mirror of https://github.com/aya-rs/aya
Add integration test for split BPF
parent
c58433b0e9
commit
aeea582bc1
@ -0,0 +1,27 @@
|
|||||||
|
// clang-format off
|
||||||
|
#include <vmlinux.h>
|
||||||
|
#include <bpf/bpf_helpers.h>
|
||||||
|
#include <bpf/bpf_core_read.h>
|
||||||
|
// clang-format on
|
||||||
|
|
||||||
|
char _license[] SEC("license") = "GPL";
|
||||||
|
|
||||||
|
struct {
|
||||||
|
__uint(type, BPF_MAP_TYPE_ARRAY);
|
||||||
|
__type(key, __u32);
|
||||||
|
__type(value, __u64);
|
||||||
|
__uint(max_entries, 1);
|
||||||
|
} output_map SEC(".maps");
|
||||||
|
|
||||||
|
long set_output(__u64 value) {
|
||||||
|
__u32 key = 0;
|
||||||
|
return bpf_map_update_elem(&output_map, &key, &value, BPF_ANY);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Try to access ip_tables structures. In most distros, ip_tables is compiled
|
||||||
|
// and loaded as a separate module, making it a pretty good target.
|
||||||
|
SEC("uprobe") int check_can_access_module(void *ctx) {
|
||||||
|
int is_successful = bpf_core_type_exists(struct ipt_entry) && bpf_core_field_offset(struct ipt_entry, target_offset) != 0;
|
||||||
|
set_output(is_successful);
|
||||||
|
return is_successful;
|
||||||
|
}
|
@ -0,0 +1,37 @@
|
|||||||
|
//! Test to make sure loading split BTF (kernel module BTF) works properly.
|
||||||
|
|
||||||
|
use aya::{maps::Array, programs::UProbe, EbpfLoader};
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn rebase_tests() {
|
||||||
|
// First, check that we have ip_tables in the split btf.
|
||||||
|
if !matches!(std::fs::exists("/sys/kernel/btf/ip_tables"), Ok(true)) {
|
||||||
|
eprintln!("skipping test on kernel, as ip_tables is not loaded as an external kernel module.");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
let mut bpf = EbpfLoader::new()
|
||||||
|
.load(crate::SPLIT_BPF)
|
||||||
|
.unwrap();
|
||||||
|
let program: &mut UProbe = bpf.program_mut("check_can_access_module").unwrap().try_into().unwrap();
|
||||||
|
program.load().unwrap();
|
||||||
|
program
|
||||||
|
.attach(
|
||||||
|
"trigger_btf_split_program",
|
||||||
|
"/proc/self/exe",
|
||||||
|
None,
|
||||||
|
None,
|
||||||
|
)
|
||||||
|
.unwrap();
|
||||||
|
|
||||||
|
trigger_btf_split_program();
|
||||||
|
|
||||||
|
let output_map: Array<_, u64> = bpf.take_map("output_map").unwrap().try_into().unwrap();
|
||||||
|
let key = 0;
|
||||||
|
assert_eq!(output_map.get(&key, 0).unwrap(), 1)
|
||||||
|
}
|
||||||
|
|
||||||
|
#[unsafe(no_mangle)]
|
||||||
|
#[inline(never)]
|
||||||
|
pub extern "C" fn trigger_btf_split_program() {
|
||||||
|
core::hint::black_box(trigger_btf_split_program);
|
||||||
|
}
|
Loading…
Reference in New Issue