mirror of
https://gitee.com/bianbu-linux/linux-6.6
synced 2025-04-24 14:07:52 -04:00
Add fentry_many_args.c and fexit_many_args.c to test the fentry/fexit with 7/11 arguments. As this feature is not supported by arm64 yet, we disable these testcases for arm64 in DENYLIST.aarch64. We can combine them with fentry_test.c/fexit_test.c when arm64 is supported too. Correspondingly, add bpf_testmod_fentry_test7() and bpf_testmod_fentry_test11() to bpf_testmod.c Meanwhile, add bpf_modify_return_test2() to test_run.c to test the MODIFY_RETURN with 7 arguments. Add bpf_testmod_test_struct_arg_7/bpf_testmod_test_struct_arg_7 in bpf_testmod.c to test the struct in the arguments. And the testcases passed on x86_64: ./test_progs -t fexit Summary: 5/14 PASSED, 0 SKIPPED, 0 FAILED ./test_progs -t fentry Summary: 3/2 PASSED, 0 SKIPPED, 0 FAILED ./test_progs -t modify_return Summary: 1/0 PASSED, 0 SKIPPED, 0 FAILED ./test_progs -t tracing_struct Summary: 1/0 PASSED, 0 SKIPPED, 0 FAILED Signed-off-by: Menglong Dong <imagedong@tencent.com> Acked-by: Yonghong Song <yhs@fb.com> Link: https://lore.kernel.org/r/20230713040738.1789742-4-imagedong@tencent.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
187 lines
4 KiB
C
187 lines
4 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Copyright (c) 2022 Meta Platforms, Inc. and affiliates. */
|
|
|
|
#include <vmlinux.h>
|
|
#include <bpf/bpf_tracing.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
|
|
struct bpf_testmod_struct_arg_1 {
|
|
int a;
|
|
};
|
|
struct bpf_testmod_struct_arg_2 {
|
|
long a;
|
|
long b;
|
|
};
|
|
|
|
struct bpf_testmod_struct_arg_3 {
|
|
int a;
|
|
int b[];
|
|
};
|
|
|
|
struct bpf_testmod_struct_arg_4 {
|
|
u64 a;
|
|
int b;
|
|
};
|
|
|
|
long t1_a_a, t1_a_b, t1_b, t1_c, t1_ret, t1_nregs;
|
|
__u64 t1_reg0, t1_reg1, t1_reg2, t1_reg3;
|
|
long t2_a, t2_b_a, t2_b_b, t2_c, t2_ret;
|
|
long t3_a, t3_b, t3_c_a, t3_c_b, t3_ret;
|
|
long t4_a_a, t4_b, t4_c, t4_d, t4_e_a, t4_e_b, t4_ret;
|
|
long t5_ret;
|
|
int t6;
|
|
long t7_a, t7_b, t7_c, t7_d, t7_e, t7_f_a, t7_f_b, t7_ret;
|
|
long t8_a, t8_b, t8_c, t8_d, t8_e, t8_f_a, t8_f_b, t8_g, t8_ret;
|
|
|
|
|
|
SEC("fentry/bpf_testmod_test_struct_arg_1")
|
|
int BPF_PROG2(test_struct_arg_1, struct bpf_testmod_struct_arg_2, a, int, b, int, c)
|
|
{
|
|
t1_a_a = a.a;
|
|
t1_a_b = a.b;
|
|
t1_b = b;
|
|
t1_c = c;
|
|
return 0;
|
|
}
|
|
|
|
SEC("fexit/bpf_testmod_test_struct_arg_1")
|
|
int BPF_PROG2(test_struct_arg_2, struct bpf_testmod_struct_arg_2, a, int, b, int, c, int, ret)
|
|
{
|
|
t1_nregs = bpf_get_func_arg_cnt(ctx);
|
|
/* a.a */
|
|
bpf_get_func_arg(ctx, 0, &t1_reg0);
|
|
/* a.b */
|
|
bpf_get_func_arg(ctx, 1, &t1_reg1);
|
|
/* b */
|
|
bpf_get_func_arg(ctx, 2, &t1_reg2);
|
|
t1_reg2 = (int)t1_reg2;
|
|
/* c */
|
|
bpf_get_func_arg(ctx, 3, &t1_reg3);
|
|
t1_reg3 = (int)t1_reg3;
|
|
|
|
t1_ret = ret;
|
|
return 0;
|
|
}
|
|
|
|
SEC("fentry/bpf_testmod_test_struct_arg_2")
|
|
