1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (c) 2021 Facebook */
6 #include <sys/syscall.h>
9 #include <test_progs.h>
10 #include <network_helpers.h>
12 #include "test_bpf_cookie.skel.h"
13 #include "kprobe_multi.skel.h"
14 #include "uprobe_multi.skel.h"
16 /* uprobe attach point */
17 static noinline void trigger_func(void)
22 static void kprobe_subtest(struct test_bpf_cookie *skel)
24 DECLARE_LIBBPF_OPTS(bpf_kprobe_opts, opts);
25 struct bpf_link *link1 = NULL, *link2 = NULL;
26 struct bpf_link *retlink1 = NULL, *retlink2 = NULL;
28 /* attach two kprobes */
29 opts.bpf_cookie = 0x1;
30 opts.retprobe = false;
31 link1 = bpf_program__attach_kprobe_opts(skel->progs.handle_kprobe,
32 SYS_NANOSLEEP_KPROBE_NAME, &opts);
33 if (!ASSERT_OK_PTR(link1, "link1"))
36 opts.bpf_cookie = 0x2;
37 opts.retprobe = false;
38 link2 = bpf_program__attach_kprobe_opts(skel->progs.handle_kprobe,
39 SYS_NANOSLEEP_KPROBE_NAME, &opts);
40 if (!ASSERT_OK_PTR(link2, "link2"))
43 /* attach two kretprobes */
44 opts.bpf_cookie = 0x10;
46 retlink1 = bpf_program__attach_kprobe_opts(skel->progs.handle_kretprobe,
47 SYS_NANOSLEEP_KPROBE_NAME, &opts);
48 if (!ASSERT_OK_PTR(retlink1, "retlink1"))
51 opts.bpf_cookie = 0x20;
53 retlink2 = bpf_program__attach_kprobe_opts(skel->progs.handle_kretprobe,
54 SYS_NANOSLEEP_KPROBE_NAME, &opts);
55 if (!ASSERT_OK_PTR(retlink2, "retlink2"))
58 /* trigger kprobe && kretprobe */
61 ASSERT_EQ(skel->bss->kprobe_res, 0x1 | 0x2, "kprobe_res");
62 ASSERT_EQ(skel->bss->kretprobe_res, 0x10 | 0x20, "kretprobe_res");
65 bpf_link__destroy(link1);
66 bpf_link__destroy(link2);
67 bpf_link__destroy(retlink1);
68 bpf_link__destroy(retlink2);
71 static void kprobe_multi_test_run(struct kprobe_multi *skel)
73 LIBBPF_OPTS(bpf_test_run_opts, topts);
76 prog_fd = bpf_program__fd(skel->progs.trigger);
77 err = bpf_prog_test_run_opts(prog_fd, &topts);
78 ASSERT_OK(err, "test_run");
79 ASSERT_EQ(topts.retval, 0, "test_run");
81 ASSERT_EQ(skel->bss->kprobe_test1_result, 1, "kprobe_test1_result");
82 ASSERT_EQ(skel->bss->kprobe_test2_result, 1, "kprobe_test2_result");
83 ASSERT_EQ(skel->bss->kprobe_test3_result, 1, "kprobe_test3_result");
84 ASSERT_EQ(skel->bss->kprobe_test4_result, 1, "kprobe_test4_result");
85 ASSERT_EQ(skel->bss->kprobe_test5_result, 1, "kprobe_test5_result");
86 ASSERT_EQ(skel->bss->kprobe_test6_result, 1, "kprobe_test6_result");
87 ASSERT_EQ(skel->bss->kprobe_test7_result, 1, "kprobe_test7_result");
88 ASSERT_EQ(skel->bss->kprobe_test8_result, 1, "kprobe_test8_result");
90 ASSERT_EQ(skel->bss->kretprobe_test1_result, 1, "kretprobe_test1_result");
91 ASSERT_EQ(skel->bss->kretprobe_test2_result, 1, "kretprobe_test2_result");
92 ASSERT_EQ(skel->bss->kretprobe_test3_result, 1, "kretprobe_test3_result");
93 ASSERT_EQ(skel->bss->kretprobe_test4_result, 1, "kretprobe_test4_result");
94 ASSERT_EQ(skel->bss->kretprobe_test5_result, 1, "kretprobe_test5_result");
95 ASSERT_EQ(skel->bss->kretprobe_test6_result, 1, "kretprobe_test6_result");
