56 lines
1.3 KiB
C
56 lines
1.3 KiB
C
|
// SPDX-License-Identifier: GPL-2.0
|
||
|
/* Copyright (c) 2021 Facebook */
|
||
|
#include <test_progs.h>
|
||
|
#include "syscall.skel.h"
|
||
|
|
||
|
struct args {
|
||
|
__u64 log_buf;
|
||
|
__u32 log_size;
|
||
|
int max_entries;
|
||
|
int map_fd;
|
||
|
int prog_fd;
|
||
|
int btf_fd;
|
||
|
};
|
||
|
|
||
|
void test_syscall(void)
|
||
|
{
|
||
|
static char verifier_log[8192];
|
||
|
struct args ctx = {
|
||
|
.max_entries = 1024,
|
||
|
.log_buf = (uintptr_t) verifier_log,
|
||
|
.log_size = sizeof(verifier_log),
|
||
|
};
|
||
|
struct bpf_prog_test_run_attr tattr = {
|
||
|
.ctx_in = &ctx,
|
||
|
.ctx_size_in = sizeof(ctx),
|
||
|
};
|
||
|
struct syscall *skel = NULL;
|
||
|
__u64 key = 12, value = 0;
|
||
|
int err;
|
||
|
|
||
|
skel = syscall__open_and_load();
|
||
|
if (!ASSERT_OK_PTR(skel, "skel_load"))
|
||
|
goto cleanup;
|
||
|
|
||
|
tattr.prog_fd = bpf_program__fd(skel->progs.bpf_prog);
|
||
|
err = bpf_prog_test_run_xattr(&tattr);
|
||
|
ASSERT_EQ(err, 0, "err");
|
||
|
ASSERT_EQ(tattr.retval, 1, "retval");
|
||
|
ASSERT_GT(ctx.map_fd, 0, "ctx.map_fd");
|
||
|
ASSERT_GT(ctx.prog_fd, 0, "ctx.prog_fd");
|
||
|
ASSERT_OK(memcmp(verifier_log, "processed", sizeof("processed") - 1),
|
||
|
"verifier_log");
|
||
|
|
||
|
err = bpf_map_lookup_elem(ctx.map_fd, &key, &value);
|
||
|
ASSERT_EQ(err, 0, "map_lookup");
|
||
|
ASSERT_EQ(value, 34, "map lookup value");
|
||
|
cleanup:
|
||
|
syscall__destroy(skel);
|
||
|
if (ctx.prog_fd > 0)
|
||
|
close(ctx.prog_fd);
|
||
|
if (ctx.map_fd > 0)
|
||
|
close(ctx.map_fd);
|
||
|
if (ctx.btf_fd > 0)
|
||
|
close(ctx.btf_fd);
|
||
|
}
|