1 // SPDX-License-Identifier: GPL-2.0
2 #include <test_progs.h>
4 void test_stacktrace_build_id(void)
6 int control_map_fd
, stackid_hmap_fd
, stackmap_fd
, stack_amap_fd
;
7 const char *prog_name
= "tracepoint/random/urandom_read";
8 const char *file
= "./test_stacktrace_build_id.o";
9 int err
, prog_fd
, stack_trace_len
;
10 __u32 key
, previous_key
, val
, duration
= 0;
11 struct bpf_program
*prog
;
12 struct bpf_object
*obj
;
13 struct bpf_link
*link
= NULL
;
16 struct bpf_stack_build_id id_offs
[PERF_MAX_STACK_DEPTH
];
17 int build_id_matches
= 0;
21 err
= bpf_prog_load(file
, BPF_PROG_TYPE_TRACEPOINT
, &obj
, &prog_fd
);
22 if (CHECK(err
, "prog_load", "err %d errno %d\n", err
, errno
))
25 prog
= bpf_object__find_program_by_title(obj
, prog_name
);
26 if (CHECK(!prog
, "find_prog", "prog '%s' not found\n", prog_name
))
29 link
= bpf_program__attach_tracepoint(prog
, "random", "urandom_read");
30 if (CHECK(IS_ERR(link
), "attach_tp", "err %ld\n", PTR_ERR(link
)))
34 control_map_fd
= bpf_find_map(__func__
, obj
, "control_map");
35 if (CHECK(control_map_fd
< 0, "bpf_find_map control_map",
36 "err %d errno %d\n", err
, errno
))
39 stackid_hmap_fd
= bpf_find_map(__func__
, obj
, "stackid_hmap");
40 if (CHECK(stackid_hmap_fd
< 0, "bpf_find_map stackid_hmap",
41 "err %d errno %d\n", err
, errno
))
44 stackmap_fd
= bpf_find_map(__func__
, obj
, "stackmap");
45 if (CHECK(stackmap_fd
< 0, "bpf_find_map stackmap", "err %d errno %d\n",
49 stack_amap_fd
= bpf_find_map(__func__
, obj
, "stack_amap");
50 if (CHECK(stack_amap_fd
< 0, "bpf_find_map stack_amap",
51 "err %d errno %d\n", err
, errno
))
54 assert(system("dd if=/dev/urandom of=/dev/zero count=4 2> /dev/null")
56 assert(system("./urandom_read") == 0);
57 /* disable stack trace collection */
60 bpf_map_update_elem(control_map_fd
, &key
, &val
, 0);
62 /* for every element in stackid_hmap, we can find a corresponding one
63 * in stackmap, and vise versa.
65 err
= compare_map_keys(stackid_hmap_fd
, stackmap_fd
);
66 if (CHECK(err
, "compare_map_keys stackid_hmap vs. stackmap",
67 "err %d errno %d\n", err
, errno
))
70 err
= compare_map_keys(stackmap_fd
, stackid_hmap_fd
);
71 if (CHECK(err
, "compare_map_keys stackmap vs. stackid_hmap",
72 "err %d errno %d\n", err
, errno
))
75 err
= extract_build_id(buf
, 256);
77 if (CHECK(err
, "get build_id with readelf",
78 "err %d errno %d\n", err
, errno
))
81 err
= bpf_map_get_next_key(stackmap_fd
, NULL
, &key
);
82 if (CHECK(err
, "get_next_key from stackmap",
83 "err %d, errno %d\n", err
, errno
))
89 err
= bpf_map_lookup_elem(stackmap_fd
, &key
, id_offs
);
90 if (CHECK(err
, "lookup_elem from stackmap",
91 "err %d, errno %d\n", err
, errno
))
93 for (i
= 0; i
< PERF_MAX_STACK_DEPTH
; ++i
)
94 if (id_offs
[i
].status
== BPF_STACK_BUILD_ID_VALID
&&
95 id_offs
[i
].offset
!= 0) {
96 for (j
= 0; j
< 20; ++j
)
97 sprintf(build_id
+ 2 * j
, "%02x",
98 id_offs
[i
].build_id
[j
] & 0xff);
99 if (strstr(buf
, build_id
) != NULL
)
100 build_id_matches
= 1;
103 } while (bpf_map_get_next_key(stackmap_fd
, &previous_key
, &key
) == 0);
105 /* stack_map_get_build_id_offset() is racy and sometimes can return
106 * BPF_STACK_BUILD_ID_IP instead of BPF_STACK_BUILD_ID_VALID;
107 * try it one more time.
109 if (build_id_matches
< 1 && retry
--) {
110 bpf_link__destroy(link
);
111 bpf_object__close(obj
);
112 printf("%s:WARN:Didn't find expected build ID from the map, retrying\n",
117 if (CHECK(build_id_matches
< 1, "build id match",
118 "Didn't find expected build ID from the map\n"))
121 stack_trace_len
= PERF_MAX_STACK_DEPTH
122 * sizeof(struct bpf_stack_build_id
);
123 err
= compare_stack_ips(stackmap_fd
, stack_amap_fd
, stack_trace_len
);
124 CHECK(err
, "compare_stack_ips stackmap vs. stack_amap",
125 "err %d errno %d\n", err
, errno
);
128 bpf_link__destroy(link
);
131 bpf_object__close(obj
);