Commit f7c0bbf2 authored by Alexei Starovoitov's avatar Alexei Starovoitov

Merge branch 'bpf-obj-skel'

Andrii Nakryiko says:

====================
This patch set introduces an alternative and complimentary to existing libbpf
API interface for working with BPF objects, maps, programs, and global data
from userspace side. This approach is relying on code generation. bpftool
produces a struct (a.k.a. skeleton) tailored and specific to provided BPF
object file. It includes hard-coded fields and data structures for every map,
program, link, and global data present.

Altogether this approach significantly reduces amount of userspace boilerplate
code required to open, load, attach, and work with BPF objects. It improves
attach/detach story, by providing pre-allocated space for bpf_links, and
ensuring they are properly detached on shutdown. It allows to do away with by
name/title lookups of maps and programs, because libbpf's skeleton API, in
conjunction with generated code from bpftool, is filling in hard-coded fields
with actual pointers to corresponding struct bpf_map/bpf_program/bpf_link.

Also, thanks to BPF array mmap() support, working with global data (variables)
from userspace is now as natural as it is from BPF side: each variable is just
a struct field inside skeleton struct. Furthermore, this allows to have
a natural way for userspace to pre-initialize global data (including
previously impossible to initialize .rodata) by just assigning values to the
same per-variable fields. Libbpf will carefully take into account this
initialization image, will use it to pre-populate BPF maps at creation time,
and will re-mmap() BPF map's contents at exactly the same userspace memory
address such that it can continue working with all the same pointers without
any interruptions. If kernel doesn't support mmap(), global data will still be
successfully initialized, but after map creation global data structures inside
skeleton will be NULL-ed out. This allows userspace application to gracefully
handle lack of mmap() support, if necessary.

A bunch of selftests are also converted to using skeletons, demonstrating
significant simplification of userspace part of test and reduction in amount
of code necessary.

v3->v4:
- add OPTS_VALID check to btf_dump__emit_type_decl (Alexei);
- expose skeleton as LIBBPF_API functions (Alexei);
- copyright clean up, update internal map init refactor (Alexei);

v2->v3:
- make skeleton part of public API;
- expose btf_dump__emit_type_decl and btf__align_of APIs;
- move LIBBPF_API and DECLARE_LIBBPF_OPTS into libbpf_common.h for reuse;

v1->v2:
- checkpatch.pl and reverse Christmas tree styling (Jakub);
- sanitize variable names to accomodate in-function static vars;

rfc->v1:
- runqslower moved out into separate patch set waiting for vmlinux.h
  improvements;
- skeleton generation code deals with unknown internal maps more gracefully.
====================
Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
parents aa915931 d9c00c3b
...@@ -839,6 +839,17 @@ _bpftool() ...@@ -839,6 +839,17 @@ _bpftool()
;; ;;
esac esac
;; ;;
gen)
case $command in
skeleton)
_filedir
;;
*)
[[ $prev == $object ]] && \
COMPREPLY=( $( compgen -W 'skeleton help' -- "$cur" ) )
;;
esac
;;
cgroup) cgroup)
case $command in case $command in
show|list|tree) show|list|tree)
......
This diff is collapsed.
...@@ -58,7 +58,7 @@ static int do_help(int argc, char **argv) ...@@ -58,7 +58,7 @@ static int do_help(int argc, char **argv)
" %s batch file FILE\n" " %s batch file FILE\n"
" %s version\n" " %s version\n"
"\n" "\n"
" OBJECT := { prog | map | cgroup | perf | net | feature | btf }\n" " OBJECT := { prog | map | cgroup | perf | net | feature | btf | gen }\n"
" " HELP_SPEC_OPTIONS "\n" " " HELP_SPEC_OPTIONS "\n"
"", "",
bin_name, bin_name, bin_name); bin_name, bin_name, bin_name);
...@@ -227,6 +227,7 @@ static const struct cmd cmds[] = { ...@@ -227,6 +227,7 @@ static const struct cmd cmds[] = {
{ "net", do_net }, { "net", do_net },
{ "feature", do_feature }, { "feature", do_feature },
{ "btf", do_btf }, { "btf", do_btf },
{ "gen", do_gen },
{ "version", do_version }, { "version", do_version },
{ 0 } { 0 }
}; };
......
...@@ -155,6 +155,7 @@ int do_net(int argc, char **arg); ...@@ -155,6 +155,7 @@ int do_net(int argc, char **arg);
int do_tracelog(int argc, char **arg); int do_tracelog(int argc, char **arg);
int do_feature(int argc, char **argv); int do_feature(int argc, char **argv);
int do_btf(int argc, char **argv); int do_btf(int argc, char **argv);
int do_gen(int argc, char **argv);
int parse_u32_arg(int *argc, char ***argv, __u32 *val, const char *what); int parse_u32_arg(int *argc, char ***argv, __u32 *val, const char *what);
int prog_parse_fd(int *argc, char ***argv); int prog_parse_fd(int *argc, char ***argv);
......
...@@ -18,6 +18,7 @@ ...@@ -18,6 +18,7 @@
#include <bpf.h> #include <bpf.h>
#include <nlattr.h> #include <nlattr.h>
#include "libbpf_internal.h"
#include "main.h" #include "main.h"
#include "netlink_dumper.h" #include "netlink_dumper.h"
......
...@@ -28,14 +28,12 @@ ...@@ -28,14 +28,12 @@
#include <stddef.h> #include <stddef.h>
#include <stdint.h> #include <stdint.h>
#include "libbpf_common.h"
#ifdef __cplusplus #ifdef __cplusplus
extern "C" { extern "C" {
#endif #endif
#ifndef LIBBPF_API
#define LIBBPF_API __attribute__((visibility("default")))
#endif
struct bpf_create_map_attr { struct bpf_create_map_attr {
const char *name; const char *name;
enum bpf_map_type map_type; enum bpf_map_type map_type;
......
...@@ -278,6 +278,45 @@ __s64 btf__resolve_size(const struct btf *btf, __u32 type_id) ...@@ -278,6 +278,45 @@ __s64 btf__resolve_size(const struct btf *btf, __u32 type_id)
return nelems * size; return nelems * size;
} }
int btf__align_of(const struct btf *btf, __u32 id)
{
const struct btf_type *t = btf__type_by_id(btf, id);
__u16 kind = btf_kind(t);
switch (kind) {
case BTF_KIND_INT:
case BTF_KIND_ENUM:
return min(sizeof(void *), t->size);
case BTF_KIND_PTR:
return sizeof(void *);
case BTF_KIND_TYPEDEF:
case BTF_KIND_VOLATILE:
case BTF_KIND_CONST:
case BTF_KIND_RESTRICT:
return btf__align_of(btf, t->type);
case BTF_KIND_ARRAY:
return btf__align_of(btf, btf_array(t)->type);
case BTF_KIND_STRUCT:
case BTF_KIND_UNION: {
const struct btf_member *m = btf_members(t);
__u16 vlen = btf_vlen(t);
int i, align = 1, t;
for (i = 0; i < vlen; i++, m++) {
t = btf__align_of(btf, m->type);
if (t <= 0)
return t;
align = max(align, t);
}
return align;
}
default:
pr_warn("unsupported BTF_KIND:%u\n", btf_kind(t));
return 0;
}
}
int btf__resolve_type(const struct btf *btf, __u32 type_id) int btf__resolve_type(const struct btf *btf, __u32 type_id)
{ {
const struct btf_type *t; const struct btf_type *t;
......
...@@ -8,14 +8,12 @@ ...@@ -8,14 +8,12 @@
#include <linux/btf.h> #include <linux/btf.h>
#include <linux/types.h> #include <linux/types.h>
#include "libbpf_common.h"
#ifdef __cplusplus #ifdef __cplusplus
extern "C" { extern "C" {
#endif #endif
#ifndef LIBBPF_API
#define LIBBPF_API __attribute__((visibility("default")))
#endif
#define BTF_ELF_SEC ".BTF" #define BTF_ELF_SEC ".BTF"
#define BTF_EXT_ELF_SEC ".BTF.ext" #define BTF_EXT_ELF_SEC ".BTF.ext"
#define MAPS_ELF_SEC ".maps" #define MAPS_ELF_SEC ".maps"
...@@ -79,6 +77,7 @@ LIBBPF_API const struct btf_type *btf__type_by_id(const struct btf *btf, ...@@ -79,6 +77,7 @@ LIBBPF_API const struct btf_type *btf__type_by_id(const struct btf *btf,
__u32 id); __u32 id);
LIBBPF_API __s64 btf__resolve_size(const struct btf *btf, __u32 type_id); LIBBPF_API __s64 btf__resolve_size(const struct btf *btf, __u32 type_id);
LIBBPF_API int btf__resolve_type(const struct btf *btf, __u32 type_id); LIBBPF_API int btf__resolve_type(const struct btf *btf, __u32 type_id);
LIBBPF_API int btf__align_of(const struct btf *btf, __u32 id);
LIBBPF_API int btf__fd(const struct btf *btf); LIBBPF_API int btf__fd(const struct btf *btf);
LIBBPF_API const void *btf__get_raw_data(const struct btf *btf, __u32 *size); LIBBPF_API const void *btf__get_raw_data(const struct btf *btf, __u32 *size);
LIBBPF_API const char *btf__name_by_offset(const struct btf *btf, __u32 offset); LIBBPF_API const char *btf__name_by_offset(const struct btf *btf, __u32 offset);
...@@ -127,6 +126,28 @@ LIBBPF_API void btf_dump__free(struct btf_dump *d); ...@@ -127,6 +126,28 @@ LIBBPF_API void btf_dump__free(struct btf_dump *d);
LIBBPF_API int btf_dump__dump_type(struct btf_dump *d, __u32 id); LIBBPF_API int btf_dump__dump_type(struct btf_dump *d, __u32 id);
struct btf_dump_emit_type_decl_opts {
/* size of this struct, for forward/backward compatiblity */
size_t sz;
/* optional field name for type declaration, e.g.:
* - struct my_struct <FNAME>
* - void (*<FNAME>)(int)
* - char (*<FNAME>)[123]
*/
const char *field_name;
/* extra indentation level (in number of tabs) to emit for multi-line
* type declarations (e.g., anonymous struct); applies for lines
* starting from the second one (first line is assumed to have
* necessary indentation already
*/
int indent_level;
};
#define btf_dump_emit_type_decl_opts__last_field indent_level
LIBBPF_API int
btf_dump__emit_type_decl(struct btf_dump *d, __u32 id,
const struct btf_dump_emit_type_decl_opts *opts);
/* /*
* A set of helpers for easier BTF types handling * A set of helpers for easier BTF types handling
*/ */
......
...@@ -116,6 +116,8 @@ static void btf_dump_printf(const struct btf_dump *d, const char *fmt, ...) ...@@ -116,6 +116,8 @@ static void btf_dump_printf(const struct btf_dump *d, const char *fmt, ...)
