// SPDX-License-Identifier: GPL-2.0 /* Copyright (c) 2020 Facebook */ #include const char *err_str; bool found; static int libbpf_debug_print(enum libbpf_print_level level, const char *format, va_list args) { char *log_buf; if (level != LIBBPF_WARN || strcmp(format, "libbpf: \n%s\n")) { vprintf(format, args); return 0; } log_buf = va_arg(args, char *); if (!log_buf) goto out; if (err_str && strstr(log_buf, err_str) == 0) found = true; out: printf(format, log_buf); return 0; } extern int extra_prog_load_log_flags; static int check_load(const char *file) { struct bpf_object *obj = NULL; struct bpf_program *prog; int err; found = false; obj = bpf_object__open_file(file, NULL); err = libbpf_get_error(obj); if (err) return err; prog = bpf_object__next_program(obj, NULL); if (!prog) { err = -ENOENT; goto err_out; } bpf_program__set_flags(prog, BPF_F_TEST_RND_HI32); bpf_program__set_log_level(prog, extra_prog_load_log_flags); err = bpf_object__load(obj); err_out: bpf_object__close(obj); return err; } struct test_def { const char *file; const char *err_str; }; void test_test_global_funcs(void) { struct test_def tests[] = { { "test_global_func1.bpf.o", "combined stack size of 4 calls is 544" }, { "test_global_func2.bpf.o" }, { "test_global_func3.bpf.o", "the call stack of 8 frames" }, { "test_global_func4.bpf.o" }, { "test_global_func5.bpf.o", "expected pointer to ctx, but got PTR" }, { "test_global_func6.bpf.o", "modified ctx ptr R2" }, { "test_global_func7.bpf.o", "foo() doesn't return scalar" }, { "test_global_func8.bpf.o" }, { "test_global_func9.bpf.o" }, { "test_global_func10.bpf.o", "invalid indirect read from stack" }, { "test_global_func11.bpf.o", "Caller passes invalid args into func#1" }, { "test_global_func12.bpf.o", "invalid mem access 'mem_or_null'" }, { "test_global_func13.bpf.o", "Caller passes invalid args into func#1" }, { "test_global_func14.bpf.o", "reference type('FWD S') size cannot be determined" }, { "test_global_func15.bpf.o", "At program exit the register R0 has value" }, { "test_global_func16.bpf.o", "invalid indirect read from stack" }, { "test_global_func17.bpf.o", "Caller passes invalid args into func#1" }, }; libbpf_print_fn_t old_print_fn = NULL; int err, i, duration = 0; old_print_fn = libbpf_set_print(libbpf_debug_print); for (i = 0; i < ARRAY_SIZE(tests); i++) { const struct test_def *test = &tests[i]; if (!test__start_subtest(test->file)) continue; err_str = test->err_str; err = check_load(test->file); CHECK_FAIL(!!err ^ !!err_str); if (err_str) CHECK(found, "", "expected string '%s'", err_str); } libbpf_set_print(old_print_fn); }