96 ASSERT_EQ(skel->bss->kretprobe_test7_result, 1, "kretprobe_test7_result");
97 ASSERT_EQ(skel->bss->kretprobe_test8_result, 1, "kretprobe_test8_result");
100 static void kprobe_multi_link_api_subtest(void)
102 int prog_fd, link1_fd = -1, link2_fd = -1;
103 struct kprobe_multi *skel = NULL;
104 LIBBPF_OPTS(bpf_link_create_opts, opts);
105 unsigned long long addrs[8];
108 if (!ASSERT_OK(load_kallsyms(), "load_kallsyms"))
111 skel = kprobe_multi__open_and_load();
112 if (!ASSERT_OK_PTR(skel, "fentry_raw_skel_load"))
115 skel->bss->pid = getpid();
116 skel->bss->test_cookie = true;
118 #define GET_ADDR(__sym, __addr) ({ \
119 __addr = ksym_get_addr(__sym); \
120 if (!ASSERT_NEQ(__addr, 0, "ksym_get_addr " #__sym)) \
124 GET_ADDR("bpf_fentry_test1", addrs[0]);
125 GET_ADDR("bpf_fentry_test3", addrs[1]);
126 GET_ADDR("bpf_fentry_test4", addrs[2]);
127 GET_ADDR("bpf_fentry_test5", addrs[3]);
128 GET_ADDR("bpf_fentry_test6", addrs[4]);
129 GET_ADDR("bpf_fentry_test7", addrs[5]);
130 GET_ADDR("bpf_fentry_test2", addrs[6]);
131 GET_ADDR("bpf_fentry_test8", addrs[7]);
135 cookies[0] = 1; /* bpf_fentry_test1 */
136 cookies[1] = 2; /* bpf_fentry_test3 */
137 cookies[2] = 3; /* bpf_fentry_test4 */
138 cookies[3] = 4; /* bpf_fentry_test5 */
139 cookies[4] = 5; /* bpf_fentry_test6 */
140 cookies[5] = 6; /* bpf_fentry_test7 */
141 cookies[6] = 7; /* bpf_fentry_test2 */
142 cookies[7] = 8; /* bpf_fentry_test8 */
144 opts.kprobe_multi.addrs = (const unsigned long *) &addrs;
145 opts.kprobe_multi.cnt = ARRAY_SIZE(addrs);
146 opts.kprobe_multi.cookies = (const __u64 *) &cookies;
147 prog_fd = bpf_program__fd(skel->progs.test_kprobe);
149 link1_fd = bpf_link_create(prog_fd, 0, BPF_TRACE_KPROBE_MULTI, &opts);
150 if (!ASSERT_GE(link1_fd, 0, "link1_fd"))
153 cookies[0] = 8; /* bpf_fentry_test1 */
154 cookies[1] = 7; /* bpf_fentry_test3 */
155 cookies[2] = 6; /* bpf_fentry_test4 */
156 cookies[3] = 5; /* bpf_fentry_test5 */
157 cookies[4] = 4; /* bpf_fentry_test6 */
158 cookies[5] = 3; /* bpf_fentry_test7 */
159 cookies[6] = 2; /* bpf_fentry_test2 */
160 cookies[7] = 1; /* bpf_fentry_test8 */
162 opts.kprobe_multi.flags = BPF_F_KPROBE_MULTI_RETURN;
163 prog_fd = bpf_program__fd(skel->progs.test_kretprobe);
165 link2_fd = bpf_link_create(prog_fd, 0, BPF_TRACE_KPROBE_MULTI, &opts);
166 if (!ASSERT_GE(link2_fd, 0, "link2_fd"))
169 kprobe_multi_test_run(skel);
174 kprobe_multi__destroy(skel);
177 static void kprobe_multi_attach_api_subtest(void)
179 struct bpf_link *link1 = NULL, *link2 = NULL;
180 LIBBPF_OPTS(bpf_kprobe_multi_opts, opts);
181 LIBBPF_OPTS(bpf_test_run_opts, topts);
182 struct kprobe_multi *skel = NULL;
183 const char *syms[8] = {
195 skel = kprobe_multi__open_and_load();
196 if (!ASSERT_OK_PTR(skel, "fentry_raw_skel_load"))
199 skel->bss->pid = getpid();
200 skel->bss->test_cookie = true;
202 cookies[0] = 1; /* bpf_fentry_test1 */
203 cookies[1] = 2; /* bpf_fentry_test3 */
204 cookies[2] = 3; /* bpf_fentry_test4 */
205 cookies[3] = 4; /* bpf_fentry_test5 */
