]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
selftests/bpf: Add stacktrace ips test for kprobe/kretprobe
authorJiri Olsa <jolsa@kernel.org>
Mon, 26 Jan 2026 21:18:35 +0000 (22:18 +0100)
committerAndrii Nakryiko <andrii@kernel.org>
Fri, 30 Jan 2026 21:40:08 +0000 (13:40 -0800)
Adding test that attaches kprobe/kretprobe and verifies the
ORC stacktrace matches expected functions.

The test is only for ORC unwinder to keep it simple.

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/bpf/20260126211837.472802-5-jolsa@kernel.org
tools/testing/selftests/bpf/prog_tests/stacktrace_ips.c
tools/testing/selftests/bpf/progs/stacktrace_ips.c

index c93718dafd9b630349852b30b96a9b271020d2c6..8528305361092ac4db595ad424d5cefd5fe224d9 100644 (file)
@@ -137,6 +137,52 @@ cleanup:
        stacktrace_ips__destroy(skel);
 }
 
+static void test_stacktrace_ips_kprobe(bool retprobe)
+{
+       LIBBPF_OPTS(bpf_kprobe_opts, opts,
+               .retprobe = retprobe
+       );
+       LIBBPF_OPTS(bpf_test_run_opts, topts);
+       struct stacktrace_ips *skel;
+
+       skel = stacktrace_ips__open_and_load();
+       if (!ASSERT_OK_PTR(skel, "stacktrace_ips__open_and_load"))
+               return;
+
+       if (!skel->kconfig->CONFIG_UNWINDER_ORC) {
+               test__skip();
+               goto cleanup;
+       }
+
+       skel->links.kprobe_test = bpf_program__attach_kprobe_opts(
+                                               skel->progs.kprobe_test,
+                                               "bpf_testmod_stacktrace_test", &opts);
+       if (!ASSERT_OK_PTR(skel->links.kprobe_test, "bpf_program__attach_kprobe_opts"))
+               goto cleanup;
+
+       trigger_module_test_read(1);
+
+       load_kallsyms();
+
+       if (retprobe) {
+               check_stacktrace_ips(bpf_map__fd(skel->maps.stackmap), skel->bss->stack_key, 4,
+                                    ksym_get_addr("bpf_testmod_stacktrace_test_3"),
+                                    ksym_get_addr("bpf_testmod_stacktrace_test_2"),
+                                    ksym_get_addr("bpf_testmod_stacktrace_test_1"),
+                                    ksym_get_addr("bpf_testmod_test_read"));
+       } else {
+               check_stacktrace_ips(bpf_map__fd(skel->maps.stackmap), skel->bss->stack_key, 5,
+                                    ksym_get_addr("bpf_testmod_stacktrace_test"),
+                                    ksym_get_addr("bpf_testmod_stacktrace_test_3"),
+                                    ksym_get_addr("bpf_testmod_stacktrace_test_2"),
+                                    ksym_get_addr("bpf_testmod_stacktrace_test_1"),
+                                    ksym_get_addr("bpf_testmod_test_read"));
+       }
+
+cleanup:
+       stacktrace_ips__destroy(skel);
+}
+
 static void __test_stacktrace_ips(void)
 {
        if (test__start_subtest("kprobe_multi"))
@@ -145,6 +191,10 @@ static void __test_stacktrace_ips(void)
                test_stacktrace_ips_kprobe_multi(true);
        if (test__start_subtest("raw_tp"))
                test_stacktrace_ips_raw_tp();
+       if (test__start_subtest("kprobe"))
+               test_stacktrace_ips_kprobe(false);
+       if (test__start_subtest("kretprobe"))
+               test_stacktrace_ips_kprobe(true);
 }
 #else
 static void __test_stacktrace_ips(void)
index a96c8150d7f5ae73dfd75c61fbd827062aa97589..cae077a4061b100880314c4c5e19a93394da84c2 100644 (file)
@@ -31,6 +31,13 @@ int unused(void)
 
 __u32 stack_key;
 
+SEC("kprobe")
+int kprobe_test(struct pt_regs *ctx)
+{
+       stack_key = bpf_get_stackid(ctx, &stackmap, 0);
+       return 0;
+}
+
 SEC("kprobe.multi")
 int kprobe_multi_test(struct pt_regs *ctx)
 {