blob: 7795be523a52a8da760587f92f9b1ac6ab0f93ef [file] [log] [blame]
# Copyright (C) 2024 The Android Open Source Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
from absl.testing import parameterized
from mobly import asserts
from net_tests_utils.host.python import apf_test_base, apf_utils
# Constants.
COUNTER_DROPPED_ETHERTYPE_NOT_ALLOWED = "DROPPED_ETHERTYPE_NOT_ALLOWED"
ETHER_BROADCAST_ADDR = "FFFFFFFFFFFF"
class ApfV4Test(apf_test_base.ApfTestBase, parameterized.TestCase):
def setup_class(self):
super().setup_class()
# Check apf version preconditions.
caps = apf_utils.get_apf_capabilities(
self.clientDevice, self.client_iface_name
)
if self.client.getVsrApiLevel() >= 34:
# Enforce APFv4 support for Android 14+ VSR.
asserts.assert_true(
caps.apf_version_supported >= 4,
"APFv4 became mandatory in Android 14 VSR.",
)
else:
# Skip tests for APF version < 4 before Android 14 VSR.
apf_utils.assume_apf_version_support_at_least(
self.clientDevice, self.client_iface_name, 4
)
# APF L2 packet filtering on V+ Android allows only specific
# types: IPv4, ARP, IPv6, EAPOL, WAPI.
# Tests can use any disallowed packet type. Currently,
# several ethertypes from the legacy ApfFilter denylist are used.
@parameterized.parameters(
"88a2", # ATA over Ethernet
"88a4", # EtherCAT
"88b8", # GOOSE (Generic Object Oriented Substation event)
"88cd", # SERCOS III
"88e3", # Media Redundancy Protocol (IEC62439-2)
) # Declare inputs for state_str and expected_result.
def test_apf_drop_ethertype_not_allowed(self, blocked_ether_type):
# Ethernet header (14 bytes).
packet = ETHER_BROADCAST_ADDR # Destination MAC (broadcast)
packet += self.server_mac_address.replace(":", "") # Source MAC
packet += blocked_ether_type
# Pad with zeroes to minimum ethernet frame length.
packet += "00" * 46
self.send_packet_and_expect_counter_increased(
packet, COUNTER_DROPPED_ETHERTYPE_NOT_ALLOWED
)