blob: 8a2d0723d4cd3410202dc77df835c389f7faff9f [file] [log] [blame]
Joel Fernandes48452882018-12-17 13:47:54 -08001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Connor O'Brien00fa9632022-01-14 15:13:20 -080017#include <android-base/file.h>
Joel Fernandes48452882018-12-17 13:47:54 -080018#include <android-base/macros.h>
19#include <gtest/gtest.h>
Maciej Żenczykowskib44e2872023-06-12 23:10:52 -070020#include <libbpf.h>
Joel Fernandes48452882018-12-17 13:47:54 -080021#include <stdlib.h>
22#include <unistd.h>
23#include <iostream>
Ken Chenb1d48882021-10-25 21:11:22 +080024#include "bpf/BpfMap.h"
25#include "bpf/BpfUtils.h"
Joel Fernandes48452882018-12-17 13:47:54 -080026#include "include/libbpf_android.h"
27
Connor O'Brien50913142022-01-27 22:47:11 -080028using ::testing::TestWithParam;
Joel Fernandes48452882018-12-17 13:47:54 -080029
30namespace android {
31namespace bpf {
32
Connor O'Brien00fa9632022-01-14 15:13:20 -080033class BpfLoadTest : public TestWithParam<std::string> {
Joel Fernandes48452882018-12-17 13:47:54 -080034 protected:
35 BpfLoadTest() {}
Maciej Żenczykowskicd5c3022020-01-26 20:17:58 -080036 int mProgFd;
Connor O'Brien00fa9632022-01-14 15:13:20 -080037 std::string mTpProgPath;
Connor O'Brien0ea4c6b2022-01-14 00:18:11 -080038 std::string mTpNeverLoadProgPath;
Connor O'Brien00fa9632022-01-14 15:13:20 -080039 std::string mTpMapPath;;
Joel Fernandes48452882018-12-17 13:47:54 -080040
41 void SetUp() {
Connor O'Brien50913142022-01-27 22:47:11 -080042 mTpProgPath = "/sys/fs/bpf/prog_" + GetParam() + "_tracepoint_sched_sched_switch";
Connor O'Brien00fa9632022-01-14 15:13:20 -080043 unlink(mTpProgPath.c_str());
44
Connor O'Brien50913142022-01-27 22:47:11 -080045 mTpNeverLoadProgPath = "/sys/fs/bpf/prog_" + GetParam() + "_tracepoint_sched_sched_wakeup";
Connor O'Brien0ea4c6b2022-01-14 00:18:11 -080046 unlink(mTpNeverLoadProgPath.c_str());
47
Connor O'Brien50913142022-01-27 22:47:11 -080048 mTpMapPath = "/sys/fs/bpf/map_" + GetParam() + "_cpu_pid_map";
Connor O'Brien00fa9632022-01-14 15:13:20 -080049 unlink(mTpMapPath.c_str());
Joel Fernandes48452882018-12-17 13:47:54 -080050
Connor O'Brien50913142022-01-27 22:47:11 -080051 auto progPath = android::base::GetExecutableDirectory() + "/" + GetParam() + ".o";
Maciej Żenczykowski89515d92020-06-14 19:27:33 -070052 bool critical = true;
Steven Moreland0f10f3f2019-12-12 14:22:34 -080053
54 bpf_prog_type kAllowed[] = {
55 BPF_PROG_TYPE_UNSPEC,
56 };
Connor O'Brien6c0ce9f2022-12-01 20:08:17 -080057
58 Location loc = {
59 .dir = "",
60 .prefix = "",
Connor O'Brien6c0ce9f2022-12-01 20:08:17 -080061 .allowedProgTypes = kAllowed,
62 .allowedProgTypesLength = arraysize(kAllowed),
63 };
64 EXPECT_EQ(android::bpf::loadProg(progPath.c_str(), &critical, loc), -1);
