mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-08-05 16:54:27 +00:00

Test gen_prologue and gen_epilogue that generate kfuncs that have not
been seen in the main program.
The main bpf program and return value checks are identical to
pro_epilogue.c introduced in commit 47e69431b5
("selftests/bpf: Test
gen_prologue and gen_epilogue"). However, now when bpf_testmod_st_ops
detects a program name with prefix "test_kfunc_", it generates slightly
different prologue and epilogue: They still add 1000 to args->a in
prologue, add 10000 to args->a and set r0 to 2 * args->a in epilogue,
but involve kfuncs.
At high level, the alternative version of prologue and epilogue look
like this:
cgrp = bpf_cgroup_from_id(0);
if (cgrp)
bpf_cgroup_release(cgrp);
else
/* Perform what original bpf_testmod_st_ops prologue or
* epilogue does
*/
Since 0 is never a valid cgroup id, the original prologue or epilogue
logic will be performed. As a result, the __retval check should expect
the exact same return value.
Signed-off-by: Amery Hung <ameryhung@gmail.com>
Acked-by: Martin KaFai Lau <martin.lau@kernel.org>
Link: https://lore.kernel.org/r/20250225233545.285481-2-ameryhung@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
62 lines
1.8 KiB
C
62 lines
1.8 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/* Copyright (c) 2024 Meta Platforms, Inc. and affiliates. */
|
|
|
|
#include <test_progs.h>
|
|
#include "pro_epilogue.skel.h"
|
|
#include "epilogue_tailcall.skel.h"
|
|
#include "pro_epilogue_goto_start.skel.h"
|
|
#include "epilogue_exit.skel.h"
|
|
#include "pro_epilogue_with_kfunc.skel.h"
|
|
|
|
struct st_ops_args {
|
|
__u64 a;
|
|
};
|
|
|
|
static void test_tailcall(void)
|
|
{
|
|
LIBBPF_OPTS(bpf_test_run_opts, topts);
|
|
struct epilogue_tailcall *skel;
|
|
struct st_ops_args args;
|
|
int err, prog_fd;
|
|
|
|
skel = epilogue_tailcall__open_and_load();
|
|
if (!ASSERT_OK_PTR(skel, "epilogue_tailcall__open_and_load"))
|
|
return;
|
|
|
|
topts.ctx_in = &args;
|
|
topts.ctx_size_in = sizeof(args);
|
|
|
|
skel->links.epilogue_tailcall =
|
|
bpf_map__attach_struct_ops(skel->maps.epilogue_tailcall);
|
|
if (!ASSERT_OK_PTR(skel->links.epilogue_tailcall, "attach_struct_ops"))
|
|
goto done;
|
|
|
|
/* Both test_epilogue_tailcall and test_epilogue_subprog are
|
|
* patched with epilogue. When syscall_epilogue_tailcall()
|
|
* is run, test_epilogue_tailcall() is triggered.
|
|
* It executes a tail call and control is transferred to
|
|
* test_epilogue_subprog(). Only test_epilogue_subprog()
|
|
* does args->a += 1, thus final args.a value of 10001
|
|
* guarantees that only the epilogue of the
|
|
* test_epilogue_subprog is executed.
|
|
*/
|
|
memset(&args, 0, sizeof(args));
|
|
prog_fd = bpf_program__fd(skel->progs.syscall_epilogue_tailcall);
|
|
err = bpf_prog_test_run_opts(prog_fd, &topts);
|
|
ASSERT_OK(err, "bpf_prog_test_run_opts");
|
|
ASSERT_EQ(args.a, 10001, "args.a");
|
|
ASSERT_EQ(topts.retval, 10001 * 2, "topts.retval");
|
|
|
|
done:
|
|
epilogue_tailcall__destroy(skel);
|
|
}
|
|
|
|
void test_pro_epilogue(void)
|
|
{
|
|
RUN_TESTS(pro_epilogue);
|
|
RUN_TESTS(pro_epilogue_goto_start);
|
|
RUN_TESTS(epilogue_exit);
|
|
RUN_TESTS(pro_epilogue_with_kfunc);
|
|
if (test__start_subtest("tailcall"))
|
|
test_tailcall();
|
|
}
|