mirror of https://github.com/aya-rs/aya
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
609 lines
18 KiB
Rust
609 lines
18 KiB
Rust
use std::{convert::TryInto as _, fs::remove_file, path::Path, thread, time::Duration};
|
|
|
|
use aya::{
|
|
Ebpf,
|
|
maps::Array,
|
|
programs::{
|
|
FlowDissector, KProbe, TracePoint, UProbe, Xdp, XdpFlags,
|
|
links::{FdLink, PinnedLink},
|
|
loaded_links, loaded_programs,
|
|
},
|
|
util::KernelVersion,
|
|
};
|
|
use aya_obj::programs::XdpAttachType;
|
|
use test_log::test;
|
|
|
|
const MAX_RETRIES: usize = 100;
|
|
const RETRY_DURATION: Duration = Duration::from_millis(10);
|
|
|
|
#[test]
|
|
fn long_name() {
|
|
let mut bpf = Ebpf::load(crate::NAME_TEST).unwrap();
|
|
let name_prog: &mut Xdp = bpf
|
|
.program_mut("ihaveaverylongname")
|
|
.unwrap()
|
|
.try_into()
|
|
.unwrap();
|
|
name_prog.load().unwrap();
|
|
name_prog.attach("lo", XdpFlags::default()).unwrap();
|
|
|
|
// We used to be able to assert with bpftool that the program name was short.
|
|
// It seem though that it now uses the name from the ELF symbol table instead.
|
|
// Therefore, as long as we were able to load the program, this is good enough.
|
|
}
|
|
|
|
#[test]
|
|
fn multiple_btf_maps() {
|
|
let mut bpf = Ebpf::load(crate::MULTIMAP_BTF).unwrap();
|
|
|
|
let map_1: Array<_, u64> = bpf.take_map("map_1").unwrap().try_into().unwrap();
|
|
let map_2: Array<_, u64> = bpf.take_map("map_2").unwrap().try_into().unwrap();
|
|
let map_pin_by_name: Array<_, u64> =
|
|
bpf.take_map("map_pin_by_name").unwrap().try_into().unwrap();
|
|
|
|
let prog: &mut UProbe = bpf.program_mut("bpf_prog").unwrap().try_into().unwrap();
|
|
prog.load().unwrap();
|
|
prog.attach("trigger_bpf_program", "/proc/self/exe", None, None)
|
|
.unwrap();
|
|
|
|
trigger_bpf_program();
|
|
|
|
let key = 0;
|
|
let val_1 = map_1.get(&key, 0).unwrap();
|
|
let val_2 = map_2.get(&key, 0).unwrap();
|
|
let val_3 = map_pin_by_name.get(&key, 0).unwrap();
|
|
|
|
assert_eq!(val_1, 24);
|
|
assert_eq!(val_2, 42);
|
|
assert_eq!(val_3, 44);
|
|
let map_pin = Path::new("/sys/fs/bpf/map_pin_by_name");
|
|
assert!(&map_pin.exists());
|
|
|
|
remove_file(map_pin).unwrap();
|
|
}
|
|
|
|
#[test]
|
|
fn pin_lifecycle_multiple_btf_maps() {
|
|
let mut bpf = Ebpf::load(crate::MULTIMAP_BTF).unwrap();
|
|
|
|
// "map_pin_by_name" should already be pinned, unpin and pin again later
|
|
let map_pin_by_name_path = Path::new("/sys/fs/bpf/map_pin_by_name");
|
|
|
|
assert!(map_pin_by_name_path.exists());
|
|
remove_file(map_pin_by_name_path).unwrap();
|
|
|
|
// pin and unpin all maps before casting to explicit types
|
|
for (i, (name, map)) in bpf.maps_mut().enumerate() {
|
|
// Don't pin system maps or the map that's already pinned by name.
