<feed xmlns='http://www.w3.org/2005/Atom'>
<title>kernel/tools/testing/selftests/bpf/progs/bpf_syscall_macro.c, branch linux-6.2.y</title>
<subtitle>Hosts the 0x221E linux distro kernel.</subtitle>
<id>https://universe.0xinfinity.dev/distro/kernel/atom?h=linux-6.2.y</id>
<link rel='self' href='https://universe.0xinfinity.dev/distro/kernel/atom?h=linux-6.2.y'/>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/'/>
<updated>2022-07-19T16:33:18Z</updated>
<entry>
<title>selftests/bpf: use BPF_KSYSCALL and SEC("ksyscall") in selftests</title>
<updated>2022-07-19T16:33:18Z</updated>
<author>
<name>Andrii Nakryiko</name>
<email>andrii@kernel.org</email>
</author>
<published>2022-07-14T07:07:55Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=d814ed62d3d24eb5c5f904b897e0414c1ccb5740'/>
<id>urn:sha1:d814ed62d3d24eb5c5f904b897e0414c1ccb5740</id>
<content type='text'>
Convert few selftest that used plain SEC("kprobe") with arch-specific
syscall wrapper prefix to ksyscall/kretsyscall and corresponding
BPF_KSYSCALL macro. test_probe_user.c is especially benefiting from this
simplification.

Tested-by: Alan Maguire &lt;alan.maguire@oracle.com&gt;
Signed-off-by: Andrii Nakryiko &lt;andrii@kernel.org&gt;
Link: https://lore.kernel.org/r/20220714070755.3235561-6-andrii@kernel.org
Signed-off-by: Alexei Starovoitov &lt;ast@kernel.org&gt;
</content>
</entry>
<entry>
<title>selftests/bpf: Test BPF_KPROBE_SYSCALL macro</title>
<updated>2022-02-09T05:45:06Z</updated>
<author>
<name>Hengqi Chen</name>
<email>hengqi.chen@gmail.com</email>
</author>
<published>2022-02-07T14:31:34Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=c28748233b4736bd31b3d3c3011d42054cc738f5'/>
<id>urn:sha1:c28748233b4736bd31b3d3c3011d42054cc738f5</id>
<content type='text'>
Add tests for the newly added BPF_KPROBE_SYSCALL macro.

Signed-off-by: Hengqi Chen &lt;hengqi.chen@gmail.com&gt;
Signed-off-by: Andrii Nakryiko &lt;andrii@kernel.org&gt;
Link: https://lore.kernel.org/bpf/20220207143134.2977852-3-hengqi.chen@gmail.com
</content>
</entry>
<entry>
<title>selftests/bpf: Skip test_bpf_syscall_macro's syscall_arg1 on arm64 and s390</title>
<updated>2022-02-09T05:37:41Z</updated>
<author>
<name>Ilya Leoshkevich</name>
<email>iii@linux.ibm.com</email>
</author>
<published>2022-02-09T02:17:42Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=9e45a377f29b5a66f75c0c3a0d84ad5c583290e8'/>
<id>urn:sha1:9e45a377f29b5a66f75c0c3a0d84ad5c583290e8</id>
<content type='text'>
These architectures can provide access to the first syscall argument
only through PT_REGS_PARM1_CORE_SYSCALL().

Signed-off-by: Ilya Leoshkevich &lt;iii@linux.ibm.com&gt;
Signed-off-by: Andrii Nakryiko &lt;andrii@kernel.org&gt;
Link: https://lore.kernel.org/bpf/20220209021745.2215452-8-iii@linux.ibm.com
</content>
</entry>
<entry>
<title>selftests/bpf: Use PT_REGS_SYSCALL_REGS in bpf_syscall_macro</title>
<updated>2022-02-09T05:16:14Z</updated>
<author>
<name>Ilya Leoshkevich</name>
<email>iii@linux.ibm.com</email>
</author>
<published>2022-02-09T02:17:38Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=3f928cab927c576f3385f3e828c53a95b2199f58'/>
<id>urn:sha1:3f928cab927c576f3385f3e828c53a95b2199f58</id>
<content type='text'>
Ensure that PT_REGS_SYSCALL_REGS works correctly.

Signed-off-by: Ilya Leoshkevich &lt;iii@linux.ibm.com&gt;
Signed-off-by: Andrii Nakryiko &lt;andrii@kernel.org&gt;
Link: https://lore.kernel.org/bpf/20220209021745.2215452-4-iii@linux.ibm.com
</content>
</entry>
<entry>
<title>selftests/bpf: Fix an endianness issue in bpf_syscall_macro test</title>
<updated>2022-02-09T05:16:14Z</updated>
<author>
<name>Ilya Leoshkevich</name>
<email>iii@linux.ibm.com</email>
</author>
<published>2022-02-09T02:17:36Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=4fc49b51ab9d58e830f9df37ea775625ea966d50'/>
<id>urn:sha1:4fc49b51ab9d58e830f9df37ea775625ea966d50</id>
<content type='text'>
bpf_syscall_macro reads a long argument into an int variable, which
produces a wrong value on big-endian systems. Fix by reading the
argument into an intermediate long variable first.

Fixes: 77fc0330dfe5 ("selftests/bpf: Add a test to confirm PT_REGS_PARM4_SYSCALL")
Signed-off-by: Ilya Leoshkevich &lt;iii@linux.ibm.com&gt;
Signed-off-by: Andrii Nakryiko &lt;andrii@kernel.org&gt;
Link: https://lore.kernel.org/bpf/20220209021745.2215452-2-iii@linux.ibm.com
</content>
</entry>
<entry>
<title>selftests/bpf: Add a test to confirm PT_REGS_PARM4_SYSCALL</title>
<updated>2022-01-25T05:04:10Z</updated>
<author>
<name>Kenta Tada</name>
<email>Kenta.Tada@sony.com</email>
</author>
<published>2022-01-24T14:16:22Z</published>
<link rel='alternate' type='text/html' href='https://universe.0xinfinity.dev/distro/kernel/commit/?id=77fc0330dfe5abf9b7ec336f173d2e1fd7258cd5'/>
<id>urn:sha1:77fc0330dfe5abf9b7ec336f173d2e1fd7258cd5</id>
<content type='text'>
Add a selftest to verify the behavior of PT_REGS_xxx
and the CORE variant.

Signed-off-by: Kenta Tada &lt;Kenta.Tada@sony.com&gt;
Signed-off-by: Andrii Nakryiko &lt;andrii@kernel.org&gt;
Link: https://lore.kernel.org/bpf/20220124141622.4378-4-Kenta.Tada@sony.com
</content>
</entry>
</feed>
