102 lines
2.6 KiB
C
102 lines
2.6 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Copyright (c) 2024 Meta Platforms, Inc. and affiliates. */
|
|
#include <test_progs.h>
|
|
#include <time.h>
|
|
|
|
#include "struct_ops_module.skel.h"
|
|
|
|
static void check_map_info(struct bpf_map_info *info)
|
|
{
|
|
struct bpf_btf_info btf_info;
|
|
char btf_name[256];
|
|
u32 btf_info_len = sizeof(btf_info);
|
|
int err, fd;
|
|
|
|
fd = bpf_btf_get_fd_by_id(info->btf_vmlinux_id);
|
|
if (!ASSERT_GE(fd, 0, "get_value_type_btf_obj_fd"))
|
|
return;
|
|
|
|
memset(&btf_info, 0, sizeof(btf_info));
|
|
btf_info.name = ptr_to_u64(btf_name);
|
|
btf_info.name_len = sizeof(btf_name);
|
|
err = bpf_btf_get_info_by_fd(fd, &btf_info, &btf_info_len);
|
|
if (!ASSERT_OK(err, "get_value_type_btf_obj_info"))
|
|
goto cleanup;
|
|
|
|
if (!ASSERT_EQ(strcmp(btf_name, "bpf_testmod"), 0, "get_value_type_btf_obj_name"))
|
|
goto cleanup;
|
|
|
|
cleanup:
|
|
close(fd);
|
|
}
|
|
|
|
static int attach_ops_and_check(struct struct_ops_module *skel,
|
|
struct bpf_map *map,
|
|
int expected_test_2_result)
|
|
{
|
|
struct bpf_link *link;
|
|
|
|
link = bpf_map__attach_struct_ops(map);
|
|
ASSERT_OK_PTR(link, "attach_test_mod_1");
|
|
if (!link)
|
|
return -1;
|
|
|
|
/* test_{1,2}() would be called from bpf_dummy_reg() in bpf_testmod.c */
|
|
ASSERT_EQ(skel->bss->test_1_result, 0xdeadbeef, "test_1_result");
|
|
ASSERT_EQ(skel->bss->test_2_result, expected_test_2_result, "test_2_result");
|
|
|
|
bpf_link__destroy(link);
|
|
return 0;
|
|
}
|
|
|
|
static void test_struct_ops_load(void)
|
|
{
|
|
struct struct_ops_module *skel;
|
|
struct bpf_map_info info = {};
|
|
int err;
|
|
u32 len;
|
|
|
|
skel = struct_ops_module__open();
|
|
if (!ASSERT_OK_PTR(skel, "struct_ops_module_open"))
|
|
return;
|
|
|
|
skel->struct_ops.testmod_1->data = 13;
|
|
skel->struct_ops.testmod_1->test_2 = skel->progs.test_3;
|
|
/* Since test_2() is not being used, it should be disabled from
|
|
* auto-loading, or it will fail to load.
|
|
*/
|
|
bpf_program__set_autoload(skel->progs.test_2, false);
|
|
|
|
err = struct_ops_module__load(skel);
|
|
if (!ASSERT_OK(err, "struct_ops_module_load"))
|
|
goto cleanup;
|
|
|
|
len = sizeof(info);
|
|
err = bpf_map_get_info_by_fd(bpf_map__fd(skel->maps.testmod_1), &info,
|
|
&len);
|
|
if (!ASSERT_OK(err, "bpf_map_get_info_by_fd"))
|
|
goto cleanup;
|
|
|
|
check_map_info(&info);
|
|
/* test_3() will be called from bpf_dummy_reg() in bpf_testmod.c
|
|
*
|
|
* In bpf_testmod.c it will pass 4 and 13 (the value of data) to
|
|
* .test_2. So, the value of test_2_result should be 20 (4 + 13 +
|
|
* 3).
|
|
*/
|
|
if (!attach_ops_and_check(skel, skel->maps.testmod_1, 20))
|
|
goto cleanup;
|
|
if (!attach_ops_and_check(skel, skel->maps.testmod_2, 12))
|
|
goto cleanup;
|
|
|
|
cleanup:
|
|
struct_ops_module__destroy(skel);
|
|
}
|
|
|
|
void serial_test_struct_ops_module(void)
|
|
{
|
|
if (test__start_subtest("test_struct_ops_load"))
|
|
test_struct_ops_load();
|
|
}
|
|
|