Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2018 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | #include <string> |
| 18 | |
| 19 | #include <fcntl.h> |
| 20 | #include <inttypes.h> |
| 21 | #include <limits.h> |
| 22 | #include <linux/inet_diag.h> |
| 23 | #include <linux/sock_diag.h> |
| 24 | #include <net/if.h> |
| 25 | #include <sys/socket.h> |
| 26 | #include <sys/types.h> |
| 27 | #include <unistd.h> |
| 28 | |
| 29 | #include <gtest/gtest.h> |
| 30 | |
| 31 | #include <cutils/qtaguid.h> |
Suren Baghdasaryan | e072a3c | 2019-01-16 14:36:07 -0800 | [diff] [blame] | 32 | #include <processgroup/processgroup.h> |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 33 | |
| 34 | #include <android-base/stringprintf.h> |
| 35 | #include <android-base/strings.h> |
| 36 | |
Chenbo Feng | 4f6c237 | 2018-04-26 10:37:55 -0700 | [diff] [blame] | 37 | #include "bpf/BpfMap.h" |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 38 | #include "bpf/BpfUtils.h" |
Chenbo Feng | d6104d1 | 2018-10-16 20:29:29 -0700 | [diff] [blame] | 39 | #include "netdbpf/bpf_shared.h" |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 40 | |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 41 | using android::base::Result; |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 42 | |
| 43 | namespace android { |
| 44 | namespace bpf { |
| 45 | |
| 46 | // Use the upper limit of uid to avoid conflict with real app uids. We can't use UID_MAX because |
| 47 | // it's -1, which is INVALID_UID. |
| 48 | constexpr uid_t TEST_UID = UID_MAX - 1; |
| 49 | constexpr uint32_t TEST_TAG = 42; |
| 50 | constexpr int TEST_COUNTERSET = 1; |
| 51 | constexpr int DEFAULT_COUNTERSET = 0; |
| 52 | |
| 53 | class BpfBasicTest : public testing::Test { |
| 54 | protected: |
| 55 | BpfBasicTest() {} |
| 56 | }; |
| 57 | |
| 58 | TEST_F(BpfBasicTest, TestCgroupMounted) { |
| 59 | SKIP_IF_BPF_NOT_SUPPORTED; |
| 60 | |
Suren Baghdasaryan | e072a3c | 2019-01-16 14:36:07 -0800 | [diff] [blame] | 61 | std::string cg2_path; |
Maciej Żenczykowski | 6bacd4f | 2020-01-21 23:05:26 -0800 | [diff] [blame] | 62 | #if 0 |
| 63 | // This is the correct way to fetch cg2_path, but it occasionally hits ASAN |
| 64 | // problems due to memory allocated in non ASAN code being freed later by us |
Suren Baghdasaryan | e072a3c | 2019-01-16 14:36:07 -0800 | [diff] [blame] | 65 | ASSERT_EQ(true, CgroupGetControllerPath(CGROUPV2_CONTROLLER_NAME, &cg2_path)); |
Maciej Żenczykowski | 6bacd4f | 2020-01-21 23:05:26 -0800 | [diff] [blame] | 66 | #else |
| 67 | ASSERT_EQ(true, CgroupGetControllerPath(CGROUPV2_CONTROLLER_NAME, nullptr)); |
| 68 | // Constant derived from //system/core/libprocessgroup/profiles/cgroups.json |
Marco Ballesio | c0487fd | 2020-08-21 07:57:47 -0700 | [diff] [blame] | 69 | cg2_path = "/sys/fs/cgroup"; |
Maciej Żenczykowski | 6bacd4f | 2020-01-21 23:05:26 -0800 | [diff] [blame] | 70 | #endif |
Suren Baghdasaryan | e072a3c | 2019-01-16 14:36:07 -0800 | [diff] [blame] | 71 | ASSERT_EQ(0, access(cg2_path.c_str(), R_OK)); |
| 72 | ASSERT_EQ(0, access((cg2_path + "/cgroup.controllers").c_str(), R_OK)); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 73 | } |
| 74 | |
| 75 | TEST_F(BpfBasicTest, TestTrafficControllerSetUp) { |
| 76 | SKIP_IF_BPF_NOT_SUPPORTED; |
| 77 | |
| 78 | ASSERT_EQ(0, access(BPF_EGRESS_PROG_PATH, R_OK)); |
| 79 | ASSERT_EQ(0, access(BPF_INGRESS_PROG_PATH, R_OK)); |
| 80 | ASSERT_EQ(0, access(XT_BPF_INGRESS_PROG_PATH, R_OK)); |
| 81 | ASSERT_EQ(0, access(XT_BPF_EGRESS_PROG_PATH, R_OK)); |
| 82 | ASSERT_EQ(0, access(COOKIE_TAG_MAP_PATH, R_OK)); |
| 83 | ASSERT_EQ(0, access(UID_COUNTERSET_MAP_PATH, R_OK)); |
Chenbo Feng | f434e86 | 2018-06-27 14:08:39 -0700 | [diff] [blame] | 84 | ASSERT_EQ(0, access(STATS_MAP_A_PATH, R_OK)); |
| 85 | ASSERT_EQ(0, access(STATS_MAP_B_PATH, R_OK)); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 86 | ASSERT_EQ(0, access(IFACE_INDEX_NAME_MAP_PATH, R_OK)); |
| 87 | ASSERT_EQ(0, access(IFACE_STATS_MAP_PATH, R_OK)); |
Chenbo Feng | 703798e | 2018-06-15 17:07:59 -0700 | [diff] [blame] | 88 | ASSERT_EQ(0, access(CONFIGURATION_MAP_PATH, R_OK)); |
| 89 | ASSERT_EQ(0, access(UID_OWNER_MAP_PATH, R_OK)); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 90 | } |
| 91 | |
Chenbo Feng | bf660aa | 2019-02-26 16:12:27 -0800 | [diff] [blame] | 92 | TEST_F(BpfBasicTest, TestSocketFilterSetUp) { |
| 93 | SKIP_IF_EXTENDED_BPF_NOT_SUPPORTED; |
| 94 | |
| 95 | ASSERT_EQ(0, access(CGROUP_SOCKET_PROG_PATH, R_OK)); |
| 96 | ASSERT_EQ(0, access(UID_PERMISSION_MAP_PATH, R_OK)); |
| 97 | } |
| 98 | |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 99 | TEST_F(BpfBasicTest, TestTagSocket) { |
| 100 | SKIP_IF_BPF_NOT_SUPPORTED; |
| 101 | |
Maciej Żenczykowski | f879a7f | 2020-01-20 03:18:06 -0800 | [diff] [blame] | 102 | BpfMap<uint64_t, UidTagValue> cookieTagMap(COOKIE_TAG_MAP_PATH); |
Chenbo Feng | 4f6c237 | 2018-04-26 10:37:55 -0700 | [diff] [blame] | 103 | ASSERT_LE(0, cookieTagMap.getMap()); |
Bernie Innocenti | f691826 | 2018-06-11 17:37:35 +0900 | [diff] [blame] | 104 | int sock = socket(AF_INET6, SOCK_STREAM | SOCK_CLOEXEC, 0); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 105 | ASSERT_LE(0, sock); |
| 106 | uint64_t cookie = getSocketCookie(sock); |
| 107 | ASSERT_NE(NONEXISTENT_COOKIE, cookie); |
| 108 | ASSERT_EQ(0, qtaguid_tagSocket(sock, TEST_TAG, TEST_UID)); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 109 | Result<UidTagValue> tagResult = cookieTagMap.readValue(cookie); |
Bernie Innocenti | dfd5a43 | 2020-02-12 09:21:56 +0900 | [diff] [blame] | 110 | ASSERT_RESULT_OK(tagResult); |
Chenbo Feng | 4f6c237 | 2018-04-26 10:37:55 -0700 | [diff] [blame] | 111 | ASSERT_EQ(TEST_UID, tagResult.value().uid); |
| 112 | ASSERT_EQ(TEST_TAG, tagResult.value().tag); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 113 | ASSERT_EQ(0, qtaguid_untagSocket(sock)); |
Chenbo Feng | 4f6c237 | 2018-04-26 10:37:55 -0700 | [diff] [blame] | 114 | tagResult = cookieTagMap.readValue(cookie); |
Bernie Innocenti | dfd5a43 | 2020-02-12 09:21:56 +0900 | [diff] [blame] | 115 | ASSERT_FALSE(tagResult.ok()); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 116 | ASSERT_EQ(ENOENT, tagResult.error().code()); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 117 | } |
| 118 | |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 119 | TEST_F(BpfBasicTest, TestCloseSocketWithoutUntag) { |