va_end(args); va_end(args);
} }
static int btf_dump_mark_referenced(struct btf_dump *d);
struct btf_dump *btf_dump__new(const struct btf *btf, struct btf_dump *btf_dump__new(const struct btf *btf,
const struct btf_ext *btf_ext, const struct btf_ext *btf_ext,
const struct btf_dump_opts *opts, const struct btf_dump_opts *opts,
...@@ -137,18 +139,39 @@ struct btf_dump *btf_dump__new(const struct btf *btf, ...@@ -137,18 +139,39 @@ struct btf_dump *btf_dump__new(const struct btf *btf,
if (IS_ERR(d->type_names)) { if (IS_ERR(d->type_names)) {
err = PTR_ERR(d->type_names); err = PTR_ERR(d->type_names);
d->type_names = NULL; d->type_names = NULL;
btf_dump__free(d);
return ERR_PTR(err);
} }
d->ident_names = hashmap__new(str_hash_fn, str_equal_fn, NULL); d->ident_names = hashmap__new(str_hash_fn, str_equal_fn, NULL);
if (IS_ERR(d->ident_names)) { if (IS_ERR(d->ident_names)) {
err = PTR_ERR(d->ident_names); err = PTR_ERR(d->ident_names);
d->ident_names = NULL; d->ident_names = NULL;
btf_dump__free(d); goto err;
return ERR_PTR(err); }
d->type_states = calloc(1 + btf__get_nr_types(d->btf),
sizeof(d->type_states[0]));
if (!d->type_states) {
err = -ENOMEM;
goto err;
}
d->cached_names = calloc(1 + btf__get_nr_types(d->btf),
sizeof(d->cached_names[0]));
if (!d->cached_names) {
err = -ENOMEM;
goto err;
} }
/* VOID is special */
d->type_states[0].order_state = ORDERED;
d->type_states[0].emit_state = EMITTED;
/* eagerly determine referenced types for anon enums */
err = btf_dump_mark_referenced(d);
if (err)
goto err;
return d; return d;
err:
btf_dump__free(d);
return ERR_PTR(err);
} }
void btf_dump__free(struct btf_dump *d) void btf_dump__free(struct btf_dump *d)
...@@ -175,7 +198,6 @@ void btf_dump__free(struct btf_dump *d) ...@@ -175,7 +198,6 @@ void btf_dump__free(struct btf_dump *d)
free(d); free(d);
} }
static int btf_dump_mark_referenced(struct btf_dump *d);
static int btf_dump_order_type(struct btf_dump *d, __u32 id, bool through_ptr); static int btf_dump_order_type(struct btf_dump *d, __u32 id, bool through_ptr);
static void btf_dump_emit_type(struct btf_dump *d, __u32 id, __u32 cont_id); static void btf_dump_emit_type(struct btf_dump *d, __u32 id, __u32 cont_id);
...@@ -202,27 +224,6 @@ int btf_dump__dump_type(struct btf_dump *d, __u32 id) ...@@ -202,27 +224,6 @@ int btf_dump__dump_type(struct btf_dump *d, __u32 id)
if (id > btf__get_nr_types(d->btf)) if (id > btf__get_nr_types(d->btf))
return -EINVAL; return -EINVAL;
/* type states are lazily allocated, as they might not be needed */
if (!d->type_states) {
d->type_states = calloc(1 + btf__get_nr_types(d->btf),
sizeof(d->type_states[0]));
if (!d->type_states)
return -ENOMEM;
d->cached_names = calloc(1 + btf__get_nr_types(d->btf),
sizeof(d->cached_names[0]));
if (!d->cached_names)
return -ENOMEM;
/* VOID is special */
d->type_states[0].order_state = ORDERED;
d->type_states[0].emit_state = EMITTED;
/* eagerly determine referenced types for anon enums */
err = btf_dump_mark_referenced(d);
if (err)
return err;
}
d->emit_queue_cnt = 0; d->emit_queue_cnt = 0;
err = btf_dump_order_type(d, id, false); err = btf_dump_order_type(d, id, false);
if (err < 0) if (err < 0)
...@@ -752,41 +753,6 @@ static void btf_dump_emit_type(struct btf_dump *d, __u32 id, __u32 cont_id) ...@@ -752,41 +753,6 @@ static void btf_dump_emit_type(struct btf_dump *d, __u32 id, __u32 cont_id)
} }
} }
static int btf_align_of(const struct btf *btf, __u32 id)
{
const struct btf_type *t = btf__type_by_id(btf, id);
__u16 kind = btf_kind(t);
switch (kind) {
case BTF_KIND_INT:
case BTF_KIND_ENUM:
return min(sizeof(void *), t->size);
case BTF_KIND_PTR:
return sizeof(void *);
case BTF_KIND_TYPEDEF:
case BTF_KIND_VOLATILE:
case BTF_KIND_CONST:
case BTF_KIND_RESTRICT:
return btf_align_of(btf, t->type);
case BTF_KIND_ARRAY:
return btf_align_of(btf, btf_array(t)->type);
case BTF_KIND_STRUCT:
case BTF_KIND_UNION: {
const struct btf_member *m = btf_members(t);
__u16 vlen = btf_vlen(t);
int i, align = 1;
for (i = 0; i < vlen; i++, m++)
align = max(align, btf_align_of(btf, m->type));
return align;
}
default:
pr_warn("unsupported BTF_KIND:%u\n", btf_kind(t));
return 1;
}
}
static bool btf_is_struct_packed(const struct btf *btf, __u32 id, static bool btf_is_struct_packed(const struct btf *btf, __u32 id,
const struct btf_type *t) const struct btf_type *t)
{ {
...@@ -794,18 +760,18 @@ static bool btf_is_struct_packed(const struct btf *btf, __u32 id, ...@@ -794,18 +760,18 @@ static bool btf_is_struct_packed(const struct btf *btf, __u32 id,
int align, i, bit_sz; int align, i, bit_sz;
__u16 vlen; __u16 vlen;
align = btf_align_of(btf, id); align = btf__align_of(btf, id);
/* size of a non-packed struct has to be a multiple of its alignment*/ /* size of a non-packed struct has to be a multiple of its alignment*/
if (t->size % align) if (align && t->size % align)
return true; return true;
m = btf_members(t); m = btf_members(t);
vlen = btf_vlen(t); vlen = btf_vlen(t);
/* all non-bitfield fields have to be naturally aligned */ /* all non-bitfield fields have to be naturally aligned */
for (i = 0; i < vlen; i++, m++) { for (i = 0; i < vlen; i++, m++) {
align = btf_align_of(btf, m->type); align = btf__align_of(btf, m->type);
bit_sz = btf_member_bitfield_size(t, i); bit_sz = btf_member_bitfield_size(t, i);
if (bit_sz == 0 && m->offset % (8 * align) != 0) if (align && bit_sz == 0 && m->offset % (8 * align) != 0)
return true; return true;
} }
...@@ -889,7 +855,7 @@ static void btf_dump_emit_struct_def(struct btf_dump *d, ...@@ -889,7 +855,7 @@ static void btf_dump_emit_struct_def(struct btf_dump *d,
fname = btf_name_of(d, m->name_off); fname = btf_name_of(d, m->name_off);
m_sz = btf_member_bitfield_size(t, i); m_sz = btf_member_bitfield_size(t, i);
m_off = btf_member_bit_offset(t, i); m_off = btf_member_bit_offset(t, i);
align = packed ? 1 : btf_align_of(d->btf, m->type); align = packed ? 1 : btf__align_of(d->btf, m->type);
btf_dump_emit_bit_padding(d, off, m_off, m_sz, align, lvl + 1); btf_dump_emit_bit_padding(d, off, m_off, m_sz, align, lvl + 1);
btf_dump_printf(d, "\n%s", pfx(lvl + 1)); btf_dump_printf(d, "\n%s", pfx(lvl + 1));
...@@ -907,7 +873,7 @@ static void btf_dump_emit_struct_def(struct btf_dump *d, ...@@ -907,7 +873,7 @@ static void btf_dump_emit_struct_def(struct btf_dump *d,
/* pad at the end, if necessary */ /* pad at the end, if necessary */
if (is_struct) { if (is_struct) {
align = packed ? 1 : btf_align_of(d->btf, id); align = packed ? 1 : btf__align_of(d->btf, id);
btf_dump_emit_bit_padding(d, off, t->size * 8, 0, align, btf_dump_emit_bit_padding(d, off, t->size * 8, 0, align,
lvl + 1); lvl + 1);
} }
...@@ -1051,6 +1017,21 @@ static int btf_dump_push_decl_stack_id(struct btf_dump *d, __u32 id) ...@@ -1051,6 +1017,21 @@ static int btf_dump_push_decl_stack_id(struct btf_dump *d, __u32 id)
* of a stack frame. Some care is required to "pop" stack frames after * of a stack frame. Some care is required to "pop" stack frames after
* processing type declaration chain. * processing type declaration chain.
*/ */
int btf_dump__emit_type_decl(struct btf_dump *d, __u32 id,
const struct btf_dump_emit_type_decl_opts *opts)
{
const char *fname;
int lvl;
if (!OPTS_VALID(opts, btf_dump_emit_type_decl_opts))
return -EINVAL;
fname = OPTS_GET(opts, field_name, NULL);
lvl = OPTS_GET(opts, indent_level, 0);
btf_dump_emit_type_decl(d, id, fname, lvl);
return 0;
}
static void btf_dump_emit_type_decl(struct btf_dump *d, __u32 id, static void btf_dump_emit_type_decl(struct btf_dump *d, __u32 id,
const char *fname, int lvl) const char *fname, int lvl)
{ {
......
This diff is collapsed.
...@@ -17,14 +17,12 @@ ...@@ -17,14 +17,12 @@
#include <sys/types.h> // for size_t #include <sys/types.h> // for size_t
#include <linux/bpf.h> #include <linux/bpf.h>
#include "libbpf_common.h"
#ifdef __cplusplus #ifdef __cplusplus
extern "C" { extern "C" {
#endif #endif
#ifndef LIBBPF_API
#define LIBBPF_API __attribute__((visibility("default")))
#endif
enum libbpf_errno { enum libbpf_errno {
__LIBBPF_ERRNO__START = 4000, __LIBBPF_ERRNO__START = 4000,
...@@ -67,28 +65,6 @@ struct bpf_object_open_attr { ...@@ -67,28 +65,6 @@ struct bpf_object_open_attr {
enum bpf_prog_type prog_type; enum bpf_prog_type prog_type;
}; };
/* Helper macro to declare and initialize libbpf options struct
*
* This dance with uninitialized declaration, followed by memset to zero,
* followed by assignment using compound literal syntax is done to preserve
* ability to use a nice struct field initialization syntax and **hopefully**
* have all the padding bytes initialized to zero. It's not guaranteed though,
* when copying literal, that compiler won't copy garbage in literal's padding
* bytes, but that's the best way I've found and it seems to work in practice.
*
* Macro declares opts struct of given type and name, zero-initializes,
* including any extra padding, it with memset() and then assigns initial
* values provided by users in struct initializer-syntax as varargs.
