xref: /aosp_15_r20/system/bpf/loader/BpfLoadTest.cpp (revision 55039e042b8390f50b0bdd70c11a2419f6d8fd50)
1*55039e04SAndroid Build Coastguard Worker /*
2*55039e04SAndroid Build Coastguard Worker  * Copyright (C) 2018 The Android Open Source Project
3*55039e04SAndroid Build Coastguard Worker  *
4*55039e04SAndroid Build Coastguard Worker  * Licensed under the Apache License, Version 2.0 (the "License");
5*55039e04SAndroid Build Coastguard Worker  * you may not use this file except in compliance with the License.
6*55039e04SAndroid Build Coastguard Worker  * You may obtain a copy of the License at
7*55039e04SAndroid Build Coastguard Worker  *
8*55039e04SAndroid Build Coastguard Worker  *      http://www.apache.org/licenses/LICENSE-2.0
9*55039e04SAndroid Build Coastguard Worker  *
10*55039e04SAndroid Build Coastguard Worker  * Unless required by applicable law or agreed to in writing, software
11*55039e04SAndroid Build Coastguard Worker  * distributed under the License is distributed on an "AS IS" BASIS,
12*55039e04SAndroid Build Coastguard Worker  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*55039e04SAndroid Build Coastguard Worker  * See the License for the specific language governing permissions and
14*55039e04SAndroid Build Coastguard Worker  * limitations under the License.
15*55039e04SAndroid Build Coastguard Worker  */
16*55039e04SAndroid Build Coastguard Worker 
17*55039e04SAndroid Build Coastguard Worker #include <android-base/file.h>
18*55039e04SAndroid Build Coastguard Worker #include <android-base/macros.h>
19*55039e04SAndroid Build Coastguard Worker #include <gtest/gtest.h>
20*55039e04SAndroid Build Coastguard Worker #include <libbpf.h>
21*55039e04SAndroid Build Coastguard Worker #include <stdlib.h>
22*55039e04SAndroid Build Coastguard Worker #include <unistd.h>
23*55039e04SAndroid Build Coastguard Worker #include <iostream>
24*55039e04SAndroid Build Coastguard Worker #include "bpf/BpfMap.h"
25*55039e04SAndroid Build Coastguard Worker #include "bpf/BpfUtils.h"
26*55039e04SAndroid Build Coastguard Worker #include "include/libbpf_android.h"
27*55039e04SAndroid Build Coastguard Worker 
28*55039e04SAndroid Build Coastguard Worker namespace android {
29*55039e04SAndroid Build Coastguard Worker namespace bpf {
30*55039e04SAndroid Build Coastguard Worker 
31*55039e04SAndroid Build Coastguard Worker class BpfLoadTest : public ::testing::Test {
32*55039e04SAndroid Build Coastguard Worker   protected:
BpfLoadTest()33*55039e04SAndroid Build Coastguard Worker     BpfLoadTest() {}
34*55039e04SAndroid Build Coastguard Worker     int mProgFd;
35*55039e04SAndroid Build Coastguard Worker     std::string mTpProgPath;
36*55039e04SAndroid Build Coastguard Worker     std::string mTpNeverLoadProgPath;
37*55039e04SAndroid Build Coastguard Worker     std::string mTpMapPath;
38*55039e04SAndroid Build Coastguard Worker 
SetUp()39*55039e04SAndroid Build Coastguard Worker     void SetUp() {
40*55039e04SAndroid Build Coastguard Worker         /*
41*55039e04SAndroid Build Coastguard Worker          * b/326156952
42*55039e04SAndroid Build Coastguard Worker          *
43*55039e04SAndroid Build Coastguard Worker          * Kernels prior to 5.11 used rlimit memlock accounting for bpf memory
44*55039e04SAndroid Build Coastguard Worker          * allocations, and therefore require increasing the rlimit of this
45*55039e04SAndroid Build Coastguard Worker          * process for the maps to be created successfully.
46*55039e04SAndroid Build Coastguard Worker          *
47*55039e04SAndroid Build Coastguard Worker          * 5.11 introduces cgroup-based accounting as discussed here:
48*55039e04SAndroid Build Coastguard Worker          * https://lore.kernel.org/bpf/[email protected]/
49*55039e04SAndroid Build Coastguard Worker          */
50*55039e04SAndroid Build Coastguard Worker         if (!isAtLeastKernelVersion(5, 11, 0)) EXPECT_EQ(setrlimitForTest(), 0);
51*55039e04SAndroid Build Coastguard Worker 
52*55039e04SAndroid Build Coastguard Worker         mTpProgPath = "/sys/fs/bpf/prog_bpfLoadTpProg_tracepoint_sched_sched_switch";
53*55039e04SAndroid Build Coastguard Worker         unlink(mTpProgPath.c_str());
54*55039e04SAndroid Build Coastguard Worker 
55*55039e04SAndroid Build Coastguard Worker         mTpNeverLoadProgPath = "/sys/fs/bpf/prog_bpfLoadTpProg_tracepoint_sched_sched_wakeup";
56*55039e04SAndroid Build Coastguard Worker         unlink(mTpNeverLoadProgPath.c_str());
57*55039e04SAndroid Build Coastguard Worker 
58*55039e04SAndroid Build Coastguard Worker         mTpMapPath = "/sys/fs/bpf/map_bpfLoadTpProg_cpu_pid_map";
59*55039e04SAndroid Build Coastguard Worker         unlink(mTpMapPath.c_str());
60*55039e04SAndroid Build Coastguard Worker 
61*55039e04SAndroid Build Coastguard Worker         auto progPath = android::base::GetExecutableDirectory() + "/bpfLoadTpProg.o";
62*55039e04SAndroid Build Coastguard Worker         bool critical = true;
63*55039e04SAndroid Build Coastguard Worker 
64*55039e04SAndroid Build Coastguard Worker         bpf_prog_type kAllowed[] = {
65*55039e04SAndroid Build Coastguard Worker                 BPF_PROG_TYPE_UNSPEC,
66*55039e04SAndroid Build Coastguard Worker         };
67*55039e04SAndroid Build Coastguard Worker 
68*55039e04SAndroid Build Coastguard Worker         Location loc = {
69*55039e04SAndroid Build Coastguard Worker             .dir = "",
70*55039e04SAndroid Build Coastguard Worker             .prefix = "",
71*55039e04SAndroid Build Coastguard Worker             .allowedProgTypes = kAllowed,
72*55039e04SAndroid Build Coastguard Worker             .allowedProgTypesLength = arraysize(kAllowed),
73*55039e04SAndroid Build Coastguard Worker         };
74*55039e04SAndroid Build Coastguard Worker         EXPECT_EQ(android::bpf::loadProg(progPath.c_str(), &critical, loc), -1);
75*55039e04SAndroid Build Coastguard Worker 
76*55039e04SAndroid Build Coastguard Worker         ASSERT_EQ(android::bpf::loadProg(progPath.c_str(), &critical), 0);
77*55039e04SAndroid Build Coastguard Worker         EXPECT_EQ(false, critical);
78*55039e04SAndroid Build Coastguard Worker 
79*55039e04SAndroid Build Coastguard Worker         mProgFd = retrieveProgram(mTpProgPath.c_str());
80*55039e04SAndroid Build Coastguard Worker         ASSERT_GT(mProgFd, 0);
81*55039e04SAndroid Build Coastguard Worker 
82*55039e04SAndroid Build Coastguard Worker         int ret = bpf_attach_tracepoint(mProgFd, "sched", "sched_switch");
83*55039e04SAndroid Build Coastguard Worker         EXPECT_NE(ret, 0);
84*55039e04SAndroid Build Coastguard Worker     }
85*55039e04SAndroid Build Coastguard Worker 
TearDown()86*55039e04SAndroid Build Coastguard Worker     void TearDown() {
87*55039e04SAndroid Build Coastguard Worker         close(mProgFd);
88*55039e04SAndroid Build Coastguard Worker         unlink(mTpProgPath.c_str());
89*55039e04SAndroid Build Coastguard Worker         unlink(mTpMapPath.c_str());
90*55039e04SAndroid Build Coastguard Worker     }
91*55039e04SAndroid Build Coastguard Worker 
checkMapNonZero()92*55039e04SAndroid Build Coastguard Worker     void checkMapNonZero() {
93*55039e04SAndroid Build Coastguard Worker         // The test program installs a tracepoint on sched:sched_switch
94*55039e04SAndroid Build Coastguard Worker         // and expects the kernel to populate a PID corresponding to CPU
95*55039e04SAndroid Build Coastguard Worker         android::bpf::BpfMap<uint32_t, uint32_t> m(mTpMapPath.c_str());
96*55039e04SAndroid Build Coastguard Worker 
97*55039e04SAndroid Build Coastguard Worker         // Wait for program to run a little
98*55039e04SAndroid Build Coastguard Worker         sleep(1);
99*55039e04SAndroid Build Coastguard Worker 
100*55039e04SAndroid Build Coastguard Worker         int non_zero = 0;
101*55039e04SAndroid Build Coastguard Worker         const auto iterFunc = [&non_zero](const uint32_t& key, const uint32_t& val,
102*55039e04SAndroid Build Coastguard Worker                                           BpfMap<uint32_t, uint32_t>& map) {
103*55039e04SAndroid Build Coastguard Worker             if (val && !non_zero) {
104*55039e04SAndroid Build Coastguard Worker                 non_zero = 1;
105*55039e04SAndroid Build Coastguard Worker             }
106*55039e04SAndroid Build Coastguard Worker 
107*55039e04SAndroid Build Coastguard Worker             UNUSED(key);
108*55039e04SAndroid Build Coastguard Worker             UNUSED(map);
109*55039e04SAndroid Build Coastguard Worker             return base::Result<void>();
110*55039e04SAndroid Build Coastguard Worker         };
111*55039e04SAndroid Build Coastguard Worker 
112*55039e04SAndroid Build Coastguard Worker         EXPECT_RESULT_OK(m.iterateWithValue(iterFunc));
113*55039e04SAndroid Build Coastguard Worker         EXPECT_EQ(non_zero, 1);
114*55039e04SAndroid Build Coastguard Worker     }
115*55039e04SAndroid Build Coastguard Worker 
checkKernelVersionEnforced()116*55039e04SAndroid Build Coastguard Worker     void checkKernelVersionEnforced() {
117*55039e04SAndroid Build Coastguard Worker         ASSERT_EQ(retrieveProgram(mTpNeverLoadProgPath.c_str()), -1);
118*55039e04SAndroid Build Coastguard Worker         ASSERT_EQ(errno, ENOENT);
119*55039e04SAndroid Build Coastguard Worker     }
120*55039e04SAndroid Build Coastguard Worker };
121*55039e04SAndroid Build Coastguard Worker 
TEST_F(BpfLoadTest,bpfCheckMap)122*55039e04SAndroid Build Coastguard Worker TEST_F(BpfLoadTest, bpfCheckMap) {
123*55039e04SAndroid Build Coastguard Worker     checkMapNonZero();
124*55039e04SAndroid Build Coastguard Worker }
125*55039e04SAndroid Build Coastguard Worker 
TEST_F(BpfLoadTest,bpfCheckMinKernelVersionEnforced)126*55039e04SAndroid Build Coastguard Worker TEST_F(BpfLoadTest, bpfCheckMinKernelVersionEnforced) {
127*55039e04SAndroid Build Coastguard Worker     checkKernelVersionEnforced();
128*55039e04SAndroid Build Coastguard Worker }
129*55039e04SAndroid Build Coastguard Worker 
130*55039e04SAndroid Build Coastguard Worker }  // namespace bpf
131*55039e04SAndroid Build Coastguard Worker }  // namespace android
132