linux/tools/testing/selftests/bpf/prog_tests/raw_tp_writable_test_run.c
<<
>>
Prefs
   1// SPDX-License-Identifier: GPL-2.0
   2
   3#include <test_progs.h>
   4#include <linux/nbd.h>
   5
   6void test_raw_tp_writable_test_run(void)
   7{
   8        __u32 duration = 0;
   9        char error[4096];
  10
  11        const struct bpf_insn trace_program[] = {
  12                BPF_LDX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
  13                BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_6, 0),
  14                BPF_MOV64_IMM(BPF_REG_0, 42),
  15                BPF_STX_MEM(BPF_W, BPF_REG_6, BPF_REG_0, 0),
  16                BPF_EXIT_INSN(),
  17        };
  18
  19        struct bpf_load_program_attr load_attr = {
  20                .prog_type = BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE,
  21                .license = "GPL v2",
  22                .insns = trace_program,
  23                .insns_cnt = sizeof(trace_program) / sizeof(struct bpf_insn),
  24                .log_level = 2,
  25        };
  26
  27        int bpf_fd = bpf_load_program_xattr(&load_attr, error, sizeof(error));
  28        if (CHECK(bpf_fd < 0, "bpf_raw_tracepoint_writable loaded",
  29                  "failed: %d errno %d\n", bpf_fd, errno))
  30                return;
  31
  32        const struct bpf_insn skb_program[] = {
  33                BPF_MOV64_IMM(BPF_REG_0, 0),
  34                BPF_EXIT_INSN(),
  35        };
  36
  37        struct bpf_load_program_attr skb_load_attr = {
  38                .prog_type = BPF_PROG_TYPE_SOCKET_FILTER,
  39                .license = "GPL v2",
  40                .insns = skb_program,
  41                .insns_cnt = sizeof(skb_program) / sizeof(struct bpf_insn),
  42        };
  43
  44        int filter_fd =
  45                bpf_load_program_xattr(&skb_load_attr, error, sizeof(error));
  46        if (CHECK(filter_fd < 0, "test_program_loaded", "failed: %d errno %d\n",
  47                  filter_fd, errno))
  48                goto out_bpffd;
  49
  50        int tp_fd = bpf_raw_tracepoint_open("bpf_test_finish", bpf_fd);
  51        if (CHECK(tp_fd < 0, "bpf_raw_tracepoint_writable opened",
  52                  "failed: %d errno %d\n", tp_fd, errno))
  53                goto out_filterfd;
  54
  55        char test_skb[128] = {
  56                0,
  57        };
  58
  59        __u32 prog_ret;
  60        int err = bpf_prog_test_run(filter_fd, 1, test_skb, sizeof(test_skb), 0,
  61                                    0, &prog_ret, 0);
  62        CHECK(err != 42, "test_run",
  63              "tracepoint did not modify return value\n");
  64        CHECK(prog_ret != 0, "test_run_ret",
  65              "socket_filter did not return 0\n");
  66
  67        close(tp_fd);
  68
  69        err = bpf_prog_test_run(filter_fd, 1, test_skb, sizeof(test_skb), 0, 0,
  70                                &prog_ret, 0);
  71        CHECK(err != 0, "test_run_notrace",
  72              "test_run failed with %d errno %d\n", err, errno);
  73        CHECK(prog_ret != 0, "test_run_ret_notrace",
  74              "socket_filter did not return 0\n");
  75
  76out_filterfd:
  77        close(filter_fd);
  78out_bpffd:
  79        close(bpf_fd);
  80}
  81