*/
#define DECLARE_LIBBPF_OPTS(TYPE, NAME, ...) \
struct TYPE NAME = ({ \
memset(&NAME, 0, sizeof(struct TYPE)); \
(struct TYPE) { \
.sz = sizeof(struct TYPE), \
__VA_ARGS__ \
}; \
})
struct bpf_object_open_opts { struct bpf_object_open_opts {
/* size of this struct, for forward/backward compatiblity */ /* size of this struct, for forward/backward compatiblity */
size_t sz; size_t sz;
...@@ -114,10 +90,10 @@ struct bpf_object_open_opts { ...@@ -114,10 +90,10 @@ struct bpf_object_open_opts {
LIBBPF_API struct bpf_object *bpf_object__open(const char *path); LIBBPF_API struct bpf_object *bpf_object__open(const char *path);
LIBBPF_API struct bpf_object * LIBBPF_API struct bpf_object *
bpf_object__open_file(const char *path, struct bpf_object_open_opts *opts); bpf_object__open_file(const char *path, const struct bpf_object_open_opts *opts);
LIBBPF_API struct bpf_object * LIBBPF_API struct bpf_object *
bpf_object__open_mem(const void *obj_buf, size_t obj_buf_sz, bpf_object__open_mem(const void *obj_buf, size_t obj_buf_sz,
struct bpf_object_open_opts *opts); const struct bpf_object_open_opts *opts);
/* deprecated bpf_object__open variants */ /* deprecated bpf_object__open variants */
LIBBPF_API struct bpf_object * LIBBPF_API struct bpf_object *
...@@ -126,11 +102,6 @@ bpf_object__open_buffer(const void *obj_buf, size_t obj_buf_sz, ...@@ -126,11 +102,6 @@ bpf_object__open_buffer(const void *obj_buf, size_t obj_buf_sz,
LIBBPF_API struct bpf_object * LIBBPF_API struct bpf_object *
bpf_object__open_xattr(struct bpf_object_open_attr *attr); bpf_object__open_xattr(struct bpf_object_open_attr *attr);
int bpf_object__section_size(const struct bpf_object *obj, const char *name,
__u32 *size);
int bpf_object__variable_offset(const struct bpf_object *obj, const char *name,
__u32 *off);
enum libbpf_pin_type { enum libbpf_pin_type {
LIBBPF_PIN_NONE, LIBBPF_PIN_NONE,
/* PIN_BY_NAME: pin maps by name (in /sys/fs/bpf by default) */ /* PIN_BY_NAME: pin maps by name (in /sys/fs/bpf by default) */
...@@ -161,6 +132,7 @@ struct bpf_object_load_attr { ...@@ -161,6 +132,7 @@ struct bpf_object_load_attr {
LIBBPF_API int bpf_object__load(struct bpf_object *obj); LIBBPF_API int bpf_object__load(struct bpf_object *obj);
LIBBPF_API int bpf_object__load_xattr(struct bpf_object_load_attr *attr); LIBBPF_API int bpf_object__load_xattr(struct bpf_object_load_attr *attr);
LIBBPF_API int bpf_object__unload(struct bpf_object *obj); LIBBPF_API int bpf_object__unload(struct bpf_object *obj);
LIBBPF_API const char *bpf_object__name(const struct bpf_object *obj); LIBBPF_API const char *bpf_object__name(const struct bpf_object *obj);
LIBBPF_API unsigned int bpf_object__kversion(const struct bpf_object *obj); LIBBPF_API unsigned int bpf_object__kversion(const struct bpf_object *obj);
...@@ -171,6 +143,9 @@ LIBBPF_API int bpf_object__btf_fd(const struct bpf_object *obj); ...@@ -171,6 +143,9 @@ LIBBPF_API int bpf_object__btf_fd(const struct bpf_object *obj);
LIBBPF_API struct bpf_program * LIBBPF_API struct bpf_program *
bpf_object__find_program_by_title(const struct bpf_object *obj, bpf_object__find_program_by_title(const struct bpf_object *obj,
const char *title); const char *title);
LIBBPF_API struct bpf_program *
bpf_object__find_program_by_name(const struct bpf_object *obj,
const char *name);
LIBBPF_API struct bpf_object *bpf_object__next(struct bpf_object *prev); LIBBPF_API struct bpf_object *bpf_object__next(struct bpf_object *prev);
#define bpf_object__for_each_safe(pos, tmp) \ #define bpf_object__for_each_safe(pos, tmp) \
...@@ -214,6 +189,7 @@ LIBBPF_API void *bpf_program__priv(const struct bpf_program *prog); ...@@ -214,6 +189,7 @@ LIBBPF_API void *bpf_program__priv(const struct bpf_program *prog);
LIBBPF_API void bpf_program__set_ifindex(struct bpf_program *prog, LIBBPF_API void bpf_program__set_ifindex(struct bpf_program *prog,
__u32 ifindex); __u32 ifindex);
LIBBPF_API const char *bpf_program__name(const struct bpf_program *prog);
LIBBPF_API const char *bpf_program__title(const struct bpf_program *prog, LIBBPF_API const char *bpf_program__title(const struct bpf_program *prog,
bool needs_copy); bool needs_copy);
...@@ -237,6 +213,8 @@ struct bpf_link; ...@@ -237,6 +213,8 @@ struct bpf_link;
LIBBPF_API int bpf_link__destroy(struct bpf_link *link); LIBBPF_API int bpf_link__destroy(struct bpf_link *link);
LIBBPF_API struct bpf_link *
bpf_program__attach(struct bpf_program *prog);
LIBBPF_API struct bpf_link * LIBBPF_API struct bpf_link *
bpf_program__attach_perf_event(struct bpf_program *prog, int pfd); bpf_program__attach_perf_event(struct bpf_program *prog, int pfd);
LIBBPF_API struct bpf_link * LIBBPF_API struct bpf_link *
...@@ -512,18 +490,6 @@ bpf_perf_event_read_simple(void *mmap_mem, size_t mmap_size, size_t page_size, ...@@ -512,18 +490,6 @@ bpf_perf_event_read_simple(void *mmap_mem, size_t mmap_size, size_t page_size,
void **copy_mem, size_t *copy_size, void **copy_mem, size_t *copy_size,
bpf_perf_event_print_t fn, void *private_data); bpf_perf_event_print_t fn, void *private_data);
struct nlattr;
typedef int (*libbpf_dump_nlmsg_t)(void *cookie, void *msg, struct nlattr **tb);
int libbpf_netlink_open(unsigned int *nl_pid);
int libbpf_nl_get_link(int sock, unsigned int nl_pid,
libbpf_dump_nlmsg_t dump_link_nlmsg, void *cookie);
int libbpf_nl_get_class(int sock, unsigned int nl_pid, int ifindex,
libbpf_dump_nlmsg_t dump_class_nlmsg, void *cookie);
int libbpf_nl_get_qdisc(int sock, unsigned int nl_pid, int ifindex,
libbpf_dump_nlmsg_t dump_qdisc_nlmsg, void *cookie);
int libbpf_nl_get_filter(int sock, unsigned int nl_pid, int ifindex, int handle,
libbpf_dump_nlmsg_t dump_filter_nlmsg, void *cookie);
struct bpf_prog_linfo; struct bpf_prog_linfo;
struct bpf_prog_info; struct bpf_prog_info;
...@@ -630,6 +596,79 @@ bpf_program__bpil_offs_to_addr(struct bpf_prog_info_linear *info_linear); ...@@ -630,6 +596,79 @@ bpf_program__bpil_offs_to_addr(struct bpf_prog_info_linear *info_linear);
*/ */
LIBBPF_API int libbpf_num_possible_cpus(void); LIBBPF_API int libbpf_num_possible_cpus(void);
struct bpf_embed_data {
void *data;
size_t size;
};
#define BPF_EMBED_OBJ_DECLARE(NAME) \
extern struct bpf_embed_data NAME##_embed; \
extern char NAME##_data[]; \
extern char NAME##_data_end[];
#define __BPF_EMBED_OBJ(NAME, PATH, SZ, ASM_TYPE) \
asm ( \
" .pushsection \".rodata\", \"a\", @progbits \n" \
" .global "#NAME"_data \n" \
#NAME"_data: \n" \
" .incbin \"" PATH "\" \n" \
" .global "#NAME"_data_end \n" \
#NAME"_data_end: \n" \
" .global "#NAME"_embed \n" \
" .type "#NAME"_embed, @object \n" \
" .size "#NAME"_size, "#SZ" \n" \
" .align 8, \n" \
#NAME"_embed: \n" \
" "ASM_TYPE" "#NAME"_data \n" \
" "ASM_TYPE" "#NAME"_data_end - "#NAME"_data \n" \
" .popsection \n" \
); \
BPF_EMBED_OBJ_DECLARE(NAME)
#if __SIZEOF_POINTER__ == 4
#define BPF_EMBED_OBJ(NAME, PATH) __BPF_EMBED_OBJ(NAME, PATH, 8, ".long")
#else
#define BPF_EMBED_OBJ(NAME, PATH) __BPF_EMBED_OBJ(NAME, PATH, 16, ".quad")
#endif
struct bpf_map_skeleton {
const char *name;
struct bpf_map **map;
void **mmaped;
};
struct bpf_prog_skeleton {
const char *name;
struct bpf_program **prog;
struct bpf_link **link;
};
struct bpf_object_skeleton {
size_t sz; /* size of this struct, for forward/backward compatibility */
const char *name;
void *data;
size_t data_sz;
struct bpf_object **obj;
int map_cnt;
int map_skel_sz; /* sizeof(struct bpf_skeleton_map) */
struct bpf_map_skeleton *maps;
int prog_cnt;
int prog_skel_sz; /* sizeof(struct bpf_skeleton_prog) */
struct bpf_prog_skeleton *progs;
};
LIBBPF_API int
bpf_object__open_skeleton(struct bpf_object_skeleton *s,
const struct bpf_object_open_opts *opts);
LIBBPF_API int bpf_object__load_skeleton(struct bpf_object_skeleton *s);
LIBBPF_API int bpf_object__attach_skeleton(struct bpf_object_skeleton *s);
LIBBPF_API void bpf_object__detach_skeleton(struct bpf_object_skeleton *s);
LIBBPF_API void bpf_object__destroy_skeleton(struct bpf_object_skeleton *s);
#ifdef __cplusplus #ifdef __cplusplus
} /* extern "C" */ } /* extern "C" */
#endif #endif
......
...@@ -210,4 +210,15 @@ LIBBPF_0.0.6 { ...@@ -210,4 +210,15 @@ LIBBPF_0.0.6 {
} LIBBPF_0.0.5; } LIBBPF_0.0.5;
LIBBPF_0.0.7 { LIBBPF_0.0.7 {
global:
btf_dump__emit_type_decl;
bpf_object__find_program_by_name;
bpf_object__attach_skeleton;
bpf_object__destroy_skeleton;
bpf_object__detach_skeleton;
bpf_object__load_skeleton;
bpf_object__open_skeleton;
bpf_program__attach;
bpf_program__name;
btf__align_of;
} LIBBPF_0.0.6; } LIBBPF_0.0.6;
/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
/*
* Common user-facing libbpf helpers.
*
* Copyright (c) 2019 Facebook
*/
#ifndef __LIBBPF_LIBBPF_COMMON_H
#define __LIBBPF_LIBBPF_COMMON_H
#ifndef LIBBPF_API
#define LIBBPF_API __attribute__((visibility("default")))
#endif
/* Helper macro to declare and initialize libbpf options struct
*
* This dance with uninitialized declaration, followed by memset to zero,
* followed by assignment using compound literal syntax is done to preserve
* ability to use a nice struct field initialization syntax and **hopefully**
* have all the padding bytes initialized to zero. It's not guaranteed though,
* when copying literal, that compiler won't copy garbage in literal's padding
* bytes, but that's the best way I've found and it seems to work in practice.
*
* Macro declares opts struct of given type and name, zero-initializes,
* including any extra padding, it with memset() and then assigns initial
* values provided by users in struct initializer-syntax as varargs.
*/
#define DECLARE_LIBBPF_OPTS(TYPE, NAME, ...) \
struct TYPE NAME = ({ \
memset(&NAME, 0, sizeof(struct TYPE)); \
(struct TYPE) { \
.sz = sizeof(struct TYPE), \
__VA_ARGS__ \
}; \
})
#endif /* __LIBBPF_LIBBPF_COMMON_H */
...@@ -100,6 +100,23 @@ int parse_cpu_mask_file(const char *fcpu, bool **mask, int *mask_sz); ...@@ -100,6 +100,23 @@ int parse_cpu_mask_file(const char *fcpu, bool **mask, int *mask_sz);
int libbpf__load_raw_btf(const char *raw_types, size_t types_len, int libbpf__load_raw_btf(const char *raw_types, size_t types_len,
const char *str_sec, size_t str_len); const char *str_sec, size_t str_len);
int bpf_object__section_size(const struct bpf_object *obj, const char *name,
__u32 *size);
int bpf_object__variable_offset(const struct bpf_object *obj, const char *name,
__u32 *off);
struct nlattr;
typedef int (*libbpf_dump_nlmsg_t)(void *cookie, void *msg, struct nlattr **tb);
int libbpf_netlink_open(unsigned int *nl_pid);
int libbpf_nl_get_link(int sock, unsigned int nl_pid,
libbpf_dump_nlmsg_t dump_link_nlmsg, void *cookie);
int libbpf_nl_get_class(int sock, unsigned int nl_pid, int ifindex,
libbpf_dump_nlmsg_t dump_class_nlmsg, void *cookie);
int libbpf_nl_get_qdisc(int sock, unsigned int nl_pid, int ifindex,
libbpf_dump_nlmsg_t dump_qdisc_nlmsg, void *cookie);
int libbpf_nl_get_filter(int sock, unsigned int nl_pid, int ifindex, int handle,
libbpf_dump_nlmsg_t dump_filter_nlmsg, void *cookie);
struct btf_ext_info { struct btf_ext_info {
/* /*
* info points to the individual info section (e.g. func_info and * info points to the individual info section (e.g. func_info and
......
...@@ -38,5 +38,7 @@ test_hashmap ...@@ -38,5 +38,7 @@ test_hashmap
test_btf_dump test_btf_dump
xdping xdping
test_cpp test_cpp
*.skel.h
/no_alu32 /no_alu32
/bpf_gcc /bpf_gcc
/tools
...@@ -3,10 +3,12 @@ include ../../../../scripts/Kbuild.include ...@@ -3,10 +3,12 @@ include ../../../../scripts/Kbuild.include
include ../../../scripts/Makefile.arch include ../../../scripts/Makefile.arch
CURDIR := $(abspath .) CURDIR := $(abspath .)
LIBDIR := $(abspath ../../../lib) TOOLSDIR := $(abspath ../../..)
