/linux-6.3-rc2/tools/testing/selftests/bpf/prog_tests/ |
A D | snprintf.c | 108 ASSERT_ERR(load_single_snprintf("0123456789"), "no terminating zero"); in test_snprintf_negative() 109 ASSERT_ERR(load_single_snprintf("%d %d"), "too many specifiers"); in test_snprintf_negative() 110 ASSERT_ERR(load_single_snprintf("%pi5"), "invalid specifier 1"); in test_snprintf_negative() 111 ASSERT_ERR(load_single_snprintf("%a"), "invalid specifier 2"); in test_snprintf_negative() 112 ASSERT_ERR(load_single_snprintf("%"), "invalid specifier 3"); in test_snprintf_negative() 113 ASSERT_ERR(load_single_snprintf("%12345678"), "invalid specifier 4"); in test_snprintf_negative() 114 ASSERT_ERR(load_single_snprintf("%--------"), "invalid specifier 5"); in test_snprintf_negative() 115 ASSERT_ERR(load_single_snprintf("%lc"), "invalid specifier 6"); in test_snprintf_negative() 116 ASSERT_ERR(load_single_snprintf("%llc"), "invalid specifier 7"); in test_snprintf_negative() 117 ASSERT_ERR(load_single_snprintf("\x80"), "non ascii character"); in test_snprintf_negative() [all …]
|
A D | lookup_and_delete.c | 127 if (!ASSERT_ERR(err, "bpf_map_lookup_elem")) in test_lookup_and_delete_hash() 167 if (!ASSERT_ERR(err, "bpf_map_lookup_elem")) in test_lookup_and_delete_percpu_hash() 208 if (!ASSERT_ERR(err, "bpf_map_lookup_elem")) in test_lookup_and_delete_lru_hash() 213 if (!ASSERT_ERR(err, "bpf_map_lookup_elem")) in test_lookup_and_delete_lru_hash() 267 if (!ASSERT_ERR(err, "bpf_map_lookup_elem")) in test_lookup_and_delete_lru_percpu_hash() 272 if (!ASSERT_ERR(err, "bpf_map_lookup_elem")) in test_lookup_and_delete_lru_percpu_hash()
|
A D | cgroup_getset_retval.c | 36 if (!ASSERT_ERR(setsockopt(sock_fd, SOL_SOCKET, SO_REUSEADDR, in test_setsockopt_set() 74 if (!ASSERT_ERR(setsockopt(sock_fd, SOL_SOCKET, SO_REUSEADDR, in test_setsockopt_set_and_get() 150 if (!ASSERT_ERR(setsockopt(sock_fd, SOL_SOCKET, SO_REUSEADDR, in test_setsockopt_default_zero_and_set() 197 if (!ASSERT_ERR(setsockopt(sock_fd, SOL_SOCKET, SO_REUSEADDR, in test_setsockopt_override() 241 if (!ASSERT_ERR(setsockopt(sock_fd, SOL_SOCKET, SO_REUSEADDR, in test_setsockopt_legacy_eperm() 290 if (!ASSERT_ERR(setsockopt(sock_fd, SOL_SOCKET, SO_REUSEADDR, in test_setsockopt_legacy_no_override() 330 if (!ASSERT_ERR(getsockopt(sock_fd, SOL_CUSTOM, 0, in test_getsockopt_get() 370 if (!ASSERT_ERR(getsockopt(sock_fd, SOL_CUSTOM, 0, in test_getsockopt_override()
|
A D | btf_tag.c | 130 ASSERT_ERR(err, "btf_type_tag_user"); in test_btf_type_tag_mod_user() 156 ASSERT_ERR(err, "btf_type_tag_user"); in test_btf_type_tag_vmlinux_user() 185 ASSERT_ERR(err, "btf_type_tag_percpu"); in test_btf_type_tag_mod_percpu() 213 ASSERT_ERR(err, "btf_type_tag_percpu_load"); in test_btf_type_tag_vmlinux_percpu()
|
A D | log_fixup.c | 29 if (!ASSERT_ERR(err, "load_fail")) in bad_core_relo() 85 if (!ASSERT_ERR(err, "load_fail")) in bad_core_relo_subprog() 119 if (!ASSERT_ERR(err, "load_fail")) in missing_map()
|
A D | xdp_link.c | 83 if (!ASSERT_ERR(err, "prog_attach_fail")) in serial_test_xdp_link() 88 if (!ASSERT_ERR(err, "prog_update_fail")) in serial_test_xdp_link() 93 if (!ASSERT_ERR(err, "prog_detach_fail")) in serial_test_xdp_link() 133 if (!ASSERT_ERR(err, "link_upd_invalid")) in serial_test_xdp_link()
|
A D | module_attach.c | 96 ASSERT_ERR(delete_module("bpf_testmod", 0), "delete_module"); in test_module_attach() 103 ASSERT_ERR(delete_module("bpf_testmod", 0), "delete_module"); in test_module_attach() 110 ASSERT_ERR(delete_module("bpf_testmod", 0), "delete_module"); in test_module_attach()
|
