diff mbox series

[16/19] selftests/bpf: Add fentry multi func test

Message ID 20210605111034.1810858-17-jolsa@kernel.org
State New
Headers show
Series x86/ftrace/bpf: Add batch support for direct/tracing attach | expand

Commit Message

Jiri Olsa June 5, 2021, 11:10 a.m. UTC
Adding selftest for fentry multi func test that attaches
to bpf_fentry_test* functions and checks argument values
based on the processed function.

Signed-off-by: Jiri Olsa <jolsa@kernel.org>
---
 tools/testing/selftests/bpf/multi_check.h     | 52 +++++++++++++++++++
 .../bpf/prog_tests/fentry_multi_test.c        | 43 +++++++++++++++
 .../selftests/bpf/progs/fentry_multi_test.c   | 18 +++++++
 3 files changed, 113 insertions(+)
 create mode 100644 tools/testing/selftests/bpf/multi_check.h
 create mode 100644 tools/testing/selftests/bpf/prog_tests/fentry_multi_test.c
 create mode 100644 tools/testing/selftests/bpf/progs/fentry_multi_test.c

Comments

Yonghong Song June 7, 2021, 6:06 a.m. UTC | #1
On 6/5/21 4:10 AM, Jiri Olsa wrote:
> Adding selftest for fentry multi func test that attaches

> to bpf_fentry_test* functions and checks argument values

> based on the processed function.

> 

> Signed-off-by: Jiri Olsa <jolsa@kernel.org>

> ---

>   tools/testing/selftests/bpf/multi_check.h     | 52 +++++++++++++++++++


Should we put this file under selftests/bpf/progs directory?
It is included only by bpf programs.

>   .../bpf/prog_tests/fentry_multi_test.c        | 43 +++++++++++++++

>   .../selftests/bpf/progs/fentry_multi_test.c   | 18 +++++++

>   3 files changed, 113 insertions(+)

>   create mode 100644 tools/testing/selftests/bpf/multi_check.h

>   create mode 100644 tools/testing/selftests/bpf/prog_tests/fentry_multi_test.c

>   create mode 100644 tools/testing/selftests/bpf/progs/fentry_multi_test.c

> 

> diff --git a/tools/testing/selftests/bpf/multi_check.h b/tools/testing/selftests/bpf/multi_check.h

> new file mode 100644

> index 000000000000..36c2a93f9be3

> --- /dev/null

> +++ b/tools/testing/selftests/bpf/multi_check.h

> @@ -0,0 +1,52 @@

> +/* SPDX-License-Identifier: GPL-2.0 */

> +

> +#ifndef __MULTI_CHECK_H

> +#define __MULTI_CHECK_H

> +

> +extern unsigned long long bpf_fentry_test[8];

> +

> +static __attribute__((unused)) inline

> +void multi_arg_check(unsigned long ip, __u64 a, __u64 b, __u64 c, __u64 d, __u64 e, __u64 f, __u64 *test_result)

> +{

> +	if (ip == bpf_fentry_test[0]) {

> +		*test_result += (int) a == 1;

> +	} else if (ip == bpf_fentry_test[1]) {

> +		*test_result += (int) a == 2 && (__u64) b == 3;

> +	} else if (ip == bpf_fentry_test[2]) {

> +		*test_result += (char) a == 4 && (int) b == 5 && (__u64) c == 6;

> +	} else if (ip == bpf_fentry_test[3]) {

> +		*test_result += (void *) a == (void *) 7 && (char) b == 8 && (int) c == 9 && (__u64) d == 10;

> +	} else if (ip == bpf_fentry_test[4]) {

> +		*test_result += (__u64) a == 11 && (void *) b == (void *) 12 && (short) c == 13 && (int) d == 14 && (__u64) e == 15;

> +	} else if (ip == bpf_fentry_test[5]) {

> +		*test_result += (__u64) a == 16 && (void *) b == (void *) 17 && (short) c == 18 && (int) d == 19 && (void *) e == (void *) 20 && (__u64) f == 21;

> +	} else if (ip == bpf_fentry_test[6]) {

> +		*test_result += 1;

> +	} else if (ip == bpf_fentry_test[7]) {

> +		*test_result += 1;

> +	}

> +}

> +

> +static __attribute__((unused)) inline

> +void multi_ret_check(unsigned long ip, int ret, __u64 *test_result)

> +{

> +	if (ip == bpf_fentry_test[0]) {

> +		*test_result += ret == 2;