LIBDIR := $(TOOLSDIR)/lib
BPFDIR := $(LIBDIR)/bpf BPFDIR := $(LIBDIR)/bpf
TOOLSDIR := $(abspath ../../../include) TOOLSINCDIR := $(TOOLSDIR)/include
APIDIR := $(TOOLSDIR)/uapi BPFTOOLDIR := $(TOOLSDIR)/bpf/bpftool
APIDIR := $(TOOLSINCDIR)/uapi
GENDIR := $(abspath ../../../../include/generated) GENDIR := $(abspath ../../../../include/generated)
GENHDR := $(GENDIR)/autoconf.h GENHDR := $(GENDIR)/autoconf.h
...@@ -19,7 +21,7 @@ LLC ?= llc ...@@ -19,7 +21,7 @@ LLC ?= llc
LLVM_OBJCOPY ?= llvm-objcopy LLVM_OBJCOPY ?= llvm-objcopy
BPF_GCC ?= $(shell command -v bpf-gcc;) BPF_GCC ?= $(shell command -v bpf-gcc;)
CFLAGS += -g -Wall -O2 $(GENFLAGS) -I$(APIDIR) -I$(LIBDIR) -I$(BPFDIR) \ CFLAGS += -g -Wall -O2 $(GENFLAGS) -I$(APIDIR) -I$(LIBDIR) -I$(BPFDIR) \
-I$(GENDIR) -I$(TOOLSDIR) -I$(CURDIR) \ -I$(GENDIR) -I$(TOOLSINCDIR) -I$(CURDIR) \
-Dbpf_prog_load=bpf_prog_test_load \ -Dbpf_prog_load=bpf_prog_test_load \
-Dbpf_load_program=bpf_test_load_program -Dbpf_load_program=bpf_test_load_program
LDLIBS += -lcap -lelf -lrt -lpthread LDLIBS += -lcap -lelf -lrt -lpthread
...@@ -117,6 +119,12 @@ $(OUTPUT)/test_cgroup_attach: cgroup_helpers.c ...@@ -117,6 +119,12 @@ $(OUTPUT)/test_cgroup_attach: cgroup_helpers.c
# force a rebuild of BPFOBJ when its dependencies are updated # force a rebuild of BPFOBJ when its dependencies are updated
force: force:
DEFAULT_BPFTOOL := $(OUTPUT)/tools/usr/local/sbin/bpftool
BPFTOOL ?= $(DEFAULT_BPFTOOL)
$(DEFAULT_BPFTOOL): force
$(MAKE) -C $(BPFTOOLDIR) DESTDIR=$(OUTPUT)/tools install
$(BPFOBJ): force $(BPFOBJ): force
$(MAKE) -C $(BPFDIR) OUTPUT=$(OUTPUT)/ $(MAKE) -C $(BPFDIR) OUTPUT=$(OUTPUT)/
...@@ -180,6 +188,8 @@ define GCC_BPF_BUILD_RULE ...@@ -180,6 +188,8 @@ define GCC_BPF_BUILD_RULE
$(BPF_GCC) $3 $4 -O2 -c $1 -o $2 $(BPF_GCC) $3 $4 -O2 -c $1 -o $2
endef endef
SKEL_BLACKLIST := btf__% test_pinning_invalid.c
# Set up extra TRUNNER_XXX "temporary" variables in the environment (relies on # Set up extra TRUNNER_XXX "temporary" variables in the environment (relies on
# $eval()) and pass control to DEFINE_TEST_RUNNER_RULES. # $eval()) and pass control to DEFINE_TEST_RUNNER_RULES.
# Parameters: # Parameters:
...@@ -195,8 +205,11 @@ TRUNNER_EXTRA_OBJS := $$(patsubst %.c,$$(TRUNNER_OUTPUT)/%.o, \ ...@@ -195,8 +205,11 @@ TRUNNER_EXTRA_OBJS := $$(patsubst %.c,$$(TRUNNER_OUTPUT)/%.o, \
$$(filter %.c,$(TRUNNER_EXTRA_SOURCES))) $$(filter %.c,$(TRUNNER_EXTRA_SOURCES)))
TRUNNER_EXTRA_HDRS := $$(filter %.h,$(TRUNNER_EXTRA_SOURCES)) TRUNNER_EXTRA_HDRS := $$(filter %.h,$(TRUNNER_EXTRA_SOURCES))
TRUNNER_TESTS_HDR := $(TRUNNER_TESTS_DIR)/tests.h TRUNNER_TESTS_HDR := $(TRUNNER_TESTS_DIR)/tests.h
TRUNNER_BPF_OBJS := $$(patsubst %.c,$$(TRUNNER_OUTPUT)/%.o, \ TRUNNER_BPF_SRCS := $$(notdir $$(wildcard $(TRUNNER_BPF_PROGS_DIR)/*.c))
$$(notdir $$(wildcard $(TRUNNER_BPF_PROGS_DIR)/*.c))) TRUNNER_BPF_OBJS := $$(patsubst %.c,$$(TRUNNER_OUTPUT)/%.o, $$(TRUNNER_BPF_SRCS))
TRUNNER_BPF_SKELS := $$(patsubst %.c,$$(TRUNNER_OUTPUT)/%.skel.h, \
$$(filter-out $(SKEL_BLACKLIST), \
$$(TRUNNER_BPF_SRCS)))
# Evaluate rules now with extra TRUNNER_XXX variables above already defined # Evaluate rules now with extra TRUNNER_XXX variables above already defined
$$(eval $$(call DEFINE_TEST_RUNNER_RULES,$1,$2)) $$(eval $$(call DEFINE_TEST_RUNNER_RULES,$1,$2))
...@@ -226,6 +239,11 @@ $(TRUNNER_BPF_OBJS): $(TRUNNER_OUTPUT)/%.o: \ ...@@ -226,6 +239,11 @@ $(TRUNNER_BPF_OBJS): $(TRUNNER_OUTPUT)/%.o: \
$$(call $(TRUNNER_BPF_BUILD_RULE),$$<,$$@, \ $$(call $(TRUNNER_BPF_BUILD_RULE),$$<,$$@, \
$(TRUNNER_BPF_CFLAGS), \ $(TRUNNER_BPF_CFLAGS), \
$(TRUNNER_BPF_LDFLAGS)) $(TRUNNER_BPF_LDFLAGS))
$(TRUNNER_BPF_SKELS): $(TRUNNER_OUTPUT)/%.skel.h: \
$(TRUNNER_OUTPUT)/%.o \
| $(BPFTOOL) $(TRUNNER_OUTPUT)
$$(BPFTOOL) gen skeleton $$< > $$@
endif endif
# ensure we set up tests.h header generation rule just once # ensure we set up tests.h header generation rule just once
...@@ -245,6 +263,7 @@ $(TRUNNER_TEST_OBJS): $(TRUNNER_OUTPUT)/%.test.o: \ ...@@ -245,6 +263,7 @@ $(TRUNNER_TEST_OBJS): $(TRUNNER_OUTPUT)/%.test.o: \
$(TRUNNER_TESTS_DIR)/%.c \ $(TRUNNER_TESTS_DIR)/%.c \
$(TRUNNER_EXTRA_HDRS) \ $(TRUNNER_EXTRA_HDRS) \
$(TRUNNER_BPF_OBJS) \ $(TRUNNER_BPF_OBJS) \
$(TRUNNER_BPF_SKELS) \
$$(BPFOBJ) | $(TRUNNER_OUTPUT) $$(BPFOBJ) | $(TRUNNER_OUTPUT)
cd $$(@D) && $$(CC) $$(CFLAGS) -c $(CURDIR)/$$< $$(LDLIBS) -o $$(@F) cd $$(@D) && $$(CC) $$(CFLAGS) -c $(CURDIR)/$$< $$(LDLIBS) -o $$(@F)
...@@ -255,9 +274,9 @@ $(TRUNNER_EXTRA_OBJS): $(TRUNNER_OUTPUT)/%.o: \ ...@@ -255,9 +274,9 @@ $(TRUNNER_EXTRA_OBJS): $(TRUNNER_OUTPUT)/%.o: \
$$(BPFOBJ) | $(TRUNNER_OUTPUT) $$(BPFOBJ) | $(TRUNNER_OUTPUT)
$$(CC) $$(CFLAGS) -c $$< $$(LDLIBS) -o $$@ $$(CC) $$(CFLAGS) -c $$< $$(LDLIBS) -o $$@
# only copy extra resources if in flavored build
$(TRUNNER_BINARY)-extras: $(TRUNNER_EXTRA_FILES) | $(TRUNNER_OUTPUT) $(TRUNNER_BINARY)-extras: $(TRUNNER_EXTRA_FILES) | $(TRUNNER_OUTPUT)
ifneq ($2,) ifneq ($2,)
# only copy extra resources if in flavored build
cp -a $$^ $(TRUNNER_OUTPUT)/ cp -a $$^ $(TRUNNER_OUTPUT)/
endif endif
...@@ -323,4 +342,5 @@ $(OUTPUT)/test_cpp: test_cpp.cpp $(BPFOBJ) ...@@ -323,4 +342,5 @@ $(OUTPUT)/test_cpp: test_cpp.cpp $(BPFOBJ)
EXTRA_CLEAN := $(TEST_CUSTOM_PROGS) \ EXTRA_CLEAN := $(TEST_CUSTOM_PROGS) \
prog_tests/tests.h map_tests/tests.h verifier/tests.h \ prog_tests/tests.h map_tests/tests.h verifier/tests.h \
feature $(OUTPUT)/*.o $(OUTPUT)/no_alu32 $(OUTPUT)/bpf_gcc feature $(OUTPUT)/*.o $(OUTPUT)/no_alu32 $(OUTPUT)/bpf_gcc \
tools *.skel.h
// SPDX-License-Identifier: GPL-2.0 // SPDX-License-Identifier: GPL-2.0
#include <test_progs.h> #include <test_progs.h>
#include "test_attach_probe.skel.h"
#define EMBED_FILE(NAME, PATH) \
asm ( \
" .pushsection \".rodata\", \"a\", @progbits \n" \
" .global "#NAME"_data \n" \
#NAME"_data: \n" \
" .incbin \"" PATH "\" \n" \
#NAME"_data_end: \n" \
" .global "#NAME"_size \n" \
" .type "#NAME"_size, @object \n" \
" .size "#NAME"_size, 4 \n" \
" .align 4, \n" \
#NAME"_size: \n" \
" .int "#NAME"_data_end - "#NAME"_data \n" \
" .popsection \n" \
); \
extern char NAME##_data[]; \
extern int NAME##_size;
ssize_t get_base_addr() { ssize_t get_base_addr() {
size_t start; size_t start;
...@@ -39,30 +22,14 @@ ssize_t get_base_addr() { ...@@ -39,30 +22,14 @@ ssize_t get_base_addr() {
return -EINVAL; return -EINVAL;
} }
EMBED_FILE(probe, "test_attach_probe.o"); BPF_EMBED_OBJ(probe, "test_attach_probe.o");
void test_attach_probe(void) void test_attach_probe(void)
{ {
const char *kprobe_name = "kprobe/sys_nanosleep"; int duration = 0;
const char *kretprobe_name = "kretprobe/sys_nanosleep"; struct bpf_link *kprobe_link, *kretprobe_link;
const char *uprobe_name = "uprobe/trigger_func"; struct bpf_link *uprobe_link, *uretprobe_link;
const char *uretprobe_name = "uretprobe/trigger_func"; struct test_attach_probe* skel;
const int kprobe_idx = 0, kretprobe_idx = 1;
const int uprobe_idx = 2, uretprobe_idx = 3;
const char *obj_name = "attach_probe";
DECLARE_LIBBPF_OPTS(bpf_object_open_opts, open_opts,
.object_name = obj_name,
.relaxed_maps = true,
);
struct bpf_program *kprobe_prog, *kretprobe_prog;
struct bpf_program *uprobe_prog, *uretprobe_prog;
struct bpf_object *obj;
int err, duration = 0, res;
struct bpf_link *kprobe_link = NULL;
struct bpf_link *kretprobe_link = NULL;
struct bpf_link *uprobe_link = NULL;
struct bpf_link *uretprobe_link = NULL;
int results_map_fd;
size_t uprobe_offset; size_t uprobe_offset;
ssize_t base_addr; ssize_t base_addr;
...@@ -72,123 +39,68 @@ void test_attach_probe(void) ...@@ -72,123 +39,68 @@ void test_attach_probe(void)
return; return;
uprobe_offset = (size_t)&get_base_addr - base_addr; uprobe_offset = (size_t)&get_base_addr - base_addr;
/* open object */ skel = test_attach_probe__open_and_load(&probe_embed);
obj = bpf_object__open_mem(probe_data, probe_size, &open_opts); if (CHECK(!skel, "skel_open", "failed to open skeleton\n"))
if (CHECK(IS_ERR(obj), "obj_open_mem", "err %ld\n", PTR_ERR(obj)))
return; return;
if (CHECK(!skel->bss, "check_bss", ".bss wasn't mmap()-ed\n"))
if (CHECK(strcmp(bpf_object__name(obj), obj_name), "obj_name",
"wrong obj name '%s', expected '%s'\n",
bpf_object__name(obj), obj_name))
goto cleanup;
kprobe_prog = bpf_object__find_program_by_title(obj, kprobe_name);
if (CHECK(!kprobe_prog, "find_probe",
"prog '%s' not found\n", kprobe_name))
goto cleanup;
kretprobe_prog = bpf_object__find_program_by_title(obj, kretprobe_name);
if (CHECK(!kretprobe_prog, "find_probe",
"prog '%s' not found\n", kretprobe_name))
goto cleanup;
uprobe_prog = bpf_object__find_program_by_title(obj, uprobe_name);
if (CHECK(!uprobe_prog, "find_probe",
"prog '%s' not found\n", uprobe_name))
goto cleanup;
uretprobe_prog = bpf_object__find_program_by_title(obj, uretprobe_name);
if (CHECK(!uretprobe_prog, "find_probe",
"prog '%s' not found\n", uretprobe_name))
goto cleanup;
/* create maps && load programs */
err = bpf_object__load(obj);
if (CHECK(err, "obj_load", "err %d\n", err))
goto cleanup; goto cleanup;
/* load maps */ kprobe_link = bpf_program__attach_kprobe(skel->progs.handle_kprobe,
results_map_fd = bpf_find_map(__func__, obj, "results_map");
if (CHECK(results_map_fd < 0, "find_results_map",
"err %d\n", results_map_fd))
goto cleanup;
kprobe_link = bpf_program__attach_kprobe(kprobe_prog,
false /* retprobe */, false /* retprobe */,
SYS_NANOSLEEP_KPROBE_NAME); SYS_NANOSLEEP_KPROBE_NAME);
