[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20251117124057.687384-7-jolsa@kernel.org>
Date: Mon, 17 Nov 2025 13:40:55 +0100
From: Jiri Olsa <jolsa@...nel.org>
To: Oleg Nesterov <oleg@...hat.com>,
Masami Hiramatsu <mhiramat@...nel.org>,
Peter Zijlstra <peterz@...radead.org>,
Andrii Nakryiko <andrii@...nel.org>
Cc: bpf@...r.kernel.org,
linux-kernel@...r.kernel.org,
linux-trace-kernel@...r.kernel.org,
x86@...nel.org,
Song Liu <songliubraving@...com>,
Yonghong Song <yhs@...com>,
John Fastabend <john.fastabend@...il.com>,
Steven Rostedt <rostedt@...dmis.org>,
Ingo Molnar <mingo@...nel.org>,
David Laight <David.Laight@...LAB.COM>
Subject: [RFC PATCH 6/8] selftests/bpf: Add test for mov and sub emulation
Adding test code for mov and sub instructions emulation.
TODO add test for sub flags value emulation.
Signed-off-by: Jiri Olsa <jolsa@...nel.org>
---
.../selftests/bpf/prog_tests/uprobe_syscall.c | 50 +++++++++++++++++++
1 file changed, 50 insertions(+)
diff --git a/tools/testing/selftests/bpf/prog_tests/uprobe_syscall.c b/tools/testing/selftests/bpf/prog_tests/uprobe_syscall.c
index 955a37751b52..27fa6f309188 100644
--- a/tools/testing/selftests/bpf/prog_tests/uprobe_syscall.c
+++ b/tools/testing/selftests/bpf/prog_tests/uprobe_syscall.c
@@ -765,6 +765,54 @@ static void test_uprobe_error(void)
ASSERT_EQ(errno, ENXIO, "errno");
}
+__attribute__((aligned(16)))
+__nocf_check __weak __naked unsigned long emulate_mov_trigger(void)
+{
+ asm volatile (
+ "pushq %rbp\n"
+ "movq %rsp,%rbp\n"
+ "subq $0xb0,%rsp\n"
+ "addq $0xb0,%rsp\n"
+ "pop %rbp\n"
+ "ret\n"
+ );
+}
+
+static void test_emulate(void)
+{
+ struct uprobe_syscall *skel = NULL;
+ unsigned long offset;
+
+ offset = get_uprobe_offset(&emulate_mov_trigger);
+ if (!ASSERT_GE(offset, 0, "get_uprobe_offset"))
+ return;
+
+ skel = uprobe_syscall__open_and_load();
+ if (!ASSERT_OK_PTR(skel, "uprobe_syscall__open_and_load"))
+ goto cleanup;
+
+ /* mov */
+ skel->links.probe = bpf_program__attach_uprobe_opts(skel->progs.probe,
+ 0, "/proc/self/exe", offset + 1, NULL);
+ if (!ASSERT_OK_PTR(skel->links.probe, "bpf_program__attach_uprobe_opts"))
+ goto cleanup;
+
+ emulate_mov_trigger();
+
+ bpf_link__destroy(skel->links.probe);
+
+ /* sub */
+ skel->links.probe = bpf_program__attach_uprobe_opts(skel->progs.probe,
+ 0, "/proc/self/exe", offset + 4, NULL);
+ if (!ASSERT_OK_PTR(skel->links.probe, "bpf_program__attach_uprobe_opts"))
+ goto cleanup;
+
+ emulate_mov_trigger();
+
+cleanup:
+ uprobe_syscall__destroy(skel);
+}
+
static void __test_uprobe_syscall(void)
{
if (test__start_subtest("uretprobe_regs_equal"))
@@ -789,6 +837,8 @@ static void __test_uprobe_syscall(void)
test_uprobe_regs_equal(false);
if (test__start_subtest("regs_change"))
test_regs_change();
+ if (test__start_subtest("emulate_mov"))
+ test_emulate();
}
#else
static void __test_uprobe_syscall(void)
--
2.51.1
Powered by blists - more mailing lists