Commit 01510fd4 authored by Andrii Nakryiko's avatar Andrii Nakryiko

Merge branch 'selftests-bpf-add-more-uprobe-multi-tests'

Jiri Olsa says:

====================
selftests/bpf: Add more uprobe multi tests

hi,
adding more uprobe multi tests for failed attachments
inside the uprobe register code.

v3 changes:
  - renamed several variables/functions, null check [Andrii]
  - fixed CI issue

thanks,
jirka
---
====================

Link: https://lore.kernel.org/r/20240722202758.3889061-1-jolsa@kernel.orgSigned-off-by: default avatarAndrii Nakryiko <andrii@kernel.org>
parents d17f9b37 98adc743
......@@ -6,6 +6,7 @@
#include "uprobe_multi.skel.h"
#include "uprobe_multi_bench.skel.h"
#include "uprobe_multi_usdt.skel.h"
#include "uprobe_multi_consumers.skel.h"
#include "bpf/libbpf_internal.h"
#include "testing_helpers.h"
#include "../sdt.h"
......@@ -516,6 +517,122 @@ static void test_attach_api_fails(void)
uprobe_multi__destroy(skel);
}
#ifdef __x86_64__
noinline void uprobe_multi_error_func(void)
{
/*
* If --fcf-protection=branch is enabled the gcc generates endbr as
* first instruction, so marking the exact address of int3 with the
* symbol to be used in the attach_uprobe_fail_trap test below.
*/
asm volatile (
".globl uprobe_multi_error_func_int3; \n"
"uprobe_multi_error_func_int3: \n"
"int3 \n"
);
}
/*
* Attaching uprobe on uprobe_multi_error_func results in error
* because it already starts with int3 instruction.
*/
static void attach_uprobe_fail_trap(struct uprobe_multi *skel)
{
LIBBPF_OPTS(bpf_uprobe_multi_opts, opts);
const char *syms[4] = {
"uprobe_multi_func_1",
"uprobe_multi_func_2",
"uprobe_multi_func_3",
"uprobe_multi_error_func_int3",
};
opts.syms = syms;
opts.cnt = ARRAY_SIZE(syms);
skel->links.uprobe = bpf_program__attach_uprobe_multi(skel->progs.uprobe, -1,
"/proc/self/exe", NULL, &opts);
if (!ASSERT_ERR_PTR(skel->links.uprobe, "bpf_program__attach_uprobe_multi")) {
bpf_link__destroy(skel->links.uprobe);
skel->links.uprobe = NULL;
}
}
#else
static void attach_uprobe_fail_trap(struct uprobe_multi *skel) { }
#endif
short sema_1 __used, sema_2 __used;
static void attach_uprobe_fail_refctr(struct uprobe_multi *skel)
{
unsigned long *tmp_offsets = NULL, *tmp_ref_ctr_offsets = NULL;
unsigned long offsets[3], ref_ctr_offsets[3];
LIBBPF_OPTS(bpf_link_create_opts, opts);
const char *path = "/proc/self/exe";
const char *syms[3] = {
"uprobe_multi_func_1",
"uprobe_multi_func_2",
};
const char *sema[3] = {
"sema_1",
"sema_2",
};
int prog_fd, link_fd, err;
prog_fd = bpf_program__fd(skel->progs.uprobe_extra);
err = elf_resolve_syms_offsets("/proc/self/exe", 2, (const char **) &syms,
&tmp_offsets, STT_FUNC);
if (!ASSERT_OK(err, "elf_resolve_syms_offsets_func"))
return;
err = elf_resolve_syms_offsets("/proc/self/exe", 2, (const char **) &sema,
&tmp_ref_ctr_offsets, STT_OBJECT);
if (!ASSERT_OK(err, "elf_resolve_syms_offsets_sema"))
goto cleanup;
/*
* We attach to 3 uprobes on 2 functions, so 2 uprobes share single function,
* but with different ref_ctr_offset which is not allowed and results in fail.
*/
offsets[0] = tmp_offsets[0]; /* uprobe_multi_func_1 */
offsets[1] = tmp_offsets[1]; /* uprobe_multi_func_2 */
offsets[2] = tmp_offsets[1]; /* uprobe_multi_func_2 */
ref_ctr_offsets[0] = tmp_ref_ctr_offsets[0]; /* sema_1 */
ref_ctr_offsets[1] = tmp_ref_ctr_offsets[1]; /* sema_2 */
ref_ctr_offsets[2] = tmp_ref_ctr_offsets[0]; /* sema_1, error */
opts.uprobe_multi.path = path;