206 cookies[4] = 5; /* bpf_fentry_test6 */
207 cookies[5] = 6; /* bpf_fentry_test7 */
208 cookies[6] = 7; /* bpf_fentry_test2 */
209 cookies[7] = 8; /* bpf_fentry_test8 */
212 opts.cnt = ARRAY_SIZE(syms);
213 opts.cookies = cookies;
215 link1 = bpf_program__attach_kprobe_multi_opts(skel->progs.test_kprobe,
217 if (!ASSERT_OK_PTR(link1, "bpf_program__attach_kprobe_multi_opts"))
220 cookies[0] = 8; /* bpf_fentry_test1 */
221 cookies[1] = 7; /* bpf_fentry_test3 */
222 cookies[2] = 6; /* bpf_fentry_test4 */
223 cookies[3] = 5; /* bpf_fentry_test5 */
224 cookies[4] = 4; /* bpf_fentry_test6 */
225 cookies[5] = 3; /* bpf_fentry_test7 */
226 cookies[6] = 2; /* bpf_fentry_test2 */
227 cookies[7] = 1; /* bpf_fentry_test8 */
229 opts.retprobe = true;
231 link2 = bpf_program__attach_kprobe_multi_opts(skel->progs.test_kretprobe,
233 if (!ASSERT_OK_PTR(link2, "bpf_program__attach_kprobe_multi_opts"))
236 kprobe_multi_test_run(skel);
239 bpf_link__destroy(link2);
240 bpf_link__destroy(link1);
241 kprobe_multi__destroy(skel);
244 /* defined in prog_tests/uprobe_multi_test.c */
245 void uprobe_multi_func_1(void);
246 void uprobe_multi_func_2(void);
247 void uprobe_multi_func_3(void);
249 static void uprobe_multi_test_run(struct uprobe_multi *skel)
251 skel->bss->uprobe_multi_func_1_addr = (__u64) uprobe_multi_func_1;
252 skel->bss->uprobe_multi_func_2_addr = (__u64) uprobe_multi_func_2;
253 skel->bss->uprobe_multi_func_3_addr = (__u64) uprobe_multi_func_3;
255 skel->bss->pid = getpid();
256 skel->bss->test_cookie = true;
258 uprobe_multi_func_1();
259 uprobe_multi_func_2();
260 uprobe_multi_func_3();
262 ASSERT_EQ(skel->bss->uprobe_multi_func_1_result, 1, "uprobe_multi_func_1_result");
263 ASSERT_EQ(skel->bss->uprobe_multi_func_2_result, 1, "uprobe_multi_func_2_result");
264 ASSERT_EQ(skel->bss->uprobe_multi_func_3_result, 1, "uprobe_multi_func_3_result");
266 ASSERT_EQ(skel->bss->uretprobe_multi_func_1_result, 1, "uretprobe_multi_func_1_result");
267 ASSERT_EQ(skel->bss->uretprobe_multi_func_2_result, 1, "uretprobe_multi_func_2_result");
268 ASSERT_EQ(skel->bss->uretprobe_multi_func_3_result, 1, "uretprobe_multi_func_3_result");
271 static void uprobe_multi_attach_api_subtest(void)
273 struct bpf_link *link1 = NULL, *link2 = NULL;
274 struct uprobe_multi *skel = NULL;
275 LIBBPF_OPTS(bpf_uprobe_multi_opts, opts);
276 const char *syms[3] = {
277 "uprobe_multi_func_1",
278 "uprobe_multi_func_2",
279 "uprobe_multi_func_3",
283 cookies[0] = 3; /* uprobe_multi_func_1 */
284 cookies[1] = 1; /* uprobe_multi_func_2 */
285 cookies[2] = 2; /* uprobe_multi_func_3 */
288 opts.cnt = ARRAY_SIZE(syms);
289 opts.cookies = &cookies[0];
291 skel = uprobe_multi__open_and_load();
292 if (!ASSERT_OK_PTR(skel, "uprobe_multi"))
295 link1 = bpf_program__attach_uprobe_multi(skel->progs.uprobe, -1,
296 "/proc/self/exe", NULL, &opts);
297 if (!ASSERT_OK_PTR(link1, "bpf_program__attach_uprobe_multi"))
300 cookies[0] = 2; /* uprobe_multi_func_1 */
301 cookies[1] = 3; /* uprobe_multi_func_2 */