> +	} else if (ip == bpf_fentry_test[1]) {

> +		*test_result += ret == 5;

> +	} else if (ip == bpf_fentry_test[2]) {

> +		*test_result += ret == 15;

> +	} else if (ip == bpf_fentry_test[3]) {

> +		*test_result += ret == 34;

> +	} else if (ip == bpf_fentry_test[4]) {

> +		*test_result += ret == 65;

> +	} else if (ip == bpf_fentry_test[5]) {

> +		*test_result += ret == 111;

> +	} else if (ip == bpf_fentry_test[6]) {

> +		*test_result += ret == 0;

> +	} else if (ip == bpf_fentry_test[7]) {

> +		*test_result += ret == 0;

> +	}

> +}

> +

> +#endif /* __MULTI_CHECK_H */

> diff --git a/tools/testing/selftests/bpf/prog_tests/fentry_multi_test.c b/tools/testing/selftests/bpf/prog_tests/fentry_multi_test.c

> new file mode 100644

> index 000000000000..e4a8089533d6

> --- /dev/null

> +++ b/tools/testing/selftests/bpf/prog_tests/fentry_multi_test.c

> @@ -0,0 +1,43 @@

> +// SPDX-License-Identifier: GPL-2.0

> +#include <test_progs.h>

> +#include "fentry_multi_test.skel.h"

> +#include "trace_helpers.h"

> +

> +void test_fentry_multi_test(void)

> +{

> +	struct fentry_multi_test *skel = NULL;

> +	unsigned long long *bpf_fentry_test;

> +	__u32 duration = 0, retval;

> +	int err, prog_fd;

> +

> +	skel = fentry_multi_test__open_and_load();

> +	if (!ASSERT_OK_PTR(skel, "fentry_multi_skel_load"))

> +		goto cleanup;

> +

> +	bpf_fentry_test = &skel->bss->bpf_fentry_test[0];

> +	ASSERT_OK(kallsyms_find("bpf_fentry_test1", &bpf_fentry_test[0]), "kallsyms_find");

> +	ASSERT_OK(kallsyms_find("bpf_fentry_test2", &bpf_fentry_test[1]), "kallsyms_find");

> +	ASSERT_OK(kallsyms_find("bpf_fentry_test3", &bpf_fentry_test[2]), "kallsyms_find");

> +	ASSERT_OK(kallsyms_find("bpf_fentry_test4", &bpf_fentry_test[3]), "kallsyms_find");

> +	ASSERT_OK(kallsyms_find("bpf_fentry_test5", &bpf_fentry_test[4]), "kallsyms_find");

> +	ASSERT_OK(kallsyms_find("bpf_fentry_test6", &bpf_fentry_test[5]), "kallsyms_find");

> +	ASSERT_OK(kallsyms_find("bpf_fentry_test7", &bpf_fentry_test[6]), "kallsyms_find");

> +	ASSERT_OK(kallsyms_find("bpf_fentry_test8", &bpf_fentry_test[7]), "kallsyms_find");

> +

> +	err = fentry_multi_test__attach(skel);

> +	if (!ASSERT_OK(err, "fentry_attach"))

> +		goto cleanup;

> +

> +	prog_fd = bpf_program__fd(skel->progs.test);

> +	err = bpf_prog_test_run(prog_fd, 1, NULL, 0,

> +				NULL, NULL, &retval, &duration);

> +	ASSERT_OK(err, "test_run");

> +	ASSERT_EQ(retval, 0, "test_run");

> +

> +	ASSERT_EQ(skel->bss->test_result, 8, "test_result");

> +

> +	fentry_multi_test__detach(skel);

> +

> +cleanup:

> +	fentry_multi_test__destroy(skel);

> +}

> diff --git a/tools/testing/selftests/bpf/progs/fentry_multi_test.c b/tools/testing/selftests/bpf/progs/fentry_multi_test.c

> new file mode 100644

> index 000000000000..a443fc958e5a

> --- /dev/null

> +++ b/tools/testing/selftests/bpf/progs/fentry_multi_test.c

> @@ -0,0 +1,18 @@

> +// SPDX-License-Identifier: GPL-2.0

> +#include <linux/bpf.h>

> +#include <bpf/bpf_helpers.h>

> +#include <bpf/bpf_tracing.h>

> +#include "multi_check.h"

> +

> +char _license[] SEC("license") = "GPL";

> +

> +unsigned long long bpf_fentry_test[8];

> +

> +__u64 test_result = 0;

> +

> +SEC("fentry.multi/bpf_fentry_test*")

