xref: /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/progs/fexit_test.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun /* Copyright (c) 2019 Facebook */
3*4882a593Smuzhiyun #include <linux/bpf.h>
4*4882a593Smuzhiyun #include <bpf/bpf_helpers.h>
5*4882a593Smuzhiyun #include <bpf/bpf_tracing.h>
6*4882a593Smuzhiyun 
7*4882a593Smuzhiyun char _license[] SEC("license") = "GPL";
8*4882a593Smuzhiyun 
9*4882a593Smuzhiyun __u64 test1_result = 0;
10*4882a593Smuzhiyun SEC("fexit/bpf_fentry_test1")
BPF_PROG(test1,int a,int ret)11*4882a593Smuzhiyun int BPF_PROG(test1, int a, int ret)
12*4882a593Smuzhiyun {
13*4882a593Smuzhiyun 	test1_result = a == 1 && ret == 2;
14*4882a593Smuzhiyun 	return 0;
15*4882a593Smuzhiyun }
16*4882a593Smuzhiyun 
17*4882a593Smuzhiyun __u64 test2_result = 0;
18*4882a593Smuzhiyun SEC("fexit/bpf_fentry_test2")
BPF_PROG(test2,int a,__u64 b,int ret)19*4882a593Smuzhiyun int BPF_PROG(test2, int a, __u64 b, int ret)
20*4882a593Smuzhiyun {
21*4882a593Smuzhiyun 	test2_result = a == 2 && b == 3 && ret == 5;
22*4882a593Smuzhiyun 	return 0;
23*4882a593Smuzhiyun }
24*4882a593Smuzhiyun 
25*4882a593Smuzhiyun __u64 test3_result = 0;
26*4882a593Smuzhiyun SEC("fexit/bpf_fentry_test3")
BPF_PROG(test3,char a,int b,__u64 c,int ret)27*4882a593Smuzhiyun int BPF_PROG(test3, char a, int b, __u64 c, int ret)
28*4882a593Smuzhiyun {
29*4882a593Smuzhiyun 	test3_result = a == 4 && b == 5 && c == 6 && ret == 15;
30*4882a593Smuzhiyun 	return 0;
31*4882a593Smuzhiyun }
32*4882a593Smuzhiyun 
33*4882a593Smuzhiyun __u64 test4_result = 0;
34*4882a593Smuzhiyun SEC("fexit/bpf_fentry_test4")
BPF_PROG(test4,void * a,char b,int c,__u64 d,int ret)35*4882a593Smuzhiyun int BPF_PROG(test4, void *a, char b, int c, __u64 d, int ret)
36*4882a593Smuzhiyun {
37*4882a593Smuzhiyun 	test4_result = a == (void *)7 && b == 8 && c == 9 && d == 10 &&
38*4882a593Smuzhiyun 		ret == 34;
39*4882a593Smuzhiyun 	return 0;
40*4882a593Smuzhiyun }
41*4882a593Smuzhiyun 
42*4882a593Smuzhiyun __u64 test5_result = 0;
43*4882a593Smuzhiyun SEC("fexit/bpf_fentry_test5")
BPF_PROG(test5,__u64 a,void * b,short c,int d,__u64 e,int ret)44*4882a593Smuzhiyun int BPF_PROG(test5, __u64 a, void *b, short c, int d, __u64 e, int ret)
45*4882a593Smuzhiyun {
46*4882a593Smuzhiyun 	test5_result = a == 11 && b == (void *)12 && c == 13 && d == 14 &&
47*4882a593Smuzhiyun 		e == 15 && ret == 65;
48*4882a593Smuzhiyun 	return 0;
49*4882a593Smuzhiyun }
50*4882a593Smuzhiyun 
51*4882a593Smuzhiyun __u64 test6_result = 0;
52*4882a593Smuzhiyun SEC("fexit/bpf_fentry_test6")
BPF_PROG(test6,__u64 a,void * b,short c,int d,void * e,__u64 f,int ret)53*4882a593Smuzhiyun int BPF_PROG(test6, __u64 a, void *b, short c, int d, void *e, __u64 f, int ret)
54*4882a593Smuzhiyun {
55*4882a593Smuzhiyun 	test6_result = a == 16 && b == (void *)17 && c == 18 && d == 19 &&
56*4882a593Smuzhiyun 		e == (void *)20 && f == 21 && ret == 111;
57*4882a593Smuzhiyun 	return 0;
58*4882a593Smuzhiyun }
59*4882a593Smuzhiyun 
60*4882a593Smuzhiyun struct bpf_fentry_test_t {
61*4882a593Smuzhiyun 	struct bpf_fentry_test *a;
62*4882a593Smuzhiyun };
63*4882a593Smuzhiyun 
64*4882a593Smuzhiyun __u64 test7_result = 0;
65*4882a593Smuzhiyun SEC("fexit/bpf_fentry_test7")
BPF_PROG(test7,struct bpf_fentry_test_t * arg)66*4882a593Smuzhiyun int BPF_PROG(test7, struct bpf_fentry_test_t *arg)
67*4882a593Smuzhiyun {
68*4882a593Smuzhiyun 	if (arg == 0)
69*4882a593Smuzhiyun 		test7_result = 1;
70*4882a593Smuzhiyun 	return 0;
71*4882a593Smuzhiyun }
72*4882a593Smuzhiyun 
73*4882a593Smuzhiyun __u64 test8_result = 0;
74*4882a593Smuzhiyun SEC("fexit/bpf_fentry_test8")
BPF_PROG(test8,struct bpf_fentry_test_t * arg)75*4882a593Smuzhiyun int BPF_PROG(test8, struct bpf_fentry_test_t *arg)
76*4882a593Smuzhiyun {
77*4882a593Smuzhiyun 	if (arg->a == 0)
78*4882a593Smuzhiyun 		test8_result = 1;
79*4882a593Smuzhiyun 	return 0;
80*4882a593Smuzhiyun }
81