[LTP] [PATCH v3 0/4] eBPF tests using guarded buffers API
Richard Palethorpe
rpalethorpe@suse.com
Tue Aug 6 11:47:48 CEST 2019
Hello,
This is another version of my basic eBPF tests using Metan's guarded buffers
patch set. I have tried to use the new API for any pointer passed to a system
call.
Richard Palethorpe (4):
BPF: Essential headers for map creation
BPF: Sanity check creating and updating maps
BPF: Essential headers for a basic program
BPF: Sanity check creating a program
include/lapi/bpf.h | 526 +++++++++++++++++++++
include/lapi/socket.h | 4 +
include/lapi/syscalls/aarch64.in | 1 +
include/lapi/syscalls/i386.in | 1 +
include/lapi/syscalls/s390.in | 1 +
include/lapi/syscalls/sparc.in | 1 +
include/lapi/syscalls/x86_64.in | 1 +
runtest/syscalls | 3 +
testcases/kernel/syscalls/bpf/.gitignore | 2 +
testcases/kernel/syscalls/bpf/Makefile | 10 +
testcases/kernel/syscalls/bpf/bpf_map01.c | 140 ++++++
testcases/kernel/syscalls/bpf/bpf_prog01.c | 161 +++++++
12 files changed, 851 insertions(+)
create mode 100644 include/lapi/bpf.h
create mode 100644 testcases/kernel/syscalls/bpf/.gitignore
create mode 100644 testcases/kernel/syscalls/bpf/Makefile
create mode 100644 testcases/kernel/syscalls/bpf/bpf_map01.c
create mode 100644 testcases/kernel/syscalls/bpf/bpf_prog01.c
--
2.22.0
More information about the ltp
mailing list