> +int BPF_PROG(test, unsigned long ip, __u64 a, __u64 b, __u64 c, __u64 d, __u64 e, __u64 f)

> +{

> +	multi_arg_check(ip, a, b, c, d, e, f, &test_result);

> +	return 0;

> +}

>
Jiri Olsa June 7, 2021, 6:42 p.m. UTC | #2
On Sun, Jun 06, 2021 at 11:06:14PM -0700, Yonghong Song wrote:
> 

> 

> On 6/5/21 4:10 AM, Jiri Olsa wrote:

> > Adding selftest for fentry multi func test that attaches

> > to bpf_fentry_test* functions and checks argument values

> > based on the processed function.

> > 

> > Signed-off-by: Jiri Olsa <jolsa@kernel.org>

> > ---

> >   tools/testing/selftests/bpf/multi_check.h     | 52 +++++++++++++++++++

> 

> Should we put this file under selftests/bpf/progs directory?

> It is included only by bpf programs.


ok

jirka
Andrii Nakryiko June 9, 2021, 5:40 a.m. UTC | #3
On Sat, Jun 5, 2021 at 4:12 AM Jiri Olsa <jolsa@kernel.org> wrote:
>

> Adding selftest for fentry multi func test that attaches

> to bpf_fentry_test* functions and checks argument values

> based on the processed function.

>

> Signed-off-by: Jiri Olsa <jolsa@kernel.org>

> ---

>  tools/testing/selftests/bpf/multi_check.h     | 52 +++++++++++++++++++

>  .../bpf/prog_tests/fentry_multi_test.c        | 43 +++++++++++++++

>  .../selftests/bpf/progs/fentry_multi_test.c   | 18 +++++++

>  3 files changed, 113 insertions(+)

>  create mode 100644 tools/testing/selftests/bpf/multi_check.h

>  create mode 100644 tools/testing/selftests/bpf/prog_tests/fentry_multi_test.c

>  create mode 100644 tools/testing/selftests/bpf/progs/fentry_multi_test.c

>

> diff --git a/tools/testing/selftests/bpf/multi_check.h b/tools/testing/selftests/bpf/multi_check.h

> new file mode 100644

> index 000000000000..36c2a93f9be3

> --- /dev/null

> +++ b/tools/testing/selftests/bpf/multi_check.h


we have a proper static linking now, we don't have to use header
inclusion hacks, let's do this properly?

> @@ -0,0 +1,52 @@

> +/* SPDX-License-Identifier: GPL-2.0 */

> +

> +#ifndef __MULTI_CHECK_H

> +#define __MULTI_CHECK_H

> +

> +extern unsigned long long bpf_fentry_test[8];

> +

> +static __attribute__((unused)) inline

> +void multi_arg_check(unsigned long ip, __u64 a, __u64 b, __u64 c, __u64 d, __u64 e, __u64 f, __u64 *test_result)

> +{

> +       if (ip == bpf_fentry_test[0]) {

> +               *test_result += (int) a == 1;

> +       } else if (ip == bpf_fentry_test[1]) {

> +               *test_result += (int) a == 2 && (__u64) b == 3;

> +       } else if (ip == bpf_fentry_test[2]) {

> +               *test_result += (char) a == 4 && (int) b == 5 && (__u64) c == 6;

> +       } else if (ip == bpf_fentry_test[3]) {

> +               *test_result += (void *) a == (void *) 7 && (char) b == 8 && (int) c == 9 && (__u64) d == 10;

> +       } else if (ip == bpf_fentry_test[4]) {

> +               *test_result += (__u64) a == 11 && (void *) b == (void *) 12 && (short) c == 13 && (int) d == 14 && (__u64) e == 15;

> +       } else if (ip == bpf_fentry_test[5]) {

> +               *test_result += (__u64) a == 16 && (void *) b == (void *) 17 && (short) c == 18 && (int) d == 19 && (void *) e == (void *) 20 && (__u64) f == 21;

> +       } else if (ip == bpf_fentry_test[6]) {

> +               *test_result += 1;

> +       } else if (ip == bpf_fentry_test[7]) {

> +               *test_result += 1;

> +       }


why not use switch? and why the casting?

> +}

> +


[...]

> diff --git a/tools/testing/selftests/bpf/progs/fentry_multi_test.c b/tools/testing/selftests/bpf/progs/fentry_multi_test.c

> new file mode 100644

> index 000000000000..a443fc958e5a

> --- /dev/null

> +++ b/tools/testing/selftests/bpf/progs/fentry_multi_test.c

> @@ -0,0 +1,18 @@

> +// SPDX-License-Identifier: GPL-2.0

> +#include <linux/bpf.h>

> +#include <bpf/bpf_helpers.h>

> +#include <bpf/bpf_tracing.h>

> +#include "multi_check.h"

> +

> +char _license[] SEC("license") = "GPL";

> +

> +unsigned long long bpf_fentry_test[8];

> +

> +__u64 test_result = 0;

> +

> +SEC("fentry.multi/bpf_fentry_test*")


wait, that's a regexp syntax that libc supports?.. Not .*? We should
definitely not provide btf__find_by_pattern_kind() API, I'd like to
avoid explaining what flavors of regexps libbpf supports.

> +int BPF_PROG(test, unsigned long ip, __u64 a, __u64 b, __u64 c, __u64 d, __u64 e, __u64 f)

> +{

> +       multi_arg_check(ip, a, b, c, d, e, f, &test_result);

> +       return 0;

> +}

> --

> 2.31.1

>
Jiri Olsa June 9, 2021, 2:29 p.m. UTC | #4
On Tue, Jun 08, 2021 at 10:40:24PM -0700, Andrii Nakryiko wrote:
> On Sat, Jun 5, 2021 at 4:12 AM Jiri Olsa <jolsa@kernel.org> wrote:

> >

> > Adding selftest for fentry multi func test that attaches

> > to bpf_fentry_test* functions and checks argument values

> > based on the processed function.

> >

> > Signed-off-by: Jiri Olsa <jolsa@kernel.org>

> > ---

> >  tools/testing/selftests/bpf/multi_check.h     | 52 +++++++++++++++++++

> >  .../bpf/prog_tests/fentry_multi_test.c        | 43 +++++++++++++++

> >  .../selftests/bpf/progs/fentry_multi_test.c   | 18 +++++++

> >  3 files changed, 113 insertions(+)

> >  create mode 100644 tools/testing/selftests/bpf/multi_check.h

> >  create mode 100644 tools/testing/selftests/bpf/prog_tests/fentry_multi_test.c

> >  create mode 100644 tools/testing/selftests/bpf/progs/fentry_multi_test.c

> >

> > diff --git a/tools/testing/selftests/bpf/multi_check.h b/tools/testing/selftests/bpf/multi_check.h

> > new file mode 100644

> > index 000000000000..36c2a93f9be3

> > --- /dev/null

> > +++ b/tools/testing/selftests/bpf/multi_check.h

> 

> we have a proper static linking now, we don't have to use header

> inclusion hacks, let's do this properly?


ok, will change

> 

> > @@ -0,0 +1,52 @@

> > +/* SPDX-License-Identifier: GPL-2.0 */

> > +

> > +#ifndef __MULTI_CHECK_H

> > +#define __MULTI_CHECK_H

> > +

> > +extern unsigned long long bpf_fentry_test[8];

> > +

> > +static __attribute__((unused)) inline

> > +void multi_arg_check(unsigned long ip, __u64 a, __u64 b, __u64 c, __u64 d, __u64 e, __u64 f, __u64 *test_result)

> > +{

> > +       if (ip == bpf_fentry_test[0]) {

> > +               *test_result += (int) a == 1;

> > +       } else if (ip == bpf_fentry_test[1]) {

> > +               *test_result += (int) a == 2 && (__u64) b == 3;

> > +       } else if (ip == bpf_fentry_test[2]) {

> > +               *test_result += (char) a == 4 && (int) b == 5 && (__u64) c == 6;

> > +       } else if (ip == bpf_fentry_test[3]) {

> > +               *test_result += (void *) a == (void *) 7 && (char) b == 8 && (int) c == 9 && (__u64) d == 10;

> > +       } else if (ip == bpf_fentry_test[4]) {

> > +               *test_result += (__u64) a == 11 && (void *) b == (void *) 12 && (short) c == 13 && (int) d == 14 && (__u64) e == 15;

> > +       } else if (ip == bpf_fentry_test[5]) {

> > +               *test_result += (__u64) a == 16 && (void *) b == (void *) 17 && (short) c == 18 && (int) d == 19 && (void *) e == (void *) 20 && (__u64) f == 21;

> > +       } else if (ip == bpf_fentry_test[6]) {

> > +               *test_result += 1;

> > +       } else if (ip == bpf_fentry_test[7]) {

> > +               *test_result += 1;

> > +       }

> 

> why not use switch? and why the casting?


hum, for switch I'd need constants right? 

casting is extra ;-) wanted to check the actual argument types,
but probably makes no sense

will check

> 

> > +}

> > +

> 

> [...]