int BPF_PROG2(test_struct_arg_3, int, a, struct bpf_testmod_struct_arg_2, b, int, c)
|
|
{
|
|
t2_a = a;
|
|
t2_b_a = b.a;
|
|
t2_b_b = b.b;
|
|
t2_c = c;
|
|
return 0;
|
|
}
|
|
|
|
SEC("fexit/bpf_testmod_test_struct_arg_2")
|
|
int BPF_PROG2(test_struct_arg_4, int, a, struct bpf_testmod_struct_arg_2, b, int, c, int, ret)
|
|
{
|
|
t2_ret = ret;
|
|
return 0;
|
|
}
|
|
|
|
SEC("fentry/bpf_testmod_test_struct_arg_3")
|
|
int BPF_PROG2(test_struct_arg_5, int, a, int, b, struct bpf_testmod_struct_arg_2, c)
|
|
{
|
|
t3_a = a;
|
|
t3_b = b;
|
|
t3_c_a = c.a;
|
|
t3_c_b = c.b;
|
|
return 0;
|
|
}
|
|
|
|
SEC("fexit/bpf_testmod_test_struct_arg_3")
|
|
int BPF_PROG2(test_struct_arg_6, int, a, int, b, struct bpf_testmod_struct_arg_2, c, int, ret)
|
|
{
|
|
t3_ret = ret;
|
|
return 0;
|
|
}
|
|
|
|
SEC("fentry/bpf_testmod_test_struct_arg_4")
|
|
int BPF_PROG2(test_struct_arg_7, struct bpf_testmod_struct_arg_1, a, int, b,
|
|
int, c, int, d, struct bpf_testmod_struct_arg_2, e)
|
|
{
|
|
t4_a_a = a.a;
|
|
t4_b = b;
|
|
t4_c = c;
|
|
t4_d = d;
|
|
t4_e_a = e.a;
|
|
t4_e_b = e.b;
|
|
return 0;
|
|
}
|
|
|
|
SEC("fexit/bpf_testmod_test_struct_arg_4")
|
|
int BPF_PROG2(test_struct_arg_8, struct bpf_testmod_struct_arg_1, a, int, b,
|
|
int, c, int, d, struct bpf_testmod_struct_arg_2, e, int, ret)
|
|
{
|
|
t4_ret = ret;
|
|
return 0;
|
|
}
|
|
|
|
SEC("fentry/bpf_testmod_test_struct_arg_5")
|
|
int BPF_PROG2(test_struct_arg_9)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
SEC("fexit/bpf_testmod_test_struct_arg_5")
|
|
int BPF_PROG2(test_struct_arg_10, int, ret)
|
|
{
|
|
t5_ret = ret;
|
|
return 0;
|
|
}
|
|
|
|
SEC("fentry/bpf_testmod_test_struct_arg_6")
|
|
int BPF_PROG2(test_struct_arg_11, struct bpf_testmod_struct_arg_3 *, a)
|
|
{
|
|
t6 = a->b[0];
|
|
return 0;
|
|
}
|
|
|
|
SEC("fentry/bpf_testmod_test_struct_arg_7")
|
|
int BPF_PROG2(test_struct_arg_12, __u64, a, void *, b, short, c, int, d,
|
|
void *, e, struct bpf_testmod_struct_arg_4, f)
|
|
{
|
|
t7_a = a;
|
|
t7_b = (long)b;
|
|
t7_c = c;
|
|
t7_d = d;
|
|
t7_e = (long)e;
|
|
t7_f_a = f.a;
|
|
t7_f_b = f.b;
|
|
return 0;
|
|
}
|
|
|
|
SEC("fexit/bpf_testmod_test_struct_arg_7")
|
|
int BPF_PROG2(test_struct_arg_13, __u64, a, void *, b, short, c, int, d,
|
|
void *, e, struct bpf_testmod_struct_arg_4, f, int, ret)
|
|
{
|
|
t7_ret = ret;
|
|
return 0;
|
|
}
|
|
|
|
SEC("fentry/bpf_testmod_test_struct_arg_8")
|
|
int BPF_PROG2(test_struct_arg_14, __u64, a, void *, b, short, c, int, d,
|
|
void *, e, struct bpf_testmod_struct_arg_4, f, int, g)
|
|
{
|
|
t8_a = a;
|
|
t8_b = (long)b;
|
|
t8_c = c;
|
|
t8_d = d;
|
|
t8_e = (long)e;
|
|
t8_f_a = f.a;
|
|
t8_f_b = f.b;
|
|
t8_g = g;
|
|
return 0;
|
|
}
|
|
|
|
SEC("fexit/bpf_testmod_test_struct_arg_8")
|
|
int BPF_PROG2(test_struct_arg_15, __u64, a, void *, b, short, c, int, d,
|
|
void *, e, struct bpf_testmod_struct_arg_4, f, int, g,
|
|
int, ret)
|
|
{
|
|
t8_ret = ret;
|
|
return 0;
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|