302 cookies[2] = 1; /* uprobe_multi_func_3 */
304 opts.retprobe = true;
305 link2 = bpf_program__attach_uprobe_multi(skel->progs.uretprobe, -1,
306 "/proc/self/exe", NULL, &opts);
307 if (!ASSERT_OK_PTR(link2, "bpf_program__attach_uprobe_multi_retprobe"))
310 uprobe_multi_test_run(skel);
313 bpf_link__destroy(link2);
314 bpf_link__destroy(link1);
315 uprobe_multi__destroy(skel);
318 static void uprobe_subtest(struct test_bpf_cookie *skel)
320 DECLARE_LIBBPF_OPTS(bpf_uprobe_opts, opts);
321 struct bpf_link *link1 = NULL, *link2 = NULL;
322 struct bpf_link *retlink1 = NULL, *retlink2 = NULL;
323 ssize_t uprobe_offset;
325 uprobe_offset = get_uprobe_offset(&trigger_func);
326 if (!ASSERT_GE(uprobe_offset, 0, "uprobe_offset"))
329 /* attach two uprobes */
330 opts.bpf_cookie = 0x100;
331 opts.retprobe = false;
332 link1 = bpf_program__attach_uprobe_opts(skel->progs.handle_uprobe, 0 /* self pid */,
333 "/proc/self/exe", uprobe_offset, &opts);
334 if (!ASSERT_OK_PTR(link1, "link1"))
337 opts.bpf_cookie = 0x200;
338 opts.retprobe = false;
339 link2 = bpf_program__attach_uprobe_opts(skel->progs.handle_uprobe, -1 /* any pid */,
340 "/proc/self/exe", uprobe_offset, &opts);
341 if (!ASSERT_OK_PTR(link2, "link2"))
344 /* attach two uretprobes */
345 opts.bpf_cookie = 0x1000;
346 opts.retprobe = true;
347 retlink1 = bpf_program__attach_uprobe_opts(skel->progs.handle_uretprobe, -1 /* any pid */,
348 "/proc/self/exe", uprobe_offset, &opts);
349 if (!ASSERT_OK_PTR(retlink1, "retlink1"))
352 opts.bpf_cookie = 0x2000;
353 opts.retprobe = true;
354 retlink2 = bpf_program__attach_uprobe_opts(skel->progs.handle_uretprobe, 0 /* self pid */,
355 "/proc/self/exe", uprobe_offset, &opts);
356 if (!ASSERT_OK_PTR(retlink2, "retlink2"))
359 /* trigger uprobe && uretprobe */
362 ASSERT_EQ(skel->bss->uprobe_res, 0x100 | 0x200, "uprobe_res");
363 ASSERT_EQ(skel->bss->uretprobe_res, 0x1000 | 0x2000, "uretprobe_res");
366 bpf_link__destroy(link1);
367 bpf_link__destroy(link2);
368 bpf_link__destroy(retlink1);
369 bpf_link__destroy(retlink2);
372 static void tp_subtest(struct test_bpf_cookie *skel)
374 DECLARE_LIBBPF_OPTS(bpf_tracepoint_opts, opts);
375 struct bpf_link *link1 = NULL, *link2 = NULL, *link3 = NULL;
377 /* attach first tp prog */
378 opts.bpf_cookie = 0x10000;
379 link1 = bpf_program__attach_tracepoint_opts(skel->progs.handle_tp1,
380 "syscalls", "sys_enter_nanosleep", &opts);
381 if (!ASSERT_OK_PTR(link1, "link1"))
384 /* attach second tp prog */
385 opts.bpf_cookie = 0x20000;
386 link2 = bpf_program__attach_tracepoint_opts(skel->progs.handle_tp2,
387 "syscalls", "sys_enter_nanosleep", &opts);
388 if (!ASSERT_OK_PTR(link2, "link2"))
391 /* trigger tracepoints */
394 ASSERT_EQ(skel->bss->tp_res, 0x10000 | 0x20000, "tp_res1");
396 /* now we detach first prog and will attach third one, which causes
397 * two internal calls to bpf_prog_array_copy(), shuffling
398 * bpf_prog_array_items around. We test here that we don't lose track
399 * of associated bpf_cookies.
