[17:50:28][root@250.1976_762998096.el9.x86_64+debug]# './test_progs -t uprobe_autoattach' test_uprobe_autoattach:PASS:skel_open 0 nsec libbpf: elf: failed to find symbol 'autoattach_trigger_func' in '/proc/self/exe' libbpf: prog 'handle_uprobe_byname': failed to auto-attach: -2 test_uprobe_autoattach:FAIL:skel_attach unexpected error: -2 (errno 2) #208 uprobe_autoattach:FAIL All error logs: test_uprobe_autoattach:PASS:skel_open 0 nsec libbpf: elf: failed to find symbol 'autoattach_trigger_func' in '/proc/self/exe' libbpf: prog 'handle_uprobe_byname': failed to auto-attach: -2 test_uprobe_autoattach:FAIL:skel_attach unexpected error: -2 (errno 2) #208 uprobe_autoattach:FAIL Summary: 0/0 PASSED, 0 SKIPPED, 1 FAILED :: [ FAIL ] :: Command './test_progs -t uprobe_autoattach' (Expected 0, got 1, score 3) [17:50:28][root@250.1976_762998096.el9.x86_64+debug]# './test_progs -vv -t uprobe_autoattach' bpf_testmod.ko is already unloaded. Loading bpf_testmod.ko... Successfully loaded bpf_testmod.ko. libbpf: loading object 'test_uprobe_autoattach' from buffer libbpf: elf: section(2) .symtab, size 576, link 1, flags 0, type=2 libbpf: elf: section(3) uprobe, size 16, link 0, flags 6, type=1 libbpf: sec 'uprobe': found program 'handle_uprobe_noautoattach' at insn offset 0 (0 bytes), code size 2 insns (16 bytes) libbpf: elf: section(4) uprobe//proc/self/exe:autoattach_trigger_func, size 136, link 0, flags 6, type=1 libbpf: sec 'uprobe//proc/self/exe:autoattach_trigger_func': found program 'handle_uprobe_byname' at insn offset 0 (0 bytes), code size 17 insns (136 bytes) libbpf: elf: section(5) uretprobe//proc/self/exe:autoattach_trigger_func, size 136, link 0, flags 6, type=1 libbpf: sec 'uretprobe//proc/self/exe:autoattach_trigger_func': found program 'handle_uretprobe_byname' at insn offset 0 (0 bytes), code size 17 insns (136 bytes) libbpf: elf: section(6) uprobe/libc.so.6:malloc, size 192, link 0, flags 6, type=1 libbpf: sec 'uprobe/libc.so.6:malloc': found program 'handle_uprobe_byname2' at insn offset 0 (0 bytes), code size 24 insns (192 bytes) libbpf: elf: section(7) uretprobe/libc.so.6:malloc, size 192, link 0, flags 6, type=1 libbpf: sec 'uretprobe/libc.so.6:malloc': found program 'handle_uretprobe_byname2' at insn offset 0 (0 bytes), code size 24 insns (192 bytes) libbpf: elf: section(8) .bss, size 48, link 0, flags 3, type=8 libbpf: elf: section(9) license, size 4, link 0, flags 3, type=1 libbpf: license of test_uprobe_autoattach is GPL libbpf: elf: section(10) .reluprobe//proc/self/exe:autoattach_trigger_func, size 32, link 2, flags 40, type=9 libbpf: elf: section(11) .reluretprobe//proc/self/exe:autoattach_trigger_func, size 32, link 2, flags 40, type=9 libbpf: elf: section(12) .reluprobe/libc.so.6:malloc, size 48, link 2, flags 40, type=9 libbpf: elf: section(13) .reluretprobe/libc.so.6:malloc, size 48, link 2, flags 40, type=9 libbpf: elf: section(14) .BTF, size 2199, link 0, flags 0, type=1 