| Ken Chen | d4876de | 2023-09-13 00:53:52 +0800 | [diff] [blame] | 1 | /* | 
 | 2 |  * Copyright (C) 2023 The Android Open Source Project | 
 | 3 |  * | 
 | 4 |  * Licensed under the Apache License, Version 2.0 (the "License"); | 
 | 5 |  * you may not use this file except in compliance with the License. | 
 | 6 |  * You may obtain a copy of the License at | 
 | 7 |  * | 
 | 8 |  *      http://www.apache.org/licenses/LICENSE-2.0 | 
 | 9 |  * | 
 | 10 |  * Unless required by applicable law or agreed to in writing, software | 
 | 11 |  * distributed under the License is distributed on an "AS IS" BASIS, | 
 | 12 |  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 | 13 |  * See the License for the specific language governing permissions and | 
 | 14 |  * limitations under the License. | 
 | 15 |  */ | 
 | 16 |  | 
 | 17 | #include <gtest/gtest.h> | 
 | 18 | #include <private/android_filesystem_config.h> | 
 | 19 |  | 
 | 20 | #define BPF_MAP_MAKE_VISIBLE_FOR_TESTING | 
 | 21 | #include "DnsBpfHelper.h" | 
 | 22 |  | 
 | 23 | using namespace android::bpf;  // NOLINT(google-build-using-namespace): exempted | 
 | 24 |  | 
 | 25 | namespace android { | 
 | 26 | namespace net { | 
 | 27 |  | 
 | 28 | constexpr int TEST_MAP_SIZE = 2; | 
 | 29 |  | 
 | 30 | #define ASSERT_VALID(x) ASSERT_TRUE((x).isValid()) | 
 | 31 |  | 
 | 32 | class DnsBpfHelperTest : public ::testing::Test { | 
 | 33 |  protected: | 
 | 34 |   DnsBpfHelper mDnsBpfHelper; | 
 | 35 |   BpfMap<uint32_t, uint32_t> mFakeConfigurationMap; | 
 | 36 |   BpfMap<uint32_t, UidOwnerValue> mFakeUidOwnerMap; | 
| Ken Chen | 006a3f1 | 2023-10-26 09:25:55 +0800 | [diff] [blame] | 37 |   BpfMap<uint32_t, bool> mFakeDataSaverEnabledMap; | 
| Ken Chen | d4876de | 2023-09-13 00:53:52 +0800 | [diff] [blame] | 38 |  | 
 | 39 |   void SetUp() { | 
 | 40 |     mFakeConfigurationMap.resetMap(BPF_MAP_TYPE_ARRAY, CONFIGURATION_MAP_SIZE); | 
 | 41 |     ASSERT_VALID(mFakeConfigurationMap); | 
 | 42 |  | 
 | 43 |     mFakeUidOwnerMap.resetMap(BPF_MAP_TYPE_HASH, TEST_MAP_SIZE); | 
 | 44 |     ASSERT_VALID(mFakeUidOwnerMap); | 
 | 45 |  | 
| Ken Chen | 006a3f1 | 2023-10-26 09:25:55 +0800 | [diff] [blame] | 46 |     mFakeDataSaverEnabledMap.resetMap(BPF_MAP_TYPE_ARRAY, DATA_SAVER_ENABLED_MAP_SIZE); | 
 | 47 |     ASSERT_VALID(mFakeDataSaverEnabledMap); | 
 | 48 |  | 
| Ken Chen | d4876de | 2023-09-13 00:53:52 +0800 | [diff] [blame] | 49 |     mDnsBpfHelper.mConfigurationMap = mFakeConfigurationMap; | 
 | 50 |     ASSERT_VALID(mDnsBpfHelper.mConfigurationMap); | 
 | 51 |     mDnsBpfHelper.mUidOwnerMap = mFakeUidOwnerMap; | 
 | 52 |     ASSERT_VALID(mDnsBpfHelper.mUidOwnerMap); | 
| Ken Chen | 006a3f1 | 2023-10-26 09:25:55 +0800 | [diff] [blame] | 53 |     mDnsBpfHelper.mDataSaverEnabledMap = mFakeDataSaverEnabledMap; | 
 | 54 |     ASSERT_VALID(mDnsBpfHelper.mDataSaverEnabledMap); | 
| Ken Chen | d4876de | 2023-09-13 00:53:52 +0800 | [diff] [blame] | 55 |   } | 
 | 56 |  | 
 | 57 |   void ResetAllMaps() { | 
 | 58 |     mDnsBpfHelper.mConfigurationMap.reset(); | 
 | 59 |     mDnsBpfHelper.mUidOwnerMap.reset(); | 
| Ken Chen | 006a3f1 | 2023-10-26 09:25:55 +0800 | [diff] [blame] | 60 |     mDnsBpfHelper.mDataSaverEnabledMap.reset(); | 
| Ken Chen | d4876de | 2023-09-13 00:53:52 +0800 | [diff] [blame] | 61 |   } | 
 | 62 | }; | 
 | 63 |  | 
 | 64 | TEST_F(DnsBpfHelperTest, IsUidNetworkingBlocked) { | 
 | 65 |   struct TestConfig { | 
 | 66 |     const uid_t uid; | 
 | 67 |     const uint32_t enabledRules; | 
 | 68 |     const uint32_t uidRules; | 
 | 69 |     const int expectedResult; | 
 | 70 |     std::string toString() const { | 
 | 71 |       return fmt::format( | 
 | 72 |           "uid: {}, enabledRules: {}, uidRules: {}, expectedResult: {}", | 
 | 73 |           uid, enabledRules, uidRules, expectedResult); | 
 | 74 |     } | 
 | 75 |   } testConfigs[] = { | 
 | 76 |     // clang-format off | 
 | 77 |     //   No rule enabled: | 
 | 78 |     // uid,         enabledRules,                  uidRules,                      expectedResult | 
 | 79 |     {AID_APP_START, NO_MATCH,                      NO_MATCH,                      false}, | 
 | 80 |  | 
 | 81 |     //   An allowlist rule: | 
 | 82 |     {AID_APP_START, NO_MATCH,                      DOZABLE_MATCH,                 false}, | 
 | 83 |     {AID_APP_START, DOZABLE_MATCH,                 NO_MATCH,                      true}, | 
 | 84 |     {AID_APP_START, DOZABLE_MATCH,                 DOZABLE_MATCH,                 false}, | 
 | 85 |     //   A denylist rule | 
 | 86 |     {AID_APP_START, NO_MATCH,                      STANDBY_MATCH,                 false}, | 
 | 87 |     {AID_APP_START, STANDBY_MATCH,                 NO_MATCH,                      false}, | 
 | 88 |     {AID_APP_START, STANDBY_MATCH,                 STANDBY_MATCH,                 true}, | 
 | 89 |  | 
 | 90 |     //   Multiple rules enabled: | 
 | 91 |     //     Match only part of the enabled allowlist rules. | 
 | 92 |     {AID_APP_START, DOZABLE_MATCH|POWERSAVE_MATCH, DOZABLE_MATCH,                 true}, | 
 | 93 |     {AID_APP_START, DOZABLE_MATCH|POWERSAVE_MATCH, POWERSAVE_MATCH,               true}, | 
 | 94 |     //     Match all of the enabled allowlist rules. | 
 | 95 |     {AID_APP_START, DOZABLE_MATCH|POWERSAVE_MATCH, DOZABLE_MATCH|POWERSAVE_MATCH, false}, | 
 | 96 |     //     Match allowlist. | 
 | 97 |     {AID_APP_START, DOZABLE_MATCH|STANDBY_MATCH,   DOZABLE_MATCH,                 false}, | 
 | 98 |     //     Match no rule. | 
 | 99 |     {AID_APP_START, DOZABLE_MATCH|STANDBY_MATCH,   NO_MATCH,                      true}, | 
 | 100 |     {AID_APP_START, DOZABLE_MATCH|POWERSAVE_MATCH, NO_MATCH,                      true}, | 
 | 101 |  | 
 | 102 |     // System UID: always unblocked. | 
 | 103 |     {AID_SYSTEM,    NO_MATCH,                      NO_MATCH,                      false}, | 
 | 104 |     {AID_SYSTEM,    NO_MATCH,                      DOZABLE_MATCH,                 false}, | 
 | 105 |     {AID_SYSTEM,    DOZABLE_MATCH,                 NO_MATCH,                      false}, | 
 | 106 |     {AID_SYSTEM,    DOZABLE_MATCH,                 DOZABLE_MATCH,                 false}, | 
 | 107 |     {AID_SYSTEM,    NO_MATCH,                      STANDBY_MATCH,                 false}, | 
