xref: /linux/tools/testing/selftests/bpf/prog_tests/cb_refs.c (revision 7f71507851fc7764b36a3221839607d3a45c2025)
1 // SPDX-License-Identifier: GPL-2.0
2 #include "bpf/libbpf.h"
3 #include <test_progs.h>
4 #include <network_helpers.h>
5 
6 #include "cb_refs.skel.h"
7 
8 static char log_buf[1024 * 1024];
9 
10 struct {
11 	const char *prog_name;
12 	const char *err_msg;
13 } cb_refs_tests[] = {
14 	{ "underflow_prog", "must point to scalar, or struct with scalar" },
15 	{ "leak_prog", "Possibly NULL pointer passed to helper arg2" },
16 	{ "nested_cb", "Unreleased reference id=4 alloc_insn=2" }, /* alloc_insn=2{4,5} */
17 	{ "non_cb_transfer_ref", "Unreleased reference id=4 alloc_insn=1" }, /* alloc_insn=1{1,2} */
18 };
19 
20 void test_cb_refs(void)
21 {
22 	LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf,
23 						.kernel_log_size = sizeof(log_buf),
24 						.kernel_log_level = 1);
25 	struct bpf_program *prog;
26 	struct cb_refs *skel;
27 	int i;
28 
29 	for (i = 0; i < ARRAY_SIZE(cb_refs_tests); i++) {
30 		LIBBPF_OPTS(bpf_test_run_opts, run_opts,
31 			.data_in = &pkt_v4,
32 			.data_size_in = sizeof(pkt_v4),
33 			.repeat = 1,
34 		);
35 		skel = cb_refs__open_opts(&opts);
36 		if (!ASSERT_OK_PTR(skel, "cb_refs__open_and_load"))
37 			return;
38 		prog = bpf_object__find_program_by_name(skel->obj, cb_refs_tests[i].prog_name);
39 		bpf_program__set_autoload(prog, true);
40 		if (!ASSERT_ERR(cb_refs__load(skel), "cb_refs__load"))
41 			bpf_prog_test_run_opts(bpf_program__fd(prog), &run_opts);
42 		if (!ASSERT_OK_PTR(strstr(log_buf, cb_refs_tests[i].err_msg), "expected error message")) {
43 			fprintf(stderr, "Expected: %s\n", cb_refs_tests[i].err_msg);
44 			fprintf(stderr, "Verifier: %s\n", log_buf);
45 		}
46 		cb_refs__destroy(skel);
47 	}
48 }
49