if (CHECK(IS_ERR(kprobe_link), "attach_kprobe", if (CHECK(IS_ERR(kprobe_link), "attach_kprobe",
"err %ld\n", PTR_ERR(kprobe_link))) { "err %ld\n", PTR_ERR(kprobe_link)))
kprobe_link = NULL;
goto cleanup; goto cleanup;
} skel->links.handle_kprobe = kprobe_link;
kretprobe_link = bpf_program__attach_kprobe(kretprobe_prog,
kretprobe_link = bpf_program__attach_kprobe(skel->progs.handle_kretprobe,
true /* retprobe */, true /* retprobe */,
SYS_NANOSLEEP_KPROBE_NAME); SYS_NANOSLEEP_KPROBE_NAME);
if (CHECK(IS_ERR(kretprobe_link), "attach_kretprobe", if (CHECK(IS_ERR(kretprobe_link), "attach_kretprobe",
"err %ld\n", PTR_ERR(kretprobe_link))) { "err %ld\n", PTR_ERR(kretprobe_link)))
kretprobe_link = NULL;
goto cleanup; goto cleanup;
} skel->links.handle_kretprobe = kretprobe_link;
uprobe_link = bpf_program__attach_uprobe(uprobe_prog,
uprobe_link = bpf_program__attach_uprobe(skel->progs.handle_uprobe,
false /* retprobe */, false /* retprobe */,
0 /* self pid */, 0 /* self pid */,
"/proc/self/exe", "/proc/self/exe",
uprobe_offset); uprobe_offset);
if (CHECK(IS_ERR(uprobe_link), "attach_uprobe", if (CHECK(IS_ERR(uprobe_link), "attach_uprobe",
"err %ld\n", PTR_ERR(uprobe_link))) { "err %ld\n", PTR_ERR(uprobe_link)))
uprobe_link = NULL;
goto cleanup; goto cleanup;
} skel->links.handle_uprobe = uprobe_link;
uretprobe_link = bpf_program__attach_uprobe(uretprobe_prog,
uretprobe_link = bpf_program__attach_uprobe(skel->progs.handle_uretprobe,
true /* retprobe */, true /* retprobe */,
-1 /* any pid */, -1 /* any pid */,
"/proc/self/exe", "/proc/self/exe",
uprobe_offset); uprobe_offset);
if (CHECK(IS_ERR(uretprobe_link), "attach_uretprobe", if (CHECK(IS_ERR(uretprobe_link), "attach_uretprobe",
"err %ld\n", PTR_ERR(uretprobe_link))) { "err %ld\n", PTR_ERR(uretprobe_link)))
uretprobe_link = NULL;
goto cleanup; goto cleanup;
} skel->links.handle_uretprobe = uretprobe_link;
/* trigger & validate kprobe && kretprobe */ /* trigger & validate kprobe && kretprobe */
usleep(1); usleep(1);
err = bpf_map_lookup_elem(results_map_fd, &kprobe_idx, &res); if (CHECK(skel->bss->kprobe_res != 1, "check_kprobe_res",
if (CHECK(err, "get_kprobe_res", "wrong kprobe res: %d\n", skel->bss->kprobe_res))
"failed to get kprobe res: %d\n", err))
goto cleanup; goto cleanup;
if (CHECK(res != kprobe_idx + 1, "check_kprobe_res", if (CHECK(skel->bss->kretprobe_res != 2, "check_kretprobe_res",
"wrong kprobe res: %d\n", res)) "wrong kretprobe res: %d\n", skel->bss->kretprobe_res))
goto cleanup;
err = bpf_map_lookup_elem(results_map_fd, &kretprobe_idx, &res);
if (CHECK(err, "get_kretprobe_res",
"failed to get kretprobe res: %d\n", err))
goto cleanup;
if (CHECK(res != kretprobe_idx + 1, "check_kretprobe_res",
"wrong kretprobe res: %d\n", res))
goto cleanup; goto cleanup;
/* trigger & validate uprobe & uretprobe */ /* trigger & validate uprobe & uretprobe */
get_base_addr(); get_base_addr();
err = bpf_map_lookup_elem(results_map_fd, &uprobe_idx, &res); if (CHECK(skel->bss->uprobe_res != 3, "check_uprobe_res",
if (CHECK(err, "get_uprobe_res", "wrong uprobe res: %d\n", skel->bss->uprobe_res))
"failed to get uprobe res: %d\n", err))
goto cleanup;
if (CHECK(res != uprobe_idx + 1, "check_uprobe_res",
"wrong uprobe res: %d\n", res))
goto cleanup;
err = bpf_map_lookup_elem(results_map_fd, &uretprobe_idx, &res);
if (CHECK(err, "get_uretprobe_res",
"failed to get uretprobe res: %d\n", err))
goto cleanup; goto cleanup;
if (CHECK(res != uretprobe_idx + 1, "check_uretprobe_res", if (CHECK(skel->bss->uretprobe_res != 4, "check_uretprobe_res",
"wrong uretprobe res: %d\n", res)) "wrong uretprobe res: %d\n", skel->bss->uretprobe_res))
goto cleanup; goto cleanup;
cleanup: cleanup:
bpf_link__destroy(kprobe_link); test_attach_probe__destroy(skel);
bpf_link__destroy(kretprobe_link);
bpf_link__destroy(uprobe_link);
bpf_link__destroy(uretprobe_link);
bpf_object__close(obj);
} }
// SPDX-License-Identifier: GPL-2.0 // SPDX-License-Identifier: GPL-2.0
/* Copyright (c) 2019 Facebook */ /* Copyright (c) 2019 Facebook */
#include <test_progs.h> #include <test_progs.h>
#include "test_pkt_access.skel.h"
#include "fentry_test.skel.h"
#include "fexit_test.skel.h"
BPF_EMBED_OBJ(pkt_access, "test_pkt_access.o");
BPF_EMBED_OBJ(fentry, "fentry_test.o");
BPF_EMBED_OBJ(fexit, "fexit_test.o");
void test_fentry_fexit(void) void test_fentry_fexit(void)
{ {
struct bpf_prog_load_attr attr_fentry = { struct test_pkt_access *pkt_skel = NULL;
.file = "./fentry_test.o", struct fentry_test *fentry_skel = NULL;
}; struct fexit_test *fexit_skel = NULL;
struct bpf_prog_load_attr attr_fexit = { __u64 *fentry_res, *fexit_res;
.file = "./fexit_test.o", __u32 duration = 0, retval;
}; int err, pkt_fd, i;
struct bpf_object *obj_fentry = NULL, *obj_fexit = NULL, *pkt_obj; pkt_skel = test_pkt_access__open_and_load(&pkt_access_embed);
struct bpf_map *data_map_fentry, *data_map_fexit; if (CHECK(!pkt_skel, "pkt_skel_load", "pkt_access skeleton failed\n"))
char fentry_name[] = "fentry/bpf_fentry_testX";
char fexit_name[] = "fexit/bpf_fentry_testX";
int err, pkt_fd, kfree_skb_fd, i;
struct bpf_link *link[12] = {};
struct bpf_program *prog[12];
__u32 duration, retval;
const int zero = 0;
u64 result[12];
err = bpf_prog_load("./test_pkt_access.o", BPF_PROG_TYPE_SCHED_CLS,
&pkt_obj, &pkt_fd);
if (CHECK(err, "prog_load sched cls", "err %d errno %d\n", err, errno))
return; return;
err = bpf_prog_load_xattr(&attr_fentry, &obj_fentry, &kfree_skb_fd); fentry_skel = fentry_test__open_and_load(&fentry_embed);
if (CHECK(err, "prog_load fail", "err %d errno %d\n", err, errno)) if (CHECK(!fentry_skel, "fentry_skel_load", "fentry skeleton failed\n"))
goto close_prog; goto close_prog;
err = bpf_prog_load_xattr(&attr_fexit, &obj_fexit, &kfree_skb_fd); fexit_skel = fexit_test__open_and_load(&fexit_embed);
if (CHECK(err, "prog_load fail", "err %d errno %d\n", err, errno)) if (CHECK(!fexit_skel, "fexit_skel_load", "fexit skeleton failed\n"))
goto close_prog;
for (i = 0; i < 6; i++) {
fentry_name[sizeof(fentry_name) - 2] = '1' + i;
prog[i] = bpf_object__find_program_by_title(obj_fentry, fentry_name);
if (CHECK(!prog[i], "find_prog", "prog %s not found\n", fentry_name))
goto close_prog;
link[i] = bpf_program__attach_trace(prog[i]);
if (CHECK(IS_ERR(link[i]), "attach_trace", "failed to link\n"))
goto close_prog;
}
data_map_fentry = bpf_object__find_map_by_name(obj_fentry, "fentry_t.bss");
if (CHECK(!data_map_fentry, "find_data_map", "data map not found\n"))
goto close_prog; goto close_prog;
for (i = 6; i < 12; i++) { err = fentry_test__attach(fentry_skel);
fexit_name[sizeof(fexit_name) - 2] = '1' + i - 6; if (CHECK(err, "fentry_attach", "fentry attach failed: %d\n", err))
prog[i] = bpf_object__find_program_by_title(obj_fexit, fexit_name);
if (CHECK(!prog[i], "find_prog", "prog %s not found\n", fexit_name))
goto close_prog; goto close_prog;
link[i] = bpf_program__attach_trace(prog[i]); err = fexit_test__attach(fexit_skel);
if (CHECK(IS_ERR(link[i]), "attach_trace", "failed to link\n")) if (CHECK(err, "fexit_attach", "fexit attach failed: %d\n", err))
goto close_prog;
}
data_map_fexit = bpf_object__find_map_by_name(obj_fexit, "fexit_te.bss");
if (CHECK(!data_map_fexit, "find_data_map", "data map not found\n"))
goto close_prog; goto close_prog;
pkt_fd = bpf_program__fd(pkt_skel->progs.test_pkt_access);
err = bpf_prog_test_run(pkt_fd, 1, &pkt_v6, sizeof(pkt_v6), err = bpf_prog_test_run(pkt_fd, 1, &pkt_v6, sizeof(pkt_v6),
NULL, NULL, &retval, &duration); NULL, NULL, &retval, &duration);
CHECK(err || retval, "ipv6", CHECK(err || retval, "ipv6",
"err %d errno %d retval %d duration %d\n", "err %d errno %d retval %d duration %d\n",
err, errno, retval, duration); err, errno, retval, duration);
err = bpf_map_lookup_elem(bpf_map__fd(data_map_fentry), &zero, &result); fentry_res = (__u64 *)fentry_skel->bss;
if (CHECK(err, "get_result", fexit_res = (__u64 *)fexit_skel->bss;
"failed to get output data: %d\n", err)) printf("%lld\n", fentry_skel->bss->test1_result);
goto close_prog; for (i = 0; i < 6; i++) {
CHECK(fentry_res[i] != 1, "result",
err = bpf_map_lookup_elem(bpf_map__fd(data_map_fexit), &zero, result + 6); "fentry_test%d failed err %lld\n", i + 1, fentry_res[i]);
if (CHECK(err, "get_result", CHECK(fexit_res[i] != 1, "result",
"failed to get output data: %d\n", err)) "fexit_test%d failed err %lld\n", i + 1, fexit_res[i]);
goto close_prog; }
for (i = 0; i < 12; i++)
if (CHECK(result[i] != 1, "result", "bpf_fentry_test%d failed err %ld\n",
i % 6 + 1, result[i]))
goto close_prog;
close_prog: close_prog:
for (i = 0; i < 12; i++) test_pkt_access__destroy(pkt_skel);
if (!IS_ERR_OR_NULL(link[i])) fentry_test__destroy(fentry_skel);
bpf_link__destroy(link[i]); fexit_test__destroy(fexit_skel);
bpf_object__close(obj_fentry);
bpf_object__close(obj_fexit);
bpf_object__close(pkt_obj);
} }
// SPDX-License-Identifier: GPL-2.0 // SPDX-License-Identifier: GPL-2.0
/* Copyright (c) 2019 Facebook */ /* Copyright (c) 2019 Facebook */
#include <test_progs.h> #include <test_progs.h>
#include "test_pkt_access.skel.h"
#include "fentry_test.skel.h"
BPF_EMBED_OBJ_DECLARE(pkt_access);
BPF_EMBED_OBJ_DECLARE(fentry);
void test_fentry_test(void) void test_fentry_test(void)
{ {
struct bpf_prog_load_attr attr = { struct test_pkt_access *pkt_skel = NULL;
.file = "./fentry_test.o", struct fentry_test *fentry_skel = NULL;
}; int err, pkt_fd, i;
char prog_name[] = "fentry/bpf_fentry_testX";
