]>
Commit | Line | Data |
---|---|---|
ba1fae43 WN |
1 | #include <stdio.h> |
2 | #include <sys/epoll.h> | |
3 | #include <util/bpf-loader.h> | |
4 | #include <util/evlist.h> | |
5 | #include "tests.h" | |
6 | #include "llvm.h" | |
7 | #include "debug.h" | |
8 | #define NR_ITERS 111 | |
9 | ||
10 | #ifdef HAVE_LIBBPF_SUPPORT | |
11 | ||
12 | static int epoll_pwait_loop(void) | |
13 | { | |
14 | int i; | |
15 | ||
16 | /* Should fail NR_ITERS times */ | |
17 | for (i = 0; i < NR_ITERS; i++) | |
18 | epoll_pwait(-(i + 1), NULL, 0, 0, NULL); | |
19 | return 0; | |
20 | } | |
21 | ||
bbb7d492 WN |
22 | #ifdef HAVE_BPF_PROLOGUE |
23 | ||
24 | static int llseek_loop(void) | |
25 | { | |
26 | int fds[2], i; | |
27 | ||
28 | fds[0] = open("/dev/null", O_RDONLY); | |
29 | fds[1] = open("/dev/null", O_RDWR); | |
30 | ||
31 | if (fds[0] < 0 || fds[1] < 0) | |
32 | return -1; | |
33 | ||
34 | for (i = 0; i < NR_ITERS; i++) { | |
35 | lseek(fds[i % 2], i, (i / 2) % 2 ? SEEK_CUR : SEEK_SET); | |
36 | lseek(fds[(i + 1) % 2], i, (i / 2) % 2 ? SEEK_CUR : SEEK_SET); | |
37 | } | |
38 | close(fds[0]); | |
39 | close(fds[1]); | |
40 | return 0; | |
41 | } | |
42 | ||
43 | #endif | |
44 | ||
ba1fae43 WN |
45 | static struct { |
46 | enum test_llvm__testcase prog_id; | |
47 | const char *desc; | |
48 | const char *name; | |
49 | const char *msg_compile_fail; | |
50 | const char *msg_load_fail; | |
51 | int (*target_func)(void); | |
52 | int expect_result; | |
53 | } bpf_testcase_table[] = { | |
54 | { | |
55 | LLVM_TESTCASE_BASE, | |
56 | "Test basic BPF filtering", | |
57 | "[basic_bpf_test]", | |
58 | "fix 'perf test LLVM' first", | |
59 | "load bpf object failed", | |
60 | &epoll_pwait_loop, | |
61 | (NR_ITERS + 1) / 2, | |
62 | }, | |
bbb7d492 WN |
63 | #ifdef HAVE_BPF_PROLOGUE |
64 | { | |
65 | LLVM_TESTCASE_BPF_PROLOGUE, | |
66 | "Test BPF prologue generation", | |
67 | "[bpf_prologue_test]", | |
68 | "fix kbuild first", | |
69 | "check your vmlinux setting?", | |
70 | &llseek_loop, | |
71 | (NR_ITERS + 1) / 4, | |
72 | }, | |
73 | #endif | |
ba1fae43 WN |
74 | }; |
75 | ||
76 | static int do_test(struct bpf_object *obj, int (*func)(void), | |
77 | int expect) | |
78 | { | |
79 | struct record_opts opts = { | |
80 | .target = { | |
81 | .uid = UINT_MAX, | |
82 | .uses_mmap = true, | |
83 | }, | |
84 | .freq = 0, | |
85 | .mmap_pages = 256, | |
86 | .default_interval = 1, | |
87 | }; | |
88 | ||
89 | char pid[16]; | |
90 | char sbuf[STRERR_BUFSIZE]; | |
91 | struct perf_evlist *evlist; | |
92 | int i, ret = TEST_FAIL, err = 0, count = 0; | |
93 | ||
94 | struct parse_events_evlist parse_evlist; | |
95 | struct parse_events_error parse_error; | |
96 | ||
97 | bzero(&parse_error, sizeof(parse_error)); | |
98 | bzero(&parse_evlist, sizeof(parse_evlist)); | |
99 | parse_evlist.error = &parse_error; | |
100 | INIT_LIST_HEAD(&parse_evlist.list); | |
101 | ||
102 | err = parse_events_load_bpf_obj(&parse_evlist, &parse_evlist.list, obj); | |
103 | if (err || list_empty(&parse_evlist.list)) { | |
104 | pr_debug("Failed to add events selected by BPF\n"); | |
105 | if (!err) | |
106 | return TEST_FAIL; | |
107 | } | |
108 | ||
109 | snprintf(pid, sizeof(pid), "%d", getpid()); | |
110 | pid[sizeof(pid) - 1] = '\0'; | |
111 | opts.target.tid = opts.target.pid = pid; | |
112 | ||
113 | /* Instead of perf_evlist__new_default, don't add default events */ | |
114 | evlist = perf_evlist__new(); | |
115 | if (!evlist) { | |
116 | pr_debug("No ehough memory to create evlist\n"); | |
117 | return TEST_FAIL; | |
118 | } | |
119 | ||
120 | err = perf_evlist__create_maps(evlist, &opts.target); | |
121 | if (err < 0) { | |
122 | pr_debug("Not enough memory to create thread/cpu maps\n"); | |
123 | goto out_delete_evlist; | |
124 | } | |
125 | ||
126 | perf_evlist__splice_list_tail(evlist, &parse_evlist.list); | |
127 | evlist->nr_groups = parse_evlist.nr_groups; | |
128 | ||
129 | perf_evlist__config(evlist, &opts); | |
130 | ||
131 | err = perf_evlist__open(evlist); | |
132 | if (err < 0) { | |
133 | pr_debug("perf_evlist__open: %s\n", | |
134 | strerror_r(errno, sbuf, sizeof(sbuf))); | |
135 | goto out_delete_evlist; | |
136 | } | |
137 | ||
138 | err = perf_evlist__mmap(evlist, opts.mmap_pages, false); | |
139 | if (err < 0) { | |
140 | pr_debug("perf_evlist__mmap: %s\n", | |
141 | strerror_r(errno, sbuf, sizeof(sbuf))); | |
142 | goto out_delete_evlist; | |
143 | } | |
144 | ||
145 | perf_evlist__enable(evlist); | |
146 | (*func)(); | |
147 | perf_evlist__disable(evlist); | |
148 | ||
149 | for (i = 0; i < evlist->nr_mmaps; i++) { | |
150 | union perf_event *event; | |
151 | ||
152 | while ((event = perf_evlist__mmap_read(evlist, i)) != NULL) { | |
153 | const u32 type = event->header.type; | |
154 | ||
155 | if (type == PERF_RECORD_SAMPLE) | |
156 | count ++; | |
157 | } | |
158 | } | |
159 | ||
160 | if (count != expect) | |
161 | pr_debug("BPF filter result incorrect\n"); | |
162 | ||
163 | ret = TEST_OK; | |
164 | ||
165 | out_delete_evlist: | |
166 | perf_evlist__delete(evlist); | |
167 | return ret; | |
168 | } | |
169 | ||
170 | static struct bpf_object * | |
171 | prepare_bpf(void *obj_buf, size_t obj_buf_sz, const char *name) | |
172 | { | |
173 | struct bpf_object *obj; | |
174 | ||
175 | obj = bpf__prepare_load_buffer(obj_buf, obj_buf_sz, name); | |
176 | if (IS_ERR(obj)) { | |
177 | pr_debug("Compile BPF program failed.\n"); | |
178 | return NULL; | |
179 | } | |
180 | return obj; | |
181 | } | |
182 | ||
916d4092 | 183 | static int __test__bpf(int idx) |
ba1fae43 WN |
184 | { |
185 | int ret; | |
186 | void *obj_buf; | |
187 | size_t obj_buf_sz; | |
188 | struct bpf_object *obj; | |
189 | ||
190 | ret = test_llvm__fetch_bpf_obj(&obj_buf, &obj_buf_sz, | |
916d4092 | 191 | bpf_testcase_table[idx].prog_id, |
ba1fae43 WN |
192 | true); |
193 | if (ret != TEST_OK || !obj_buf || !obj_buf_sz) { | |
194 | pr_debug("Unable to get BPF object, %s\n", | |
916d4092 ACM |
195 | bpf_testcase_table[idx].msg_compile_fail); |
196 | if (idx == 0) | |
ba1fae43 WN |
197 | return TEST_SKIP; |
198 | else | |
199 | return TEST_FAIL; | |
200 | } | |
201 | ||
202 | obj = prepare_bpf(obj_buf, obj_buf_sz, | |
916d4092 | 203 | bpf_testcase_table[idx].name); |
ba1fae43 WN |
204 | if (!obj) { |
205 | ret = TEST_FAIL; | |
206 | goto out; | |
207 | } | |
208 | ||
209 | ret = do_test(obj, | |
916d4092 ACM |
210 | bpf_testcase_table[idx].target_func, |
211 | bpf_testcase_table[idx].expect_result); | |
ba1fae43 WN |
212 | out: |
213 | bpf__clear(); | |
214 | return ret; | |
215 | } | |
216 | ||
217 | int test__bpf(void) | |
218 | { | |
219 | unsigned int i; | |
220 | int err; | |
221 | ||
222 | if (geteuid() != 0) { | |
223 | pr_debug("Only root can run BPF test\n"); | |
224 | return TEST_SKIP; | |
225 | } | |
226 | ||
227 | for (i = 0; i < ARRAY_SIZE(bpf_testcase_table); i++) { | |
228 | err = __test__bpf(i); | |
229 | ||
230 | if (err != TEST_OK) | |
231 | return err; | |
232 | } | |
233 | ||
234 | return TEST_OK; | |
235 | } | |
236 | ||
237 | #else | |
238 | int test__bpf(void) | |
239 | { | |
240 | pr_debug("Skip BPF test because BPF support is not compiled\n"); | |
241 | return TEST_SKIP; | |
242 | } | |
243 | #endif |