Linux Audio

Check our new training course

Loading...
v6.13.7
 1// SPDX-License-Identifier: GPL-2.0
 2/* Copyright 2022 Sony Group Corporation */
 3#define _GNU_SOURCE
 4#include <fcntl.h>
 5#include <sys/prctl.h>
 6#include <test_progs.h>
 7#include "bpf_syscall_macro.skel.h"
 8
 9void test_bpf_syscall_macro(void)
10{
11	struct bpf_syscall_macro *skel = NULL;
12	int err;
13	int exp_arg1 = 1001;
14	unsigned long exp_arg2 = 12;
15	unsigned long exp_arg3 = 13;
16	unsigned long exp_arg4 = 14;
17	unsigned long exp_arg5 = 15;
18	loff_t off_in, off_out;
19	ssize_t r;
20
21	/* check whether it can open program */
22	skel = bpf_syscall_macro__open();
23	if (!ASSERT_OK_PTR(skel, "bpf_syscall_macro__open"))
24		return;
25
26	skel->rodata->filter_pid = getpid();
27
28	/* check whether it can load program */
29	err = bpf_syscall_macro__load(skel);
30	if (!ASSERT_OK(err, "bpf_syscall_macro__load"))
31		goto cleanup;
32
33	/* check whether it can attach kprobe */
34	err = bpf_syscall_macro__attach(skel);
35	if (!ASSERT_OK(err, "bpf_syscall_macro__attach"))
36		goto cleanup;
37
38	/* check whether args of syscall are copied correctly */
39	prctl(exp_arg1, exp_arg2, exp_arg3, exp_arg4, exp_arg5);
40
 
 
41	ASSERT_EQ(skel->bss->arg1, exp_arg1, "syscall_arg1");
 
42	ASSERT_EQ(skel->bss->arg2, exp_arg2, "syscall_arg2");
43	ASSERT_EQ(skel->bss->arg3, exp_arg3, "syscall_arg3");
44	/* it cannot copy arg4 when uses PT_REGS_PARM4 on x86_64 */
45#ifdef __x86_64__
46	ASSERT_NEQ(skel->bss->arg4_cx, exp_arg4, "syscall_arg4_from_cx");
47#else
48	ASSERT_EQ(skel->bss->arg4_cx, exp_arg4, "syscall_arg4_from_cx");
49#endif
50	ASSERT_EQ(skel->bss->arg4, exp_arg4, "syscall_arg4");
51	ASSERT_EQ(skel->bss->arg5, exp_arg5, "syscall_arg5");
52
53	/* check whether args of syscall are copied correctly for CORE variants */
54	ASSERT_EQ(skel->bss->arg1_core, exp_arg1, "syscall_arg1_core_variant");
55	ASSERT_EQ(skel->bss->arg2_core, exp_arg2, "syscall_arg2_core_variant");
56	ASSERT_EQ(skel->bss->arg3_core, exp_arg3, "syscall_arg3_core_variant");
57	/* it cannot copy arg4 when uses PT_REGS_PARM4_CORE on x86_64 */
58#ifdef __x86_64__
59	ASSERT_NEQ(skel->bss->arg4_core_cx, exp_arg4, "syscall_arg4_from_cx_core_variant");
60#else
61	ASSERT_EQ(skel->bss->arg4_core_cx, exp_arg4, "syscall_arg4_from_cx_core_variant");
62#endif
63	ASSERT_EQ(skel->bss->arg4_core, exp_arg4, "syscall_arg4_core_variant");
64	ASSERT_EQ(skel->bss->arg5_core, exp_arg5, "syscall_arg5_core_variant");
65
66	ASSERT_EQ(skel->bss->option_syscall, exp_arg1, "BPF_KPROBE_SYSCALL_option");
67	ASSERT_EQ(skel->bss->arg2_syscall, exp_arg2, "BPF_KPROBE_SYSCALL_arg2");
68	ASSERT_EQ(skel->bss->arg3_syscall, exp_arg3, "BPF_KPROBE_SYSCALL_arg3");
69	ASSERT_EQ(skel->bss->arg4_syscall, exp_arg4, "BPF_KPROBE_SYSCALL_arg4");
70	ASSERT_EQ(skel->bss->arg5_syscall, exp_arg5, "BPF_KPROBE_SYSCALL_arg5");
71
72	r = splice(-42, &off_in, 42, &off_out, 0x12340000, SPLICE_F_NONBLOCK);
73	err = -errno;
74	ASSERT_EQ(r, -1, "splice_res");
75	ASSERT_EQ(err, -EBADF, "splice_err");
76
77	ASSERT_EQ(skel->bss->splice_fd_in, -42, "splice_arg1");
78	ASSERT_EQ(skel->bss->splice_off_in, (__u64)&off_in, "splice_arg2");
79	ASSERT_EQ(skel->bss->splice_fd_out, 42, "splice_arg3");
80	ASSERT_EQ(skel->bss->splice_off_out, (__u64)&off_out, "splice_arg4");
81	ASSERT_EQ(skel->bss->splice_len, 0x12340000, "splice_arg5");
82	ASSERT_EQ(skel->bss->splice_flags, SPLICE_F_NONBLOCK, "splice_arg6");
83
84cleanup:
85	bpf_syscall_macro__destroy(skel);
86}
v6.2
 1// SPDX-License-Identifier: GPL-2.0
 2/* Copyright 2022 Sony Group Corporation */
 