|
|
if name.contains(".rodata") || name.contains(".bss") {
|
|
continue;
|
|
}
|
|
let map_pin_path = &Path::new("/sys/fs/bpf/").join(i.to_string());
|
|
|
|
map.pin(map_pin_path).unwrap();
|
|
|
|
assert!(map_pin_path.exists());
|
|
remove_file(map_pin_path).unwrap();
|
|
}
|
|
|
|
let map_1: Array<_, u64> = bpf.take_map("map_1").unwrap().try_into().unwrap();
|
|
let map_2: Array<_, u64> = bpf.take_map("map_2").unwrap().try_into().unwrap();
|
|
let map_pin_by_name: Array<_, u64> =
|
|
bpf.take_map("map_pin_by_name").unwrap().try_into().unwrap();
|
|
|
|
let prog: &mut UProbe = bpf.program_mut("bpf_prog").unwrap().try_into().unwrap();
|
|
prog.load().unwrap();
|
|
prog.attach("trigger_bpf_program", "/proc/self/exe", None, None)
|
|
.unwrap();
|
|
|
|
trigger_bpf_program();
|
|
|
|
let key = 0;
|
|
let val_1 = map_1.get(&key, 0).unwrap();
|
|
let val_2 = map_2.get(&key, 0).unwrap();
|
|
let val_3 = map_pin_by_name.get(&key, 0).unwrap();
|
|
|
|
assert_eq!(val_1, 24);
|
|
assert_eq!(val_2, 42);
|
|
assert_eq!(val_3, 44);
|
|
|
|
let map_1_pin_path = Path::new("/sys/fs/bpf/map_1");
|
|
let map_2_pin_path = Path::new("/sys/fs/bpf/map_2");
|
|
|
|
map_1.pin(map_1_pin_path).unwrap();
|
|
map_2.pin(map_2_pin_path).unwrap();
|
|
map_pin_by_name.pin(map_pin_by_name_path).unwrap();
|
|
assert!(map_1_pin_path.exists());
|
|
assert!(map_2_pin_path.exists());
|
|
assert!(map_pin_by_name_path.exists());
|
|
|
|
remove_file(map_1_pin_path).unwrap();
|
|
remove_file(map_2_pin_path).unwrap();
|
|
remove_file(map_pin_by_name_path).unwrap();
|
|
}
|
|
|
|
#[unsafe(no_mangle)]
|
|
#[inline(never)]
|
|
pub extern "C" fn trigger_bpf_program() {
|
|
core::hint::black_box(trigger_bpf_program);
|
|
}
|
|
|
|
fn poll_loaded_program_id(name: &str) -> impl Iterator<Item = Option<u32>> + '_ {
|
|
std::iter::once(true)
|
|
.chain(std::iter::repeat(false))
|
|
.map(|first| {
|
|
if !first {
|
|
thread::sleep(RETRY_DURATION);
|
|
}
|
|
// Ignore race failures which can happen when the tests delete a
|
|
// program in the middle of a `loaded_programs()` call.
|
|
loaded_programs()
|
|
.filter_map(|prog| prog.ok())
|
|
.find_map(|prog| (prog.name() == name.as_bytes()).then(|| prog.id()))
|
|
})
|
|
}
|
|
|
|
#[track_caller]
|
|
fn assert_loaded_and_linked(name: &str) {
|
|
let (attempts_used, prog_id) = poll_loaded_program_id(name)
|
|
.take(MAX_RETRIES)
|
|
.enumerate()
|
|
.find_map(|(i, id)| id.map(|id| (i, id)))
|
|
.unwrap_or_else(|| panic!("{name} not loaded after {MAX_RETRIES}"));
|
|
let poll_loaded_link_id = std::iter::once(true)
|
|
.chain(std::iter::repeat(false))
|
|
.map(|first| {
|
|
if !first {
|
|
thread::sleep(RETRY_DURATION);
|
|
}
|
|
// Ignore race failures which can happen when the tests delete a
|
|
// program in the middle of a `loaded_programs()` call.
