Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 | // SPDX-License-Identifier: GPL-2.0 /* Copyright (c) 2020 Google */ #include <test_progs.h> #include <bpf/libbpf.h> #include <bpf/btf.h> #include "test_ksyms_btf.skel.h" #include "test_ksyms_btf_null_check.skel.h" #include "test_ksyms_weak.skel.h" #include "test_ksyms_weak.lskel.h" #include "test_ksyms_btf_write_check.skel.h" static int duration; static void test_basic(void) { __u64 runqueues_addr, bpf_prog_active_addr; __u32 this_rq_cpu; int this_bpf_prog_active; struct test_ksyms_btf *skel = NULL; struct test_ksyms_btf__data *data; int err; err = kallsyms_find("runqueues", &runqueues_addr); if (CHECK(err == -EINVAL, "kallsyms_fopen", "failed to open: %d\n", errno)) return; if (CHECK(err == -ENOENT, "ksym_find", "symbol 'runqueues' not found\n")) return; err = kallsyms_find("bpf_prog_active", &bpf_prog_active_addr); if (CHECK(err == -EINVAL, "kallsyms_fopen", "failed to open: %d\n", errno)) return; if (CHECK(err == -ENOENT, "ksym_find", "symbol 'bpf_prog_active' not found\n")) return; skel = test_ksyms_btf__open_and_load(); if (CHECK(!skel, "skel_open", "failed to open and load skeleton\n")) goto cleanup; err = test_ksyms_btf__attach(skel); if (CHECK(err, "skel_attach", "skeleton attach failed: %d\n", err)) goto cleanup; /* trigger tracepoint */ usleep(1); data = skel->data; CHECK(data->out__runqueues_addr != runqueues_addr, "runqueues_addr", "got %llu, exp %llu\n", (unsigned long long)data->out__runqueues_addr, (unsigned long long)runqueues_addr); CHECK(data->out__bpf_prog_active_addr != bpf_prog_active_addr, "bpf_prog_active_addr", "got %llu, exp %llu\n", (unsigned long long)data->out__bpf_prog_active_addr, (unsigned long long)bpf_prog_active_addr); CHECK(data->out__rq_cpu == -1, "rq_cpu", "got %u, exp != -1\n", data->out__rq_cpu); CHECK(data->out__bpf_prog_active < 0, "bpf_prog_active", "got %d, exp >= 0\n", data->out__bpf_prog_active); CHECK(data->out__cpu_0_rq_cpu != 0, "cpu_rq(0)->cpu", "got %u, exp 0\n", data->out__cpu_0_rq_cpu); this_rq_cpu = data->out__this_rq_cpu; CHECK(this_rq_cpu != data->out__rq_cpu, "this_rq_cpu", "got %u, exp %u\n", this_rq_cpu, data->out__rq_cpu); this_bpf_prog_active = data->out__this_bpf_prog_active; CHECK(this_bpf_prog_active != data->out__bpf_prog_active, "this_bpf_prog_active", "got %d, exp %d\n", this_bpf_prog_active, data->out__bpf_prog_active); cleanup: test_ksyms_btf__destroy(skel); } static void test_null_check(void) { struct test_ksyms_btf_null_check *skel; skel = test_ksyms_btf_null_check__open_and_load(); CHECK(skel, "skel_open", "unexpected load of a prog missing null check\n"); test_ksyms_btf_null_check__destroy(skel); } static void test_weak_syms(void) { struct test_ksyms_weak *skel; struct test_ksyms_weak__data *data; int err; skel = test_ksyms_weak__open_and_load(); if (!ASSERT_OK_PTR(skel, "test_ksyms_weak__open_and_load")) return; err = test_ksyms_weak__attach(skel); if (!ASSERT_OK(err, "test_ksyms_weak__attach")) goto cleanup; /* trigger tracepoint */ usleep(1); data = skel->data; ASSERT_EQ(data->out__existing_typed, 0, "existing typed ksym"); ASSERT_NEQ(data->out__existing_typeless, -1, "existing typeless ksym"); ASSERT_EQ(data->out__non_existent_typeless, 0, "nonexistent typeless ksym"); ASSERT_EQ(data->out__non_existent_typed, 0, "nonexistent typed ksym"); cleanup: test_ksyms_weak__destroy(skel); } static void test_weak_syms_lskel(void) { struct test_ksyms_weak_lskel *skel; struct test_ksyms_weak_lskel__data *data; int err; skel = test_ksyms_weak_lskel__open_and_load(); if (!ASSERT_OK_PTR(skel, "test_ksyms_weak_lskel__open_and_load")) return; err = test_ksyms_weak_lskel__attach(skel); if (!ASSERT_OK(err, "test_ksyms_weak_lskel__attach")) goto cleanup; /* trigger tracepoint */ usleep(1); data = skel->data; ASSERT_EQ(data->out__existing_typed, 0, "existing typed ksym"); ASSERT_NEQ(data->out__existing_typeless, -1, "existing typeless ksym"); ASSERT_EQ(data->out__non_existent_typeless, 0, "nonexistent typeless ksym"); ASSERT_EQ(data->out__non_existent_typed, 0, "nonexistent typed ksym"); cleanup: test_ksyms_weak_lskel__destroy(skel); } static void test_write_check(bool test_handler1) { struct test_ksyms_btf_write_check *skel; skel = test_ksyms_btf_write_check__open(); if (!ASSERT_OK_PTR(skel, "test_ksyms_btf_write_check__open")) return; bpf_program__set_autoload(test_handler1 ? skel->progs.handler2 : skel->progs.handler1, false); ASSERT_ERR(test_ksyms_btf_write_check__load(skel), "unexpected load of a prog writing to ksym memory\n"); test_ksyms_btf_write_check__destroy(skel); } void test_ksyms_btf(void) { int percpu_datasec; struct btf *btf; btf = libbpf_find_kernel_btf(); if (!ASSERT_OK_PTR(btf, "btf_exists")) return; percpu_datasec = btf__find_by_name_kind(btf, ".data..percpu", BTF_KIND_DATASEC); btf__free(btf); if (percpu_datasec < 0) { printf("%s:SKIP:no PERCPU DATASEC in kernel btf\n", __func__); test__skip(); return; } if (test__start_subtest("basic")) test_basic(); if (test__start_subtest("null_check")) test_null_check(); if (test__start_subtest("weak_ksyms")) test_weak_syms(); if (test__start_subtest("weak_ksyms_lskel")) test_weak_syms_lskel(); if (test__start_subtest("write_check1")) test_write_check(true); if (test__start_subtest("write_check2")) test_write_check(false); } |