struct bpf_object *obj = NULL, *pkt_obj;
int err, pkt_fd, kfree_skb_fd, i;
struct bpf_link *link[6] = {};
struct bpf_program *prog[6];
__u32 duration, retval; __u32 duration, retval;
struct bpf_map *data_map; __u64 *result;
const int zero = 0;
u64 result[6];
err = bpf_prog_load("./test_pkt_access.o", BPF_PROG_TYPE_SCHED_CLS, pkt_skel = test_pkt_access__open_and_load(&pkt_access_embed);
&pkt_obj, &pkt_fd); if (CHECK(!pkt_skel, "pkt_skel_load", "pkt_access skeleton failed\n"))
if (CHECK(err, "prog_load sched cls", "err %d errno %d\n", err, errno))
return; return;
err = bpf_prog_load_xattr(&attr, &obj, &kfree_skb_fd); fentry_skel = fentry_test__open_and_load(&fentry_embed);
if (CHECK(err, "prog_load fail", "err %d errno %d\n", err, errno)) if (CHECK(!fentry_skel, "fentry_skel_load", "fentry skeleton failed\n"))
goto close_prog; goto cleanup;
for (i = 0; i < 6; i++) { err = fentry_test__attach(fentry_skel);
prog_name[sizeof(prog_name) - 2] = '1' + i; if (CHECK(err, "fentry_attach", "fentry attach failed: %d\n", err))
prog[i] = bpf_object__find_program_by_title(obj, prog_name); goto cleanup;
if (CHECK(!prog[i], "find_prog", "prog %s not found\n", prog_name))
goto close_prog;
link[i] = bpf_program__attach_trace(prog[i]);
if (CHECK(IS_ERR(link[i]), "attach_trace", "failed to link\n"))
goto close_prog;
}
data_map = bpf_object__find_map_by_name(obj, "fentry_t.bss");
if (CHECK(!data_map, "find_data_map", "data map not found\n"))
goto close_prog;
pkt_fd = bpf_program__fd(pkt_skel->progs.test_pkt_access);
err = bpf_prog_test_run(pkt_fd, 1, &pkt_v6, sizeof(pkt_v6), err = bpf_prog_test_run(pkt_fd, 1, &pkt_v6, sizeof(pkt_v6),
NULL, NULL, &retval, &duration); NULL, NULL, &retval, &duration);
CHECK(err || retval, "ipv6", CHECK(err || retval, "ipv6",
"err %d errno %d retval %d duration %d\n", "err %d errno %d retval %d duration %d\n",
err, errno, retval, duration); err, errno, retval, duration);
err = bpf_map_lookup_elem(bpf_map__fd(data_map), &zero, &result); result = (__u64 *)fentry_skel->bss;
if (CHECK(err, "get_result", for (i = 0; i < 6; i++) {
"failed to get output data: %d\n", err)) if (CHECK(result[i] != 1, "result",
goto close_prog; "fentry_test%d failed err %lld\n", i + 1, result[i]))
goto cleanup;
for (i = 0; i < 6; i++) }
if (CHECK(result[i] != 1, "result", "bpf_fentry_test%d failed err %ld\n",
i + 1, result[i]))
goto close_prog;
close_prog: cleanup:
for (i = 0; i < 6; i++) fentry_test__destroy(fentry_skel);
if (!IS_ERR_OR_NULL(link[i])) test_pkt_access__destroy(pkt_skel);
bpf_link__destroy(link[i]);
bpf_object__close(obj);
bpf_object__close(pkt_obj);
} }
// SPDX-License-Identifier: GPL-2.0 // SPDX-License-Identifier: GPL-2.0
#include <test_progs.h> #include <test_progs.h>
#include <sys/mman.h> #include <sys/mman.h>
#include "test_mmap.skel.h"
struct map_data { struct map_data {
__u64 val[512 * 4]; __u64 val[512 * 4];
}; };
struct bss_data {
__u64 in_val;
__u64 out_val;
};
static size_t roundup_page(size_t sz) static size_t roundup_page(size_t sz)
{ {
long page_size = sysconf(_SC_PAGE_SIZE); long page_size = sysconf(_SC_PAGE_SIZE);
return (sz + page_size - 1) / page_size * page_size; return (sz + page_size - 1) / page_size * page_size;
} }
BPF_EMBED_OBJ(test_mmap, "test_mmap.o");
void test_mmap(void) void test_mmap(void)
{ {
const char *file = "test_mmap.o"; const size_t bss_sz = roundup_page(sizeof(struct test_mmap__bss));
const char *probe_name = "raw_tracepoint/sys_enter";
const char *tp_name = "sys_enter";
const size_t bss_sz = roundup_page(sizeof(struct bss_data));
const size_t map_sz = roundup_page(sizeof(struct map_data)); const size_t map_sz = roundup_page(sizeof(struct map_data));
const int zero = 0, one = 1, two = 2, far = 1500; const int zero = 0, one = 1, two = 2, far = 1500;
const long page_size = sysconf(_SC_PAGE_SIZE); const long page_size = sysconf(_SC_PAGE_SIZE);
int err, duration = 0, i, data_map_fd; int err, duration = 0, i, data_map_fd;
struct bpf_program *prog;
struct bpf_object *obj;
struct bpf_link *link = NULL;
struct bpf_map *data_map, *bss_map; struct bpf_map *data_map, *bss_map;
void *bss_mmaped = NULL, *map_mmaped = NULL, *tmp1, *tmp2; void *bss_mmaped = NULL, *map_mmaped = NULL, *tmp1, *tmp2;
volatile struct bss_data *bss_data; struct test_mmap__bss *bss_data;
volatile struct map_data *map_data; struct map_data *map_data;
struct test_mmap *skel;
__u64 val = 0; __u64 val = 0;
obj = bpf_object__open_file("test_mmap.o", NULL);
if (CHECK(IS_ERR(obj), "obj_open", "failed to open '%s': %ld\n", skel = test_mmap__open_and_load(&test_mmap_embed);
file, PTR_ERR(obj))) if (CHECK(!skel, "skel_open_and_load", "skeleton open/load failed\n"))
return; return;
prog = bpf_object__find_program_by_title(obj, probe_name);
if (CHECK(!prog, "find_probe", "prog '%s' not found\n", probe_name))
goto cleanup;
err = bpf_object__load(obj);
if (CHECK(err, "obj_load", "failed to load prog '%s': %d\n",
probe_name, err))
goto cleanup;
bss_map = bpf_object__find_map_by_name(obj, "test_mma.bss"); bss_map = skel->maps.bss;
if (CHECK(!bss_map, "find_bss_map", ".bss map not found\n")) data_map = skel->maps.data_map;
goto cleanup;
data_map = bpf_object__find_map_by_name(obj, "data_map");
if (CHECK(!data_map, "find_data_map", "data_map map not found\n"))
goto cleanup;
data_map_fd = bpf_map__fd(data_map); data_map_fd = bpf_map__fd(data_map);
bss_mmaped = mmap(NULL, bss_sz, PROT_READ | PROT_WRITE, MAP_SHARED, bss_mmaped = mmap(NULL, bss_sz, PROT_READ | PROT_WRITE, MAP_SHARED,
...@@ -77,13 +59,15 @@ void test_mmap(void) ...@@ -77,13 +59,15 @@ void test_mmap(void)
CHECK_FAIL(bss_data->in_val); CHECK_FAIL(bss_data->in_val);
CHECK_FAIL(bss_data->out_val); CHECK_FAIL(bss_data->out_val);
CHECK_FAIL(skel->bss->in_val);
CHECK_FAIL(skel->bss->out_val);
CHECK_FAIL(map_data->val[0]); CHECK_FAIL(map_data->val[0]);
CHECK_FAIL(map_data->val[1]); CHECK_FAIL(map_data->val[1]);
CHECK_FAIL(map_data->val[2]); CHECK_FAIL(map_data->val[2]);
CHECK_FAIL(map_data->val[far]); CHECK_FAIL(map_data->val[far]);
link = bpf_program__attach_raw_tracepoint(prog, tp_name); err = test_mmap__attach(skel);
if (CHECK(IS_ERR(link), "attach_raw_tp", "err %ld\n", PTR_ERR(link))) if (CHECK(err, "attach_raw_tp", "err %d\n", err))
goto cleanup; goto cleanup;
bss_data->in_val = 123; bss_data->in_val = 123;
...@@ -94,6 +78,8 @@ void test_mmap(void) ...@@ -94,6 +78,8 @@ void test_mmap(void)
CHECK_FAIL(bss_data->in_val != 123); CHECK_FAIL(bss_data->in_val != 123);
CHECK_FAIL(bss_data->out_val != 123); CHECK_FAIL(bss_data->out_val != 123);
CHECK_FAIL(skel->bss->in_val != 123);
CHECK_FAIL(skel->bss->out_val != 123);
CHECK_FAIL(map_data->val[0] != 111); CHECK_FAIL(map_data->val[0] != 111);
CHECK_FAIL(map_data->val[1] != 222); CHECK_FAIL(map_data->val[1] != 222);
CHECK_FAIL(map_data->val[2] != 123); CHECK_FAIL(map_data->val[2] != 123);
...@@ -160,6 +146,8 @@ void test_mmap(void) ...@@ -160,6 +146,8 @@ void test_mmap(void)
usleep(1); usleep(1);
CHECK_FAIL(bss_data->in_val != 321); CHECK_FAIL(bss_data->in_val != 321);
CHECK_FAIL(bss_data->out_val != 321); CHECK_FAIL(bss_data->out_val != 321);
CHECK_FAIL(skel->bss->in_val != 321);
CHECK_FAIL(skel->bss->out_val != 321);
CHECK_FAIL(map_data->val[0] != 111); CHECK_FAIL(map_data->val[0] != 111);
CHECK_FAIL(map_data->val[1] != 222); CHECK_FAIL(map_data->val[1] != 222);
CHECK_FAIL(map_data->val[2] != 321); CHECK_FAIL(map_data->val[2] != 321);
...@@ -203,6 +191,8 @@ void test_mmap(void) ...@@ -203,6 +191,8 @@ void test_mmap(void)
map_data = tmp2; map_data = tmp2;
CHECK_FAIL(bss_data->in_val != 321); CHECK_FAIL(bss_data->in_val != 321);
CHECK_FAIL(bss_data->out_val != 321); CHECK_FAIL(bss_data->out_val != 321);
CHECK_FAIL(skel->bss->in_val != 321);
CHECK_FAIL(skel->bss->out_val != 321);
CHECK_FAIL(map_data->val[0] != 111); CHECK_FAIL(map_data->val[0] != 111);
CHECK_FAIL(map_data->val[1] != 222); CHECK_FAIL(map_data->val[1] != 222);
CHECK_FAIL(map_data->val[2] != 321); CHECK_FAIL(map_data->val[2] != 321);
...@@ -214,7 +204,5 @@ void test_mmap(void) ...@@ -214,7 +204,5 @@ void test_mmap(void)
CHECK_FAIL(munmap(bss_mmaped, bss_sz)); CHECK_FAIL(munmap(bss_mmaped, bss_sz));
if (map_mmaped) if (map_mmaped)
CHECK_FAIL(munmap(map_mmaped, map_sz)); CHECK_FAIL(munmap(map_mmaped, map_sz));
if (!IS_ERR_OR_NULL(link)) test_mmap__destroy(skel);
bpf_link__destroy(link);
bpf_object__close(obj);
} }
...@@ -3,8 +3,7 @@ ...@@ -3,8 +3,7 @@
void test_probe_user(void) void test_probe_user(void)
{ {
#define kprobe_name "__sys_connect" const char *prog_name = "kprobe/__sys_connect";
const char *prog_name = "kprobe/" kprobe_name;
const char *obj_file = "./test_probe_user.o"; const char *obj_file = "./test_probe_user.o";
DECLARE_LIBBPF_OPTS(bpf_object_open_opts, opts, ); DECLARE_LIBBPF_OPTS(bpf_object_open_opts, opts, );
int err, results_map_fd, sock_fd, duration = 0; int err, results_map_fd, sock_fd, duration = 0;
...@@ -33,8 +32,7 @@ void test_probe_user(void) ...@@ -33,8 +32,7 @@ void test_probe_user(void)
"err %d\n", results_map_fd)) "err %d\n", results_map_fd))
goto cleanup; goto cleanup;
kprobe_link = bpf_program__attach_kprobe(kprobe_prog, false, kprobe_link = bpf_program__attach(kprobe_prog);
kprobe_name);
if (CHECK(IS_ERR(kprobe_link), "attach_kprobe", if (CHECK(IS_ERR(kprobe_link), "attach_kprobe",
"err %ld\n", PTR_ERR(kprobe_link))) { "err %ld\n", PTR_ERR(kprobe_link))) {
kprobe_link = NULL; kprobe_link = NULL;
......