|
|
loaded_links()
|
|
.filter_map(|link| link.ok())
|
|
.find_map(|link| (link.prog_id == prog_id).then_some(link.id))
|
|
});
|
|
assert!(
|
|
poll_loaded_link_id
|
|
.take(MAX_RETRIES)
|
|
.skip(attempts_used)
|
|
.any(|id| id.is_some()),
|
|
"{name} not linked after {MAX_RETRIES}"
|
|
);
|
|
}
|
|
|
|
#[track_caller]
|
|
fn assert_loaded(name: &str) {
|
|
assert!(
|
|
poll_loaded_program_id(name)
|
|
.take(MAX_RETRIES)
|
|
.any(|id| id.is_some()),
|
|
"{name} not loaded after {MAX_RETRIES}"
|
|
)
|
|
}
|
|
|
|
#[track_caller]
|
|
fn assert_unloaded(name: &str) {
|
|
assert!(
|
|
poll_loaded_program_id(name)
|
|
.take(MAX_RETRIES)
|
|
.any(|id| id.is_none()),
|
|
"{name} still loaded after {MAX_RETRIES}"
|
|
)
|
|
}
|
|
|
|
#[test]
|
|
fn unload_xdp() {
|
|
let mut bpf = Ebpf::load(crate::TEST).unwrap();
|
|
let prog: &mut Xdp = bpf.program_mut("pass").unwrap().try_into().unwrap();
|
|
prog.load().unwrap();
|
|
assert_loaded("pass");
|
|
let link = prog.attach("lo", XdpFlags::default()).unwrap();
|
|
{
|
|
let _link_owned = prog.take_link(link).unwrap();
|
|
prog.unload().unwrap();
|
|
assert_loaded_and_linked("pass");
|
|
};
|
|
|
|
assert_unloaded("pass");
|
|
prog.load().unwrap();
|
|
|
|
assert_loaded("pass");
|
|
prog.attach("lo", XdpFlags::default()).unwrap();
|
|
|
|
assert_loaded("pass");
|
|
prog.unload().unwrap();
|
|
|
|
assert_unloaded("pass");
|
|
}
|
|
|
|
#[test]
|
|
fn unload_kprobe() {
|
|
let mut bpf = Ebpf::load(crate::TEST).unwrap();
|
|
let prog: &mut KProbe = bpf.program_mut("test_kprobe").unwrap().try_into().unwrap();
|
|
prog.load().unwrap();
|
|
assert_loaded("test_kprobe");
|
|
let link = prog.attach("try_to_wake_up", 0).unwrap();
|
|
{
|
|
let _link_owned = prog.take_link(link).unwrap();
|
|
prog.unload().unwrap();
|
|
assert_loaded_and_linked("test_kprobe");
|
|
};
|
|
|
|
assert_unloaded("test_kprobe");
|
|
prog.load().unwrap();
|
|
|
|
assert_loaded("test_kprobe");
|
|
prog.attach("try_to_wake_up", 0).unwrap();
|
|
|
|
assert_loaded("test_kprobe");
|
|
prog.unload().unwrap();
|
|
|
|
assert_unloaded("test_kprobe");
|
|
}
|
|
|
|
#[test]
|
|
fn memmove() {
|
|
let mut bpf = Ebpf::load(crate::MEMMOVE_TEST).unwrap();
|
|
let prog: &mut Xdp = bpf.program_mut("do_dnat").unwrap().try_into().unwrap();
|
|
|
|
prog.load().unwrap();
|
|
assert_loaded("do_dnat");
|
|
}
|
|
|
|
#[test]
|
|
fn basic_tracepoint() {
|
|
let mut bpf = Ebpf::load(crate::TEST).unwrap();
|
|
let prog: &mut TracePoint = bpf
|
|
.program_mut("test_tracepoint")
|
|
.unwrap()
|
|
.try_into()
|
|
.unwrap();
|
|
|
|
prog.load().unwrap();
|
|
assert_loaded("test_tracepoint");
|
|
let link = prog.attach("syscalls", "sys_enter_kill").unwrap();
|
|
|
|
{
|
|
let _link_owned = prog.take_link(link).unwrap();
|
|
prog.unload().unwrap();
|
|
assert_loaded_and_linked("test_tracepoint");
|
|
};
|
|
|
|
assert_unloaded("test_tracepoint");
|
|
prog.load().unwrap();
|
|
|
|
assert_loaded("test_tracepoint");
|
|
prog.attach("syscalls", "sys_enter_kill").unwrap();
|
|
|
|
assert_loaded("test_tracepoint");
|
|
prog.unload().unwrap();
|
|
|
|
assert_unloaded("test_tracepoint");
|
|
}
|
|
|
|
#[test]
|
|
fn basic_uprobe() {
|
|
let mut bpf = Ebpf::load(crate::TEST).unwrap();
|
|
let prog: &mut UProbe = bpf.program_mut("test_uprobe").unwrap().try_into().unwrap();
|
|
|
|
prog.load().unwrap();
|
|
assert_loaded("test_uprobe");
|
|
let link = prog
|
|
.attach("uprobe_function", "/proc/self/exe", None, None)
|
|
.unwrap();
|
|
|
|
{
|
|
let _link_owned = prog.take_link(link).unwrap();
|
|
prog.unload().unwrap();
|
|
