aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/tools/testing/selftests/bpf/prog_tests/get_func_ip_test.c
blob: c40242dfa8fb5fa049c31b4dcd572940aa2f4cbb (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
// SPDX-License-Identifier: GPL-2.0
#include <test_progs.h>
#include "get_func_ip_test.skel.h"
#include "get_func_ip_uprobe_test.skel.h"

static noinline void uprobe_trigger(void)
{
}

static void test_function_entry(void)
{
	struct get_func_ip_test *skel = NULL;
	int err, prog_fd;
	LIBBPF_OPTS(bpf_test_run_opts, topts);

	skel = get_func_ip_test__open();
	if (!ASSERT_OK_PTR(skel, "get_func_ip_test__open"))
		return;

	err = get_func_ip_test__load(skel);
	if (!ASSERT_OK(err, "get_func_ip_test__load"))
		goto cleanup;

	err = get_func_ip_test__attach(skel);
	if (!ASSERT_OK(err, "get_func_ip_test__attach"))
		goto cleanup;

	skel->bss->uprobe_trigger = (unsigned long) uprobe_trigger;

	prog_fd = bpf_program__fd(skel->progs.test1);
	err = bpf_prog_test_run_opts(prog_fd, &topts);
	ASSERT_OK(err, "test_run");
	ASSERT_EQ(topts.retval, 0, "test_run");

	prog_fd = bpf_program__fd(skel->progs.test5);
	err = bpf_prog_test_run_opts(prog_fd, &topts);

	ASSERT_OK(err, "test_run");

	uprobe_trigger();

	ASSERT_EQ(skel->bss->test1_result, 1, "test1_result");
	ASSERT_EQ(skel->bss->test2_result, 1, "test2_result");
	ASSERT_EQ(skel->bss->test3_result, 1, "test3_result");
	ASSERT_EQ(skel->bss->test4_result, 1, "test4_result");
	ASSERT_EQ(skel->bss->test5_result, 1, "test5_result");
	ASSERT_EQ(skel->bss->test7_result, 1, "test7_result");
	ASSERT_EQ(skel->bss->test8_result, 1, "test8_result");

cleanup:
	get_func_ip_test__destroy(skel);
}

#ifdef __x86_64__
extern void uprobe_trigger_body(void);
asm(
".globl uprobe_trigger_body\n"
".type uprobe_trigger_body, @function\n"
"uprobe_trigger_body:\n"
"	nop\n"
"	ret\n"
);

static void test_function_body_kprobe(void)
{
	struct get_func_ip_test *skel = NULL;
	LIBBPF_OPTS(bpf_test_run_opts, topts);
	LIBBPF_OPTS(bpf_kprobe_opts, kopts);
	struct bpf_link *link6 = NULL;
	int err, prog_fd;

	skel = get_func_ip_test__open();
	if (!ASSERT_OK_PTR(skel, "get_func_ip_test__open"))
		return;

	/* test6 is x86_64 specific and is disabled by default,
	 * enable it for body test.
	 */
	bpf_program__set_autoload(skel->progs.test6, true);

	err = get_func_ip_test__load(skel);
	if (!ASSERT_OK(err, "get_func_ip_test__load"))
		goto cleanup;

	kopts.offset = skel->kconfig->CONFIG_X86_KERNEL_IBT ? 9 : 5;

	link6 = bpf_program__attach_kprobe_opts(skel->progs.test6, "bpf_fentry_test6", &kopts);
	if (!ASSERT_OK_PTR(link6, "link6"))
		goto cleanup;

	prog_fd = bpf_program__fd(skel->progs.test1);
	err = bpf_prog_test_run_opts(prog_fd, &topts);
	ASSERT_OK(err, "test_run");
	ASSERT_EQ(topts.retval, 0, "test_run");

	ASSERT_EQ(skel->bss->test6_result, 1, "test6_result");

cleanup:
	bpf_link__destroy(link6);
	get_func_ip_test__destroy(skel);
}

static void test_function_body_uprobe(void)
{
	struct get_func_ip_uprobe_test *skel = NULL;
	int err;

	skel = get_func_ip_uprobe_test__open_and_load();
	if (!ASSERT_OK_PTR(skel, "get_func_ip_uprobe_test__open_and_load"))
		return;

	err = get_func_ip_uprobe_test__attach(skel);
	if (!ASSERT_OK(err, "get_func_ip_test__attach"))
		goto cleanup;

	skel->bss->uprobe_trigger_body = (unsigned long) uprobe_trigger_body;

	uprobe_trigger_body();

	ASSERT_EQ(skel->bss->test1_result, 1, "test1_result");

cleanup:
	get_func_ip_uprobe_test__destroy(skel);
}

static void test_function_body(void)
{
	test_function_body_kprobe();
	test_function_body_uprobe();
}
#else
#define test_function_body()
#endif

void test_get_func_ip_test(void)
{
	test_function_entry();
	test_function_body();
}