Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2018 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | #include <string> |
| 18 | |
| 19 | #include <fcntl.h> |
| 20 | #include <inttypes.h> |
| 21 | #include <limits.h> |
| 22 | #include <linux/inet_diag.h> |
| 23 | #include <linux/sock_diag.h> |
| 24 | #include <net/if.h> |
| 25 | #include <sys/socket.h> |
| 26 | #include <sys/types.h> |
| 27 | #include <unistd.h> |
| 28 | |
| 29 | #include <gtest/gtest.h> |
| 30 | |
| 31 | #include <cutils/qtaguid.h> |
Suren Baghdasaryan | e072a3c | 2019-01-16 14:36:07 -0800 | [diff] [blame] | 32 | #include <processgroup/processgroup.h> |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 33 | |
| 34 | #include <android-base/stringprintf.h> |
| 35 | #include <android-base/strings.h> |
| 36 | |
Chenbo Feng | 4f6c237 | 2018-04-26 10:37:55 -0700 | [diff] [blame] | 37 | #include "bpf/BpfMap.h" |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 38 | #include "bpf/BpfUtils.h" |
Chenbo Feng | d6104d1 | 2018-10-16 20:29:29 -0700 | [diff] [blame] | 39 | #include "netdbpf/bpf_shared.h" |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 40 | |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 41 | using android::base::Result; |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 42 | |
| 43 | namespace android { |
| 44 | namespace bpf { |
| 45 | |
| 46 | // Use the upper limit of uid to avoid conflict with real app uids. We can't use UID_MAX because |
| 47 | // it's -1, which is INVALID_UID. |
| 48 | constexpr uid_t TEST_UID = UID_MAX - 1; |
| 49 | constexpr uint32_t TEST_TAG = 42; |
| 50 | constexpr int TEST_COUNTERSET = 1; |
| 51 | constexpr int DEFAULT_COUNTERSET = 0; |
| 52 | |
Chenbo Feng | bf660aa | 2019-02-26 16:12:27 -0800 | [diff] [blame] | 53 | #define SKIP_IF_EXTENDED_BPF_NOT_SUPPORTED \ |
| 54 | do { \ |
| 55 | if (android::bpf::getBpfSupportLevel() != android::bpf::BpfLevel::EXTENDED) { \ |
| 56 | GTEST_LOG_(INFO) << "This test is skipped since extended bpf feature" \ |
| 57 | << "not supported\n"; \ |
| 58 | return; \ |
| 59 | } \ |
| 60 | } while (0) |
| 61 | |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 62 | class BpfBasicTest : public testing::Test { |
| 63 | protected: |
| 64 | BpfBasicTest() {} |
| 65 | }; |
| 66 | |
| 67 | TEST_F(BpfBasicTest, TestCgroupMounted) { |
| 68 | SKIP_IF_BPF_NOT_SUPPORTED; |
| 69 | |
Suren Baghdasaryan | e072a3c | 2019-01-16 14:36:07 -0800 | [diff] [blame] | 70 | std::string cg2_path; |
Maciej Żenczykowski | 6bacd4f | 2020-01-21 23:05:26 -0800 | [diff] [blame] | 71 | #if 0 |
| 72 | // This is the correct way to fetch cg2_path, but it occasionally hits ASAN |
| 73 | // problems due to memory allocated in non ASAN code being freed later by us |
Suren Baghdasaryan | e072a3c | 2019-01-16 14:36:07 -0800 | [diff] [blame] | 74 | ASSERT_EQ(true, CgroupGetControllerPath(CGROUPV2_CONTROLLER_NAME, &cg2_path)); |
Maciej Żenczykowski | 6bacd4f | 2020-01-21 23:05:26 -0800 | [diff] [blame] | 75 | #else |
| 76 | ASSERT_EQ(true, CgroupGetControllerPath(CGROUPV2_CONTROLLER_NAME, nullptr)); |