assert_loaded_and_linked("test_uprobe");
|
|
};
|
|
|
|
assert_unloaded("test_uprobe");
|
|
prog.load().unwrap();
|
|
|
|
assert_loaded("test_uprobe");
|
|
prog.attach("uprobe_function", "/proc/self/exe", None, None)
|
|
.unwrap();
|
|
|
|
assert_loaded("test_uprobe");
|
|
prog.unload().unwrap();
|
|
|
|
assert_unloaded("test_uprobe");
|
|
}
|
|
|
|
#[test]
|
|
fn basic_flow_dissector() {
|
|
let mut bpf = Ebpf::load(crate::TEST).unwrap();
|
|
let prog: &mut FlowDissector = bpf.program_mut("test_flow").unwrap().try_into().unwrap();
|
|
|
|
prog.load().unwrap();
|
|
assert_loaded("test_flow");
|
|
|
|
let net_ns = std::fs::File::open("/proc/self/ns/net").unwrap();
|
|
let link = prog.attach(net_ns.try_clone().unwrap()).unwrap();
|
|
{
|
|
let _link_owned = prog.take_link(link).unwrap();
|
|
prog.unload().unwrap();
|
|
assert_loaded_and_linked("test_flow");
|
|
};
|
|
|
|
assert_unloaded("test_flow");
|
|
prog.load().unwrap();
|
|
|
|
assert_loaded("test_flow");
|
|
prog.attach(net_ns).unwrap();
|
|
|
|
assert_loaded("test_flow");
|
|
prog.unload().unwrap();
|
|
|
|
assert_unloaded("test_flow");
|
|
}
|
|
|
|
#[test]
|
|
fn pin_link() {
|
|
let kernel_version = KernelVersion::current().unwrap();
|
|
if kernel_version < KernelVersion::new(5, 9, 0) {
|
|
eprintln!("skipping test on kernel {kernel_version:?}, XDP uses netlink");
|
|
return;
|
|
}
|
|
|
|
let mut bpf = Ebpf::load(crate::TEST).unwrap();
|
|
let prog: &mut Xdp = bpf.program_mut("pass").unwrap().try_into().unwrap();
|
|
prog.load().unwrap();
|
|
let link_id = prog.attach("lo", XdpFlags::default()).unwrap();
|
|
let link = prog.take_link(link_id).unwrap();
|
|
assert_loaded("pass");
|
|
|
|
let fd_link: FdLink = link.try_into().unwrap();
|
|
let pinned = fd_link.pin("/sys/fs/bpf/aya-xdp-test-lo").unwrap();
|
|
|
|
// because of the pin, the program is still attached
|
|
prog.unload().unwrap();
|
|
assert_loaded("pass");
|
|
|
|
// delete the pin, but the program is still attached
|
|
let new_link = pinned.unpin().unwrap();
|
|
assert_loaded("pass");
|
|
|
|
// finally when new_link is dropped we're detached
|
|
drop(new_link);
|
|
assert_unloaded("pass");
|
|
}
|
|
|
|
#[test]
|
|
fn pin_lifecycle() {
|
|
let kernel_version = KernelVersion::current().unwrap();
|
|
if kernel_version < KernelVersion::new(5, 18, 0) {
|
|
eprintln!(
|
|
"skipping test on kernel {kernel_version:?}, support for BPF_F_XDP_HAS_FRAGS was added in 5.18.0; see https://github.com/torvalds/linux/commit/c2f2cdb"
|
|
);
|
|
return;
|
|
}
|
|
|
|
// 1. Load Program and Pin
|
|
{
|
|
let mut bpf = Ebpf::load(crate::PASS).unwrap();
|
|
let prog: &mut Xdp = bpf.program_mut("pass").unwrap().try_into().unwrap();
|
|
prog.load().unwrap();
|
|
prog.pin("/sys/fs/bpf/aya-xdp-test-prog").unwrap();
|
|
}
|
|
|
|
// should still be loaded since prog was pinned
|
|
assert_loaded("pass");
|
|
|
|
// 2. Load program from bpffs but don't attach it
|
|
{
|
|
let _ = Xdp::from_pin("/sys/fs/bpf/aya-xdp-test-prog", XdpAttachType::Interface).unwrap();
|
|
}
|
|
|
|
// should still be loaded since prog was pinned
|
|
assert_loaded("pass");
|
|
|
|
// 3. Load program from bpffs and attach
|
|
{
|
|
let mut prog =
|
|
Xdp::from_pin("/sys/fs/bpf/aya-xdp-test-prog", XdpAttachType::Interface).unwrap();
|
|
let link_id = prog.attach("lo", XdpFlags::default()).unwrap();
|
|
let link = prog.take_link(link_id).unwrap();
|
|
let fd_link: FdLink = link.try_into().unwrap();
|
|
fd_link.pin("/sys/fs/bpf/aya-xdp-test-lo").unwrap();
|
|
|
|
// Unpin the program. It will stay attached since its links were pinned.