...@@ -16,14 +16,11 @@ struct rdonly_map_subtest { ...@@ -16,14 +16,11 @@ struct rdonly_map_subtest {
void test_rdonly_maps(void) void test_rdonly_maps(void)
{ {
const char *prog_name_skip_loop = "raw_tracepoint/sys_enter:skip_loop";
const char *prog_name_part_loop = "raw_tracepoint/sys_enter:part_loop";
const char *prog_name_full_loop = "raw_tracepoint/sys_enter:full_loop";
const char *file = "test_rdonly_maps.o"; const char *file = "test_rdonly_maps.o";
struct rdonly_map_subtest subtests[] = { struct rdonly_map_subtest subtests[] = {
{ "skip loop", prog_name_skip_loop, 0, 0 }, { "skip loop", "skip_loop", 0, 0 },
{ "part loop", prog_name_part_loop, 3, 2 + 3 + 4 }, { "part loop", "part_loop", 3, 2 + 3 + 4 },
{ "full loop", prog_name_full_loop, 4, 2 + 3 + 4 + 5 }, { "full loop", "full_loop", 4, 2 + 3 + 4 + 5 },
}; };
int i, err, zero = 0, duration = 0; int i, err, zero = 0, duration = 0;
struct bpf_link *link = NULL; struct bpf_link *link = NULL;
...@@ -50,7 +47,7 @@ void test_rdonly_maps(void) ...@@ -50,7 +47,7 @@ void test_rdonly_maps(void)
if (!test__start_subtest(t->subtest_name)) if (!test__start_subtest(t->subtest_name))
continue; continue;
prog = bpf_object__find_program_by_title(obj, t->prog_name); prog = bpf_object__find_program_by_name(obj, t->prog_name);
if (CHECK(!prog, "find_prog", "prog '%s' not found\n", if (CHECK(!prog, "find_prog", "prog '%s' not found\n",
t->prog_name)) t->prog_name))
goto cleanup; goto cleanup;
......
// SPDX-License-Identifier: GPL-2.0
/* Copyright (c) 2019 Facebook */
#include <test_progs.h>
struct s {
int a;
long long b;
} __attribute__((packed));
#include "test_skeleton.skel.h"
BPF_EMBED_OBJ(skeleton, "test_skeleton.o");
void test_skeleton(void)
{
int duration = 0, err;
struct test_skeleton* skel;
struct test_skeleton__bss *bss;
skel = test_skeleton__open_and_load(&skeleton_embed);
if (CHECK(!skel, "skel_open", "failed to open skeleton\n"))
return;
bss = skel->bss;
bss->in1 = 1;
bss->in2 = 2;
bss->in3 = 3;
bss->in4 = 4;
bss->in5.a = 5;
bss->in5.b = 6;
err = test_skeleton__attach(skel);
if (CHECK(err, "skel_attach", "skeleton attach failed: %d\n", err))
goto cleanup;
/* trigger tracepoint */
usleep(1);
CHECK(bss->out1 != 1, "res1", "got %d != exp %d\n", bss->out1, 1);
CHECK(bss->out2 != 2, "res2", "got %lld != exp %d\n", bss->out2, 2);
CHECK(bss->out3 != 3, "res3", "got %d != exp %d\n", (int)bss->out3, 3);
CHECK(bss->out4 != 4, "res4", "got %lld != exp %d\n", bss->out4, 4);
CHECK(bss->handler_out5.a != 5, "res5", "got %d != exp %d\n",
bss->handler_out5.a, 5);
CHECK(bss->handler_out5.b != 6, "res6", "got %lld != exp %d\n",
bss->handler_out5.b, 6);
cleanup:
test_skeleton__destroy(skel);
}
// SPDX-License-Identifier: GPL-2.0 // SPDX-License-Identifier: GPL-2.0
#include <test_progs.h> #include <test_progs.h>
#include "test_stacktrace_build_id.skel.h"
BPF_EMBED_OBJ(stacktrace_build_id, "test_stacktrace_build_id.o");
void test_stacktrace_build_id(void) void test_stacktrace_build_id(void)
{ {
int control_map_fd, stackid_hmap_fd, stackmap_fd, stack_amap_fd; int control_map_fd, stackid_hmap_fd, stackmap_fd, stack_amap_fd;
const char *prog_name = "tracepoint/random/urandom_read"; struct test_stacktrace_build_id *skel;
const char *file = "./test_stacktrace_build_id.o"; int err, stack_trace_len;
int err, prog_fd, stack_trace_len;
__u32 key, previous_key, val, duration = 0; __u32 key, previous_key, val, duration = 0;
struct bpf_program *prog;
struct bpf_object *obj;
struct bpf_link *link = NULL;
char buf[256]; char buf[256];
int i, j; int i, j;
struct bpf_stack_build_id id_offs[PERF_MAX_STACK_DEPTH]; struct bpf_stack_build_id id_offs[PERF_MAX_STACK_DEPTH];
...@@ -18,43 +18,24 @@ void test_stacktrace_build_id(void) ...@@ -18,43 +18,24 @@ void test_stacktrace_build_id(void)
int retry = 1; int retry = 1;
retry: retry:
err = bpf_prog_load(file, BPF_PROG_TYPE_TRACEPOINT, &obj, &prog_fd); skel = test_stacktrace_build_id__open_and_load(&stacktrace_build_id_embed);
if (CHECK(err, "prog_load", "err %d errno %d\n", err, errno)) if (CHECK(!skel, "skel_open_and_load", "skeleton open/load failed\n"))
return; return;
prog = bpf_object__find_program_by_title(obj, prog_name); err = test_stacktrace_build_id__attach(skel);
if (CHECK(!prog, "find_prog", "prog '%s' not found\n", prog_name)) if (CHECK(err, "attach_tp", "err %d\n", err))
goto close_prog; goto cleanup;
link = bpf_program__attach_tracepoint(prog, "random", "urandom_read");
if (CHECK(IS_ERR(link), "attach_tp", "err %ld\n", PTR_ERR(link)))
goto close_prog;
/* find map fds */ /* find map fds */
control_map_fd = bpf_find_map(__func__, obj, "control_map"); control_map_fd = bpf_map__fd(skel->maps.control_map);
if (CHECK(control_map_fd < 0, "bpf_find_map control_map", stackid_hmap_fd = bpf_map__fd(skel->maps.stackid_hmap);
"err %d errno %d\n", err, errno)) stackmap_fd = bpf_map__fd(skel->maps.stackmap);
goto disable_pmu; stack_amap_fd = bpf_map__fd(skel->maps.stack_amap);
stackid_hmap_fd = bpf_find_map(__func__, obj, "stackid_hmap");
if (CHECK(stackid_hmap_fd < 0, "bpf_find_map stackid_hmap",
"err %d errno %d\n", err, errno))
goto disable_pmu;
stackmap_fd = bpf_find_map(__func__, obj, "stackmap");
if (CHECK(stackmap_fd < 0, "bpf_find_map stackmap", "err %d errno %d\n",
err, errno))
goto disable_pmu;
stack_amap_fd = bpf_find_map(__func__, obj, "stack_amap");
if (CHECK(stack_amap_fd < 0, "bpf_find_map stack_amap",
"err %d errno %d\n", err, errno))
goto disable_pmu;
if (CHECK_FAIL(system("dd if=/dev/urandom of=/dev/zero count=4 2> /dev/null"))) if (CHECK_FAIL(system("dd if=/dev/urandom of=/dev/zero count=4 2> /dev/null")))
goto disable_pmu; goto cleanup;
if (CHECK_FAIL(system("./urandom_read"))) if (CHECK_FAIL(system("./urandom_read")))
goto disable_pmu; goto cleanup;
/* disable stack trace collection */ /* disable stack trace collection */
key = 0; key = 0;
val = 1; val = 1;
...@@ -66,23 +47,23 @@ void test_stacktrace_build_id(void) ...@@ -66,23 +47,23 @@ void test_stacktrace_build_id(void)
err = compare_map_keys(stackid_hmap_fd, stackmap_fd); err = compare_map_keys(stackid_hmap_fd, stackmap_fd);
if (CHECK(err, "compare_map_keys stackid_hmap vs. stackmap", if (CHECK(err, "compare_map_keys stackid_hmap vs. stackmap",
"err %d errno %d\n", err, errno)) "err %d errno %d\n", err, errno))
goto disable_pmu; goto cleanup;
err = compare_map_keys(stackmap_fd, stackid_hmap_fd); err = compare_map_keys(stackmap_fd, stackid_hmap_fd);
if (CHECK(err, "compare_map_keys stackmap vs. stackid_hmap", if (CHECK(err, "compare_map_keys stackmap vs. stackid_hmap",
"err %d errno %d\n", err, errno)) "err %d errno %d\n", err, errno))
goto disable_pmu; goto cleanup;
err = extract_build_id(buf, 256); err = extract_build_id(buf, 256);
if (CHECK(err, "get build_id with readelf", if (CHECK(err, "get build_id with readelf",
"err %d errno %d\n", err, errno)) "err %d errno %d\n", err, errno))
goto disable_pmu; goto cleanup;
err = bpf_map_get_next_key(stackmap_fd, NULL, &key); err = bpf_map_get_next_key(stackmap_fd, NULL, &key);
if (CHECK(err, "get_next_key from stackmap", if (CHECK(err, "get_next_key from stackmap",
"err %d, errno %d\n", err, errno)) "err %d, errno %d\n", err, errno))
goto disable_pmu; goto cleanup;
do { do {
char build_id[64]; char build_id[64];
...@@ -90,7 +71,7 @@ void test_stacktrace_build_id(void) ...@@ -90,7 +71,7 @@ void test_stacktrace_build_id(void)
err = bpf_map_lookup_elem(stackmap_fd, &key, id_offs); err = bpf_map_lookup_elem(stackmap_fd, &key, id_offs);
if (CHECK(err, "lookup_elem from stackmap", if (CHECK(err, "lookup_elem from stackmap",
"err %d, errno %d\n", err, errno)) "err %d, errno %d\n", err, errno))
goto disable_pmu; goto cleanup;
for (i = 0; i < PERF_MAX_STACK_DEPTH; ++i) for (i = 0; i < PERF_MAX_STACK_DEPTH; ++i)
if (id_offs[i].status == BPF_STACK_BUILD_ID_VALID && if (id_offs[i].status == BPF_STACK_BUILD_ID_VALID &&
id_offs[i].offset != 0) { id_offs[i].offset != 0) {
...@@ -108,8 +89,7 @@ void test_stacktrace_build_id(void) ...@@ -108,8 +89,7 @@ void test_stacktrace_build_id(void)
* try it one more time. * try it one more time.
