1 // SPDX-License-Identifier: GPL-2.0
3 #include <test_progs.h>
7 /* NOTE: conflict with other tests. */
8 void serial_test_raw_tp_writable_test_run(void)
13 const struct bpf_insn trace_program[] = {
14 BPF_LDX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
15 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_6, 0),
16 BPF_MOV64_IMM(BPF_REG_0, 42),
17 BPF_STX_MEM(BPF_W, BPF_REG_6, BPF_REG_0, 0),
21 LIBBPF_OPTS(bpf_prog_load_opts, trace_opts,
24 .log_size = sizeof(error),
27 int bpf_fd = bpf_prog_load(BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE, NULL, "GPL v2",
28 trace_program, ARRAY_SIZE(trace_program),
30 if (CHECK(bpf_fd < 0, "bpf_raw_tracepoint_writable loaded",
31 "failed: %d errno %d\n", bpf_fd, errno))
34 const struct bpf_insn skb_program[] = {
35 BPF_MOV64_IMM(BPF_REG_0, 0),
39 LIBBPF_OPTS(bpf_prog_load_opts, skb_opts,
41 .log_size = sizeof(error),
44 int filter_fd = bpf_prog_load(BPF_PROG_TYPE_SOCKET_FILTER, NULL, "GPL v2",
45 skb_program, ARRAY_SIZE(skb_program),
47 if (CHECK(filter_fd < 0, "test_program_loaded", "failed: %d errno %d\n",
51 int tp_fd = bpf_raw_tracepoint_open("bpf_test_finish", bpf_fd);
52 if (CHECK(tp_fd < 0, "bpf_raw_tracepoint_writable opened",
53 "failed: %d errno %d\n", tp_fd, errno))
56 char test_skb[128] = {
60 LIBBPF_OPTS(bpf_test_run_opts, topts,
62 .data_size_in = sizeof(test_skb),
65 int err = bpf_prog_test_run_opts(filter_fd, &topts);
66 CHECK(err != 42, "test_run",
67 "tracepoint did not modify return value\n");
68 CHECK(topts.retval != 0, "test_run_ret",
69 "socket_filter did not return 0\n");
73 err = bpf_prog_test_run_opts(filter_fd, &topts);
74 CHECK(err != 0, "test_run_notrace",
75 "test_run failed with %d errno %d\n", err, errno);
76 CHECK(topts.retval != 0, "test_run_ret_notrace",
77 "socket_filter did not return 0\n");