A D | test_strncmp.c | 99 ASSERT_ERR(err, "strncmp_test load bad_not_const_str_size"); in test_strncmp_bad_not_const_str_size() 116 ASSERT_ERR(err, "strncmp_test load bad_writable_target"); in test_strncmp_bad_writable_target() 133 ASSERT_ERR(err, "strncmp_test load bad_not_null_term_target"); in test_strncmp_bad_not_null_term_target()
|
A D | user_ringbuf.c | 113 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_WRITE), "write_cons_pos_protect"); in test_user_ringbuf_mappings() 114 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_cons_pos_protect"); in test_user_ringbuf_mappings() 117 ASSERT_ERR(err, "wr_prod_pos_err"); in test_user_ringbuf_mappings() 124 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_prod_pos_protect"); in test_user_ringbuf_mappings() 126 ASSERT_ERR(err, "wr_prod_pos_err"); in test_user_ringbuf_mappings() 133 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_data_protect"); in test_user_ringbuf_mappings() 135 ASSERT_ERR(err, "exec_data_err"); in test_user_ringbuf_mappings() 366 ASSERT_ERR(err, "write_samples"); in test_user_ringbuf_overfill()
|
A D | ringbuf.c | 112 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_cons_pos_protect"); in ringbuf_subtest() 136 ASSERT_ERR(mprotect(mmap_ptr, 4 * page_size, PROT_WRITE), "write_protect"); in ringbuf_subtest() 137 ASSERT_ERR(mprotect(mmap_ptr, 4 * page_size, PROT_EXEC), "exec_protect"); in ringbuf_subtest() 146 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_WRITE), "write_protect"); in ringbuf_subtest() 147 ASSERT_ERR(mprotect(mmap_ptr, page_size, PROT_EXEC), "exec_protect"); in ringbuf_subtest()
|
A D | btf_write.c | 43 ASSERT_ERR(id, "int_bad_sz"); in gen_btf() 46 ASSERT_ERR(id, "int_bad_enc"); in gen_btf() 49 ASSERT_ERR(id, "int_bad_null_name"); in gen_btf() 52 ASSERT_ERR(id, "int_bad_empty_name"); in gen_btf() 100 ASSERT_ERR(err, "no_struct_field"); in gen_btf() 135 ASSERT_ERR(err, "no_struct_field"); in gen_btf()
|
A D | raw_tp_test_run.c | 73 ASSERT_ERR(err, "test_run_opts_fail"); in test_raw_tp_test_run() 80 ASSERT_ERR(err, "test_run_opts_fail"); in test_raw_tp_test_run()
|
A D | xdp_context_test_run.c | 25 ASSERT_ERR(err, "bpf_prog_test_run"); in test_xdp_context_error() 54 ASSERT_ERR(err, "bpf_prog_test_run(extradata)"); in test_xdp_context_test_run()
|
A D | rcu_read_lock.c | 95 ASSERT_ERR(err, "skel_load"); in test_inproper_region() 123 ASSERT_ERR(err, "skel_load"); in test_rcuptr_misuse()
|
A D | helper_restricted.c | 27 ASSERT_ERR(err, "load_should_fail"); in test_helper_restricted()
|
A D | cb_refs.c | 40 if (!ASSERT_ERR(cb_refs__load(skel), "cb_refs__load")) in test_cb_refs()
|
A D | log_buf.c | 71 if (!ASSERT_ERR(err, "unexpected_load_success")) in obj_load_log_buf() 114 if (!ASSERT_ERR(err, "unexpected_load_success")) in obj_load_log_buf()
|
A D | prog_run_opts.c | 50 ASSERT_ERR(err, "test_run"); in test_prog_run_opts()
|
A D | spin_lock.c | 68 if (!ASSERT_ERR(ret, "test_spin_lock_fail__load must fail")) in test_spin_lock_fail_prog()
|
A D | bpf_verif_scale.c | 68 ASSERT_ERR(err, "expect_error"); in scale_test()
|
A D | sk_storage_tracing.c | 85 if (!ASSERT_ERR(err, "map_lookup(del_sk_stg_map)")) in do_test()
|
A D | type_cast.c | 100 ASSERT_ERR(err, "skel_load"); in test_negative()
|
A D | ringbuf_multi.c | 76 …if (!ASSERT_ERR(bpf_map__set_max_entries(skel->maps.ringbuf1, 3 * page_size), "rb1_resize_after_lo… in test_ringbuf_multi()
|
A D | ksyms_btf.c | 149 ASSERT_ERR(test_ksyms_btf_write_check__load(skel), in test_write_check()
|
A D | sockmap_ktls.c | 124 if (!ASSERT_ERR(err, "sockmap update elem")) in test_sockmap_ktls_update_fails_when_sock_has_ulp()
|