Loading...
1// SPDX-License-Identifier: GPL-2.0
2/* Copyright (c) 2019 Facebook */
3#include <test_progs.h>
4#include "bpf_util.h"
5
6void serial_test_fexit_stress(void)
7{
8 int bpf_max_tramp_links, err, i;
9 int *fd, *fexit_fd, *link_fd;
10
11 bpf_max_tramp_links = get_bpf_max_tramp_links();
12 if (!ASSERT_GE(bpf_max_tramp_links, 1, "bpf_max_tramp_links"))
13 return;
14 fd = calloc(bpf_max_tramp_links * 2, sizeof(*fd));
15 if (!ASSERT_OK_PTR(fd, "fd"))
16 return;
17 fexit_fd = fd;
18 link_fd = fd + bpf_max_tramp_links;
19
20 const struct bpf_insn trace_program[] = {
21 BPF_MOV64_IMM(BPF_REG_0, 0),
22 BPF_EXIT_INSN(),
23 };
24
25 LIBBPF_OPTS(bpf_prog_load_opts, trace_opts,
26 .expected_attach_type = BPF_TRACE_FEXIT,
27 );
28
29 LIBBPF_OPTS(bpf_test_run_opts, topts);
30
31 err = libbpf_find_vmlinux_btf_id("bpf_fentry_test1",
32 trace_opts.expected_attach_type);
33 if (!ASSERT_GT(err, 0, "find_vmlinux_btf_id"))
34 goto out;
35 trace_opts.attach_btf_id = err;
36
37 for (i = 0; i < bpf_max_tramp_links; i++) {
38 fexit_fd[i] = bpf_prog_load(BPF_PROG_TYPE_TRACING, NULL, "GPL",
39 trace_program,
40 ARRAY_SIZE(trace_program),
41 &trace_opts);
42 if (!ASSERT_GE(fexit_fd[i], 0, "fexit load"))
43 goto out;
44 link_fd[i] = bpf_link_create(fexit_fd[i], 0, BPF_TRACE_FEXIT, NULL);
45 if (!ASSERT_GE(link_fd[i], 0, "fexit attach"))
46 goto out;
47 }
48
49 err = bpf_prog_test_run_opts(fexit_fd[0], &topts);
50 ASSERT_OK(err, "bpf_prog_test_run_opts");
51
52out:
53 for (i = 0; i < bpf_max_tramp_links; i++) {
54 if (link_fd[i] > 0)
55 close(link_fd[i]);
56 if (fexit_fd[i] > 0)
57 close(fexit_fd[i]);
58 }
59 free(fd);
60}
1// SPDX-License-Identifier: GPL-2.0
2/* Copyright (c) 2019 Facebook */
3#include <test_progs.h>
4
5/* x86-64 fits 55 JITed and 43 interpreted progs into half page */
6#define CNT 40
7
8void test_fexit_stress(void)
9{
10 char test_skb[128] = {};
11 int fexit_fd[CNT] = {};
12 int link_fd[CNT] = {};
13 __u32 duration = 0;
14 char error[4096];
15 __u32 prog_ret;
16 int err, i, filter_fd;
17
18 const struct bpf_insn trace_program[] = {
19 BPF_MOV64_IMM(BPF_REG_0, 0),
20 BPF_EXIT_INSN(),
21 };
22
23 struct bpf_load_program_attr load_attr = {
24 .prog_type = BPF_PROG_TYPE_TRACING,
25 .license = "GPL",
26 .insns = trace_program,
27 .insns_cnt = sizeof(trace_program) / sizeof(struct bpf_insn),
28 .expected_attach_type = BPF_TRACE_FEXIT,
29 };
30
31 const struct bpf_insn skb_program[] = {
32 BPF_MOV64_IMM(BPF_REG_0, 0),
33 BPF_EXIT_INSN(),
34 };
35
36 struct bpf_load_program_attr skb_load_attr = {
37 .prog_type = BPF_PROG_TYPE_SOCKET_FILTER,
38 .license = "GPL",
39 .insns = skb_program,
40 .insns_cnt = sizeof(skb_program) / sizeof(struct bpf_insn),
41 };
42
43 err = libbpf_find_vmlinux_btf_id("bpf_fentry_test1",
44 load_attr.expected_attach_type);
45 if (CHECK(err <= 0, "find_vmlinux_btf_id", "failed: %d\n", err))
46 goto out;
47 load_attr.attach_btf_id = err;
48
49 for (i = 0; i < CNT; i++) {
50 fexit_fd[i] = bpf_load_program_xattr(&load_attr, error, sizeof(error));
51 if (CHECK(fexit_fd[i] < 0, "fexit loaded",
52 "failed: %d errno %d\n", fexit_fd[i], errno))
53 goto out;
54 link_fd[i] = bpf_raw_tracepoint_open(NULL, fexit_fd[i]);
55 if (CHECK(link_fd[i] < 0, "fexit attach failed",
56 "prog %d failed: %d err %d\n", i, link_fd[i], errno))
57 goto out;
58 }
59
60 filter_fd = bpf_load_program_xattr(&skb_load_attr, error, sizeof(error));
61 if (CHECK(filter_fd < 0, "test_program_loaded", "failed: %d errno %d\n",
62 filter_fd, errno))
63 goto out;
64
65 err = bpf_prog_test_run(filter_fd, 1, test_skb, sizeof(test_skb), 0,
66 0, &prog_ret, 0);
67 close(filter_fd);
68 CHECK_FAIL(err);
69out:
70 for (i = 0; i < CNT; i++) {
71 if (link_fd[i])
72 close(link_fd[i]);
73 if (fexit_fd[i])
74 close(fexit_fd[i]);
75 }
76}