> 

> > diff --git a/tools/testing/selftests/bpf/progs/fentry_multi_test.c b/tools/testing/selftests/bpf/progs/fentry_multi_test.c

> > new file mode 100644

> > index 000000000000..a443fc958e5a

> > --- /dev/null

> > +++ b/tools/testing/selftests/bpf/progs/fentry_multi_test.c

> > @@ -0,0 +1,18 @@

> > +// SPDX-License-Identifier: GPL-2.0

> > +#include <linux/bpf.h>

> > +#include <bpf/bpf_helpers.h>

> > +#include <bpf/bpf_tracing.h>

> > +#include "multi_check.h"

> > +

> > +char _license[] SEC("license") = "GPL";

> > +

> > +unsigned long long bpf_fentry_test[8];

> > +

> > +__u64 test_result = 0;

> > +

> > +SEC("fentry.multi/bpf_fentry_test*")

> 

> wait, that's a regexp syntax that libc supports?.. Not .*? We should

> definitely not provide btf__find_by_pattern_kind() API, I'd like to

> avoid explaining what flavors of regexps libbpf supports.


ok

thanks,
jirka
Andrii Nakryiko June 10, 2021, 5 p.m. UTC | #5
On Wed, Jun 9, 2021 at 7:29 AM Jiri Olsa <jolsa@redhat.com> wrote:
>

> On Tue, Jun 08, 2021 at 10:40:24PM -0700, Andrii Nakryiko wrote:

> > On Sat, Jun 5, 2021 at 4:12 AM Jiri Olsa <jolsa@kernel.org> wrote:

> > >

> > > Adding selftest for fentry multi func test that attaches

> > > to bpf_fentry_test* functions and checks argument values

> > > based on the processed function.

> > >

> > > Signed-off-by: Jiri Olsa <jolsa@kernel.org>

> > > ---

> > >  tools/testing/selftests/bpf/multi_check.h     | 52 +++++++++++++++++++

> > >  .../bpf/prog_tests/fentry_multi_test.c        | 43 +++++++++++++++

> > >  .../selftests/bpf/progs/fentry_multi_test.c   | 18 +++++++

> > >  3 files changed, 113 insertions(+)

> > >  create mode 100644 tools/testing/selftests/bpf/multi_check.h

> > >  create mode 100644 tools/testing/selftests/bpf/prog_tests/fentry_multi_test.c

> > >  create mode 100644 tools/testing/selftests/bpf/progs/fentry_multi_test.c

> > >

> > > diff --git a/tools/testing/selftests/bpf/multi_check.h b/tools/testing/selftests/bpf/multi_check.h

> > > new file mode 100644

> > > index 000000000000..36c2a93f9be3

> > > --- /dev/null

> > > +++ b/tools/testing/selftests/bpf/multi_check.h

> >

> > we have a proper static linking now, we don't have to use header

> > inclusion hacks, let's do this properly?

>

> ok, will change

>

> >

> > > @@ -0,0 +1,52 @@

> > > +/* SPDX-License-Identifier: GPL-2.0 */

> > > +

> > > +#ifndef __MULTI_CHECK_H

> > > +#define __MULTI_CHECK_H

> > > +

> > > +extern unsigned long long bpf_fentry_test[8];

> > > +

> > > +static __attribute__((unused)) inline

> > > +void multi_arg_check(unsigned long ip, __u64 a, __u64 b, __u64 c, __u64 d, __u64 e, __u64 f, __u64 *test_result)

> > > +{

> > > +       if (ip == bpf_fentry_test[0]) {

> > > +               *test_result += (int) a == 1;

> > > +       } else if (ip == bpf_fentry_test[1]) {

> > > +               *test_result += (int) a == 2 && (__u64) b == 3;

> > > +       } else if (ip == bpf_fentry_test[2]) {

> > > +               *test_result += (char) a == 4 && (int) b == 5 && (__u64) c == 6;

> > > +       } else if (ip == bpf_fentry_test[3]) {

> > > +               *test_result += (void *) a == (void *) 7 && (char) b == 8 && (int) c == 9 && (__u64) d == 10;

> > > +       } else if (ip == bpf_fentry_test[4]) {

> > > +               *test_result += (__u64) a == 11 && (void *) b == (void *) 12 && (short) c == 13 && (int) d == 14 && (__u64) e == 15;

> > > +       } else if (ip == bpf_fentry_test[5]) {

> > > +               *test_result += (__u64) a == 16 && (void *) b == (void *) 17 && (short) c == 18 && (int) d == 19 && (void *) e == (void *) 20 && (__u64) f == 21;

> > > +       } else if (ip == bpf_fentry_test[6]) {

> > > +               *test_result += 1;

> > > +       } else if (ip == bpf_fentry_test[7]) {

> > > +               *test_result += 1;

> > > +       }

> >

> > why not use switch? and why the casting?