libbpf: elf: section(15) .BTF.ext, size 884, link 0, flags 0, type=1 libbpf: looking for externs among 24 symbols... libbpf: collected 0 externs total libbpf: map 'test_upr.bss' (global data): at sec_idx 8, offset 0, flags 400. libbpf: map 0 is "test_upr.bss" libbpf: sec '.reluprobe//proc/self/exe:autoattach_trigger_func': collecting relocation for section(4) 'uprobe//proc/self/exe:autoattach_trigger_func' libbpf: sec '.reluprobe//proc/self/exe:autoattach_trigger_func': relo #0: insn #7 against 'uprobe_byname_ran' libbpf: prog 'handle_uprobe_byname': found data map 0 (test_upr.bss, sec 8, off 0) for insn 7 libbpf: sec '.reluprobe//proc/self/exe:autoattach_trigger_func': relo #1: insn #12 against 'uprobe_byname_parm1' libbpf: prog 'handle_uprobe_byname': found data map 0 (test_upr.bss, sec 8, off 0) for insn 12 libbpf: sec '.reluretprobe//proc/self/exe:autoattach_trigger_func': collecting relocation for section(5) 'uretprobe//proc/self/exe:autoattach_trigger_func' libbpf: sec '.reluretprobe//proc/self/exe:autoattach_trigger_func': relo #0: insn #7 against 'uretprobe_byname_ran' libbpf: prog 'handle_uretprobe_byname': found data map 0 (test_upr.bss, sec 8, off 0) for insn 7 libbpf: sec '.reluretprobe//proc/self/exe:autoattach_trigger_func': relo #1: insn #12 against 'uretprobe_byname_rc' libbpf: prog 'handle_uretprobe_byname': found data map 0 (test_upr.bss, sec 8, off 0) for insn 12 libbpf: sec '.reluprobe/libc.so.6:malloc': collecting relocation for section(6) 'uprobe/libc.so.6:malloc' libbpf: sec '.reluprobe/libc.so.6:malloc': relo #0: insn #2 against 'test_pid' libbpf: prog 'handle_uprobe_byname2': found data map 0 (test_upr.bss, sec 8, off 0) for insn 2 libbpf: sec '.reluprobe/libc.so.6:malloc': relo #1: insn #14 against 'uprobe_byname2_ran' libbpf: prog 'handle_uprobe_byname2': found data map 0 (test_upr.bss, sec 8, off 0) for insn 14 libbpf: sec '.reluprobe/libc.so.6:malloc': relo #2: insn #18 against 'uprobe_byname2_parm1' libbpf: prog 'handle_uprobe_byname2': found data map 0 (test_upr.bss, sec 8, off 0) for insn 18 libbpf: sec '.reluretprobe/libc.so.6:malloc': collecting relocation for section(7) 'uretprobe/libc.so.6:malloc' libbpf: sec '.reluretprobe/libc.so.6:malloc': relo #0: insn #2 against 'test_pid' libbpf: prog 'handle_uretprobe_byname2': found data map 0 (test_upr.bss, sec 8, off 0) for insn 2 libbpf: sec '.reluretprobe/libc.so.6:malloc': relo #1: insn #14 against 'uretprobe_byname2_ran' libbpf: prog 'handle_uretprobe_byname2': found data map 0 (test_upr.bss, sec 8, off 0) for insn 14 libbpf: sec '.reluretprobe/libc.so.6:malloc': relo #2: insn #18 against 'uretprobe_byname2_rc' libbpf: prog 'handle_uretprobe_byname2': found data map 0 (test_upr.bss, sec 8, off 0) for insn 18 libbpf: loading kernel BTF '/sys/kernel/btf/vmlinux': 0 libbpf: map 'test_upr.bss': created successfully, fd=5 libbpf: sec 'uprobe//proc/self/exe:autoattach_trigger_func': found 1 CO-RE relocations libbpf: CO-RE