 | 108 |     {AID_SYSTEM,    STANDBY_MATCH,                 NO_MATCH,                      false}, | 
 | 109 |     {AID_SYSTEM,    STANDBY_MATCH,                 STANDBY_MATCH,                 false}, | 
 | 110 |     {AID_SYSTEM,    DOZABLE_MATCH|POWERSAVE_MATCH, DOZABLE_MATCH,                 false}, | 
 | 111 |     {AID_SYSTEM,    DOZABLE_MATCH|POWERSAVE_MATCH, POWERSAVE_MATCH,               false}, | 
 | 112 |     {AID_SYSTEM,    DOZABLE_MATCH|POWERSAVE_MATCH, DOZABLE_MATCH|POWERSAVE_MATCH, false}, | 
 | 113 |     {AID_SYSTEM,    DOZABLE_MATCH|STANDBY_MATCH,   DOZABLE_MATCH,                 false}, | 
 | 114 |     {AID_SYSTEM,    DOZABLE_MATCH|STANDBY_MATCH,   NO_MATCH,                      false}, | 
 | 115 |     {AID_SYSTEM,    DOZABLE_MATCH|POWERSAVE_MATCH, NO_MATCH,                      false}, | 
 | 116 |     // clang-format on | 
 | 117 |   }; | 
 | 118 |  | 
 | 119 |   for (const auto& config : testConfigs) { | 
 | 120 |     SCOPED_TRACE(config.toString()); | 
 | 121 |  | 
 | 122 |     // Setup maps. | 
 | 123 |     EXPECT_RESULT_OK(mFakeConfigurationMap.writeValue(UID_RULES_CONFIGURATION_KEY, | 
 | 124 |                                                       config.enabledRules, BPF_EXIST)); | 
 | 125 |     EXPECT_RESULT_OK(mFakeUidOwnerMap.writeValue(config.uid, {.iif = 0, .rule = config.uidRules}, | 
 | 126 |                                                  BPF_ANY)); | 
 | 127 |  | 
 | 128 |     // Verify the function. | 
 | 129 |     auto result = mDnsBpfHelper.isUidNetworkingBlocked(config.uid, /*metered=*/false); | 
 | 130 |     EXPECT_TRUE(result.ok()); | 
 | 131 |     EXPECT_EQ(config.expectedResult, result.value()); | 
 | 132 |   } | 
 | 133 | } | 
 | 134 |  | 
 | 135 | TEST_F(DnsBpfHelperTest, IsUidNetworkingBlocked_uninitialized) { | 
 | 136 |   ResetAllMaps(); | 
 | 137 |  | 
 | 138 |   auto result = mDnsBpfHelper.isUidNetworkingBlocked(AID_APP_START, /*metered=*/false); | 
 | 139 |   EXPECT_FALSE(result.ok()); | 
 | 140 |   EXPECT_EQ(EUNATCH, result.error().code()); | 
 | 141 |  | 
 | 142 |   result = mDnsBpfHelper.isUidNetworkingBlocked(AID_SYSTEM, /*metered=*/false); | 
 | 143 |   EXPECT_TRUE(result.ok()); | 
 | 144 |   EXPECT_FALSE(result.value()); | 
 | 145 | } | 
 | 146 |  | 
| Ken Chen | 006a3f1 | 2023-10-26 09:25:55 +0800 | [diff] [blame] | 147 | // Verify DataSaver on metered network. | 
 | 148 | TEST_F(DnsBpfHelperTest, IsUidNetworkingBlocked_metered) { | 
 | 149 |   struct TestConfig { | 
 | 150 |     const uint32_t enabledRules;     // Settings in configuration map. | 
 | 151 |     const bool dataSaverEnabled;     // Settings in data saver enabled map. | 
 | 152 |     const uint32_t uidRules;         // Settings in uid owner map. | 
 | 153 |     const int blocked;               // Whether the UID is expected to be networking blocked or not. | 
 | 154 |     std::string toString() const { | 
 | 155 |       return fmt::format( | 
 | 156 |           ", enabledRules: {}, dataSaverEnabled: {},  uidRules: {}, expect blocked: {}", | 
 | 157 |           enabledRules, dataSaverEnabled, uidRules, blocked); | 
