| // SPDX-License-Identifier: GPL-2.0 |
| /* Copyright (c) 2025 Microsoft */ |
| #include <test_progs.h> |
| #include "kfunc_call_test.skel.h" |
| #include "kfunc_call_test.lskel.h" |
| #include "test_kernel_flag.skel.h" |
| |
| void test_kernel_flag(void) |
| { |
| struct test_kernel_flag *lsm_skel; |
| struct kfunc_call_test *skel = NULL; |
| struct kfunc_call_test_lskel *lskel = NULL; |
| int ret; |
| |
| lsm_skel = test_kernel_flag__open_and_load(); |
| if (!ASSERT_OK_PTR(lsm_skel, "lsm_skel")) |
| return; |
| |
| lsm_skel->bss->monitored_tid = gettid(); |
| |
| ret = test_kernel_flag__attach(lsm_skel); |
| if (!ASSERT_OK(ret, "test_kernel_flag__attach")) |
| goto close_prog; |
| |
| /* Test with skel. This should pass the gatekeeper */ |
| skel = kfunc_call_test__open_and_load(); |
| if (!ASSERT_OK_PTR(skel, "skel")) |
| goto close_prog; |
| |
| /* Test with lskel. This should fail due to blocking kernel-based bpf() invocations */ |
| lskel = kfunc_call_test_lskel__open_and_load(); |
| if (!ASSERT_ERR_PTR(lskel, "lskel")) |
| goto close_prog; |
| |
| close_prog: |
| if (skel) |
| kfunc_call_test__destroy(skel); |
| if (lskel) |
| kfunc_call_test_lskel__destroy(lskel); |
| |
| lsm_skel->bss->monitored_tid = 0; |
| test_kernel_flag__destroy(lsm_skel); |
| } |