>

> hum, for switch I'd need constants right?


doh, of course :)

but! you don't need to fill out bpf_fentry_test[] array from
user-space, just use extern const void variables to get addresses of
those functions:

extern const void bpf_fentry_test1 __ksym;
extern const void bpf_fentry_test2 __ksym;
...

>

> casting is extra ;-) wanted to check the actual argument types,

> but probably makes no sense


probably doesn't given you already declared it u64 and use integer
values for comparison

>

> will check

>

> >

> > > +}

> > > +

> >

> > [...]

> >

> > > diff --git a/tools/testing/selftests/bpf/progs/fentry_multi_test.c b/tools/testing/selftests/bpf/progs/fentry_multi_test.c

> > > new file mode 100644

> > > index 000000000000..a443fc958e5a

> > > --- /dev/null

> > > +++ b/tools/testing/selftests/bpf/progs/fentry_multi_test.c

> > > @@ -0,0 +1,18 @@

> > > +// SPDX-License-Identifier: GPL-2.0

> > > +#include <linux/bpf.h>

> > > +#include <bpf/bpf_helpers.h>

> > > +#include <bpf/bpf_tracing.h>

> > > +#include "multi_check.h"

> > > +

> > > +char _license[] SEC("license") = "GPL";

> > > +

> > > +unsigned long long bpf_fentry_test[8];

> > > +

> > > +__u64 test_result = 0;

> > > +

> > > +SEC("fentry.multi/bpf_fentry_test*")

> >

> > wait, that's a regexp syntax that libc supports?.. Not .*? We should

> > definitely not provide btf__find_by_pattern_kind() API, I'd like to

> > avoid explaining what flavors of regexps libbpf supports.

>

> ok

>

> thanks,

> jirka

>
Jiri Olsa June 10, 2021, 8:28 p.m. UTC | #6
On Thu, Jun 10, 2021 at 10:00:34AM -0700, Andrii Nakryiko wrote:
> On Wed, Jun 9, 2021 at 7:29 AM Jiri Olsa <jolsa@redhat.com> wrote:

> >

> > On Tue, Jun 08, 2021 at 10:40:24PM -0700, Andrii Nakryiko wrote:

> > > On Sat, Jun 5, 2021 at 4:12 AM Jiri Olsa <jolsa@kernel.org> wrote:

> > > >

> > > > Adding selftest for fentry multi func test that attaches

> > > > to bpf_fentry_test* functions and checks argument values

> > > > based on the processed function.

> > > >

> > > > Signed-off-by: Jiri Olsa <jolsa@kernel.org>

> > > > ---

> > > >  tools/testing/selftests/bpf/multi_check.h     | 52 +++++++++++++++++++

> > > >  .../bpf/prog_tests/fentry_multi_test.c        | 43 +++++++++++++++

> > > >  .../selftests/bpf/progs/fentry_multi_test.c   | 18 +++++++

> > > >  3 files changed, 113 insertions(+)

> > > >  create mode 100644 tools/testing/selftests/bpf/multi_check.h

> > > >  create mode 100644 tools/testing/selftests/bpf/prog_tests/fentry_multi_test.c

> > > >  create mode 100644 tools/testing/selftests/bpf/progs/fentry_multi_test.c

> > > >

> > > > diff --git a/tools/testing/selftests/bpf/multi_check.h b/tools/testing/selftests/bpf/multi_check.h

> > > > new file mode 100644

> > > > index 000000000000..36c2a93f9be3

> > > > --- /dev/null

> > > > +++ b/tools/testing/selftests/bpf/multi_check.h

> > >

> > > we have a proper static linking now, we don't have to use header

> > > inclusion hacks, let's do this properly?