 
 3#include <sys/prctl.h>
 4#include <test_progs.h>
 5#include "bpf_syscall_macro.skel.h"
 6
 7void test_bpf_syscall_macro(void)
 8{
 9	struct bpf_syscall_macro *skel = NULL;
10	int err;
11	int exp_arg1 = 1001;
12	unsigned long exp_arg2 = 12;
13	unsigned long exp_arg3 = 13;
14	unsigned long exp_arg4 = 14;
15	unsigned long exp_arg5 = 15;
 
 
16
17	/* check whether it can open program */
18	skel = bpf_syscall_macro__open();
19	if (!ASSERT_OK_PTR(skel, "bpf_syscall_macro__open"))
20		return;
21
22	skel->rodata->filter_pid = getpid();
23
24	/* check whether it can load program */
25	err = bpf_syscall_macro__load(skel);
26	if (!ASSERT_OK(err, "bpf_syscall_macro__load"))
27		goto cleanup;
28
29	/* check whether it can attach kprobe */
30	err = bpf_syscall_macro__attach(skel);
31	if (!ASSERT_OK(err, "bpf_syscall_macro__attach"))
32		goto cleanup;
33
34	/* check whether args of syscall are copied correctly */
35	prctl(exp_arg1, exp_arg2, exp_arg3, exp_arg4, exp_arg5);
36#if defined(__aarch64__) || defined(__s390__)
37	ASSERT_NEQ(skel->bss->arg1, exp_arg1, "syscall_arg1");
38#else
39	ASSERT_EQ(skel->bss->arg1, exp_arg1, "syscall_arg1");
40#endif
41	ASSERT_EQ(skel->bss->arg2, exp_arg2, "syscall_arg2");
42	ASSERT_EQ(skel->bss->arg3, exp_arg3, "syscall_arg3");
43	/* it cannot copy arg4 when uses PT_REGS_PARM4 on x86_64 */
44#ifdef __x86_64__
45	ASSERT_NEQ(skel->bss->arg4_cx, exp_arg4, "syscall_arg4_from_cx");
46#else
47	ASSERT_EQ(skel->bss->arg4_cx, exp_arg4, "syscall_arg4_from_cx");
48#endif
49	ASSERT_EQ(skel->bss->arg4, exp_arg4, "syscall_arg4");
50	ASSERT_EQ(skel->bss->arg5, exp_arg5, "syscall_arg5");
51
52	/* check whether args of syscall are copied correctly for CORE variants */
53	ASSERT_EQ(skel->bss->arg1_core, exp_arg1, "syscall_arg1_core_variant");
54	ASSERT_EQ(skel->bss->arg2_core, exp_arg2, "syscall_arg2_core_variant");
55	ASSERT_EQ(skel->bss->arg3_core, exp_arg3, "syscall_arg3_core_variant");
56	/* it cannot copy arg4 when uses PT_REGS_PARM4_CORE on x86_64 */
57#ifdef __x86_64__
58	ASSERT_NEQ(skel->bss->arg4_core_cx, exp_arg4, "syscall_arg4_from_cx_core_variant");
59#else
60	ASSERT_EQ(skel->bss->arg4_core_cx, exp_arg4, "syscall_arg4_from_cx_core_variant");
61#endif
62	ASSERT_EQ(skel->bss->arg4_core, exp_arg4, "syscall_arg4_core_variant");
63	ASSERT_EQ(skel->bss->arg5_core, exp_arg5, "syscall_arg5_core_variant");
64
65	ASSERT_EQ(skel->bss->option_syscall, exp_arg1, "BPF_KPROBE_SYSCALL_option");
66	ASSERT_EQ(skel->bss->arg2_syscall, exp_arg2, "BPF_KPROBE_SYSCALL_arg2");
67	ASSERT_EQ(skel->bss->arg3_syscall, exp_arg3, "BPF_KPROBE_SYSCALL_arg3");
68	ASSERT_EQ(skel->bss->arg4_syscall, exp_arg4, "BPF_KPROBE_SYSCALL_arg4");
69	ASSERT_EQ(skel->bss->arg5_syscall, exp_arg5, "BPF_KPROBE_SYSCALL_arg5");
 
 
 
 
 
 
 
 
 
 
 
 
70
71cleanup:
72	bpf_syscall_macro__destroy(skel);
73}