 | 158 |     } | 
 | 159 |   } testConfigs[]{ | 
 | 160 |     // clang-format off | 
 | 161 |     // enabledRules, dataSaverEnabled, uidRules,                                        blocked | 
 | 162 |     {NO_MATCH,       false,            NO_MATCH,                                        false}, | 
 | 163 |     {NO_MATCH,       false,            PENALTY_BOX_MATCH,                               true}, | 
 | 164 |     {NO_MATCH,       false,            HAPPY_BOX_MATCH,                                 false}, | 
 | 165 |     {NO_MATCH,       false,            PENALTY_BOX_MATCH|HAPPY_BOX_MATCH,               true}, | 
 | 166 |     {NO_MATCH,       true,             NO_MATCH,                                        true}, | 
 | 167 |     {NO_MATCH,       true,             PENALTY_BOX_MATCH,                               true}, | 
 | 168 |     {NO_MATCH,       true,             HAPPY_BOX_MATCH,                                 false}, | 
 | 169 |     {NO_MATCH,       true,             PENALTY_BOX_MATCH|HAPPY_BOX_MATCH,               true}, | 
 | 170 |     {STANDBY_MATCH,  false,            STANDBY_MATCH,                                   true}, | 
 | 171 |     {STANDBY_MATCH,  false,            STANDBY_MATCH|PENALTY_BOX_MATCH,                 true}, | 
 | 172 |     {STANDBY_MATCH,  false,            STANDBY_MATCH|HAPPY_BOX_MATCH,                   true}, | 
 | 173 |     {STANDBY_MATCH,  false,            STANDBY_MATCH|PENALTY_BOX_MATCH|HAPPY_BOX_MATCH, true}, | 
 | 174 |     {STANDBY_MATCH,  true,             STANDBY_MATCH,                                   true}, | 
 | 175 |     {STANDBY_MATCH,  true,             STANDBY_MATCH|PENALTY_BOX_MATCH,                 true}, | 
 | 176 |     {STANDBY_MATCH,  true,             STANDBY_MATCH|HAPPY_BOX_MATCH,                   true}, | 
 | 177 |     {STANDBY_MATCH,  true,             STANDBY_MATCH|PENALTY_BOX_MATCH|HAPPY_BOX_MATCH, true}, | 
 | 178 |     // clang-format on | 
 | 179 |   }; | 
 | 180 |  | 
 | 181 |   for (const auto& config : testConfigs) { | 
 | 182 |     SCOPED_TRACE(config.toString()); | 
 | 183 |  | 
 | 184 |     // Setup maps. | 
 | 185 |     EXPECT_RESULT_OK(mFakeConfigurationMap.writeValue(UID_RULES_CONFIGURATION_KEY, | 
 | 186 |                                                       config.enabledRules, BPF_EXIST)); | 
 | 187 |     EXPECT_RESULT_OK(mFakeDataSaverEnabledMap.writeValue(DATA_SAVER_ENABLED_KEY, | 
 | 188 |                                                       config.dataSaverEnabled, BPF_EXIST)); | 
 | 189 |     EXPECT_RESULT_OK(mFakeUidOwnerMap.writeValue(AID_APP_START, {.iif = 0, .rule = config.uidRules}, | 
 | 190 |                                                  BPF_ANY)); | 
 | 191 |  | 
 | 192 |     // Verify the function. | 
 | 193 |     auto result = mDnsBpfHelper.isUidNetworkingBlocked(AID_APP_START, /*metered=*/true); | 
 | 194 |     EXPECT_RESULT_OK(result); | 
 | 195 |     EXPECT_EQ(config.blocked, result.value()); | 
 | 196 |   } | 
 | 197 | } | 
 | 198 |  | 
| Ken Chen | d4876de | 2023-09-13 00:53:52 +0800 | [diff] [blame] | 199 | }  // namespace net | 
 | 200 | }  // namespace android |