvalidSocket) {
185 int invalidSocket = -1;
186 ASSERT_GT(0, mBh.tagSocket(invalidSocket, TEST_TAG, TEST_UID, TEST_UID));
187 expectMapEmpty(mFakeCookieTagMap);
188}
189
190TEST_F(BpfHandlerTest, TestTagSocketWithoutPermission) {
191 int sock = socket(AF_INET6, SOCK_STREAM | SOCK_CLOEXEC, 0);
192 ASSERT_NE(-1, sock);
193 ASSERT_EQ(-EPERM, mBh.tagSocket(sock, TEST_TAG, TEST_UID, TEST_UID2));
194 expectMapEmpty(mFakeCookieTagMap);
195}
196
197TEST_F(BpfHandlerTest, TestTagSocketWithPermission) {
198 // Grant permission to real uid. In practice, the uid permission map will be updated by
199 // TrafficController::setPermissionForUids().
200 uid_t realUid = TEST_UID2;
201 ASSERT_RESULT_OK(mFakeUidPermissionMap.writeValue(realUid,
202 BPF_PERMISSION_UPDATE_DEVICE_STATS, BPF_ANY));
203
204 // Tag a socket to a different uid other then realUid.
205 uint64_t sockCookie;
206 int v6socket = setUpSocketAndTag(AF_INET6, &sockCookie, TEST_TAG, TEST_UID, realUid);
207 expectUidTag(sockCookie, TEST_UID, TEST_TAG);
208 EXPECT_EQ(0, mBh.untagSocket(v6socket));
209 expectNoTag(sockCookie);
210 expectMapEmpty(mFakeCookieTagMap);
211}
212
213TEST_F(BpfHandlerTest, TestUntagInvalidSocket) {
214 int invalidSocket = -1;
215 ASSERT_GT(0, mBh.untagSocket(invalidSocket));
216 int v4socket = socket(AF_INET, SOCK_STREAM | SOCK_CLOEXEC, 0);
217 ASSERT_GT(0, mBh.untagSocket(v4socket));
218 expectMapEmpty(mFakeCookieTagMap);
219}
220
221TEST_F(BpfHandlerTest, TestTagSocketReachLimitFail) {
222 uid_t uid = TEST_UID;
223 StatsKey tagStatsMapKey[3];
224 for (int i = 0; i < 3; i++) {
225 uint64_t cookie = TEST_COOKIE + i;
226 uint32_t tag = TEST_TAG + i;
227 populateFakeStats(cookie, uid, tag, &tagStatsMapKey[i]);
228 }
229 expectTagSocketReachLimit(TEST_TAG, TEST_UID);
230}
231
232TEST_F(BpfHandlerTest, TestTagSocketReachTotalLimitFail) {
233 StatsKey tagStatsMapKey[4];
234 for (int i = 0; i < 4; i++) {
235 uint64_t cookie = TEST_COOKIE + i;
236 uint32_t tag = TEST_TAG + i;
237 uid_t uid = TEST_UID + i;
238 populateFakeStats(cookie, uid, tag, &tagStatsMapKey[i]);
239 }
240 expectTagSocketReachLimit(TEST_TAG, TEST_UID);
241}
242
243} // namespace net
244} // namespace android