Validate libbpf's USDT-over-multi-uprobe logic by adding USDTs to existing multi-uprobe tests. This checks correct libbpf fallback to singular uprobes (when run on older kernels with buggy PID filtering). We reuse already established child process and child thread testing infrastructure, so additions are minimal. These test fail on either older kernels or older version of libbpf that doesn't detect PID filtering problems. Acked-by: Jiri Olsa <jolsa@kernel.org> Signed-off-by: Andrii Nakryiko <andrii@kernel.org> Link: https://lore.kernel.org/r/20240521163401.3005045-6-andrii@kernel.org Signed-off-by: Alexei Starovoitov <ast@kernel.org>
143 lines
3.3 KiB
C
143 lines
3.3 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
#include "vmlinux.h"
|
|
#include <bpf/bpf_helpers.h>
|
|
#include <bpf/bpf_tracing.h>
|
|
#include <bpf/usdt.bpf.h>
|
|
|
|
char _license[] SEC("license") = "GPL";
|
|
|
|
__u64 uprobe_multi_func_1_addr = 0;
|
|
__u64 uprobe_multi_func_2_addr = 0;
|
|
__u64 uprobe_multi_func_3_addr = 0;
|
|
|
|
__u64 uprobe_multi_func_1_result = 0;
|
|
__u64 uprobe_multi_func_2_result = 0;
|
|
__u64 uprobe_multi_func_3_result = 0;
|
|
|
|
__u64 uretprobe_multi_func_1_result = 0;
|
|
__u64 uretprobe_multi_func_2_result = 0;
|
|
__u64 uretprobe_multi_func_3_result = 0;
|
|
|
|
__u64 uprobe_multi_sleep_result = 0;
|
|
|
|
int pid = 0;
|
|
int child_pid = 0;
|
|
int child_tid = 0;
|
|
int child_pid_usdt = 0;
|
|
int child_tid_usdt = 0;
|
|
|
|
int expect_pid = 0;
|
|
bool bad_pid_seen = false;
|
|
bool bad_pid_seen_usdt = false;
|
|
|
|
bool test_cookie = false;
|
|
void *user_ptr = 0;
|
|
|
|
static __always_inline bool verify_sleepable_user_copy(void)
|
|
{
|
|
char data[9];
|
|
|
|
bpf_copy_from_user(data, sizeof(data), user_ptr);
|
|
return bpf_strncmp(data, sizeof(data), "test_data") == 0;
|
|
}
|
|
|
|
static void uprobe_multi_check(void *ctx, bool is_return, bool is_sleep)
|
|
{
|
|
__u64 cur_pid_tgid = bpf_get_current_pid_tgid();
|
|
__u32 cur_pid;
|
|
|
|
cur_pid = cur_pid_tgid >> 32;
|
|
if (pid && cur_pid != pid)
|
|
return;
|
|
|
|
if (expect_pid && cur_pid != expect_pid)
|
|
bad_pid_seen = true;
|
|
|
|
child_pid = cur_pid_tgid >> 32;
|
|
child_tid = (__u32)cur_pid_tgid;
|
|
|
|
__u64 cookie = test_cookie ? bpf_get_attach_cookie(ctx) : 0;
|
|
__u64 addr = bpf_get_func_ip(ctx);
|
|
|
|
#define SET(__var, __addr, __cookie) ({ \
|
|
if (addr == __addr && \
|
|
(!test_cookie || (cookie == __cookie))) \
|
|
__var += 1; \
|
|
})
|
|
|
|
if (is_return) {
|
|
SET(uretprobe_multi_func_1_result, uprobe_multi_func_1_addr, 2);
|
|
SET(uretprobe_multi_func_2_result, uprobe_multi_func_2_addr, 3);
|
|
SET(uretprobe_multi_func_3_result, uprobe_multi_func_3_addr, 1);
|
|
} else {
|
|
SET(uprobe_multi_func_1_result, uprobe_multi_func_1_addr, 3);
|
|
SET(uprobe_multi_func_2_result, uprobe_multi_func_2_addr, 1);
|
|
SET(uprobe_multi_func_3_result, uprobe_multi_func_3_addr, 2);
|
|
}
|
|
|
|
#undef SET
|
|
|
|
if (is_sleep && verify_sleepable_user_copy())
|
|
uprobe_multi_sleep_result += 1;
|
|
}
|
|
|
|
SEC("uprobe.multi//proc/self/exe:uprobe_multi_func_*")
|
|
int uprobe(struct pt_regs *ctx)
|
|
{
|
|
uprobe_multi_check(ctx, false, false);
|
|
return 0;
|
|
}
|
|
|
|
SEC("uretprobe.multi//proc/self/exe:uprobe_multi_func_*")
|
|
int uretprobe(struct pt_regs *ctx)
|
|
{
|
|
uprobe_multi_check(ctx, true, false);
|
|
return 0;
|
|
}
|
|
|
|
SEC("uprobe.multi.s//proc/self/exe:uprobe_multi_func_*")
|
|
int uprobe_sleep(struct pt_regs *ctx)
|
|
{
|
|
uprobe_multi_check(ctx, false, true);
|
|
return 0;
|
|
}
|
|
|
|
SEC("uretprobe.multi.s//proc/self/exe:uprobe_multi_func_*")
|
|
int uretprobe_sleep(struct pt_regs *ctx)
|
|
{
|
|
uprobe_multi_check(ctx, true, true);
|
|
return 0;
|
|
}
|
|
|
|
SEC("uprobe.multi//proc/self/exe:uprobe_multi_func_*")
|
|
int uprobe_extra(struct pt_regs *ctx)
|
|
{
|
|
/* we need this one just to mix PID-filtered and global uprobes */
|
|
return 0;
|
|
}
|
|
|
|
SEC("usdt")
|
|
int usdt_pid(struct pt_regs *ctx)
|
|
{
|
|
__u64 cur_pid_tgid = bpf_get_current_pid_tgid();
|
|
__u32 cur_pid;
|
|
|
|
cur_pid = cur_pid_tgid >> 32;
|
|
if (pid && cur_pid != pid)
|
|
return 0;
|
|
|
|
if (expect_pid && cur_pid != expect_pid)
|
|
bad_pid_seen_usdt = true;
|
|
|
|
child_pid_usdt = cur_pid_tgid >> 32;
|
|
child_tid_usdt = (__u32)cur_pid_tgid;
|
|
|
|
return 0;
|
|
}
|
|
|
|
SEC("usdt")
|
|
int usdt_extra(struct pt_regs *ctx)
|
|
{
|
|
/* we need this one just to mix PID-filtered and global USDT probes */
|
|
return 0;
|
|
}
|