| 77 | // Constant derived from //system/core/libprocessgroup/profiles/cgroups.json |
| 78 | cg2_path = "/dev/cg2_bpf"; |
| 79 | #endif |
Suren Baghdasaryan | e072a3c | 2019-01-16 14:36:07 -0800 | [diff] [blame] | 80 | ASSERT_EQ(0, access(cg2_path.c_str(), R_OK)); |
| 81 | ASSERT_EQ(0, access((cg2_path + "/cgroup.controllers").c_str(), R_OK)); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 82 | } |
| 83 | |
| 84 | TEST_F(BpfBasicTest, TestTrafficControllerSetUp) { |
| 85 | SKIP_IF_BPF_NOT_SUPPORTED; |
| 86 | |
| 87 | ASSERT_EQ(0, access(BPF_EGRESS_PROG_PATH, R_OK)); |
| 88 | ASSERT_EQ(0, access(BPF_INGRESS_PROG_PATH, R_OK)); |
| 89 | ASSERT_EQ(0, access(XT_BPF_INGRESS_PROG_PATH, R_OK)); |
| 90 | ASSERT_EQ(0, access(XT_BPF_EGRESS_PROG_PATH, R_OK)); |
| 91 | ASSERT_EQ(0, access(COOKIE_TAG_MAP_PATH, R_OK)); |
| 92 | ASSERT_EQ(0, access(UID_COUNTERSET_MAP_PATH, R_OK)); |
Chenbo Feng | f434e86 | 2018-06-27 14:08:39 -0700 | [diff] [blame] | 93 | ASSERT_EQ(0, access(STATS_MAP_A_PATH, R_OK)); |
| 94 | ASSERT_EQ(0, access(STATS_MAP_B_PATH, R_OK)); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 95 | ASSERT_EQ(0, access(IFACE_INDEX_NAME_MAP_PATH, R_OK)); |
| 96 | ASSERT_EQ(0, access(IFACE_STATS_MAP_PATH, R_OK)); |
Chenbo Feng | 703798e | 2018-06-15 17:07:59 -0700 | [diff] [blame] | 97 | ASSERT_EQ(0, access(CONFIGURATION_MAP_PATH, R_OK)); |
| 98 | ASSERT_EQ(0, access(UID_OWNER_MAP_PATH, R_OK)); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 99 | } |
| 100 | |
Chenbo Feng | bf660aa | 2019-02-26 16:12:27 -0800 | [diff] [blame] | 101 | TEST_F(BpfBasicTest, TestSocketFilterSetUp) { |
| 102 | SKIP_IF_EXTENDED_BPF_NOT_SUPPORTED; |
| 103 | |
| 104 | ASSERT_EQ(0, access(CGROUP_SOCKET_PROG_PATH, R_OK)); |
| 105 | ASSERT_EQ(0, access(UID_PERMISSION_MAP_PATH, R_OK)); |
| 106 | } |
| 107 | |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 108 | TEST_F(BpfBasicTest, TestTagSocket) { |
| 109 | SKIP_IF_BPF_NOT_SUPPORTED; |
| 110 | |
Maciej Żenczykowski | f879a7f | 2020-01-20 03:18:06 -0800 | [diff] [blame^] | 111 | BpfMap<uint64_t, UidTagValue> cookieTagMap(COOKIE_TAG_MAP_PATH); |
Chenbo Feng | 4f6c237 | 2018-04-26 10:37:55 -0700 | [diff] [blame] | 112 | ASSERT_LE(0, cookieTagMap.getMap()); |
Bernie Innocenti | f691826 | 2018-06-11 17:37:35 +0900 | [diff] [blame] | 113 | int sock = socket(AF_INET6, SOCK_STREAM | SOCK_CLOEXEC, 0); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 114 | ASSERT_LE(0, sock); |
| 115 | uint64_t cookie = getSocketCookie(sock); |
| 116 | ASSERT_NE(NONEXISTENT_COOKIE, cookie); |
| 117 | ASSERT_EQ(0, qtaguid_tagSocket(sock, TEST_TAG, TEST_UID)); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 118 | Result<UidTagValue> tagResult = cookieTagMap.readValue(cookie); |
| 119 | ASSERT_TRUE(tagResult); |
Chenbo Feng | 4f6c237 | 2018-04-26 10:37:55 -0700 | [diff] [blame] | 120 | ASSERT_EQ(TEST_UID, tagResult.value().uid); |
| 121 | ASSERT_EQ(TEST_TAG, tagResult.value().tag); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 122 | ASSERT_EQ(0, qtaguid_untagSocket(sock)); |
