| /* |
| * Copyright (C) 2023 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include <android-base/unique_fd.h> |
| #include <android/multinetwork.h> |
| #include <arpa/inet.h> |
| #include <gmock/gmock.h> |
| #include <gtest/gtest.h> |
| #include <inttypes.h> |
| #include <net/if.h> |
| #include <netinet/tcp.h> |
| #include <sys/socket.h> |
| #include <sys/types.h> |
| #include <unistd.h> |
| |
| #include <chrono> |
| #include <thread> |
| #include <vector> |
| |
| #include "netdbpf/NetworkTracePoller.h" |
| |
| using ::testing::AllOf; |
| using ::testing::AnyOf; |
| using ::testing::Each; |
| using ::testing::Eq; |
| using ::testing::Field; |
| using ::testing::Test; |
| |
| namespace android { |
| namespace bpf { |
| namespace internal { |
| // Use uint32 max to cause the handler to never Loop. Instead, the tests will |
| // manually drive things by calling ConsumeAll explicitly. |
| constexpr uint32_t kNeverPoll = std::numeric_limits<uint32_t>::max(); |
| |
| __be16 bindAndListen(int s) { |
| sockaddr_in sin = {.sin_family = AF_INET}; |
| socklen_t len = sizeof(sin); |
| if (bind(s, (sockaddr*)&sin, sizeof(sin))) return 0; |
| if (listen(s, 1)) return 0; |
| if (getsockname(s, (sockaddr*)&sin, &len)) return 0; |
| return sin.sin_port; |
| } |
| |
| // This takes tcp flag constants from the standard library and makes them usable |
| // with the flags we get from BPF. The standard library flags are big endian |
| // whereas the BPF flags are reported in host byte order. BPF also trims the |
| // flags down to the 8 single-bit flag bits (fin, syn, rst, etc). |
| constexpr inline uint8_t FlagToHost(__be32 be_unix_flags) { |
| return ntohl(be_unix_flags) >> 16; |
| } |
| |
| // Pretty prints all fields for a list of packets (useful for debugging). |
| struct PacketPrinter { |
| const std::vector<PacketTrace>& data; |
| static constexpr char kTcpFlagNames[] = "FSRPAUEC"; |
| |
| friend std::ostream& operator<<(std::ostream& os, const PacketPrinter& d) { |
| os << "Packet count: " << d.data.size(); |
| for (const PacketTrace& info : d.data) { |
| os << "\nifidx=" << info.ifindex; |
| os << ", len=" << info.length; |
| os << ", uid=" << info.uid; |
| os << ", tag=" << info.tag; |
| os << ", sport=" << info.sport; |
| os << ", dport=" << info.dport; |
| os << ", direction=" << (info.egress ? "egress" : "ingress"); |
| os << ", proto=" << static_cast<int>(info.ipProto); |
| os << ", ip=" << static_cast<int>(info.ipVersion); |
| os << ", flags="; |
| for (int i = 0; i < 8; i++) { |
| os << ((info.tcpFlags & (1 << i)) ? kTcpFlagNames[i] : '.'); |
| } |
| } |
| return os; |
| } |
| }; |
| |
| class NetworkTracePollerTest : public testing::Test { |
| protected: |
| void SetUp() { |
| if (access(PACKET_TRACE_RINGBUF_PATH, R_OK)) { |
| GTEST_SKIP() << "Network tracing is not enabled/loaded on this build."; |
| } |
| if (sizeof(void*) != 8) { |
| GTEST_SKIP() << "Network tracing requires 64-bit build."; |
| } |
| } |
| }; |
| |
| TEST_F(NetworkTracePollerTest, PollWhileInactive) { |
| NetworkTracePoller handler([&](const std::vector<PacketTrace>& pkt) {}); |
| |
| // One succeed after start and before stop. |
| EXPECT_FALSE(handler.ConsumeAll()); |
| ASSERT_TRUE(handler.Start(kNeverPoll)); |
| EXPECT_TRUE(handler.ConsumeAll()); |
| ASSERT_TRUE(handler.Stop()); |
| EXPECT_FALSE(handler.ConsumeAll()); |
| } |
| |
| TEST_F(NetworkTracePollerTest, ConcurrentSessions) { |
| // Simulate two concurrent sessions (two starts followed by two stops). Check |
| // that tracing is stopped only after both sessions finish. |
| NetworkTracePoller handler([&](const std::vector<PacketTrace>& pkt) {}); |
| |
| ASSERT_TRUE(handler.Start(kNeverPoll)); |
| EXPECT_TRUE(handler.ConsumeAll()); |
| |
| ASSERT_TRUE(handler.Start(kNeverPoll)); |
| EXPECT_TRUE(handler.ConsumeAll()); |
| |
| ASSERT_TRUE(handler.Stop()); |
| EXPECT_TRUE(handler.ConsumeAll()); |
| |
| ASSERT_TRUE(handler.Stop()); |
| EXPECT_FALSE(handler.ConsumeAll()); |
| } |
| |
| TEST_F(NetworkTracePollerTest, TraceTcpSession) { |
| __be16 server_port = 0; |
| std::vector<PacketTrace> packets, unmatched; |
| |
| // Record all packets with the bound address and current uid. This callback is |
| // involked only within ConsumeAll, at which point the port should have |
| // already been filled in and all packets have been processed. |
| NetworkTracePoller handler([&](const std::vector<PacketTrace>& pkts) { |
| for (const PacketTrace& pkt : pkts) { |
| if ((pkt.sport == server_port || pkt.dport == server_port) && |
| pkt.uid == getuid()) { |
| packets.push_back(pkt); |
| } else { |
| // There may be spurious packets not caused by the test. These are only |
| // captured so that we can report them to help debug certain errors. |
| unmatched.push_back(pkt); |
| } |
| } |
| }); |
| |
| ASSERT_TRUE(handler.Start(kNeverPoll)); |
| const uint32_t kClientTag = 2468; |
| const uint32_t kServerTag = 1357; |
| |
| // Go through a typical connection sequence between two v4 sockets using tcp. |
| // This covers connection handshake, shutdown, and one data packet. |
| { |
| android::base::unique_fd clientsocket(socket(AF_INET, SOCK_STREAM, 0)); |
| ASSERT_NE(-1, clientsocket) << "Failed to open client socket"; |
| ASSERT_EQ(android_tag_socket(clientsocket, kClientTag), 0); |
| |
| android::base::unique_fd serversocket(socket(AF_INET, SOCK_STREAM, 0)); |
| ASSERT_NE(-1, serversocket) << "Failed to open server socket"; |
| ASSERT_EQ(android_tag_socket(serversocket, kServerTag), 0); |
| |
| server_port = bindAndListen(serversocket); |
| ASSERT_NE(0, server_port) << "Can't bind to server port"; |
| |
| sockaddr_in addr = {.sin_family = AF_INET, .sin_port = server_port}; |
| ASSERT_EQ(0, connect(clientsocket, (sockaddr*)&addr, sizeof(addr))) |
| << "connect to loopback failed: " << strerror(errno); |
| |
| int accepted = accept(serversocket, nullptr, nullptr); |
| ASSERT_NE(-1, accepted) << "accept connection failed: " << strerror(errno); |
| |
| const char data[] = "abcdefghijklmnopqrstuvwxyz"; |
| EXPECT_EQ(send(clientsocket, data, sizeof(data), 0), sizeof(data)) |
| << "failed to send message: " << strerror(errno); |
| |
| char buff[100] = {}; |
| EXPECT_EQ(recv(accepted, buff, sizeof(buff), 0), sizeof(data)) |
| << "failed to receive message: " << strerror(errno); |
| |
| EXPECT_EQ(std::string(data), std::string(buff)); |
| } |
| |
| // Poll until we get all the packets (typically we get it first try). |
| for (int attempt = 0; attempt < 10; attempt++) { |
| ASSERT_TRUE(handler.ConsumeAll()); |
| if (packets.size() >= 12) break; |
| std::this_thread::sleep_for(std::chrono::milliseconds(5)); |
| } |
| |
| ASSERT_TRUE(handler.Stop()); |
| |
| // There are 12 packets in total (6 messages: each seen by client & server): |
| // 1. Client connects to server with syn |
| // 2. Server responds with syn ack |
| // 3. Client responds with ack |
| // 4. Client sends data with psh ack |
| // 5. Server acks the data packet |
| // 6. Client closes connection with fin ack |
| ASSERT_EQ(packets.size(), 12) |
| << PacketPrinter{packets} |
| << "\nUnmatched packets: " << PacketPrinter{unmatched}; |
| |
| // All packets should be TCP packets. |
| EXPECT_THAT(packets, Each(Field(&PacketTrace::ipProto, Eq(IPPROTO_TCP)))); |
| |
| // Packet 1: client requests connection with server. |
| EXPECT_EQ(packets[0].egress, 1) << PacketPrinter{packets}; |
| EXPECT_EQ(packets[0].dport, server_port) << PacketPrinter{packets}; |
| EXPECT_EQ(packets[0].tag, kClientTag) << PacketPrinter{packets}; |
| EXPECT_EQ(packets[0].tcpFlags, FlagToHost(TCP_FLAG_SYN)) |
| << PacketPrinter{packets}; |
| |
| // Packet 2: server receives request from client. |
| EXPECT_EQ(packets[1].egress, 0) << PacketPrinter{packets}; |
| EXPECT_EQ(packets[1].dport, server_port) << PacketPrinter{packets}; |
| EXPECT_EQ(packets[1].tag, kServerTag) << PacketPrinter{packets}; |
| EXPECT_EQ(packets[1].tcpFlags, FlagToHost(TCP_FLAG_SYN)) |
| << PacketPrinter{packets}; |
| |
| // Packet 3: server replies back with syn ack. |
| EXPECT_EQ(packets[2].egress, 1) << PacketPrinter{packets}; |
| EXPECT_EQ(packets[2].sport, server_port) << PacketPrinter{packets}; |
| EXPECT_EQ(packets[2].tcpFlags, FlagToHost(TCP_FLAG_SYN | TCP_FLAG_ACK)) |
| << PacketPrinter{packets}; |
| |
| // Packet 4: client receives the server's syn ack. |
| EXPECT_EQ(packets[3].egress, 0) << PacketPrinter{packets}; |
| EXPECT_EQ(packets[3].sport, server_port) << PacketPrinter{packets}; |
| EXPECT_EQ(packets[3].tcpFlags, FlagToHost(TCP_FLAG_SYN | TCP_FLAG_ACK)) |
| << PacketPrinter{packets}; |
| } |
| |
| } // namespace internal |
| } // namespace bpf |
| } // namespace android |