mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git
synced 2026-04-25 00:52:45 -04:00
For BPF_PROG_TYPE_TRACING, the bpf_prog's ctx is an array of u64. This patch borrows the idea from BPF_CALL_x in filter.h to convert a u64 to the arg type of the traced function. The new BPF_TRACE_x has an arg to specify the return type of a bpf_prog. It will be used in the future TCP-ops bpf_prog that may return "void". The new macros are defined in the new header file "bpf_trace_helpers.h". It is under selftests/bpf/ for now. It could be moved to libbpf later after seeing more upcoming non-tracing use cases. The tests are changed to use these new macros also. Hence, the k[s]u8/16/32/64 are no longer needed and they are removed from the bpf_helpers.h. Signed-off-by: Martin KaFai Lau <kafai@fb.com> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Link: https://lore.kernel.org/bpf/20191123202504.1502696-1-kafai@fb.com
58 lines
1.4 KiB
C
58 lines
1.4 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Copyright (c) 2019 Facebook */
|
|
#include <linux/bpf.h>
|
|
#include "bpf_helpers.h"
|
|
#include "bpf_trace_helpers.h"
|
|
|
|
char _license[] SEC("license") = "GPL";
|
|
|
|
static volatile __u64 test1_result;
|
|
BPF_TRACE_2("fexit/bpf_fentry_test1", test1, int, a, int, ret)
|
|
{
|
|
test1_result = a == 1 && ret == 2;
|
|
return 0;
|
|
}
|
|
|
|
static volatile __u64 test2_result;
|
|
BPF_TRACE_3("fexit/bpf_fentry_test2", test2, int, a, __u64, b, int, ret)
|
|
{
|
|
test2_result = a == 2 && b == 3 && ret == 5;
|
|
return 0;
|
|
}
|
|
|
|
static volatile __u64 test3_result;
|
|
BPF_TRACE_4("fexit/bpf_fentry_test3", test3, char, a, int, b, __u64, c, int, ret)
|
|
{
|
|
test3_result = a == 4 && b == 5 && c == 6 && ret == 15;
|
|
return 0;
|
|
}
|
|
|
|
static volatile __u64 test4_result;
|
|
BPF_TRACE_5("fexit/bpf_fentry_test4", test4,
|
|
void *, a, char, b, int, c, __u64, d, int, ret)
|
|
{
|
|
|
|
test4_result = a == (void *)7 && b == 8 && c == 9 && d == 10 &&
|
|
ret == 34;
|
|
return 0;
|
|
}
|
|
|
|
static volatile __u64 test5_result;
|
|
BPF_TRACE_6("fexit/bpf_fentry_test5", test5,
|
|
__u64, a, void *, b, short, c, int, d, __u64, e, int, ret)
|
|
{
|
|
test5_result = a == 11 && b == (void *)12 && c == 13 && d == 14 &&
|
|
e == 15 && ret == 65;
|
|
return 0;
|
|
}
|
|
|
|
static volatile __u64 test6_result;
|
|
BPF_TRACE_7("fexit/bpf_fentry_test6", test6,
|
|
__u64, a, void *, b, short, c, int, d, void *, e, __u64, f,
|
|
int, ret)
|
|
{
|
|
test6_result = a == 16 && b == (void *)17 && c == 18 && d == 19 &&
|
|
e == (void *)20 && f == 21 && ret == 111;
|
|
return 0;
|
|
}
|