> >

> > ok, will change

> >

> > >

> > > > @@ -0,0 +1,52 @@

> > > > +/* SPDX-License-Identifier: GPL-2.0 */

> > > > +

> > > > +#ifndef __MULTI_CHECK_H

> > > > +#define __MULTI_CHECK_H

> > > > +

> > > > +extern unsigned long long bpf_fentry_test[8];

> > > > +

> > > > +static __attribute__((unused)) inline

> > > > +void multi_arg_check(unsigned long ip, __u64 a, __u64 b, __u64 c, __u64 d, __u64 e, __u64 f, __u64 *test_result)

> > > > +{

> > > > +       if (ip == bpf_fentry_test[0]) {

> > > > +               *test_result += (int) a == 1;

> > > > +       } else if (ip == bpf_fentry_test[1]) {

> > > > +               *test_result += (int) a == 2 && (__u64) b == 3;

> > > > +       } else if (ip == bpf_fentry_test[2]) {

> > > > +               *test_result += (char) a == 4 && (int) b == 5 && (__u64) c == 6;

> > > > +       } else if (ip == bpf_fentry_test[3]) {

> > > > +               *test_result += (void *) a == (void *) 7 && (char) b == 8 && (int) c == 9 && (__u64) d == 10;

> > > > +       } else if (ip == bpf_fentry_test[4]) {

> > > > +               *test_result += (__u64) a == 11 && (void *) b == (void *) 12 && (short) c == 13 && (int) d == 14 && (__u64) e == 15;

> > > > +       } else if (ip == bpf_fentry_test[5]) {

> > > > +               *test_result += (__u64) a == 16 && (void *) b == (void *) 17 && (short) c == 18 && (int) d == 19 && (void *) e == (void *) 20 && (__u64) f == 21;

> > > > +       } else if (ip == bpf_fentry_test[6]) {

> > > > +               *test_result += 1;

> > > > +       } else if (ip == bpf_fentry_test[7]) {

> > > > +               *test_result += 1;

> > > > +       }

> > >

> > > why not use switch? and why the casting?

> >

> > hum, for switch I'd need constants right?

> 

> doh, of course :)

> 

> but! you don't need to fill out bpf_fentry_test[] array from

> user-space, just use extern const void variables to get addresses of

> those functions:

> 

> extern const void bpf_fentry_test1 __ksym;

> extern const void bpf_fentry_test2 __ksym;

> ...