opts.uprobe_multi.offsets = (const unsigned long *) &offsets;
opts.uprobe_multi.ref_ctr_offsets = (const unsigned long *) &ref_ctr_offsets;
opts.uprobe_multi.cnt = 3;
link_fd = bpf_link_create(prog_fd, 0, BPF_TRACE_UPROBE_MULTI, &opts);
if (!ASSERT_ERR(link_fd, "link_fd"))
close(link_fd);
cleanup:
free(tmp_ref_ctr_offsets);
free(tmp_offsets);
}
static void test_attach_uprobe_fails(void)
{
struct uprobe_multi *skel = NULL;
skel = uprobe_multi__open_and_load();
if (!ASSERT_OK_PTR(skel, "uprobe_multi__open_and_load"))
return;
/* attach fails due to adding uprobe on trap instruction, x86_64 only */
attach_uprobe_fail_trap(skel);
/* attach fail due to wrong ref_ctr_offs on one of the uprobes */
attach_uprobe_fail_refctr(skel);
uprobe_multi__destroy(skel);
}
static void __test_link_api(struct child *child)
{
int prog_fd, link1_fd = -1, link2_fd = -1, link3_fd = -1, link4_fd = -1;
......@@ -615,6 +732,216 @@ static void test_link_api(void)
__test_link_api(child);
}
static struct bpf_program *
get_program(struct uprobe_multi_consumers *skel, int prog)
{
switch (prog) {
case 0:
return skel->progs.uprobe_0;
case 1:
return skel->progs.uprobe_1;
case 2:
return skel->progs.uprobe_2;
case 3:
return skel->progs.uprobe_3;
default:
ASSERT_FAIL("get_program");
return NULL;
}
}
static struct bpf_link **
get_link(struct uprobe_multi_consumers *skel, int link)
{
switch (link) {
case 0:
return &skel->links.uprobe_0;
case 1:
return &skel->links.uprobe_1;
case 2:
return &skel->links.uprobe_2;
case 3:
return &skel->links.uprobe_3;
default:
ASSERT_FAIL("get_link");
return NULL;
}
}
static int uprobe_attach(struct uprobe_multi_consumers *skel, int idx)
{
struct bpf_program *prog = get_program(skel, idx);
struct bpf_link **link = get_link(skel, idx);
LIBBPF_OPTS(bpf_uprobe_multi_opts, opts);
if (!prog || !link)
return -1;
/*
* bit/prog: 0,1 uprobe entry
* bit/prog: 2,3 uprobe return
*/
opts.retprobe = idx == 2 || idx == 3;
*link = bpf_program__attach_uprobe_multi(prog, 0, "/proc/self/exe",
"uprobe_consumer_test",
&opts);
if (!ASSERT_OK_PTR(*link, "bpf_program__attach_uprobe_multi"))
return -1;
return 0;
}
static void uprobe_detach(struct uprobe_multi_consumers *skel, int idx)
{
struct bpf_link **link = get_link(skel, idx);
bpf_link__destroy(*link);
*link = NULL;
}
static bool test_bit(int bit, unsigned long val)
{
return val & (1 << bit);
}
noinline int
uprobe_consumer_test(struct uprobe_multi_consumers *skel,
unsigned long before, unsigned long after)
{
int idx;
/* detach uprobe for each unset programs in 'before' state ... */
for (idx = 0; idx < 4; idx++) {
if (test_bit(idx, before) && !test_bit(idx, after))
uprobe_detach(skel, idx);
}
/* ... and attach all new programs in 'after' state */
for (idx = 0; idx < 4; idx++) {
if (!test_bit(idx, before) && test_bit(idx, after)) {
if (!ASSERT_OK(uprobe_attach(skel, idx), "uprobe_attach_after"))
return -1;
}
}
return 0;
}
static void consumer_test(struct uprobe_multi_consumers *skel,
unsigned long before, unsigned long after)
{
int err, idx;
printf("consumer_test before %lu after %lu\n", before, after);
/* 'before' is each, we attach uprobe for every set idx */
for (idx = 0; idx < 4; idx++) {
if (test_bit(idx, before)) {
if (!ASSERT_OK(uprobe_attach(skel, idx), "uprobe_attach_before"))
goto cleanup;
}
}
err = uprobe_consumer_test(skel, before, after);
if (!ASSERT_EQ(err, 0, "uprobe_consumer_test"))
goto cleanup;
for (idx = 0; idx < 4; idx++) {
const char *fmt = "BUG";
