mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-10-31 16:38:12 +00:00
da00d2f117
The current fexit and fentry tests rely on a different program to exercise the functions they attach to. Instead of doing this, implement the test operations for tracing which will also be used for BPF_MODIFY_RETURN in a subsequent patch. Also, clean up the fexit test to use the generated skeleton. Signed-off-by: KP Singh <kpsingh@google.com> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Acked-by: Andrii Nakryiko <andriin@fb.com> Acked-by: Daniel Borkmann <daniel@iogearbox.net> Link: https://lore.kernel.org/bpf/20200304191853.1529-7-kpsingh@chromium.org
37 lines
1,016 B
C
37 lines
1,016 B
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Copyright (c) 2019 Facebook */
|
|
#include <test_progs.h>
|
|
#include "fentry_test.skel.h"
|
|
|
|
void test_fentry_test(void)
|
|
{
|
|
struct fentry_test *fentry_skel = NULL;
|
|
int err, prog_fd, i;
|
|
__u32 duration = 0, retval;
|
|
__u64 *result;
|
|
|
|
fentry_skel = fentry_test__open_and_load();
|
|
if (CHECK(!fentry_skel, "fentry_skel_load", "fentry skeleton failed\n"))
|
|
goto cleanup;
|
|
|
|
err = fentry_test__attach(fentry_skel);
|
|
if (CHECK(err, "fentry_attach", "fentry attach failed: %d\n", err))
|
|
goto cleanup;
|
|
|
|
prog_fd = bpf_program__fd(fentry_skel->progs.test1);
|
|
err = bpf_prog_test_run(prog_fd, 1, NULL, 0,
|
|
NULL, NULL, &retval, &duration);
|
|
CHECK(err || retval, "test_run",
|
|
"err %d errno %d retval %d duration %d\n",
|
|
err, errno, retval, duration);
|
|
|
|
result = (__u64 *)fentry_skel->bss;
|
|
for (i = 0; i < 6; i++) {
|
|
if (CHECK(result[i] != 1, "result",
|
|
"fentry_test%d failed err %lld\n", i + 1, result[i]))
|
|
goto cleanup;
|
|
}
|
|
|
|
cleanup:
|
|
fentry_test__destroy(fentry_skel);
|
|
}
|