|
|
prog.unpin().unwrap();
|
|
}
|
|
|
|
// should still be loaded since link was pinned
|
|
assert_loaded_and_linked("pass");
|
|
|
|
// 4. Load a new version of the program, unpin link, and atomically replace old program
|
|
{
|
|
let mut bpf = Ebpf::load(crate::PASS).unwrap();
|
|
let prog: &mut Xdp = bpf.program_mut("pass").unwrap().try_into().unwrap();
|
|
prog.load().unwrap();
|
|
|
|
let link = PinnedLink::from_pin("/sys/fs/bpf/aya-xdp-test-lo")
|
|
.unwrap()
|
|
.unpin()
|
|
.unwrap();
|
|
prog.attach_to_link(link.try_into().unwrap()).unwrap();
|
|
assert_loaded("pass");
|
|
}
|
|
|
|
// program should be unloaded
|
|
assert_unloaded("pass");
|
|
}
|
|
|
|
#[test]
|
|
fn pin_lifecycle_tracepoint() {
|
|
// 1. Load Program and Pin
|
|
{
|
|
let mut bpf = Ebpf::load(crate::TEST).unwrap();
|
|
let prog: &mut TracePoint = bpf
|
|
.program_mut("test_tracepoint")
|
|
.unwrap()
|
|
.try_into()
|
|
.unwrap();
|
|
prog.load().unwrap();
|
|
prog.pin("/sys/fs/bpf/aya-tracepoint-test-prog").unwrap();
|
|
}
|
|
|
|
// should still be loaded since prog was pinned
|
|
assert_loaded("test_tracepoint");
|
|
|
|
// 2. Load program from bpffs but don't attach it
|
|
{
|
|
let _ = TracePoint::from_pin("/sys/fs/bpf/aya-tracepoint-test-prog").unwrap();
|
|
}
|
|
|
|
// should still be loaded since prog was pinned
|
|
assert_loaded("test_tracepoint");
|
|
|
|
// 3. Load program from bpffs and attach
|
|
{
|
|
let mut prog = TracePoint::from_pin("/sys/fs/bpf/aya-tracepoint-test-prog").unwrap();
|
|
let link_id = prog.attach("syscalls", "sys_enter_kill").unwrap();
|
|
let link = prog.take_link(link_id).unwrap();
|
|
let fd_link: FdLink = link.try_into().unwrap();
|
|
fd_link
|
|
.pin("/sys/fs/bpf/aya-tracepoint-test-sys-enter-kill")
|
|
.unwrap();
|
|
|
|
// Unpin the program. It will stay attached since its links were pinned.
|
|
prog.unpin().unwrap();
|
|
}
|
|
|
|
// should still be loaded since link was pinned
|
|
assert_loaded_and_linked("test_tracepoint");
|
|
|
|
// 4. unpin link, and make sure everything is unloaded
|
|
{
|
|
PinnedLink::from_pin("/sys/fs/bpf/aya-tracepoint-test-sys-enter-kill")
|
|
.unwrap()
|
|
.unpin()
|
|
.unwrap();
|
|
}
|
|
|
|
// program should be unloaded
|
|
assert_unloaded("test_tracepoint");
|
|
}
|
|
|
|
#[test]
|
|
fn pin_lifecycle_kprobe() {
|
|
// 1. Load Program and Pin
|
|
{
|
|
let mut bpf = Ebpf::load(crate::TEST).unwrap();
|
|
let prog: &mut KProbe = bpf.program_mut("test_kprobe").unwrap().try_into().unwrap();
|
|
prog.load().unwrap();
|
|
prog.pin("/sys/fs/bpf/aya-kprobe-test-prog").unwrap();
|
|
}
|
|
|
|
// should still be loaded since prog was pinned
|
|
assert_loaded("test_kprobe");
|
|
|
|
// 2. Load program from bpffs but don't attach it
|
|
{
|
|
let _ = KProbe::from_pin(
|
|
"/sys/fs/bpf/aya-kprobe-test-prog",
|
|
aya::programs::ProbeKind::KProbe,
|
|
)
|
|
.unwrap();
|
|
}
|
|
|
|
// should still be loaded since prog was pinned
|
|
assert_loaded("test_kprobe");
|
|
|
|
// 3. Load program from bpffs and attach
|
|
{
|
|
let mut prog = KProbe::from_pin(
|
|
"/sys/fs/bpf/aya-kprobe-test-prog",
|
|
aya::programs::ProbeKind::KProbe,
|
|
)
|
|
.unwrap();
|
|
let link_id = prog.attach("try_to_wake_up", 0).unwrap();
|
|
let link = prog.take_link(link_id).unwrap();
|
|
let fd_link: FdLink = link.try_into().unwrap();
|
|
fd_link
|
|
.pin("/sys/fs/bpf/aya-kprobe-test-try-to-wake-up")
|
|
.unwrap();
|
|
|
|
// Unpin the program. It will stay attached since its links were pinned.