401 bpf_link__destroy(link1);
404 skel->bss->tp_res = 0;
406 /* attach third tp prog */
407 opts.bpf_cookie = 0x40000;
408 link3 = bpf_program__attach_tracepoint_opts(skel->progs.handle_tp3,
409 "syscalls", "sys_enter_nanosleep", &opts);
410 if (!ASSERT_OK_PTR(link3, "link3"))
413 /* trigger tracepoints */
416 ASSERT_EQ(skel->bss->tp_res, 0x20000 | 0x40000, "tp_res2");
419 bpf_link__destroy(link1);
420 bpf_link__destroy(link2);
421 bpf_link__destroy(link3);
424 static void burn_cpu(void)
430 /* generate some branches on cpu 0 */
432 CPU_SET(0, &cpu_set);
433 err = pthread_setaffinity_np(pthread_self(), sizeof(cpu_set), &cpu_set);
434 ASSERT_OK(err, "set_thread_affinity");
436 /* spin the loop for a while (random high number) */
437 for (i = 0; i < 1000000; ++i)
441 static void pe_subtest(struct test_bpf_cookie *skel)
443 DECLARE_LIBBPF_OPTS(bpf_perf_event_opts, opts);
444 struct bpf_link *link = NULL;
445 struct perf_event_attr attr;
448 /* create perf event */
449 memset(&attr, 0, sizeof(attr));
450 attr.size = sizeof(attr);
451 attr.type = PERF_TYPE_SOFTWARE;
452 attr.config = PERF_COUNT_SW_CPU_CLOCK;
454 attr.sample_freq = 10000;
455 pfd = syscall(__NR_perf_event_open, &attr, -1, 0, -1, PERF_FLAG_FD_CLOEXEC);
456 if (!ASSERT_GE(pfd, 0, "perf_fd"))
459 opts.bpf_cookie = 0x100000;
460 link = bpf_program__attach_perf_event_opts(skel->progs.handle_pe, pfd, &opts);
461 if (!ASSERT_OK_PTR(link, "link1"))
464 burn_cpu(); /* trigger BPF prog */
466 ASSERT_EQ(skel->bss->pe_res, 0x100000, "pe_res1");
468 /* prevent bpf_link__destroy() closing pfd itself */
469 bpf_link__disconnect(link);
470 /* close BPF link's FD explicitly */
471 close(bpf_link__fd(link));
472 /* free up memory used by struct bpf_link */
473 bpf_link__destroy(link);
476 skel->bss->pe_res = 0;
478 opts.bpf_cookie = 0x200000;
479 link = bpf_program__attach_perf_event_opts(skel->progs.handle_pe, pfd, &opts);
480 if (!ASSERT_OK_PTR(link, "link2"))
483 burn_cpu(); /* trigger BPF prog */
485 ASSERT_EQ(skel->bss->pe_res, 0x200000, "pe_res2");
489 bpf_link__destroy(link);
492 static void tracing_subtest(struct test_bpf_cookie *skel)
496 int fentry_fd = -1, fexit_fd = -1, fmod_ret_fd = -1;
497 LIBBPF_OPTS(bpf_test_run_opts, opts);
498 LIBBPF_OPTS(bpf_link_create_opts, link_opts);