Chenbo Feng | 4f6c237 | 2018-04-26 10:37:55 -0700 | [diff] [blame] | 123 | tagResult = cookieTagMap.readValue(cookie); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 124 | ASSERT_FALSE(tagResult); |
| 125 | ASSERT_EQ(ENOENT, tagResult.error().code()); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 126 | } |
| 127 | |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 128 | TEST_F(BpfBasicTest, TestCloseSocketWithoutUntag) { |
| 129 | SKIP_IF_BPF_NOT_SUPPORTED; |
| 130 | |
Maciej Żenczykowski | f879a7f | 2020-01-20 03:18:06 -0800 | [diff] [blame^] | 131 | BpfMap<uint64_t, UidTagValue> cookieTagMap(COOKIE_TAG_MAP_PATH); |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 132 | ASSERT_LE(0, cookieTagMap.getMap()); |
Bernie Innocenti | f691826 | 2018-06-11 17:37:35 +0900 | [diff] [blame] | 133 | int sock = socket(AF_INET6, SOCK_STREAM | SOCK_CLOEXEC, 0); |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 134 | ASSERT_LE(0, sock); |
| 135 | uint64_t cookie = getSocketCookie(sock); |
| 136 | ASSERT_NE(NONEXISTENT_COOKIE, cookie); |
| 137 | ASSERT_EQ(0, qtaguid_tagSocket(sock, TEST_TAG, TEST_UID)); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 138 | Result<UidTagValue> tagResult = cookieTagMap.readValue(cookie); |
| 139 | ASSERT_TRUE(tagResult); |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 140 | ASSERT_EQ(TEST_UID, tagResult.value().uid); |
| 141 | ASSERT_EQ(TEST_TAG, tagResult.value().tag); |
| 142 | ASSERT_EQ(0, close(sock)); |
| 143 | // Check map periodically until sk destroy handler have done its job. |
| 144 | for (int i = 0; i < 10; i++) { |
Maciej Żenczykowski | d0e14f8 | 2019-04-24 12:41:17 -0700 | [diff] [blame] | 145 | usleep(5000); // 5ms |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 146 | tagResult = cookieTagMap.readValue(cookie); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 147 | if (!tagResult) { |
| 148 | ASSERT_EQ(ENOENT, tagResult.error().code()); |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 149 | return; |
| 150 | } |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 151 | } |
Maciej Żenczykowski | 6ee57d7 | 2019-04-23 19:14:09 -0700 | [diff] [blame] | 152 | FAIL() << "socket tag still exist after 50ms"; |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 153 | } |
| 154 | |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 155 | TEST_F(BpfBasicTest, TestChangeCounterSet) { |
| 156 | SKIP_IF_BPF_NOT_SUPPORTED; |
| 157 | |
Maciej Żenczykowski | f879a7f | 2020-01-20 03:18:06 -0800 | [diff] [blame^] | 158 | BpfMap<uint32_t, uint8_t> uidCounterSetMap(UID_COUNTERSET_MAP_PATH); |
Chenbo Feng | 4f6c237 | 2018-04-26 10:37:55 -0700 | [diff] [blame] | 159 | ASSERT_LE(0, uidCounterSetMap.getMap()); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 160 | ASSERT_EQ(0, qtaguid_setCounterSet(TEST_COUNTERSET, TEST_UID)); |
| 161 | uid_t uid = TEST_UID; |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 162 | Result<uint8_t> counterSetResult = uidCounterSetMap.readValue(uid); |
| 163 | ASSERT_TRUE(counterSetResult); |