| 120 | SKIP_IF_BPF_NOT_SUPPORTED; |
| 121 | |
Maciej Żenczykowski | f879a7f | 2020-01-20 03:18:06 -0800 | [diff] [blame] | 122 | BpfMap<uint64_t, UidTagValue> cookieTagMap(COOKIE_TAG_MAP_PATH); |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 123 | ASSERT_LE(0, cookieTagMap.getMap()); |
Bernie Innocenti | f691826 | 2018-06-11 17:37:35 +0900 | [diff] [blame] | 124 | int sock = socket(AF_INET6, SOCK_STREAM | SOCK_CLOEXEC, 0); |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 125 | ASSERT_LE(0, sock); |
| 126 | uint64_t cookie = getSocketCookie(sock); |
| 127 | ASSERT_NE(NONEXISTENT_COOKIE, cookie); |
| 128 | ASSERT_EQ(0, qtaguid_tagSocket(sock, TEST_TAG, TEST_UID)); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 129 | Result<UidTagValue> tagResult = cookieTagMap.readValue(cookie); |
Bernie Innocenti | dfd5a43 | 2020-02-12 09:21:56 +0900 | [diff] [blame] | 130 | ASSERT_RESULT_OK(tagResult); |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 131 | ASSERT_EQ(TEST_UID, tagResult.value().uid); |
| 132 | ASSERT_EQ(TEST_TAG, tagResult.value().tag); |
| 133 | ASSERT_EQ(0, close(sock)); |
| 134 | // Check map periodically until sk destroy handler have done its job. |
| 135 | for (int i = 0; i < 10; i++) { |
Maciej Żenczykowski | d0e14f8 | 2019-04-24 12:41:17 -0700 | [diff] [blame] | 136 | usleep(5000); // 5ms |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 137 | tagResult = cookieTagMap.readValue(cookie); |
Bernie Innocenti | dfd5a43 | 2020-02-12 09:21:56 +0900 | [diff] [blame] | 138 | if (!tagResult.ok()) { |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 139 | ASSERT_EQ(ENOENT, tagResult.error().code()); |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 140 | return; |
| 141 | } |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 142 | } |
Maciej Żenczykowski | 6ee57d7 | 2019-04-23 19:14:09 -0700 | [diff] [blame] | 143 | FAIL() << "socket tag still exist after 50ms"; |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 144 | } |
| 145 | |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 146 | TEST_F(BpfBasicTest, TestChangeCounterSet) { |
| 147 | SKIP_IF_BPF_NOT_SUPPORTED; |
| 148 | |
Maciej Żenczykowski | f879a7f | 2020-01-20 03:18:06 -0800 | [diff] [blame] | 149 | BpfMap<uint32_t, uint8_t> uidCounterSetMap(UID_COUNTERSET_MAP_PATH); |
Chenbo Feng | 4f6c237 | 2018-04-26 10:37:55 -0700 | [diff] [blame] | 150 | ASSERT_LE(0, uidCounterSetMap.getMap()); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 151 | ASSERT_EQ(0, qtaguid_setCounterSet(TEST_COUNTERSET, TEST_UID)); |
| 152 | uid_t uid = TEST_UID; |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 153 | Result<uint8_t> counterSetResult = uidCounterSetMap.readValue(uid); |
Bernie Innocenti | dfd5a43 | 2020-02-12 09:21:56 +0900 | [diff] [blame] | 154 | ASSERT_RESULT_OK(counterSetResult); |
Chenbo Feng | 4f6c237 | 2018-04-26 10:37:55 -0700 | [diff] [blame] | 155 | ASSERT_EQ(TEST_COUNTERSET, counterSetResult.value()); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 156 | ASSERT_EQ(0, qtaguid_setCounterSet(DEFAULT_COUNTERSET, TEST_UID)); |
Chenbo Feng | 4f6c237 | 2018-04-26 10:37:55 -0700 | [diff] [blame] | 157 | counterSetResult = uidCounterSetMap.readValue(uid); |
