| // SPDX-License-Identifier: GPL-2.0 |
| /* Copyright (c) 2021 Facebook */ |
| #include <test_progs.h> |
| #include "syscall.skel.h" |
| |
| struct args { |
| __u64 log_buf; |
| __u32 log_size; |
| int max_entries; |
| int map_fd; |
| int prog_fd; |
| int btf_fd; |
| }; |
| |
| void test_syscall(void) |
| { |
| static char verifier_log[8192]; |
| struct args ctx = { |
| .max_entries = 1024, |
| .log_buf = (uintptr_t) verifier_log, |
| .log_size = sizeof(verifier_log), |
| }; |
| struct bpf_prog_test_run_attr tattr = { |
| .ctx_in = &ctx, |
| .ctx_size_in = sizeof(ctx), |
| }; |
| struct syscall *skel = NULL; |
| __u64 key = 12, value = 0; |
| int err; |
| |
| skel = syscall__open_and_load(); |
| if (!ASSERT_OK_PTR(skel, "skel_load")) |
| goto cleanup; |
| |
| tattr.prog_fd = bpf_program__fd(skel->progs.bpf_prog); |
| err = bpf_prog_test_run_xattr(&tattr); |
| ASSERT_EQ(err, 0, "err"); |
| ASSERT_EQ(tattr.retval, 1, "retval"); |
| ASSERT_GT(ctx.map_fd, 0, "ctx.map_fd"); |
| ASSERT_GT(ctx.prog_fd, 0, "ctx.prog_fd"); |
| ASSERT_OK(memcmp(verifier_log, "processed", sizeof("processed") - 1), |
| "verifier_log"); |
| |
| err = bpf_map_lookup_elem(ctx.map_fd, &key, &value); |
| ASSERT_EQ(err, 0, "map_lookup"); |
| ASSERT_EQ(value, 34, "map lookup value"); |
| cleanup: |
| syscall__destroy(skel); |
| if (ctx.prog_fd > 0) |
| close(ctx.prog_fd); |
| if (ctx.map_fd > 0) |
| close(ctx.map_fd); |
| if (ctx.btf_fd > 0) |
| close(ctx.btf_fd); |
| } |