blob: e14aa7b5e5dc9547dbd92a4911828e1c1c6d55a8 [file] [log] [blame]
Joel Fernandes48452882018-12-17 13:47:54 -08001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Connor O'Brien00fa9632022-01-14 15:13:20 -080017#include <android-base/file.h>
Joel Fernandes48452882018-12-17 13:47:54 -080018#include <android-base/macros.h>
19#include <gtest/gtest.h>
Maciej Żenczykowskib44e2872023-06-12 23:10:52 -070020#include <libbpf.h>
Joel Fernandes48452882018-12-17 13:47:54 -080021#include <stdlib.h>
22#include <unistd.h>
23#include <iostream>
Ken Chenb1d48882021-10-25 21:11:22 +080024#include "bpf/BpfMap.h"
25#include "bpf/BpfUtils.h"
Joel Fernandes48452882018-12-17 13:47:54 -080026#include "include/libbpf_android.h"
27
Connor O'Brien50913142022-01-27 22:47:11 -080028using ::testing::TestWithParam;
Joel Fernandes48452882018-12-17 13:47:54 -080029
30namespace android {
31namespace bpf {
32
Connor O'Brien00fa9632022-01-14 15:13:20 -080033class BpfLoadTest : public TestWithParam<std::string> {
Joel Fernandes48452882018-12-17 13:47:54 -080034 protected:
35 BpfLoadTest() {}
Maciej Żenczykowskicd5c3022020-01-26 20:17:58 -080036 int mProgFd;
Connor O'Brien00fa9632022-01-14 15:13:20 -080037 std::string mTpProgPath;
Connor O'Brien0ea4c6b2022-01-14 00:18:11 -080038 std::string mTpNeverLoadProgPath;
Neill Kapronbc4ae412024-04-09 17:04:25 +000039 std::string mTpMapPath;
Joel Fernandes48452882018-12-17 13:47:54 -080040
41 void SetUp() {
Neill Kapronbc4ae412024-04-09 17:04:25 +000042 /*
43 * b/326156952
44 *
45 * Kernels prior to 5.11 used rlimit memlock accounting for bpf memory
46 * allocations, and therefore require increasing the rlimit of this
47 * process for the maps to be created successfully.
48 *
49 * 5.11 introduces cgroup-based accounting as discussed here:
50 * https://lore.kernel.org/bpf/20201201215900.3569844-1-guro@fb.com/
51 */
52 if (!isAtLeastKernelVersion(5, 11, 0)) EXPECT_EQ(setrlimitForTest(), 0);
53
Connor O'Brien50913142022-01-27 22:47:11 -080054 mTpProgPath = "/sys/fs/bpf/prog_" + GetParam() + "_tracepoint_sched_sched_switch";
Connor O'Brien00fa9632022-01-14 15:13:20 -080055 unlink(mTpProgPath.c_str());
56
Connor O'Brien50913142022-01-27 22:47:11 -080057 mTpNeverLoadProgPath = "/sys/fs/bpf/prog_" + GetParam() + "_tracepoint_sched_sched_wakeup";
Connor O'Brien0ea4c6b2022-01-14 00:18:11 -080058 unlink(mTpNeverLoadProgPath.c_str());
59
Connor O'Brien50913142022-01-27 22:47:11 -080060 mTpMapPath = "/sys/fs/bpf/map_" + GetParam() + "_cpu_pid_map";
Connor O'Brien00fa9632022-01-14 15:13:20 -080061 unlink(mTpMapPath.c_str());
Joel Fernandes48452882018-12-17 13:47:54 -080062
Connor O'Brien50913142022-01-27 22:47:11 -080063 auto progPath = android::base::GetExecutableDirectory() + "/" + GetParam() + ".o";
Maciej Żenczykowski89515d92020-06-14 19:27:33 -070064 bool critical = true;
Steven Moreland0f10f3f2019-12-12 14:22:34 -080065
66 bpf_prog_type kAllowed[] = {
67 BPF_PROG_TYPE_UNSPEC,
68 };
Connor O'Brien6c0ce9f2022-12-01 20:08:17 -080069
70 Location loc = {
71 .dir = "",
72 .prefix = "",
Connor O'Brien6c0ce9f2022-12-01 20:08:17 -080073 .allowedProgTypes = kAllowed,
74 .allowedProgTypesLength = arraysize(kAllowed),
75 };
76 EXPECT_EQ(android::bpf::loadProg(progPath.c_str(), &critical, loc), -1);
Steven Moreland0f10f3f2019-12-12 14:22:34 -080077
Connor O'Brien50913142022-01-27 22:47:11 -080078 EXPECT_EQ(android::bpf::loadProg(progPath.c_str(), &critical), 0);
Maciej Żenczykowski89515d92020-06-14 19:27:33 -070079 EXPECT_EQ(false, critical);
Joel Fernandes48452882018-12-17 13:47:54 -080080
Maciej Żenczykowskib44e2872023-06-12 23:10:52 -070081 mProgFd = retrieveProgram(mTpProgPath.c_str());
Joel Fernandes48452882018-12-17 13:47:54 -080082 EXPECT_GT(mProgFd, 0);
83
Joel Fernandes48452882018-12-17 13:47:54 -080084 int ret = bpf_attach_tracepoint(mProgFd, "sched", "sched_switch");
85 EXPECT_NE(ret, 0);
86 }
87
88 void TearDown() {
Joel Fernandes48452882018-12-17 13:47:54 -080089 close(mProgFd);
Connor O'Brien00fa9632022-01-14 15:13:20 -080090 unlink(mTpProgPath.c_str());
91 unlink(mTpMapPath.c_str());
Joel Fernandes48452882018-12-17 13:47:54 -080092 }
93
94 void checkMapNonZero() {
95 // The test program installs a tracepoint on sched:sched_switch
96 // and expects the kernel to populate a PID corresponding to CPU
Connor O'Brien00fa9632022-01-14 15:13:20 -080097 android::bpf::BpfMap<uint32_t, uint32_t> m(mTpMapPath.c_str());
Joel Fernandes48452882018-12-17 13:47:54 -080098
99 // Wait for program to run a little
100 sleep(1);
101
102 int non_zero = 0;
103 const auto iterFunc = [&non_zero](const uint32_t& key, const uint32_t& val,
104 BpfMap<uint32_t, uint32_t>& map) {
105 if (val && !non_zero) {
106 non_zero = 1;
107 }
108
109 UNUSED(key);
110 UNUSED(map);
Steven Morelande7cd2a72020-01-10 17:49:35 -0800111 return base::Result<void>();
Joel Fernandes48452882018-12-17 13:47:54 -0800112 };
113
Bernie Innocenti43d25382020-02-10 07:25:16 +0900114 EXPECT_RESULT_OK(m.iterateWithValue(iterFunc));
Joel Fernandes48452882018-12-17 13:47:54 -0800115 EXPECT_EQ(non_zero, 1);
116 }
Connor O'Brien35425e52022-01-18 21:41:16 -0800117
Connor O'Brien0ea4c6b2022-01-14 00:18:11 -0800118 void checkKernelVersionEnforced() {
Maciej Żenczykowskib44e2872023-06-12 23:10:52 -0700119 EXPECT_EQ(retrieveProgram(mTpNeverLoadProgPath.c_str()), -1);
Connor O'Brien0ea4c6b2022-01-14 00:18:11 -0800120 EXPECT_EQ(errno, ENOENT);
121 }
Joel Fernandes48452882018-12-17 13:47:54 -0800122};
123
Maciej Żenczykowskib44e2872023-06-12 23:10:52 -0700124INSTANTIATE_TEST_SUITE_P(BpfLoadTests, BpfLoadTest, ::testing::Values("bpfLoadTpProg"));
Connor O'Brien00fa9632022-01-14 15:13:20 -0800125
126TEST_P(BpfLoadTest, bpfCheckMap) {
Joel Fernandes48452882018-12-17 13:47:54 -0800127 checkMapNonZero();
128}
129
Connor O'Brien0ea4c6b2022-01-14 00:18:11 -0800130TEST_P(BpfLoadTest, bpfCheckMinKernelVersionEnforced) {
131 checkKernelVersionEnforced();
132}
133
Joel Fernandes48452882018-12-17 13:47:54 -0800134} // namespace bpf
135} // namespace android