Bernie Innocenti | dfd5a43 | 2020-02-12 09:21:56 +0900 | [diff] [blame] | 158 | ASSERT_FALSE(counterSetResult.ok()); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 159 | ASSERT_EQ(ENOENT, counterSetResult.error().code()); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 160 | } |
| 161 | |
| 162 | TEST_F(BpfBasicTest, TestDeleteTagData) { |
| 163 | SKIP_IF_BPF_NOT_SUPPORTED; |
| 164 | |
Maciej Żenczykowski | f879a7f | 2020-01-20 03:18:06 -0800 | [diff] [blame] | 165 | BpfMap<StatsKey, StatsValue> statsMapA(STATS_MAP_A_PATH); |
Chenbo Feng | f434e86 | 2018-06-27 14:08:39 -0700 | [diff] [blame] | 166 | ASSERT_LE(0, statsMapA.getMap()); |
Maciej Żenczykowski | f879a7f | 2020-01-20 03:18:06 -0800 | [diff] [blame] | 167 | BpfMap<StatsKey, StatsValue> statsMapB(STATS_MAP_B_PATH); |
Chenbo Feng | f434e86 | 2018-06-27 14:08:39 -0700 | [diff] [blame] | 168 | ASSERT_LE(0, statsMapB.getMap()); |
Maciej Żenczykowski | f879a7f | 2020-01-20 03:18:06 -0800 | [diff] [blame] | 169 | BpfMap<uint32_t, StatsValue> appUidStatsMap(APP_UID_STATS_MAP_PATH); |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 170 | ASSERT_LE(0, appUidStatsMap.getMap()); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 171 | |
| 172 | StatsKey key = {.uid = TEST_UID, .tag = TEST_TAG, .counterSet = TEST_COUNTERSET, |
| 173 | .ifaceIndex = 1}; |
| 174 | StatsValue statsMapValue = {.rxPackets = 1, .rxBytes = 100}; |
Bernie Innocenti | dfd5a43 | 2020-02-12 09:21:56 +0900 | [diff] [blame] | 175 | EXPECT_RESULT_OK(statsMapB.writeValue(key, statsMapValue, BPF_ANY)); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 176 | key.tag = 0; |
Bernie Innocenti | dfd5a43 | 2020-02-12 09:21:56 +0900 | [diff] [blame] | 177 | EXPECT_RESULT_OK(statsMapA.writeValue(key, statsMapValue, BPF_ANY)); |
| 178 | EXPECT_RESULT_OK(appUidStatsMap.writeValue(TEST_UID, statsMapValue, BPF_ANY)); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 179 | ASSERT_EQ(0, qtaguid_deleteTagData(0, TEST_UID)); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 180 | Result<StatsValue> statsResult = statsMapA.readValue(key); |
Bernie Innocenti | dfd5a43 | 2020-02-12 09:21:56 +0900 | [diff] [blame] | 181 | ASSERT_FALSE(statsResult.ok()); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 182 | ASSERT_EQ(ENOENT, statsResult.error().code()); |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 183 | statsResult = appUidStatsMap.readValue(TEST_UID); |
Bernie Innocenti | dfd5a43 | 2020-02-12 09:21:56 +0900 | [diff] [blame] | 184 | ASSERT_FALSE(statsResult.ok()); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 185 | ASSERT_EQ(ENOENT, statsResult.error().code()); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 186 | key.tag = TEST_TAG; |
Chenbo Feng | f434e86 | 2018-06-27 14:08:39 -0700 | [diff] [blame] | 187 | statsResult = statsMapB.readValue(key); |
Bernie Innocenti | dfd5a43 | 2020-02-12 09:21:56 +0900 | [diff] [blame] | 188 | ASSERT_FALSE(statsResult.ok()); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 189 | ASSERT_EQ(ENOENT, statsResult.error().code()); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 190 | } |
| 191 | |
| 192 | } |
| 193 | } |