500 skel->bss->fentry_res = 0;
501 skel->bss->fexit_res = 0;
503 cookie = 0x10000000000000L;
504 prog_fd = bpf_program__fd(skel->progs.fentry_test1);
505 link_opts.tracing.cookie = cookie;
506 fentry_fd = bpf_link_create(prog_fd, 0, BPF_TRACE_FENTRY, &link_opts);
507 if (!ASSERT_GE(fentry_fd, 0, "fentry.link_create"))
510 cookie = 0x20000000000000L;
511 prog_fd = bpf_program__fd(skel->progs.fexit_test1);
512 link_opts.tracing.cookie = cookie;
513 fexit_fd = bpf_link_create(prog_fd, 0, BPF_TRACE_FEXIT, &link_opts);
514 if (!ASSERT_GE(fexit_fd, 0, "fexit.link_create"))
517 cookie = 0x30000000000000L;
518 prog_fd = bpf_program__fd(skel->progs.fmod_ret_test);
519 link_opts.tracing.cookie = cookie;
520 fmod_ret_fd = bpf_link_create(prog_fd, 0, BPF_MODIFY_RETURN, &link_opts);
521 if (!ASSERT_GE(fmod_ret_fd, 0, "fmod_ret.link_create"))
524 prog_fd = bpf_program__fd(skel->progs.fentry_test1);
525 bpf_prog_test_run_opts(prog_fd, &opts);
527 prog_fd = bpf_program__fd(skel->progs.fmod_ret_test);
528 bpf_prog_test_run_opts(prog_fd, &opts);
530 ASSERT_EQ(skel->bss->fentry_res, 0x10000000000000L, "fentry_res");
531 ASSERT_EQ(skel->bss->fexit_res, 0x20000000000000L, "fexit_res");
532 ASSERT_EQ(skel->bss->fmod_ret_res, 0x30000000000000L, "fmod_ret_res");
539 if (fmod_ret_fd >= 0)
543 int stack_mprotect(void);
545 static void lsm_subtest(struct test_bpf_cookie *skel)
550 LIBBPF_OPTS(bpf_link_create_opts, link_opts);
553 skel->bss->lsm_res = 0;
555 cookie = 0x90000000000090L;
556 prog_fd = bpf_program__fd(skel->progs.test_int_hook);
557 link_opts.tracing.cookie = cookie;
558 lsm_fd = bpf_link_create(prog_fd, 0, BPF_LSM_MAC, &link_opts);
559 if (!ASSERT_GE(lsm_fd, 0, "lsm.link_create"))
562 err = stack_mprotect();
563 if (!ASSERT_EQ(err, -1, "stack_mprotect") ||
564 !ASSERT_EQ(errno, EPERM, "stack_mprotect"))
569 ASSERT_EQ(skel->bss->lsm_res, 0x90000000000090L, "fentry_res");
576 static void tp_btf_subtest(struct test_bpf_cookie *skel)
579 int prog_fd, link_fd = -1;
580 struct bpf_link *link = NULL;
581 LIBBPF_OPTS(bpf_link_create_opts, link_opts);
582 LIBBPF_OPTS(bpf_raw_tp_opts, raw_tp_opts);
583 LIBBPF_OPTS(bpf_trace_opts, trace_opts);
585 /* There are three different ways to attach tp_btf (BTF-aware raw
586 * tracepoint) programs. Let's test all of them.