*/ */
if (build_id_matches < 1 && retry--) { if (build_id_matches < 1 && retry--) {
bpf_link__destroy(link); test_stacktrace_build_id__destroy(skel);
bpf_object__close(obj);
printf("%s:WARN:Didn't find expected build ID from the map, retrying\n", printf("%s:WARN:Didn't find expected build ID from the map, retrying\n",
__func__); __func__);
goto retry; goto retry;
...@@ -117,17 +97,14 @@ void test_stacktrace_build_id(void) ...@@ -117,17 +97,14 @@ void test_stacktrace_build_id(void)
if (CHECK(build_id_matches < 1, "build id match", if (CHECK(build_id_matches < 1, "build id match",
"Didn't find expected build ID from the map\n")) "Didn't find expected build ID from the map\n"))
goto disable_pmu; goto cleanup;
stack_trace_len = PERF_MAX_STACK_DEPTH stack_trace_len = PERF_MAX_STACK_DEPTH *
* sizeof(struct bpf_stack_build_id); sizeof(struct bpf_stack_build_id);
err = compare_stack_ips(stackmap_fd, stack_amap_fd, stack_trace_len); err = compare_stack_ips(stackmap_fd, stack_amap_fd, stack_trace_len);
CHECK(err, "compare_stack_ips stackmap vs. stack_amap", CHECK(err, "compare_stack_ips stackmap vs. stack_amap",
"err %d errno %d\n", err, errno); "err %d errno %d\n", err, errno);
disable_pmu: cleanup:
bpf_link__destroy(link); test_stacktrace_build_id__destroy(skel);
close_prog:
bpf_object__close(obj);
} }
// SPDX-License-Identifier: GPL-2.0 // SPDX-License-Identifier: GPL-2.0
#include <test_progs.h> #include <test_progs.h>
#include "test_stacktrace_build_id.skel.h"
static __u64 read_perf_max_sample_freq(void) static __u64 read_perf_max_sample_freq(void)
{ {
...@@ -14,21 +15,19 @@ static __u64 read_perf_max_sample_freq(void) ...@@ -14,21 +15,19 @@ static __u64 read_perf_max_sample_freq(void)
return sample_freq; return sample_freq;
} }
BPF_EMBED_OBJ_DECLARE(stacktrace_build_id);
void test_stacktrace_build_id_nmi(void) void test_stacktrace_build_id_nmi(void)
{ {
int control_map_fd, stackid_hmap_fd, stackmap_fd, stack_amap_fd; int control_map_fd, stackid_hmap_fd, stackmap_fd;
const char *prog_name = "tracepoint/random/urandom_read"; struct test_stacktrace_build_id *skel;
const char *file = "./test_stacktrace_build_id.o"; int err, pmu_fd;
int err, pmu_fd, prog_fd;
struct perf_event_attr attr = { struct perf_event_attr attr = {
.freq = 1, .freq = 1,
.type = PERF_TYPE_HARDWARE, .type = PERF_TYPE_HARDWARE,
.config = PERF_COUNT_HW_CPU_CYCLES, .config = PERF_COUNT_HW_CPU_CYCLES,
}; };
__u32 key, previous_key, val, duration = 0; __u32 key, previous_key, val, duration = 0;
struct bpf_program *prog;
struct bpf_object *obj;
struct bpf_link *link;
char buf[256]; char buf[256];
int i, j; int i, j;
struct bpf_stack_build_id id_offs[PERF_MAX_STACK_DEPTH]; struct bpf_stack_build_id id_offs[PERF_MAX_STACK_DEPTH];
...@@ -38,13 +37,16 @@ void test_stacktrace_build_id_nmi(void) ...@@ -38,13 +37,16 @@ void test_stacktrace_build_id_nmi(void)
attr.sample_freq = read_perf_max_sample_freq(); attr.sample_freq = read_perf_max_sample_freq();
retry: retry:
err = bpf_prog_load(file, BPF_PROG_TYPE_PERF_EVENT, &obj, &prog_fd); skel = test_stacktrace_build_id__open(&stacktrace_build_id_embed);
if (CHECK(err, "prog_load", "err %d errno %d\n", err, errno)) if (CHECK(!skel, "skel_open", "skeleton open failed\n"))
return; return;
prog = bpf_object__find_program_by_title(obj, prog_name); /* override program type */
if (CHECK(!prog, "find_prog", "prog '%s' not found\n", prog_name)) bpf_program__set_perf_event(skel->progs.oncpu);
goto close_prog;
err = test_stacktrace_build_id__load(skel);
if (CHECK(err, "skel_load", "skeleton load failed: %d\n", err))
goto cleanup;
pmu_fd = syscall(__NR_perf_event_open, &attr, -1 /* pid */, pmu_fd = syscall(__NR_perf_event_open, &attr, -1 /* pid */,
0 /* cpu 0 */, -1 /* group id */, 0 /* cpu 0 */, -1 /* group id */,
...@@ -52,40 +54,25 @@ void test_stacktrace_build_id_nmi(void) ...@@ -52,40 +54,25 @@ void test_stacktrace_build_id_nmi(void)
if (CHECK(pmu_fd < 0, "perf_event_open", if (CHECK(pmu_fd < 0, "perf_event_open",
"err %d errno %d. Does the test host support PERF_COUNT_HW_CPU_CYCLES?\n", "err %d errno %d. Does the test host support PERF_COUNT_HW_CPU_CYCLES?\n",
pmu_fd, errno)) pmu_fd, errno))
goto close_prog; goto cleanup;
link = bpf_program__attach_perf_event(prog, pmu_fd); skel->links.oncpu = bpf_program__attach_perf_event(skel->progs.oncpu,
if (CHECK(IS_ERR(link), "attach_perf_event", pmu_fd);
"err %ld\n", PTR_ERR(link))) { if (CHECK(IS_ERR(skel->links.oncpu), "attach_perf_event",
"err %ld\n", PTR_ERR(skel->links.oncpu))) {
close(pmu_fd); close(pmu_fd);
goto close_prog; goto cleanup;
} }
/* find map fds */ /* find map fds */
control_map_fd = bpf_find_map(__func__, obj, "control_map"); control_map_fd = bpf_map__fd(skel->maps.control_map);
if (CHECK(control_map_fd < 0, "bpf_find_map control_map", stackid_hmap_fd = bpf_map__fd(skel->maps.stackid_hmap);
"err %d errno %d\n", err, errno)) stackmap_fd = bpf_map__fd(skel->maps.stackmap);
goto disable_pmu;
stackid_hmap_fd = bpf_find_map(__func__, obj, "stackid_hmap");
if (CHECK(stackid_hmap_fd < 0, "bpf_find_map stackid_hmap",
"err %d errno %d\n", err, errno))
goto disable_pmu;
stackmap_fd = bpf_find_map(__func__, obj, "stackmap");
if (CHECK(stackmap_fd < 0, "bpf_find_map stackmap", "err %d errno %d\n",
err, errno))
goto disable_pmu;
stack_amap_fd = bpf_find_map(__func__, obj, "stack_amap");
if (CHECK(stack_amap_fd < 0, "bpf_find_map stack_amap",
"err %d errno %d\n", err, errno))
goto disable_pmu;
if (CHECK_FAIL(system("dd if=/dev/urandom of=/dev/zero count=4 2> /dev/null"))) if (CHECK_FAIL(system("dd if=/dev/urandom of=/dev/zero count=4 2> /dev/null")))
goto disable_pmu; goto cleanup;
if (CHECK_FAIL(system("taskset 0x1 ./urandom_read 100000"))) if (CHECK_FAIL(system("taskset 0x1 ./urandom_read 100000")))
goto disable_pmu; goto cleanup;
/* disable stack trace collection */ /* disable stack trace collection */
key = 0; key = 0;
val = 1; val = 1;
...@@ -97,23 +84,23 @@ void test_stacktrace_build_id_nmi(void) ...@@ -97,23 +84,23 @@ void test_stacktrace_build_id_nmi(void)
err = compare_map_keys(stackid_hmap_fd, stackmap_fd); err = compare_map_keys(stackid_hmap_fd, stackmap_fd);
if (CHECK(err, "compare_map_keys stackid_hmap vs. stackmap", if (CHECK(err, "compare_map_keys stackid_hmap vs. stackmap",
"err %d errno %d\n", err, errno)) "err %d errno %d\n", err, errno))
goto disable_pmu; goto cleanup;
err = compare_map_keys(stackmap_fd, stackid_hmap_fd); err = compare_map_keys(stackmap_fd, stackid_hmap_fd);
if (CHECK(err, "compare_map_keys stackmap vs. stackid_hmap", if (CHECK(err, "compare_map_keys stackmap vs. stackid_hmap",
"err %d errno %d\n", err, errno)) "err %d errno %d\n", err, errno))
goto disable_pmu; goto cleanup;
err = extract_build_id(buf, 256); err = extract_build_id(buf, 256);
if (CHECK(err, "get build_id with readelf", if (CHECK(err, "get build_id with readelf",
"err %d errno %d\n", err, errno)) "err %d errno %d\n", err, errno))
goto disable_pmu; goto cleanup;
err = bpf_map_get_next_key(stackmap_fd, NULL, &key); err = bpf_map_get_next_key(stackmap_fd, NULL, &key);
if (CHECK(err, "get_next_key from stackmap", if (CHECK(err, "get_next_key from stackmap",
"err %d, errno %d\n", err, errno)) "err %d, errno %d\n", err, errno))
goto disable_pmu; goto cleanup;
do { do {
char build_id[64]; char build_id[64];
...@@ -121,7 +108,7 @@ void test_stacktrace_build_id_nmi(void) ...@@ -121,7 +108,7 @@ void test_stacktrace_build_id_nmi(void)
err = bpf_map_lookup_elem(stackmap_fd, &key, id_offs); err = bpf_map_lookup_elem(stackmap_fd, &key, id_offs);
if (CHECK(err, "lookup_elem from stackmap", if (CHECK(err, "lookup_elem from stackmap",
"err %d, errno %d\n", err, errno)) "err %d, errno %d\n", err, errno))
goto disable_pmu; goto cleanup;
for (i = 0; i < PERF_MAX_STACK_DEPTH; ++i) for (i = 0; i < PERF_MAX_STACK_DEPTH; ++i)
if (id_offs[i].status == BPF_STACK_BUILD_ID_VALID && if (id_offs[i].status == BPF_STACK_BUILD_ID_VALID &&
id_offs[i].offset != 0) { id_offs[i].offset != 0) {
...@@ -139,8 +126,7 @@ void test_stacktrace_build_id_nmi(void) ...@@ -139,8 +126,7 @@ void test_stacktrace_build_id_nmi(void)
* try it one more time. * try it one more time.
*/ */
if (build_id_matches < 1 && retry--) { if (build_id_matches < 1 && retry--) {
bpf_link__destroy(link); test_stacktrace_build_id__destroy(skel);
bpf_object__close(obj);
printf("%s:WARN:Didn't find expected build ID from the map, retrying\n", printf("%s:WARN:Didn't find expected build ID from the map, retrying\n",
__func__); __func__);
goto retry; goto retry;
...@@ -148,7 +134,7 @@ void test_stacktrace_build_id_nmi(void) ...@@ -148,7 +134,7 @@ void test_stacktrace_build_id_nmi(void)
if (CHECK(build_id_matches < 1, "build id match", if (CHECK(build_id_matches < 1, "build id match",
"Didn't find expected build ID from the map\n")) "Didn't find expected build ID from the map\n"))
goto disable_pmu; goto cleanup;
/* /*
* We intentionally skip compare_stack_ips(). This is because we * We intentionally skip compare_stack_ips(). This is because we
...@@ -157,8 +143,6 @@ void test_stacktrace_build_id_nmi(void) ...@@ -157,8 +143,6 @@ void test_stacktrace_build_id_nmi(void)
* BPF_STACK_BUILD_ID_IP; * BPF_STACK_BUILD_ID_IP;
*/ */
disable_pmu: cleanup:
bpf_link__destroy(link); test_stacktrace_build_id__destroy(skel);
close_prog:
bpf_object__close(obj);
} }
...@@ -5,46 +5,36 @@ ...@@ -5,46 +5,36 @@
#include <linux/bpf.h> #include <linux/bpf.h>
#include "bpf_helpers.h" #include "bpf_helpers.h"
struct { int kprobe_res = 0;
__uint(type, BPF_MAP_TYPE_ARRAY); int kretprobe_res = 0;
__uint(max_entries, 4); int uprobe_res = 0;
__type(key, int); int uretprobe_res = 0;
__type(value, int);
} results_map SEC(".maps");
SEC("kprobe/sys_nanosleep") SEC("kprobe/sys_nanosleep")
int handle_sys_nanosleep_entry(struct pt_regs *ctx) int handle_kprobe(struct pt_regs *ctx)
{ {
const int key = 0, value = 1; kprobe_res = 1;
bpf_map_update_elem(&results_map, &key, &value, 0);
return 0; return 0;
} }
SEC("kretprobe/sys_nanosleep") SEC("kretprobe/sys_nanosleep")
int handle_sys_getpid_return(struct pt_regs *ctx) int handle_kretprobe(struct pt_regs *ctx)
{ {
const int key = 1, value = 2; kretprobe_res = 2;
bpf_map_update_elem(&results_map, &key, &value, 0);
return 0; return 0;
} }
SEC("uprobe/trigger_func") SEC("uprobe/trigger_func")
int handle_uprobe_entry(struct pt_regs *ctx) int handle_uprobe(struct pt_regs *ctx)
{ {
const int key = 2, value = 3; uprobe_res = 3;
bpf_map_update_elem(&results_map, &key, &value, 0);
return 0; return 0;
} }
SEC("uretprobe/trigger_func") SEC("uretprobe/trigger_func")
int handle_uprobe_return(struct pt_regs *ctx) int handle_uretprobe(struct pt_regs *ctx)
{ {
const int key = 3, value = 4; uretprobe_res = 4;
bpf_map_update_elem(&results_map, &key, &value, 0);
return 0; return 0;
} }
......
// SPDX-License-Identifier: GPL-2.0
/* Copyright (c) 2019 Facebook */
#include <linux/bpf.h>
#include "bpf_helpers.h"
struct s {
int a;
long long b;
} __attribute__((packed));
int in1 = 0;
long long in2 = 0;
char in3 = '\0';
long long in4 __attribute__((aligned(64))) = 0;
struct s in5 = {};
long long out2 = 0;
char out3 = 0;
long long out4 = 0;
int out1 = 0;
SEC("raw_tp/sys_enter")
int handler(const void *ctx)
{
static volatile struct s out5;
out1 = in1;
out2 = in2;
out3 = in3;
out4 = in4;
out5 = in5;
return 0;
}
char _license[] SEC("license") = "GPL";
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment