load.rs 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228
  1. use procfs::KernelVersion;
  2. use std::{convert::TryInto as _, thread, time};
  3. use aya::{
  4. include_bytes_aligned,
  5. maps::Array,
  6. programs::{
  7. links::{FdLink, PinnedLink},
  8. loaded_programs, KProbe, TracePoint, Xdp, XdpFlags,
  9. },
  10. Bpf,
  11. };
  12. const MAX_RETRIES: u32 = 100;
  13. const RETRY_DURATION_MS: u64 = 10;
  14. #[test]
  15. fn long_name() {
  16. let bytes = include_bytes_aligned!("../../../target/bpfel-unknown-none/release/name_test");
  17. let mut bpf = Bpf::load(bytes).unwrap();
  18. let name_prog: &mut Xdp = bpf
  19. .program_mut("ihaveaverylongname")
  20. .unwrap()
  21. .try_into()
  22. .unwrap();
  23. name_prog.load().unwrap();
  24. name_prog.attach("lo", XdpFlags::default()).unwrap();
  25. // We used to be able to assert with bpftool that the program name was short.
  26. // It seem though that it now uses the name from the ELF symbol table instead.
  27. // Therefore, as long as we were able to load the program, this is good enough.
  28. }
  29. #[test]
  30. fn multiple_btf_maps() {
  31. let bytes =
  32. include_bytes_aligned!("../../../target/bpfel-unknown-none/release/multimap-btf.bpf.o");
  33. let mut bpf = Bpf::load(bytes).unwrap();
  34. let map_1: Array<_, u64> = bpf.take_map("map_1").unwrap().try_into().unwrap();
  35. let map_2: Array<_, u64> = bpf.take_map("map_2").unwrap().try_into().unwrap();
  36. let prog: &mut TracePoint = bpf.program_mut("tracepoint").unwrap().try_into().unwrap();
  37. prog.load().unwrap();
  38. prog.attach("sched", "sched_switch").unwrap();
  39. thread::sleep(time::Duration::from_secs(3));
  40. let key = 0;
  41. let val_1 = map_1.get(&key, 0).unwrap();
  42. let val_2 = map_2.get(&key, 0).unwrap();
  43. assert_eq!(val_1, 24);
  44. assert_eq!(val_2, 42);
  45. }
  46. macro_rules! assert_loaded {
  47. ($name:literal, $loaded:expr) => {
  48. for i in 0..(MAX_RETRIES + 1) {
  49. let state = loaded_programs().any(|prog| prog.unwrap().name() == $name.as_bytes());
  50. if state == $loaded {
  51. break;
  52. }
  53. if i == MAX_RETRIES {
  54. panic!("Expected loaded: {} but was loaded: {}", $loaded, state);
  55. }
  56. thread::sleep(time::Duration::from_millis(RETRY_DURATION_MS));
  57. }
  58. };
  59. }
  60. #[test]
  61. fn unload_xdp() {
  62. let bytes = include_bytes_aligned!("../../../target/bpfel-unknown-none/release/test");
  63. let mut bpf = Bpf::load(bytes).unwrap();
  64. let prog: &mut Xdp = bpf
  65. .program_mut("test_unload_xdp")
  66. .unwrap()
  67. .try_into()
  68. .unwrap();
  69. prog.load().unwrap();
  70. assert_loaded!("test_unload_xdp", true);
  71. let link = prog.attach("lo", XdpFlags::default()).unwrap();
  72. {
  73. let _link_owned = prog.take_link(link).unwrap();
  74. prog.unload().unwrap();
  75. assert_loaded!("test_unload_xdp", true);
  76. };
  77. assert_loaded!("test_unload_xdp", false);
  78. prog.load().unwrap();
  79. assert_loaded!("test_unload_xdp", true);
  80. prog.attach("lo", XdpFlags::default()).unwrap();
  81. assert_loaded!("test_unload_xdp", true);
  82. prog.unload().unwrap();
  83. assert_loaded!("test_unload_xdp", false);
  84. }
  85. #[test]
  86. fn unload_kprobe() {
  87. let bytes = include_bytes_aligned!("../../../target/bpfel-unknown-none/release/test");
  88. let mut bpf = Bpf::load(bytes).unwrap();
  89. let prog: &mut KProbe = bpf
  90. .program_mut("test_unload_kpr")
  91. .unwrap()
  92. .try_into()
  93. .unwrap();
  94. prog.load().unwrap();
  95. assert_loaded!("test_unload_kpr", true);
  96. let link = prog.attach("try_to_wake_up", 0).unwrap();
  97. {
  98. let _link_owned = prog.take_link(link).unwrap();
  99. prog.unload().unwrap();
  100. assert_loaded!("test_unload_kpr", true);
  101. };