relocating [2] struct pt_regs: found target candidate [16] struct pt_regs in [vmlinux] libbpf: prog 'handle_uprobe_byname': relo #0: [2] struct pt_regs.di (0:14 @ offset 112) libbpf: prog 'handle_uprobe_byname': relo #0: matching candidate #0 [16] struct pt_regs.di (0:14 @ offset 112) libbpf: prog 'handle_uprobe_byname': relo #0: patched insn #1 (ALU/ALU64) imm 112 -> 112 libbpf: sec 'uretprobe//proc/self/exe:autoattach_trigger_func': found 1 CO-RE relocations libbpf: prog 'handle_uretprobe_byname': relo #0: [2] struct pt_regs.ax (0:10 @ offset 80) libbpf: prog 'handle_uretprobe_byname': relo #0: matching candidate #0 [16] struct pt_regs.ax (0:10 @ offset 80) libbpf: prog 'handle_uretprobe_byname': relo #0: patched insn #1 (ALU/ALU64) imm 80 -> 80 libbpf: sec 'uprobe/libc.so.6:malloc': found 1 CO-RE relocations libbpf: prog 'handle_uprobe_byname2': relo #0: [2] struct pt_regs.di (0:14 @ offset 112) libbpf: prog 'handle_uprobe_byname2': relo #0: matching candidate #0 [16] struct pt_regs.di (0:14 @ offset 112) libbpf: prog 'handle_uprobe_byname2': relo #0: patched insn #7 (ALU/ALU64) imm 112 -> 112 libbpf: sec 'uretprobe/libc.so.6:malloc': found 1 CO-RE relocations libbpf: prog 'handle_uretprobe_byname2': relo #0: [2] struct pt_regs.ax (0:10 @ offset 80) libbpf: prog 'handle_uretprobe_byname2': relo #0: matching candidate #0 [16] struct pt_regs.ax (0:10 @ offset 80) libbpf: prog 'handle_uretprobe_byname2': relo #0: patched insn #7 (ALU/ALU64) imm 80 -> 80 test_uprobe_autoattach:PASS:skel_open 0 nsec libbpf: elf: failed to find symbol table ELF sections in '/proc/self/exe' libbpf: elf: failed to find symbol 'autoattach_trigger_func' in '/proc/self/exe' libbpf: prog 'handle_uprobe_byname': failed to auto-attach: -2 test_uprobe_autoattach:FAIL:skel_attach unexpected error: -2 (errno 2) #208 uprobe_autoattach:FAIL Summary: 0/0 PASSED, 0 SKIPPED, 1 FAILED Successfully unloaded bpf_testmod.ko. :: [ FAIL ] :: Command './test_progs -vv -t uprobe_autoattach' (Expected 0, got 1, score 3) [17:50:28][root@250.1976_762998096.el9.x86_64+debug]# './test_progs-no_alu32 -t uprobe_autoattach' test_uprobe_autoattach:PASS:skel_open 0 nsec libbpf: elf: failed to find symbol 'autoattach_trigger_func' in '/proc/self/exe' libbpf: prog 'handle_uprobe_byname': failed to auto-attach: -2 test_uprobe_autoattach:FAIL:skel_attach unexpected error: -2 (errno 2) #208 uprobe_autoattach:FAIL All error logs: test_uprobe_autoattach:PASS:skel_open 0 nsec libbpf: elf: failed to find symbol 'autoattach_trigger_func' in '/proc/self/exe' libbpf: prog 'handle_uprobe_byname': failed to auto-attach: -2 test_uprobe_autoattach:FAIL:skel_attach unexpected error: -2 (errno 2) #208 uprobe_autoattach:FAIL Summary: 0/0 PASSED, 0 SKIPPED, 1 FAILED :: [ FAIL ] :: Command './test_progs-no_alu32 -t uprobe_autoattach' (Expected 0, got 1, score 3) === Dmesg result === :: [ PASS ] :: Test '207..253 selftests: bpf_test_progs:uprobe_autoattach [WAIVE]'