588 prog_fd = bpf_program__fd(skel->progs.handle_tp_btf);
590 /* low-level BPF_RAW_TRACEPOINT_OPEN command wrapper */
591 skel->bss->tp_btf_res = 0;
593 raw_tp_opts.cookie = cookie = 0x11000000000000L;
594 link_fd = bpf_raw_tracepoint_open_opts(prog_fd, &raw_tp_opts);
595 if (!ASSERT_GE(link_fd, 0, "bpf_raw_tracepoint_open_opts"))
598 usleep(1); /* trigger */
599 close(link_fd); /* detach */
602 ASSERT_EQ(skel->bss->tp_btf_res, cookie, "raw_tp_open_res");
604 /* low-level generic bpf_link_create() API */
605 skel->bss->tp_btf_res = 0;
607 link_opts.tracing.cookie = cookie = 0x22000000000000L;
608 link_fd = bpf_link_create(prog_fd, 0, BPF_TRACE_RAW_TP, &link_opts);
609 if (!ASSERT_GE(link_fd, 0, "bpf_link_create"))
612 usleep(1); /* trigger */
613 close(link_fd); /* detach */
616 ASSERT_EQ(skel->bss->tp_btf_res, cookie, "link_create_res");
618 /* high-level bpf_link-based bpf_program__attach_trace_opts() API */
619 skel->bss->tp_btf_res = 0;
621 trace_opts.cookie = cookie = 0x33000000000000L;
622 link = bpf_program__attach_trace_opts(skel->progs.handle_tp_btf, &trace_opts);
623 if (!ASSERT_OK_PTR(link, "attach_trace_opts"))
626 usleep(1); /* trigger */
627 bpf_link__destroy(link); /* detach */
630 ASSERT_EQ(skel->bss->tp_btf_res, cookie, "attach_trace_opts_res");
635 bpf_link__destroy(link);
638 static void raw_tp_subtest(struct test_bpf_cookie *skel)
641 int prog_fd, link_fd = -1;
642 struct bpf_link *link = NULL;
643 LIBBPF_OPTS(bpf_raw_tp_opts, raw_tp_opts);
644 LIBBPF_OPTS(bpf_raw_tracepoint_opts, opts);
646 /* There are two different ways to attach raw_tp programs */
647 prog_fd = bpf_program__fd(skel->progs.handle_raw_tp);
649 /* low-level BPF_RAW_TRACEPOINT_OPEN command wrapper */
650 skel->bss->raw_tp_res = 0;
652 raw_tp_opts.tp_name = "sys_enter";
653 raw_tp_opts.cookie = cookie = 0x55000000000000L;
654 link_fd = bpf_raw_tracepoint_open_opts(prog_fd, &raw_tp_opts);
655 if (!ASSERT_GE(link_fd, 0, "bpf_raw_tracepoint_open_opts"))
658 usleep(1); /* trigger */
659 close(link_fd); /* detach */
662 ASSERT_EQ(skel->bss->raw_tp_res, cookie, "raw_tp_open_res");
664 /* high-level bpf_link-based bpf_program__attach_raw_tracepoint_opts() API */
665 skel->bss->raw_tp_res = 0;
667 opts.cookie = cookie = 0x66000000000000L;
668 link = bpf_program__attach_raw_tracepoint_opts(skel->progs.handle_raw_tp,
670 if (!ASSERT_OK_PTR(link, "attach_raw_tp_opts"))
673 usleep(1); /* trigger */
674 bpf_link__destroy(link); /* detach */
677 ASSERT_EQ(skel->bss->raw_tp_res, cookie, "attach_raw_tp_opts_res");
682 bpf_link__destroy(link);
685 void test_bpf_cookie(void)
687 struct test_bpf_cookie *skel;
689 skel = test_bpf_cookie__open_and_load();
690 if (!ASSERT_OK_PTR(skel, "skel_open"))
693 skel->bss->my_tid = sys_gettid();
695 if (test__start_subtest("kprobe"))
696 kprobe_subtest(skel);
697 if (test__start_subtest("multi_kprobe_link_api"))
698 kprobe_multi_link_api_subtest();
699 if (test__start_subtest("multi_kprobe_attach_api"))
700 kprobe_multi_attach_api_subtest();
701 if (test__start_subtest("uprobe"))
702 uprobe_subtest(skel);
703 if (test__start_subtest("multi_uprobe_attach_api"))
704 uprobe_multi_attach_api_subtest();
705 if (test__start_subtest("tracepoint"))
707 if (test__start_subtest("perf_event"))
709 if (test__start_subtest("trampoline"))
710 tracing_subtest(skel);
711 if (test__start_subtest("lsm"))
713 if (test__start_subtest("tp_btf"))
714 tp_btf_subtest(skel);
715 if (test__start_subtest("raw_tp"))
716 raw_tp_subtest(skel);
717 test_bpf_cookie__destroy(skel);