syscall.c (1308B)
1// SPDX-License-Identifier: GPL-2.0 2/* Copyright (c) 2021 Facebook */ 3#include <test_progs.h> 4#include "syscall.skel.h" 5 6struct args { 7 __u64 log_buf; 8 __u32 log_size; 9 int max_entries; 10 int map_fd; 11 int prog_fd; 12 int btf_fd; 13}; 14 15void test_syscall(void) 16{ 17 static char verifier_log[8192]; 18 struct args ctx = { 19 .max_entries = 1024, 20 .log_buf = (uintptr_t) verifier_log, 21 .log_size = sizeof(verifier_log), 22 }; 23 LIBBPF_OPTS(bpf_test_run_opts, tattr, 24 .ctx_in = &ctx, 25 .ctx_size_in = sizeof(ctx), 26 ); 27 struct syscall *skel = NULL; 28 __u64 key = 12, value = 0; 29 int err, prog_fd; 30 31 skel = syscall__open_and_load(); 32 if (!ASSERT_OK_PTR(skel, "skel_load")) 33 goto cleanup; 34 35 prog_fd = bpf_program__fd(skel->progs.bpf_prog); 36 err = bpf_prog_test_run_opts(prog_fd, &tattr); 37 ASSERT_EQ(err, 0, "err"); 38 ASSERT_EQ(tattr.retval, 1, "retval"); 39 ASSERT_GT(ctx.map_fd, 0, "ctx.map_fd"); 40 ASSERT_GT(ctx.prog_fd, 0, "ctx.prog_fd"); 41 ASSERT_OK(memcmp(verifier_log, "processed", sizeof("processed") - 1), 42 "verifier_log"); 43 44 err = bpf_map_lookup_elem(ctx.map_fd, &key, &value); 45 ASSERT_EQ(err, 0, "map_lookup"); 46 ASSERT_EQ(value, 34, "map lookup value"); 47cleanup: 48 syscall__destroy(skel); 49 if (ctx.prog_fd > 0) 50 close(ctx.prog_fd); 51 if (ctx.map_fd > 0) 52 close(ctx.map_fd); 53 if (ctx.btf_fd > 0) 54 close(ctx.btf_fd); 55}