__u64 val = 0;
if (idx < 2) {
/*
* uprobe entry
* +1 if define in 'before'
*/
if (test_bit(idx, before))
val++;
fmt = "prog 0/1: uprobe";
} else {
/*
* uprobe return is tricky ;-)
*
* to trigger uretprobe consumer, the uretprobe needs to be installed,
* which means one of the 'return' uprobes was alive when probe was hit:
*
* idxs: 2/3 uprobe return in 'installed' mask
*
* in addition if 'after' state removes everything that was installed in
* 'before' state, then uprobe kernel object goes away and return uprobe
* is not installed and we won't hit it even if it's in 'after' state.
*/
unsigned long had_uretprobes = before & 0b1100; /* is uretprobe installed */
unsigned long probe_preserved = before & after; /* did uprobe go away */
if (had_uretprobes && probe_preserved && test_bit(idx, after))
val++;
fmt = "idx 2/3: uretprobe";
}
ASSERT_EQ(skel->bss->uprobe_result[idx], val, fmt);
skel->bss->uprobe_result[idx] = 0;
}
cleanup:
for (idx = 0; idx < 4; idx++)
uprobe_detach(skel, idx);
}
static void test_consumers(void)
{
struct uprobe_multi_consumers *skel;
int before, after;
skel = uprobe_multi_consumers__open_and_load();
if (!ASSERT_OK_PTR(skel, "uprobe_multi_consumers__open_and_load"))
return;
/*
* The idea of this test is to try all possible combinations of
* uprobes consumers attached on single function.
*
* - 2 uprobe entry consumer
* - 2 uprobe exit consumers
*
* The test uses 4 uprobes attached on single function, but that
* translates into single uprobe with 4 consumers in kernel.
*
* The before/after values present the state of attached consumers
* before and after the probed function:
*
* bit/prog 0,1 : uprobe entry
* bit/prog 2,3 : uprobe return
*
* For example for:
*
* before = 0b0101
* after = 0b0110
*
* it means that before we call 'uprobe_consumer_test' we attach
* uprobes defined in 'before' value:
*
* - bit/prog 0: uprobe entry
* - bit/prog 2: uprobe return
*
* uprobe_consumer_test is called and inside it we attach and detach
* uprobes based on 'after' value:
*
* - bit/prog 0: stays untouched
* - bit/prog 2: uprobe return is detached
*
* uprobe_consumer_test returns and we check counters values increased
* by bpf programs on each uprobe to match the expected count based on
* before/after bits.
*/
for (before = 0; before < 16; before++) {
for (after = 0; after < 16; after++)
consumer_test(skel, before, after);
}
uprobe_multi_consumers__destroy(skel);
}
static void test_bench_attach_uprobe(void)
{
long attach_start_ns = 0, attach_end_ns = 0;
......@@ -703,4 +1030,8 @@ void test_uprobe_multi_test(void)
test_bench_attach_usdt();
if (test__start_subtest("attach_api_fails"))
test_attach_api_fails();
if (test__start_subtest("attach_uprobe_fails"))
test_attach_uprobe_fails();
if (test__start_subtest("consumers"))
test_consumers();
}
// SPDX-License-Identifier: GPL-2.0
#include <linux/bpf.h>
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_tracing.h>
#include <stdbool.h>
#include "bpf_kfuncs.h"
#include "bpf_misc.h"
char _license[] SEC("license") = "GPL";
__u64 uprobe_result[4];
SEC("uprobe.multi")
int uprobe_0(struct pt_regs *ctx)
{
uprobe_result[0]++;
return 0;
}
SEC("uprobe.multi")
int uprobe_1(struct pt_regs *ctx)
{
uprobe_result[1]++;
return 0;
}
SEC("uprobe.multi")
int uprobe_2(struct pt_regs *ctx)
{
uprobe_result[2]++;
return 0;
}
SEC("uprobe.multi")
int uprobe_3(struct pt_regs *ctx)
{
uprobe_result[3]++;
return 0;
}
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment