blob: 635d877fd99d56bfc798bdf28f816410f3137d8a [file] [log] [blame]
Joel Fernandes48452882018-12-17 13:47:54 -08001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Connor O'Brien00fa9632022-01-14 15:13:20 -080017#include <android-base/file.h>
Joel Fernandes48452882018-12-17 13:47:54 -080018#include <android-base/macros.h>
19#include <gtest/gtest.h>
20#include <stdlib.h>
21#include <unistd.h>
22#include <iostream>
Ken Chenb1d48882021-10-25 21:11:22 +080023#include "bpf/BpfMap.h"
24#include "bpf/BpfUtils.h"
Joel Fernandes48452882018-12-17 13:47:54 -080025#include "include/libbpf_android.h"
26
Connor O'Brien00fa9632022-01-14 15:13:20 -080027using ::testing::TestWithParam;;
Joel Fernandes48452882018-12-17 13:47:54 -080028
29namespace android {
30namespace bpf {
31
Connor O'Brien00fa9632022-01-14 15:13:20 -080032class BpfLoadTest : public TestWithParam<std::string> {
Joel Fernandes48452882018-12-17 13:47:54 -080033 protected:
34 BpfLoadTest() {}
Maciej Żenczykowskicd5c3022020-01-26 20:17:58 -080035 int mProgFd;
Connor O'Brien00fa9632022-01-14 15:13:20 -080036 std::string mTpProgPath;
Connor O'Brien0ea4c6b2022-01-14 00:18:11 -080037 std::string mTpNeverLoadProgPath;
Connor O'Brien00fa9632022-01-14 15:13:20 -080038 std::string mTpMapPath;;
Joel Fernandes48452882018-12-17 13:47:54 -080039
40 void SetUp() {
Connor O'Brien00fa9632022-01-14 15:13:20 -080041 auto progName = android::base::Basename(GetParam());
42 progName = progName.substr(0, progName.find_last_of('.'));
43 mTpProgPath = "/sys/fs/bpf/prog_" + progName + "_tracepoint_sched_sched_switch";
44 unlink(mTpProgPath.c_str());
45
Connor O'Brien0ea4c6b2022-01-14 00:18:11 -080046 mTpNeverLoadProgPath = "/sys/fs/bpf/prog_" + progName + "_tracepoint_sched_sched_wakeup";
47 unlink(mTpNeverLoadProgPath.c_str());
48
Connor O'Brien00fa9632022-01-14 15:13:20 -080049 mTpMapPath = "/sys/fs/bpf/map_" + progName + "_cpu_pid_map";
50 unlink(mTpMapPath.c_str());
Joel Fernandes48452882018-12-17 13:47:54 -080051
Maciej Żenczykowski89515d92020-06-14 19:27:33 -070052 bool critical = true;
Connor O'Brien00fa9632022-01-14 15:13:20 -080053 EXPECT_EQ(android::bpf::loadProg(GetParam().c_str(), &critical), 0);
Maciej Żenczykowski89515d92020-06-14 19:27:33 -070054 EXPECT_EQ(false, critical);
Joel Fernandes48452882018-12-17 13:47:54 -080055
Connor O'Brien00fa9632022-01-14 15:13:20 -080056 mProgFd = bpf_obj_get(mTpProgPath.c_str());
Joel Fernandes48452882018-12-17 13:47:54 -080057 EXPECT_GT(mProgFd, 0);
58
Joel Fernandes48452882018-12-17 13:47:54 -080059 int ret = bpf_attach_tracepoint(mProgFd, "sched", "sched_switch");
60 EXPECT_NE(ret, 0);
61 }
62
63 void TearDown() {
Joel Fernandes48452882018-12-17 13:47:54 -080064 close(mProgFd);
Connor O'Brien00fa9632022-01-14 15:13:20 -080065 unlink(mTpProgPath.c_str());
66 unlink(mTpMapPath.c_str());
Joel Fernandes48452882018-12-17 13:47:54 -080067 }
68
69 void checkMapNonZero() {
70 // The test program installs a tracepoint on sched:sched_switch
71 // and expects the kernel to populate a PID corresponding to CPU
Connor O'Brien00fa9632022-01-14 15:13:20 -080072 android::bpf::BpfMap<uint32_t, uint32_t> m(mTpMapPath.c_str());
Joel Fernandes48452882018-12-17 13:47:54 -080073
74 // Wait for program to run a little
75 sleep(1);
76
77 int non_zero = 0;
78 const auto iterFunc = [&non_zero](const uint32_t& key, const uint32_t& val,
79 BpfMap<uint32_t, uint32_t>& map) {
80 if (val && !non_zero) {
81 non_zero = 1;
82 }
83
84 UNUSED(key);
85 UNUSED(map);
Steven Morelande7cd2a72020-01-10 17:49:35 -080086 return base::Result<void>();
Joel Fernandes48452882018-12-17 13:47:54 -080087 };
88
Bernie Innocenti43d25382020-02-10 07:25:16 +090089 EXPECT_RESULT_OK(m.iterateWithValue(iterFunc));
Joel Fernandes48452882018-12-17 13:47:54 -080090 EXPECT_EQ(non_zero, 1);
91 }
Connor O'Brien35425e52022-01-18 21:41:16 -080092
93 void checkMapBtf() {
94 // Earlier kernels lack BPF_BTF_LOAD support
95 if (!isAtLeastKernelVersion(4, 19, 0)) GTEST_SKIP() << "pre-4.19 kernel does not support BTF";
96
97 const bool haveBtf = GetParam().find("btf") != std::string::npos;
98
99 std::string str;
100 EXPECT_EQ(android::base::ReadFileToString(mTpMapPath, &str), haveBtf);
101 if (haveBtf) EXPECT_FALSE(str.empty());
102 }
Connor O'Brien0ea4c6b2022-01-14 00:18:11 -0800103
104 void checkKernelVersionEnforced() {
105 EXPECT_EQ(bpf_obj_get(mTpNeverLoadProgPath.c_str()), -1);
106 EXPECT_EQ(errno, ENOENT);
107 }
Joel Fernandes48452882018-12-17 13:47:54 -0800108};
109
Connor O'Brien00fa9632022-01-14 15:13:20 -0800110INSTANTIATE_TEST_SUITE_P(BpfLoadTests, BpfLoadTest,
Connor O'Brien0056fdc2022-01-21 18:21:23 -0800111 ::testing::Values("/system/etc/bpf/bpf_load_tp_prog.o",
112 "/system/etc/bpf/bpf_load_tp_prog_btf.o"));
Connor O'Brien00fa9632022-01-14 15:13:20 -0800113
114TEST_P(BpfLoadTest, bpfCheckMap) {
Joel Fernandes48452882018-12-17 13:47:54 -0800115 checkMapNonZero();
116}
117
Connor O'Brien35425e52022-01-18 21:41:16 -0800118TEST_P(BpfLoadTest, bpfCheckBtf) {
119 checkMapBtf();
120}
121
Connor O'Brien0ea4c6b2022-01-14 00:18:11 -0800122TEST_P(BpfLoadTest, bpfCheckMinKernelVersionEnforced) {
123 checkKernelVersionEnforced();
124}
125
Joel Fernandes48452882018-12-17 13:47:54 -0800126} // namespace bpf
127} // namespace android