|
|
prog.unpin().unwrap();
|
|
}
|
|
|
|
// should still be loaded since link was pinned
|
|
assert_loaded_and_linked("test_kprobe");
|
|
|
|
// 4. unpin link, and make sure everything is unloaded
|
|
{
|
|
PinnedLink::from_pin("/sys/fs/bpf/aya-kprobe-test-try-to-wake-up")
|
|
.unwrap()
|
|
.unpin()
|
|
.unwrap();
|
|
}
|
|
|
|
// program should be unloaded
|
|
assert_unloaded("test_kprobe");
|
|
}
|
|
|
|
#[unsafe(no_mangle)]
|
|
#[inline(never)]
|
|
extern "C" fn uprobe_function() {
|
|
core::hint::black_box(uprobe_function);
|
|
}
|
|
|
|
#[test]
|
|
fn pin_lifecycle_uprobe() {
|
|
const FIRST_PIN_PATH: &str = "/sys/fs/bpf/aya-uprobe-test-prog-1";
|
|
const SECOND_PIN_PATH: &str = "/sys/fs/bpf/aya-uprobe-test-prog-2";
|
|
|
|
// 1. Load Program and Pin
|
|
{
|
|
let mut bpf = Ebpf::load(crate::TEST).unwrap();
|
|
let prog: &mut UProbe = bpf.program_mut("test_uprobe").unwrap().try_into().unwrap();
|
|
prog.load().unwrap();
|
|
prog.pin(FIRST_PIN_PATH).unwrap();
|
|
}
|
|
|
|
// should still be loaded since prog was pinned
|
|
assert_loaded("test_uprobe");
|
|
|
|
// 2. Load program from bpffs but don't attach it
|
|
{
|
|
let _ = UProbe::from_pin(FIRST_PIN_PATH, aya::programs::ProbeKind::UProbe).unwrap();
|
|
}
|
|
|
|
// should still be loaded since prog was pinned
|
|
assert_loaded("test_uprobe");
|
|
|
|
// 3. Load program from bpffs and attach
|
|
{
|
|
let mut prog = UProbe::from_pin(FIRST_PIN_PATH, aya::programs::ProbeKind::UProbe).unwrap();
|
|
let link_id = prog
|
|
.attach("uprobe_function", "/proc/self/exe", None, None)
|
|
.unwrap();
|
|
let link = prog.take_link(link_id).unwrap();
|
|
let fd_link: FdLink = link.try_into().unwrap();
|
|
fd_link.pin(SECOND_PIN_PATH).unwrap();
|
|
|
|
// Unpin the program. It will stay attached since its links were pinned.
|
|
prog.unpin().unwrap();
|
|
}
|
|
|
|
// should still be loaded since link was pinned
|
|
assert_loaded_and_linked("test_uprobe");
|
|
|
|
// 4. unpin link, and make sure everything is unloaded
|
|
{
|
|
PinnedLink::from_pin(SECOND_PIN_PATH)
|
|
.unwrap()
|
|
.unpin()
|
|
.unwrap();
|
|
}
|
|
|
|
// program should be unloaded
|
|
assert_unloaded("test_uprobe");
|
|
|
|
// Make sure the function isn't optimized out.
|
|
uprobe_function();
|
|
}
|