selftests/bpf: Remove explicit setrlimit(RLIMIT_MEMLOCK) in main selftests
[linux.git] / tools / testing / selftests / bpf / prog_tests / skeleton.c
CommitLineData
197448ea
AN
1// SPDX-License-Identifier: GPL-2.0
2/* Copyright (c) 2019 Facebook */
3
4#include <test_progs.h>
5
6struct s {
7 int a;
8 long long b;
9} __attribute__((packed));
10
11#include "test_skeleton.skel.h"
12
197448ea
AN
13void test_skeleton(void)
14{
15 int duration = 0, err;
16 struct test_skeleton* skel;
17 struct test_skeleton__bss *bss;
caf62492 18 struct test_skeleton__data *data;
30c5bd96 19 struct test_skeleton__data_dyn *data_dyn;
caf62492 20 struct test_skeleton__rodata *rodata;
30c5bd96 21 struct test_skeleton__rodata_dyn *rodata_dyn;
81bfdd08 22 struct test_skeleton__kconfig *kcfg;
980a1a4c
MS
23 const void *elf_bytes;
24 size_t elf_bytes_sz = 0;
30c5bd96 25 int i;
197448ea 26
5dc7a8b2 27 skel = test_skeleton__open();
197448ea
AN
28 if (CHECK(!skel, "skel_open", "failed to open skeleton\n"))
29 return;
30
81bfdd08 31 if (CHECK(skel->kconfig, "skel_kconfig", "kconfig is mmaped()!\n"))
330a73a7
AN
32 goto cleanup;
33
caf62492
AN
34 bss = skel->bss;
35 data = skel->data;
30c5bd96 36 data_dyn = skel->data_dyn;
caf62492 37 rodata = skel->rodata;
30c5bd96
AN
38 rodata_dyn = skel->rodata_dyn;
39
40 ASSERT_STREQ(bpf_map__name(skel->maps.rodata_dyn), ".rodata.dyn", "rodata_dyn_name");
41 ASSERT_STREQ(bpf_map__name(skel->maps.data_dyn), ".data.dyn", "data_dyn_name");
caf62492
AN
42
43 /* validate values are pre-initialized correctly */
44 CHECK(data->in1 != -1, "in1", "got %d != exp %d\n", data->in1, -1);
45 CHECK(data->out1 != -1, "out1", "got %d != exp %d\n", data->out1, -1);
46 CHECK(data->in2 != -1, "in2", "got %lld != exp %lld\n", data->in2, -1LL);
47 CHECK(data->out2 != -1, "out2", "got %lld != exp %lld\n", data->out2, -1LL);
48
49 CHECK(bss->in3 != 0, "in3", "got %d != exp %d\n", bss->in3, 0);
50 CHECK(bss->out3 != 0, "out3", "got %d != exp %d\n", bss->out3, 0);
51 CHECK(bss->in4 != 0, "in4", "got %lld != exp %lld\n", bss->in4, 0LL);
52 CHECK(bss->out4 != 0, "out4", "got %lld != exp %lld\n", bss->out4, 0LL);
53
0b20933d 54 CHECK(rodata->in.in6 != 0, "in6", "got %d != exp %d\n", rodata->in.in6, 0);
caf62492
AN
55 CHECK(bss->out6 != 0, "out6", "got %d != exp %d\n", bss->out6, 0);
56
30c5bd96
AN
57 ASSERT_EQ(rodata_dyn->in_dynarr_sz, 0, "in_dynarr_sz");
58 for (i = 0; i < 4; i++)
59 ASSERT_EQ(rodata_dyn->in_dynarr[i], -(i + 1), "in_dynarr");
60 for (i = 0; i < 4; i++)
61 ASSERT_EQ(data_dyn->out_dynarr[i], i + 1, "out_dynarr");
62
caf62492
AN
63 /* validate we can pre-setup global variables, even in .bss */
64 data->in1 = 10;
65 data->in2 = 11;
66 bss->in3 = 12;
67 bss->in4 = 13;
0b20933d 68 rodata->in.in6 = 14;
