selftests/bpf: check insn processed in test_verifier
authorAlexei Starovoitov <ast@kernel.org>
Thu, 13 Dec 2018 19:42:32 +0000 (11:42 -0800)
committerDaniel Borkmann <daniel@iogearbox.net>
Sat, 15 Dec 2018 00:28:32 +0000 (01:28 +0100)
Teach test_verifier to parse verifier output for insn processed
and compare with expected number.

Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Edward Cree <ecree@solarflare.com>
Acked-by: Jakub Kicinski <jakub.kicinski@netronome.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
tools/testing/selftests/bpf/test_verifier.c

index a08c67c..82359cd 100644 (file)
@@ -76,7 +76,7 @@ struct bpf_test {
        int fixup_percpu_cgroup_storage[MAX_FIXUPS];
        const char *errstr;
        const char *errstr_unpriv;
-       uint32_t retval, retval_unpriv;
+       uint32_t retval, retval_unpriv, insn_processed;
        enum {
                UNDEF,
                ACCEPT,
@@ -14444,6 +14444,19 @@ static void do_test_single(struct bpf_test *test, bool unpriv,
                }
        }
 
+       if (test->insn_processed) {
+               uint32_t insn_processed;
+               char *proc;
+
+               proc = strstr(bpf_vlog, "processed ");
+               insn_processed = atoi(proc + 10);
+               if (test->insn_processed != insn_processed) {
+                       printf("FAIL\nUnexpected insn_processed %u vs %u\n",
+                              insn_processed, test->insn_processed);
+                       goto fail_log;
+               }
+       }
+
        if (fd_prog >= 0) {
                __u8 tmp[TEST_DATA_LEN << 2];
                __u32 size_tmp = sizeof(tmp);