On 2/3/23 10:28 AM, Grant Seltzer wrote:
This patch changes the behavior of how BPF_PROG_RUN treats tracing (fentry/fexit) programs. Previously only a return value is injected but the actual program was not run.
hmm... I don't understand this. The actual program is run by attaching to the bpf_fentry_test{1,2,3...}. eg. The test in fentry_test.c
New behavior mirrors that of running raw tracepoint BPF programs which actually runs the instructions of the program via `bpf_prog_run()`
Which tracepoint and how is it tested? The CI kernel is crashing: https://patchwork.kernel.org/project/netdevbpf/patch/20230203182812.20657-1-grantseltzer@xxxxxxxxx/