caf62492 69
30c5bd96
AN
70 rodata_dyn->in_dynarr_sz = 4;
71 for (i = 0; i < 4; i++)
72 rodata_dyn->in_dynarr[i] = i + 10;
73
330a73a7
AN
74 err = test_skeleton__load(skel);
75 if (CHECK(err, "skel_load", "failed to load skeleton: %d\n", err))
76 goto cleanup;
330a73a7 77
caf62492
AN
78 /* validate pre-setup values are still there */
79 CHECK(data->in1 != 10, "in1", "got %d != exp %d\n", data->in1, 10);
80 CHECK(data->in2 != 11, "in2", "got %lld != exp %lld\n", data->in2, 11LL);
81 CHECK(bss->in3 != 12, "in3", "got %d != exp %d\n", bss->in3, 12);
82 CHECK(bss->in4 != 13, "in4", "got %lld != exp %lld\n", bss->in4, 13LL);
0b20933d 83 CHECK(rodata->in.in6 != 14, "in6", "got %d != exp %d\n", rodata->in.in6, 14);
caf62492 84
30c5bd96
AN
85 ASSERT_EQ(rodata_dyn->in_dynarr_sz, 4, "in_dynarr_sz");
86 for (i = 0; i < 4; i++)
87 ASSERT_EQ(rodata_dyn->in_dynarr[i], i + 10, "in_dynarr");
88
caf62492
AN
89 /* now set new values and attach to get them into outX variables */
90 data->in1 = 1;
91 data->in2 = 2;
197448ea
AN
92 bss->in3 = 3;
93 bss->in4 = 4;
94 bss->in5.a = 5;
95 bss->in5.b = 6;
81bfdd08 96 kcfg = skel->kconfig;
197448ea 97
30c5bd96
AN
98 skel->data_read_mostly->read_mostly_var = 123;
99
197448ea
AN
100 err = test_skeleton__attach(skel);
101 if (CHECK(err, "skel_attach", "skeleton attach failed: %d\n", err))
102 goto cleanup;
103
104 /* trigger tracepoint */
105 usleep(1);
106
caf62492
AN
107 CHECK(data->out1 != 1, "res1", "got %d != exp %d\n", data->out1, 1);
108 CHECK(data->out2 != 2, "res2", "got %lld != exp %d\n", data->out2, 2);
197448ea
AN
109 CHECK(bss->out3 != 3, "res3", "got %d != exp %d\n", (int)bss->out3, 3);
110 CHECK(bss->out4 != 4, "res4", "got %lld != exp %d\n", bss->out4, 4);
256eab48
AN
111 CHECK(bss->out5.a != 5, "res5", "got %d != exp %d\n", bss->out5.a, 5);
112 CHECK(bss->out5.b != 6, "res6", "got %lld != exp %d\n", bss->out5.b, 6);
caf62492 113 CHECK(bss->out6 != 14, "res7", "got %d != exp %d\n", bss->out6, 14);
197448ea 114
81bfdd08
AN
115 CHECK(bss->bpf_syscall != kcfg->CONFIG_BPF_SYSCALL, "ext1",
116 "got %d != exp %d\n", bss->bpf_syscall, kcfg->CONFIG_BPF_SYSCALL);
117 CHECK(bss->kern_ver != kcfg->LINUX_KERNEL_VERSION, "ext2",
118 "got %d != exp %d\n", bss->kern_ver, kcfg->LINUX_KERNEL_VERSION);
330a73a7 119
30c5bd96
AN
120 for (i = 0; i < 4; i++)
121 ASSERT_EQ(data_dyn->out_dynarr[i], i + 10, "out_dynarr");
122
123 ASSERT_EQ(skel->bss->out_mostly_var, 123, "out_mostly_var");
124
980a1a4c
MS
125 elf_bytes = test_skeleton__elf_bytes(&elf_bytes_sz);
126 ASSERT_OK_PTR(elf_bytes, "elf_bytes");
127 ASSERT_GE(elf_bytes_sz, 0, "elf_bytes_sz");
128
197448ea
AN
129cleanup:
130 test_skeleton__destroy(skel);
131}
This page took 0.216975 seconds and 4 git commands to generate.