nice, will use that

jirka
diff mbox series

Patch

diff --git a/tools/testing/selftests/bpf/multi_check.h b/tools/testing/selftests/bpf/multi_check.h
new file mode 100644
index 000000000000..36c2a93f9be3
--- /dev/null
+++ b/tools/testing/selftests/bpf/multi_check.h
@@ -0,0 +1,52 @@ 
+/* SPDX-License-Identifier: GPL-2.0 */
+
+#ifndef __MULTI_CHECK_H
+#define __MULTI_CHECK_H
+
+extern unsigned long long bpf_fentry_test[8];
+
+static __attribute__((unused)) inline
+void multi_arg_check(unsigned long ip, __u64 a, __u64 b, __u64 c, __u64 d, __u64 e, __u64 f, __u64 *test_result)
+{
+	if (ip == bpf_fentry_test[0]) {
+		*test_result += (int) a == 1;
+	} else if (ip == bpf_fentry_test[1]) {
+		*test_result += (int) a == 2 && (__u64) b == 3;
+	} else if (ip == bpf_fentry_test[2]) {
+		*test_result += (char) a == 4 && (int) b == 5 && (__u64) c == 6;
+	} else if (ip == bpf_fentry_test[3]) {
+		*test_result += (void *) a == (void *) 7 && (char) b == 8 && (int) c == 9 && (__u64) d == 10;
+	} else if (ip == bpf_fentry_test[4]) {
+		*test_result += (__u64) a == 11 && (void *) b == (void *) 12 && (short) c == 13 && (int) d == 14 && (__u64) e == 15;
+	} else if (ip == bpf_fentry_test[5]) {
+		*test_result += (__u64) a == 16 && (void *) b == (void *) 17 && (short) c == 18 && (int) d == 19 && (void *) e == (void *) 20 && (__u64) f == 21;
+	} else if (ip == bpf_fentry_test[6]) {
+		*test_result += 1;
+	} else if (ip == bpf_fentry_test[7]) {
+		*test_result += 1;
+	}
+}
+
+static __attribute__((unused)) inline
+void multi_ret_check(unsigned long ip, int ret, __u64 *test_result)
+{
+	if (ip == bpf_fentry_test[0]) {
+		*test_result += ret == 2;
+	} else if (ip == bpf_fentry_test[1]) {
+		*test_result += ret == 5;
+	} else if (ip == bpf_fentry_test[2]) {
+		*test_result += ret == 15;
+	} else if (ip == bpf_fentry_test[3]) {
+		*test_result += ret == 34;
+	} else if (ip == bpf_fentry_test[4]) {
+		*test_result += ret == 65;
+	} else if (ip == bpf_fentry_test[5]) {
+		*test_result += ret == 111;
+	} else if (ip == bpf_fentry_test[6]) {
+		*test_result += ret == 0;
+	} else if (ip == bpf_fentry_test[7]) {
+		*test_result += ret == 0;
+	}
+}
+
+#endif /* __MULTI_CHECK_H */
diff --git a/tools/testing/selftests/bpf/prog_tests/fentry_multi_test.c b/tools/testing/selftests/bpf/prog_tests/fentry_multi_test.c
new file mode 100644
index 000000000000..e4a8089533d6
--- /dev/null
+++ b/tools/testing/selftests/bpf/prog_tests/fentry_multi_test.c
@@ -0,0 +1,43 @@ 
+// SPDX-License-Identifier: GPL-2.0
+#include <test_progs.h>
+#include "fentry_multi_test.skel.h"
+#include "trace_helpers.h"
+
+void test_fentry_multi_test(void)
+{
+	struct fentry_multi_test *skel = NULL;
+	unsigned long long *bpf_fentry_test;
+	__u32 duration = 0, retval;
+	int err, prog_fd;
+
+	skel = fentry_multi_test__open_and_load();
+	if (!ASSERT_OK_PTR(skel, "fentry_multi_skel_load"))
+		goto cleanup;
+
+	bpf_fentry_test = &skel->bss->bpf_fentry_test[0];
+	ASSERT_OK(kallsyms_find("bpf_fentry_test1", &bpf_fentry_test[0]), "kallsyms_find");
+	ASSERT_OK(kallsyms_find("bpf_fentry_test2", &bpf_fentry_test[1]), "kallsyms_find");
+	ASSERT_OK(kallsyms_find("bpf_fentry_test3", &bpf_fentry_test[2]), "kallsyms_find");
+	ASSERT_OK(kallsyms_find("bpf_fentry_test4", &bpf_fentry_test[3]), "kallsyms_find");
+	ASSERT_OK(kallsyms_find("bpf_fentry_test5", &bpf_fentry_test[4]), "kallsyms_find");
+	ASSERT_OK(kallsyms_find("bpf_fentry_test6", &bpf_fentry_test[5]), "kallsyms_find");
+	ASSERT_OK(kallsyms_find("bpf_fentry_test7", &bpf_fentry_test[6]), "kallsyms_find");
+	ASSERT_OK(kallsyms_find("bpf_fentry_test8", &bpf_fentry_test[7]), "kallsyms_find");
+
+	err = fentry_multi_test__attach(skel);
+	if (!ASSERT_OK(err, "fentry_attach"))
+		goto cleanup;
+
+	prog_fd = bpf_program__fd(skel->progs.test);
+	err = bpf_prog_test_run(prog_fd, 1, NULL, 0,
+				NULL, NULL, &retval, &duration);
+	ASSERT_OK(err, "test_run");
+	ASSERT_EQ(retval, 0, "test_run");
+
+	ASSERT_EQ(skel->bss->test_result, 8, "test_result");
+
+	fentry_multi_test__detach(skel);
+
+cleanup:
+	fentry_multi_test__destroy(skel);
+}
diff --git a/tools/testing/selftests/bpf/progs/fentry_multi_test.c b/tools/testing/selftests/bpf/progs/fentry_multi_test.c
new file mode 100644
index 000000000000..a443fc958e5a
--- /dev/null
+++ b/tools/testing/selftests/bpf/progs/fentry_multi_test.c
@@ -0,0 +1,18 @@ 
+// SPDX-License-Identifier: GPL-2.0
+#include <linux/bpf.h>
+#include <bpf/bpf_helpers.h>
+#include <bpf/bpf_tracing.h>
+#include "multi_check.h"
+
+char _license[] SEC("license") = "GPL";
+
+unsigned long long bpf_fentry_test[8];
+
+__u64 test_result = 0;
+
+SEC("fentry.multi/bpf_fentry_test*")
+int BPF_PROG(test, unsigned long ip, __u64 a, __u64 b, __u64 c, __u64 d, __u64 e, __u64 f)
+{
+	multi_arg_check(ip, a, b, c, d, e, f, &test_result);
+	return 0;
+}