1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (c) 2019 Facebook */
3 #include <test_progs.h>
5 static void test_fexit_bpf2bpf_common(const char *obj_file,
6 const char *target_obj_file,
8 const char **prog_name,
11 struct bpf_object *obj = NULL, *pkt_obj;
13 struct bpf_link **link = NULL;
14 struct bpf_program **prog = NULL;
15 __u32 duration = 0, retval;
16 struct bpf_map *data_map;
20 err = bpf_prog_load(target_obj_file, BPF_PROG_TYPE_UNSPEC,
22 if (CHECK(err, "tgt_prog_load", "file %s err %d errno %d\n",
23 target_obj_file, err, errno))
25 DECLARE_LIBBPF_OPTS(bpf_object_open_opts, opts,
26 .attach_prog_fd = pkt_fd,
29 link = calloc(sizeof(struct bpf_link *), prog_cnt);
30 prog = calloc(sizeof(struct bpf_program *), prog_cnt);
31 result = malloc((prog_cnt + 32 /* spare */) * sizeof(u64));
32 if (CHECK(!link || !prog || !result, "alloc_memory",
33 "failed to alloc memory"))
36 obj = bpf_object__open_file(obj_file, &opts);
37 if (CHECK(IS_ERR_OR_NULL(obj), "obj_open",
38 "failed to open %s: %ld\n", obj_file,
42 err = bpf_object__load(obj);
43 if (CHECK(err, "obj_load", "err %d\n", err))
46 for (i = 0; i < prog_cnt; i++) {
47 prog[i] = bpf_object__find_program_by_title(obj, prog_name[i]);
48 if (CHECK(!prog[i], "find_prog", "prog %s not found\n", prog_name[i]))
50 link[i] = bpf_program__attach_trace(prog[i]);
51 if (CHECK(IS_ERR(link[i]), "attach_trace", "failed to link\n"))
58 data_map = bpf_object__find_map_by_name(obj, "fexit_bp.bss");
59 if (CHECK(!data_map, "find_data_map", "data map not found\n"))
62 err = bpf_prog_test_run(pkt_fd, 1, &pkt_v6, sizeof(pkt_v6),
63 NULL, NULL, &retval, &duration);
64 CHECK(err || retval, "ipv6",
65 "err %d errno %d retval %d duration %d\n",
66 err, errno, retval, duration);
68 err = bpf_map_lookup_elem(bpf_map__fd(data_map), &zero, result);
69 if (CHECK(err, "get_result",
70 "failed to get output data: %d\n", err))
73 for (i = 0; i < prog_cnt; i++)
74 if (CHECK(result[i] != 1, "result", "fexit_bpf2bpf failed err %ld\n",
79 for (i = 0; i < prog_cnt; i++)
80 if (!IS_ERR_OR_NULL(link[i]))
81 bpf_link__destroy(link[i]);
82 if (!IS_ERR_OR_NULL(obj))
83 bpf_object__close(obj);
84 bpf_object__close(pkt_obj);
90 static void test_target_no_callees(void)
92 const char *prog_name[] = {
93 "fexit/test_pkt_md_access",
95 test_fexit_bpf2bpf_common("./fexit_bpf2bpf_simple.o",
96 "./test_pkt_md_access.o",
97 ARRAY_SIZE(prog_name),
101 static void test_target_yes_callees(void)
103 const char *prog_name[] = {
104 "fexit/test_pkt_access",
105 "fexit/test_pkt_access_subprog1",
106 "fexit/test_pkt_access_subprog2",
107 "fexit/test_pkt_access_subprog3",
109 test_fexit_bpf2bpf_common("./fexit_bpf2bpf.o",
110 "./test_pkt_access.o",
111 ARRAY_SIZE(prog_name),
115 static void test_func_replace(void)
117 const char *prog_name[] = {
118 "fexit/test_pkt_access",
119 "fexit/test_pkt_access_subprog1",
120 "fexit/test_pkt_access_subprog2",
121 "fexit/test_pkt_access_subprog3",
122 "freplace/get_skb_len",
123 "freplace/get_skb_ifindex",
124 "freplace/get_constant",
126 test_fexit_bpf2bpf_common("./fexit_bpf2bpf.o",
127 "./test_pkt_access.o",
128 ARRAY_SIZE(prog_name),
132 static void test_func_replace_verify(void)
134 const char *prog_name[] = {
137 test_fexit_bpf2bpf_common("./freplace_connect4.o",
139 ARRAY_SIZE(prog_name),
143 void test_fexit_bpf2bpf(void)
145 test_target_no_callees();
146 test_target_yes_callees();
148 test_func_replace_verify();