On Thu, Mar 12, 2026 at 06:42:19PM +0800, Sun Jian wrote:

SNIP

> diff --git a/tools/testing/selftests/bpf/progs/modify_return.c 
> b/tools/testing/selftests/bpf/progs/modify_return.c
> index 3376d4849f58..5ff18ddb3050 100644
> --- a/tools/testing/selftests/bpf/progs/modify_return.c
> +++ b/tools/testing/selftests/bpf/progs/modify_return.c
> @@ -7,16 +7,29 @@
>  #include <linux/bpf.h>
>  #include <bpf/bpf_helpers.h>
>  #include <bpf/bpf_tracing.h>
> +#include <stdbool.h>
>  
>  char _license[] SEC("license") = "GPL";
>  
>  static int sequence = 0;
>  __s32 input_retval = 0;
> +__u32 test_pid = 0;
> +
> +static __always_inline bool match_pid(void)
> +{
> +     __u64 pid_tgid = bpf_get_current_pid_tgid();
> +
> +     if (!test_pid)
> +             return false;
> +     return (__u32)(pid_tgid >> 32) == test_pid;
> +}
>  
>  __u64 fentry_result = 0;
>  SEC("fentry/bpf_modify_return_test")
>  int BPF_PROG(fentry_test, int a, __u64 b)
>  {
> +     if (!match_pid())
> +             return 0;

I think just simple pid check like we do in other places
should be enough:

        if (bpf_get_current_pid_tgid() >> 32 != test_pid)
                return 0;

jirka


>       sequence++;
>       fentry_result = (sequence == 1);
>       return 0;
> @@ -26,6 +39,8 @@ __u64 fmod_ret_result = 0;
>  SEC("fmod_ret/bpf_modify_return_test")
>  int BPF_PROG(fmod_ret_test, int a, int *b, int ret)
>  {
> +     if (!match_pid())
> +             return ret;
>       sequence++;
>       /* This is the first fmod_ret program, the ret passed should be 0 */
>       fmod_ret_result = (sequence == 2 && ret == 0);
> @@ -36,6 +51,8 @@ __u64 fexit_result = 0;
>  SEC("fexit/bpf_modify_return_test")
>  int BPF_PROG(fexit_test, int a, __u64 b, int ret)
>  {
> +     if (!match_pid())
> +             return 0;
>       sequence++;
>       /* If the input_reval is non-zero a successful modification should have
>        * occurred.
> @@ -55,6 +72,8 @@ SEC("fentry/bpf_modify_return_test2")
>  int BPF_PROG(fentry_test2, int a, int *b, short c, int d, void *e, char f,
>            int g)
>  {
> +     if (!match_pid())
> +             return 0;
>       sequence2++;
>       fentry_result2 = (sequence2 == 1);
>       return 0;
> @@ -65,6 +84,8 @@ SEC("fmod_ret/bpf_modify_return_test2")
>  int BPF_PROG(fmod_ret_test2, int a, int *b, short c, int d, void *e, char f,
>            int g, int ret)
>  {
> +     if (!match_pid())
> +             return ret;
>       sequence2++;
>       /* This is the first fmod_ret program, the ret passed should be 0 */
>       fmod_ret_result2 = (sequence2 == 2 && ret == 0);
> @@ -76,6 +97,8 @@ SEC("fexit/bpf_modify_return_test2")
>  int BPF_PROG(fexit_test2, int a, int *b, short c, int d, void *e, char f,
>            int g, int ret)
>  {
> +     if (!match_pid())
> +             return 0;
>       sequence2++;
>       /* If the input_reval is non-zero a successful modification should have
>        * occurred.
> 
> base-commit: 80234b5ab240f52fa45d201e899e207b9265ef91
> -- 
> 2.43.0
> 
> 

Reply via email to