Chenbo Feng | 4f6c237 | 2018-04-26 10:37:55 -0700 | [diff] [blame] | 164 | ASSERT_EQ(TEST_COUNTERSET, counterSetResult.value()); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 165 | ASSERT_EQ(0, qtaguid_setCounterSet(DEFAULT_COUNTERSET, TEST_UID)); |
Chenbo Feng | 4f6c237 | 2018-04-26 10:37:55 -0700 | [diff] [blame] | 166 | counterSetResult = uidCounterSetMap.readValue(uid); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 167 | ASSERT_FALSE(counterSetResult); |
| 168 | ASSERT_EQ(ENOENT, counterSetResult.error().code()); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 169 | } |
| 170 | |
| 171 | TEST_F(BpfBasicTest, TestDeleteTagData) { |
| 172 | SKIP_IF_BPF_NOT_SUPPORTED; |
| 173 | |
Maciej Żenczykowski | f879a7f | 2020-01-20 03:18:06 -0800 | [diff] [blame^] | 174 | BpfMap<StatsKey, StatsValue> statsMapA(STATS_MAP_A_PATH); |
Chenbo Feng | f434e86 | 2018-06-27 14:08:39 -0700 | [diff] [blame] | 175 | ASSERT_LE(0, statsMapA.getMap()); |
Maciej Żenczykowski | f879a7f | 2020-01-20 03:18:06 -0800 | [diff] [blame^] | 176 | BpfMap<StatsKey, StatsValue> statsMapB(STATS_MAP_B_PATH); |
Chenbo Feng | f434e86 | 2018-06-27 14:08:39 -0700 | [diff] [blame] | 177 | ASSERT_LE(0, statsMapB.getMap()); |
Maciej Żenczykowski | f879a7f | 2020-01-20 03:18:06 -0800 | [diff] [blame^] | 178 | BpfMap<uint32_t, StatsValue> appUidStatsMap(APP_UID_STATS_MAP_PATH); |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 179 | ASSERT_LE(0, appUidStatsMap.getMap()); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 180 | |
| 181 | StatsKey key = {.uid = TEST_UID, .tag = TEST_TAG, .counterSet = TEST_COUNTERSET, |
| 182 | .ifaceIndex = 1}; |
| 183 | StatsValue statsMapValue = {.rxPackets = 1, .rxBytes = 100}; |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 184 | EXPECT_TRUE(statsMapB.writeValue(key, statsMapValue, BPF_ANY)); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 185 | key.tag = 0; |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 186 | EXPECT_TRUE(statsMapA.writeValue(key, statsMapValue, BPF_ANY)); |
| 187 | EXPECT_TRUE(appUidStatsMap.writeValue(TEST_UID, statsMapValue, BPF_ANY)); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 188 | ASSERT_EQ(0, qtaguid_deleteTagData(0, TEST_UID)); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 189 | Result<StatsValue> statsResult = statsMapA.readValue(key); |
| 190 | ASSERT_FALSE(statsResult); |
| 191 | ASSERT_EQ(ENOENT, statsResult.error().code()); |
Chenbo Feng | bc4a15f | 2018-05-11 19:15:15 -0700 | [diff] [blame] | 192 | statsResult = appUidStatsMap.readValue(TEST_UID); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 193 | ASSERT_FALSE(statsResult); |
| 194 | ASSERT_EQ(ENOENT, statsResult.error().code()); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 195 | key.tag = TEST_TAG; |
Chenbo Feng | f434e86 | 2018-06-27 14:08:39 -0700 | [diff] [blame] | 196 | statsResult = statsMapB.readValue(key); |
Steven Moreland | a307454 | 2020-01-13 14:13:44 -0800 | [diff] [blame] | 197 | ASSERT_FALSE(statsResult); |
| 198 | ASSERT_EQ(ENOENT, statsResult.error().code()); |
Chenbo Feng | 837ddfc | 2018-05-08 13:45:08 -0700 | [diff] [blame] | 199 | } |
| 200 | |
| 201 | } |
| 202 | } |