|
7 | 7 | #include <unistd.h>
|
8 | 8 | #include <test_progs.h>
|
9 | 9 | #include "test_bpf_cookie.skel.h"
|
| 10 | +#include "kprobe_multi_bpf_cookie.skel.h" |
10 | 11 |
|
11 | 12 | /* uprobe attach point */
|
12 | 13 | static void trigger_func(void)
|
@@ -63,6 +64,75 @@ static void kprobe_subtest(struct test_bpf_cookie *skel)
|
63 | 64 | bpf_link__destroy(retlink2);
|
64 | 65 | }
|
65 | 66 |
|
| 67 | +static void kprobe_multi_subtest(void) |
| 68 | +{ |
| 69 | + DECLARE_LIBBPF_OPTS(bpf_link_create_opts, opts); |
| 70 | + int err, prog_fd, link1_fd = -1, link2_fd = -1; |
| 71 | + LIBBPF_OPTS(bpf_test_run_opts, topts); |
| 72 | + struct kprobe_multi_bpf_cookie *skel = NULL; |
| 73 | + __u64 addrs[8], cookies[8]; |
| 74 | + |
| 75 | + skel = kprobe_multi_bpf_cookie__open_and_load(); |
| 76 | + if (!ASSERT_OK_PTR(skel, "fentry_raw_skel_load")) |
| 77 | + goto cleanup; |
| 78 | + |
| 79 | + kallsyms_find("bpf_fentry_test1", &addrs[0]); |
| 80 | + kallsyms_find("bpf_fentry_test2", &addrs[1]); |
| 81 | + kallsyms_find("bpf_fentry_test3", &addrs[2]); |
| 82 | + kallsyms_find("bpf_fentry_test4", &addrs[3]); |
| 83 | + kallsyms_find("bpf_fentry_test5", &addrs[4]); |
| 84 | + kallsyms_find("bpf_fentry_test6", &addrs[5]); |
| 85 | + kallsyms_find("bpf_fentry_test7", &addrs[6]); |
| 86 | + kallsyms_find("bpf_fentry_test8", &addrs[7]); |
| 87 | + |
| 88 | + cookies[0] = 1; |
| 89 | + cookies[1] = 2; |
| 90 | + cookies[2] = 3; |
| 91 | + cookies[3] = 4; |
| 92 | + cookies[4] = 5; |
| 93 | + cookies[5] = 6; |
| 94 | + cookies[6] = 7; |
| 95 | + cookies[7] = 8; |
| 96 | + |
| 97 | + opts.kprobe_multi.addrs = ptr_to_u64(&addrs); |
| 98 | + opts.kprobe_multi.cnt = 8; |
| 99 | + opts.kprobe_multi.cookies = ptr_to_u64(&cookies); |
| 100 | + prog_fd = bpf_program__fd(skel->progs.test2); |
| 101 | + |
| 102 | + link1_fd = bpf_link_create(prog_fd, 0, BPF_TRACE_KPROBE_MULTI, &opts); |
| 103 | + if (!ASSERT_GE(link1_fd, 0, "link1_fd")) |
| 104 | + return; |
| 105 | + |
| 106 | + cookies[0] = 8; |
| 107 | + cookies[1] = 7; |
| 108 | + cookies[2] = 6; |
| 109 | + cookies[3] = 5; |
| 110 | + cookies[4] = 4; |
| 111 | + cookies[5] = 3; |
| 112 | + cookies[6] = 2; |
| 113 | + cookies[7] = 1; |
| 114 | + |
| 115 | + opts.flags = BPF_F_KPROBE_MULTI_RETURN; |
| 116 | + prog_fd = bpf_program__fd(skel->progs.test3); |
| 117 | + |
| 118 | + link2_fd = bpf_link_create(prog_fd, 0, BPF_TRACE_KPROBE_MULTI, &opts); |
| 119 | + if (!ASSERT_GE(link2_fd, 0, "link2_fd")) |
| 120 | + goto cleanup; |
| 121 | + |
| 122 | + prog_fd = bpf_program__fd(skel->progs.test1); |
| 123 | + err = bpf_prog_test_run_opts(prog_fd, &topts); |
| 124 | + ASSERT_OK(err, "test_run"); |
| 125 | + ASSERT_EQ(topts.retval, 0, "test_run"); |
| 126 | + |
| 127 | + ASSERT_EQ(skel->bss->test2_result, 8, "test2_result"); |
| 128 | + ASSERT_EQ(skel->bss->test3_result, 8, "test3_result"); |
| 129 | + |
| 130 | +cleanup: |
| 131 | + close(link1_fd); |
| 132 | + close(link2_fd); |
| 133 | + kprobe_multi_bpf_cookie__destroy(skel); |
| 134 | +} |
| 135 | + |
66 | 136 | static void uprobe_subtest(struct test_bpf_cookie *skel)
|
67 | 137 | {
|
68 | 138 | DECLARE_LIBBPF_OPTS(bpf_uprobe_opts, opts);
|
@@ -249,6 +319,8 @@ void test_bpf_cookie(void)
|
249 | 319 |
|
250 | 320 | if (test__start_subtest("kprobe"))
|
251 | 321 | kprobe_subtest(skel);
|
| 322 | + if (test__start_subtest("multi_kprobe")) |
| 323 | + kprobe_multi_subtest(); |
252 | 324 | if (test__start_subtest("uprobe"))
|
253 | 325 | uprobe_subtest(skel);
|
254 | 326 | if (test__start_subtest("tracepoint"))
|
|
0 commit comments