  102. assert_loaded!("test_unload_kpr", false);
  103. prog.load().unwrap();
  104. assert_loaded!("test_unload_kpr", true);
  105. prog.attach("try_to_wake_up", 0).unwrap();
  106. assert_loaded!("test_unload_kpr", true);
  107. prog.unload().unwrap();
  108. assert_loaded!("test_unload_kpr", false);
  109. }
  110. #[test]
  111. fn pin_link() {
  112. let kernel_version = KernelVersion::current().unwrap();
  113. if kernel_version < KernelVersion::new(5, 9, 0) {
  114. eprintln!("skipping test on kernel {kernel_version:?}, XDP uses netlink");
  115. return;
  116. }
  117. let bytes = include_bytes_aligned!("../../../target/bpfel-unknown-none/release/test");
  118. let mut bpf = Bpf::load(bytes).unwrap();
  119. let prog: &mut Xdp = bpf
  120. .program_mut("test_unload_xdp")
  121. .unwrap()
  122. .try_into()
  123. .unwrap();
  124. prog.load().unwrap();
  125. let link_id = prog.attach("lo", XdpFlags::default()).unwrap();
  126. let link = prog.take_link(link_id).unwrap();
  127. assert_loaded!("test_unload_xdp", true);
  128. let fd_link: FdLink = link.try_into().unwrap();
  129. let pinned = fd_link.pin("/sys/fs/bpf/aya-xdp-test-lo").unwrap();
  130. // because of the pin, the program is still attached
  131. prog.unload().unwrap();
  132. assert_loaded!("test_unload_xdp", true);
  133. // delete the pin, but the program is still attached
  134. let new_link = pinned.unpin().unwrap();
  135. assert_loaded!("test_unload_xdp", true);
  136. // finally when new_link is dropped we're detached
  137. drop(new_link);
  138. assert_loaded!("test_unload_xdp", false);
  139. }
  140. #[test]
  141. fn pin_lifecycle() {
  142. let kernel_version = KernelVersion::current().unwrap();
  143. if kernel_version < KernelVersion::new(5, 18, 0) {
  144. eprintln!("skipping test on kernel {kernel_version:?}, support for BPF_F_XDP_HAS_FRAGS was added in 5.18.0; see https://github.com/torvalds/linux/commit/c2f2cdb");
  145. return;
  146. }
  147. let bytes = include_bytes_aligned!("../../../target/bpfel-unknown-none/release/pass");
  148. // 1. Load Program and Pin
  149. {
  150. let mut bpf = Bpf::load(bytes).unwrap();
  151. let prog: &mut Xdp = bpf.program_mut("pass").unwrap().try_into().unwrap();
  152. prog.load().unwrap();
  153. prog.pin("/sys/fs/bpf/aya-xdp-test-prog").unwrap();
  154. }
  155. // should still be loaded since prog was pinned
  156. assert_loaded!("pass", true);
  157. // 2. Load program from bpffs but don't attach it
  158. {
  159. let _ = Xdp::from_pin("/sys/fs/bpf/aya-xdp-test-prog").unwrap();
  160. }
  161. // should still be loaded since prog was pinned
  162. assert_loaded!("pass", true);
  163. // 3. Load program from bpffs and attach
  164. {
  165. let mut prog = Xdp::from_pin("/sys/fs/bpf/aya-xdp-test-prog").unwrap();
  166. let link_id = prog.attach("lo", XdpFlags::default()).unwrap();
  167. let link = prog.take_link(link_id).unwrap();
  168. let fd_link: FdLink = link.try_into().unwrap();
  169. fd_link.pin("/sys/fs/bpf/aya-xdp-test-lo").unwrap();
  170. // Unpin the program. It will stay attached since its links were pinned.
  171. prog.unpin().unwrap();
  172. }
  173. // should still be loaded since link was pinned
  174. assert_loaded!("pass", true);
  175. // 4. Load a new version of the program, unpin link, and atomically replace old program
  176. {
  177. let mut bpf = Bpf::load(bytes).unwrap();
  178. let prog: &mut Xdp = bpf.program_mut("pass").unwrap().try_into().unwrap();
  179. prog.load().unwrap();
  180. let link = PinnedLink::from_pin("/sys/fs/bpf/aya-xdp-test-lo")
  181. .unwrap()
  182. .unpin()
  183. .unwrap();
  184. prog.attach_to_link(link.try_into().unwrap()).unwrap();
  185. assert_loaded!("pass", true);
  186. }
  187. // program should be unloaded
  188. assert_loaded!("pass", false);
  189. }