Steven Moreland0f10f3f2019-12-12 14:22:34 -080065
Connor O'Brien50913142022-01-27 22:47:11 -080066 EXPECT_EQ(android::bpf::loadProg(progPath.c_str(), &critical), 0);
Maciej Żenczykowski89515d92020-06-14 19:27:33 -070067 EXPECT_EQ(false, critical);
Joel Fernandes48452882018-12-17 13:47:54 -080068
Maciej Żenczykowskib44e2872023-06-12 23:10:52 -070069 mProgFd = retrieveProgram(mTpProgPath.c_str());
Joel Fernandes48452882018-12-17 13:47:54 -080070 EXPECT_GT(mProgFd, 0);
71
Joel Fernandes48452882018-12-17 13:47:54 -080072 int ret = bpf_attach_tracepoint(mProgFd, "sched", "sched_switch");
73 EXPECT_NE(ret, 0);
74 }
75
76 void TearDown() {
Joel Fernandes48452882018-12-17 13:47:54 -080077 close(mProgFd);
Connor O'Brien00fa9632022-01-14 15:13:20 -080078 unlink(mTpProgPath.c_str());
79 unlink(mTpMapPath.c_str());
Joel Fernandes48452882018-12-17 13:47:54 -080080 }
81
82 void checkMapNonZero() {
83 // The test program installs a tracepoint on sched:sched_switch
84 // and expects the kernel to populate a PID corresponding to CPU
Connor O'Brien00fa9632022-01-14 15:13:20 -080085 android::bpf::BpfMap<uint32_t, uint32_t> m(mTpMapPath.c_str());
Joel Fernandes48452882018-12-17 13:47:54 -080086
87 // Wait for program to run a little
88 sleep(1);
89
90 int non_zero = 0;
91 const auto iterFunc = [&non_zero](const uint32_t& key, const uint32_t& val,
92 BpfMap<uint32_t, uint32_t>& map) {
93 if (val && !non_zero) {
94 non_zero = 1;
95 }
96
97 UNUSED(key);
98 UNUSED(map);
Steven Morelande7cd2a72020-01-10 17:49:35 -080099 return base::Result<void>();
Joel Fernandes48452882018-12-17 13:47:54 -0800100 };
101
Bernie Innocenti43d25382020-02-10 07:25:16 +0900102 EXPECT_RESULT_OK(m.iterateWithValue(iterFunc));
Joel Fernandes48452882018-12-17 13:47:54 -0800103 EXPECT_EQ(non_zero, 1);
104 }
Connor O'Brien35425e52022-01-18 21:41:16 -0800105
Connor O'Brien0ea4c6b2022-01-14 00:18:11 -0800106 void checkKernelVersionEnforced() {
Maciej Żenczykowskib44e2872023-06-12 23:10:52 -0700107 EXPECT_EQ(retrieveProgram(mTpNeverLoadProgPath.c_str()), -1);
Connor O'Brien0ea4c6b2022-01-14 00:18:11 -0800108 EXPECT_EQ(errno, ENOENT);
109 }
Joel Fernandes48452882018-12-17 13:47:54 -0800110};
111
Maciej Żenczykowskib44e2872023-06-12 23:10:52 -0700112INSTANTIATE_TEST_SUITE_P(BpfLoadTests, BpfLoadTest, ::testing::Values("bpfLoadTpProg"));
Connor O'Brien00fa9632022-01-14 15:13:20 -0800113
114TEST_P(BpfLoadTest, bpfCheckMap) {
Joel Fernandes48452882018-12-17 13:47:54 -0800115 checkMapNonZero();
116}
117
Connor O'Brien0ea4c6b2022-01-14 00:18:11 -0800118TEST_P(BpfLoadTest, bpfCheckMinKernelVersionEnforced) {
119 checkKernelVersionEnforced();
120}
121
Joel Fernandes48452882018-12-17 13:47:54 -0800122} // namespace bpf
123} // namespace android