1e950e843SMatt Mullins // SPDX-License-Identifier: GPL-2.0 2e950e843SMatt Mullins 3e950e843SMatt Mullins #include <test_progs.h> 4e950e843SMatt Mullins #include <linux/nbd.h> 5e950e843SMatt Mullins 6*d3f7b166SYucong Sun /* NOTE: conflict with other tests. */ 7*d3f7b166SYucong Sun void serial_test_raw_tp_writable_test_run(void) 8e950e843SMatt Mullins { 9e950e843SMatt Mullins __u32 duration = 0; 10e950e843SMatt Mullins char error[4096]; 11e950e843SMatt Mullins 12e950e843SMatt Mullins const struct bpf_insn trace_program[] = { 13e950e843SMatt Mullins BPF_LDX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0), 14e950e843SMatt Mullins BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_6, 0), 15e950e843SMatt Mullins BPF_MOV64_IMM(BPF_REG_0, 42), 16e950e843SMatt Mullins BPF_STX_MEM(BPF_W, BPF_REG_6, BPF_REG_0, 0), 17e950e843SMatt Mullins BPF_EXIT_INSN(), 18e950e843SMatt Mullins }; 19e950e843SMatt Mullins 20e950e843SMatt Mullins struct bpf_load_program_attr load_attr = { 21e950e843SMatt Mullins .prog_type = BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE, 22e950e843SMatt Mullins .license = "GPL v2", 23e950e843SMatt Mullins .insns = trace_program, 24e950e843SMatt Mullins .insns_cnt = sizeof(trace_program) / sizeof(struct bpf_insn), 25e950e843SMatt Mullins .log_level = 2, 26e950e843SMatt Mullins }; 27e950e843SMatt Mullins 28e950e843SMatt Mullins int bpf_fd = bpf_load_program_xattr(&load_attr, error, sizeof(error)); 29e950e843SMatt Mullins if (CHECK(bpf_fd < 0, "bpf_raw_tracepoint_writable loaded", 30e950e843SMatt Mullins "failed: %d errno %d\n", bpf_fd, errno)) 31e950e843SMatt Mullins return; 32e950e843SMatt Mullins 33e950e843SMatt Mullins const struct bpf_insn skb_program[] = { 34e950e843SMatt Mullins BPF_MOV64_IMM(BPF_REG_0, 0), 35e950e843SMatt Mullins BPF_EXIT_INSN(), 36e950e843SMatt Mullins }; 37e950e843SMatt Mullins 38e950e843SMatt Mullins struct bpf_load_program_attr skb_load_attr = { 39e950e843SMatt Mullins .prog_type = BPF_PROG_TYPE_SOCKET_FILTER, 40e950e843SMatt Mullins .license = "GPL v2", 41e950e843SMatt Mullins .insns = skb_program, 42e950e843SMatt Mullins .insns_cnt = sizeof(skb_program) / sizeof(struct bpf_insn), 43e950e843SMatt Mullins }; 44e950e843SMatt Mullins 45e950e843SMatt Mullins int filter_fd = 46e950e843SMatt Mullins bpf_load_program_xattr(&skb_load_attr, error, sizeof(error)); 47e950e843SMatt Mullins if (CHECK(filter_fd < 0, "test_program_loaded", "failed: %d errno %d\n", 48e950e843SMatt Mullins filter_fd, errno)) 49e950e843SMatt Mullins goto out_bpffd; 50e950e843SMatt Mullins 51e950e843SMatt Mullins int tp_fd = bpf_raw_tracepoint_open("bpf_test_finish", bpf_fd); 52e950e843SMatt Mullins if (CHECK(tp_fd < 0, "bpf_raw_tracepoint_writable opened", 53e950e843SMatt Mullins "failed: %d errno %d\n", tp_fd, errno)) 54e950e843SMatt Mullins goto out_filterfd; 55e950e843SMatt Mullins 56e950e843SMatt Mullins char test_skb[128] = { 57e950e843SMatt Mullins 0, 58e950e843SMatt Mullins }; 59e950e843SMatt Mullins 60e950e843SMatt Mullins __u32 prog_ret; 61e950e843SMatt Mullins int err = bpf_prog_test_run(filter_fd, 1, test_skb, sizeof(test_skb), 0, 62e950e843SMatt Mullins 0, &prog_ret, 0); 63e950e843SMatt Mullins CHECK(err != 42, "test_run", 64e950e843SMatt Mullins "tracepoint did not modify return value\n"); 65e950e843SMatt Mullins CHECK(prog_ret != 0, "test_run_ret", 66e950e843SMatt Mullins "socket_filter did not return 0\n"); 67e950e843SMatt Mullins 68e950e843SMatt Mullins close(tp_fd); 69e950e843SMatt Mullins 70e950e843SMatt Mullins err = bpf_prog_test_run(filter_fd, 1, test_skb, sizeof(test_skb), 0, 0, 71e950e843SMatt Mullins &prog_ret, 0); 72e950e843SMatt Mullins CHECK(err != 0, "test_run_notrace", 73e950e843SMatt Mullins "test_run failed with %d errno %d\n", err, errno); 74e950e843SMatt Mullins CHECK(prog_ret != 0, "test_run_ret_notrace", 75e950e843SMatt Mullins "socket_filter did not return 0\n"); 76e950e843SMatt Mullins 77e950e843SMatt Mullins out_filterfd: 78e950e843SMatt Mullins close(filter_fd); 79e950e843SMatt Mullins out_bpffd: 80e950e843SMatt Mullins close(bpf_fd); 81e950e843SMatt Mullins } 82