36 lines
925 B
C
36 lines
925 B
C
|
// SPDX-License-Identifier: GPL-2.0
|
||
|
#include <test_progs.h>
|
||
|
#include "test_stack_var_off.skel.h"
|
||
|
|
||
|
/* Test read and writes to the stack performed with offsets that are not
|
||
|
* statically known.
|
||
|
*/
|
||
|
void test_stack_var_off(void)
|
||
|
{
|
||
|
int duration = 0;
|
||
|
struct test_stack_var_off *skel;
|
||
|
|
||
|
skel = test_stack_var_off__open_and_load();
|
||
|
if (CHECK(!skel, "skel_open", "failed to open skeleton\n"))
|
||
|
return;
|
||
|
|
||
|
/* Give pid to bpf prog so it doesn't trigger for anyone else. */
|
||
|
skel->bss->test_pid = getpid();
|
||
|
/* Initialize the probe's input. */
|
||
|
skel->bss->input[0] = 2;
|
||
|
skel->bss->input[1] = 42; /* This will be returned in probe_res. */
|
||
|
|
||
|
if (!ASSERT_OK(test_stack_var_off__attach(skel), "skel_attach"))
|
||
|
goto cleanup;
|
||
|
|
||
|
/* Trigger probe. */
|
||
|
usleep(1);
|
||
|
|
||
|
if (CHECK(skel->bss->probe_res != 42, "check_probe_res",
|
||
|
"wrong probe res: %d\n", skel->bss->probe_res))
|
||
|
goto cleanup;
|
||
|
|
||
|
cleanup:
|
||
|
test_stack_var_off__destroy(skel);
|
||
|
}
|