Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp7153602ybi; Mon, 8 Jul 2019 15:44:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqxAoAqERH53r2oS1L46HyZ5TdF3Qw2WYHfWRMw7Dp2cfjvLsZLp5K2WLdiLoogNW2RM8OXy X-Received: by 2002:a17:902:70c3:: with SMTP id l3mr20707136plt.92.1562625840107; Mon, 08 Jul 2019 15:44:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562625840; cv=none; d=google.com; s=arc-20160816; b=G/G4qzI+jspEF60jdf6/AU63oceEz72/POBHszFVCkLlU5a4CGIRfRQowcoh3J3vVr FdHcoHkNa4NA/MctF6SuXR+yKqZzRAtISDa0OgilwnaIbX5++Zl7gldJFuxT5Yi3+GvV Q/kHmOBVkmGpxjLHrO6CxRV+ZnuxKdNaqMZFPI6nKZcnnt7wWHkJP6/eSBI/yv8S9kpl pShJwbLDU6MIOMIPRbUzreFp6QjyXwpXQmFJolj178Wut5TWb26o5LD/TvhS8UTfZ56A Pm15DZmU74oy8Q4UHpkyx5oJ7A34CEgFhOBuo+E4R42QBpUkSrC2fhve3BwLUPQCN5+7 JdMA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=amfYeislYJ8EeT6TDcXvFdnxBjp9KM9m4SLqeYyRX4s=; b=olKs9IEFLs3giPAn4sUndmwINTmgeyIAv6Y3DDu3J4oZUGCRRL/1+Vv2PrxgzXL5Qv iTSmcFZwZ5jSxihlguFLx+pPbpOBvJ2NKtnrWfTtMkNrvlvc6sP4UjSkq9nqbzvJytBY bOBWUNarSovq3yG2gTBsFVzLu1EbsdK9a2wyuP+X0o37UR1SWeS+0eR33ZeaIan6Q8Y5 cm2uOCp6YFA9hqBX3SYpy9/Nl3yOh3vOFuZ0jGKUnV0uADmq9WmmCECgv7T9XUdVMbPa YnFauHwPrJU1QfZFpEC1TC3If84Gafx6fP0vCsB9fpGD3S0F+kcOxzw9aPggd7Gm4CkJ DQXQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kinvolk.io header.s=google header.b=iGxEo3Er; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m67si20886068pgm.319.2019.07.08.15.43.45; Mon, 08 Jul 2019 15:44:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kinvolk.io header.s=google header.b=iGxEo3Er; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388843AbfGHQbv (ORCPT + 99 others); Mon, 8 Jul 2019 12:31:51 -0400 Received: from mail-wr1-f68.google.com ([209.85.221.68]:40160 "EHLO mail-wr1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388418AbfGHQbt (ORCPT ); Mon, 8 Jul 2019 12:31:49 -0400 Received: by mail-wr1-f68.google.com with SMTP id r1so11513185wrl.7 for ; Mon, 08 Jul 2019 09:31:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kinvolk.io; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=amfYeislYJ8EeT6TDcXvFdnxBjp9KM9m4SLqeYyRX4s=; b=iGxEo3ErstIbpnRCA6hd+jmfSU0hCfTpvTKR6lvsxesRxZHf1hoNU5JuBoXW3jQVVU QpC+S686rdjpn9J+WWGmQaUXctXp5v5m2wY/OlhNR+Ayr3kqJxXU3Ig9XtNGK75HceN9 r6SBGDX9r2Mm8acAfQ74175bgJbek0xTFYta4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=amfYeislYJ8EeT6TDcXvFdnxBjp9KM9m4SLqeYyRX4s=; b=e0/NC+ZDmRfkD77rXMGzW9ckwzZA5Lvq28AyNLmcaG9lzHZFKEXnJrlWM0OLAUZD9Q H7eJ5SrF1Q2DDrmL2Sj2+rDYjtL13KnsDv/3KvHGla9TCtbWvAeY3uom4WlumomTLDEv wWgmhqusCLhv7fMWhqImMGl96yJDKrWRsXCg2ZgNxTnTAlrOnsgdn9jPtU3V5isDXKAJ MO+8BtVzYMSVMFh3MK8sSWwDZ1DOgaxthKZ6J6V82lCxBKlVWSNNKcLXUj5i82AiGbtL ceZtcxirT338Jq2LW75UbJppjyug10FCNEfNfi0Cs4KqFUCY9XL/bgzwEo7hKZ31DqC2 wSBw== X-Gm-Message-State: APjAAAUSvMl3NcX93d4QdFAkD2eugDdDvOyJv7GoAa6f4gDEJ//d1mK8 YHVLcPCKF9Y/QVQiqOttLDWMcRcxzy+lnA== X-Received: by 2002:adf:f8cf:: with SMTP id f15mr19391048wrq.333.1562603507442; Mon, 08 Jul 2019 09:31:47 -0700 (PDT) Received: from localhost.localdomain (ip5f5aedbe.dynamic.kabel-deutschland.de. [95.90.237.190]) by smtp.gmail.com with ESMTPSA id e6sm18255086wrw.23.2019.07.08.09.31.46 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Mon, 08 Jul 2019 09:31:46 -0700 (PDT) From: Krzesimir Nowak To: linux-kernel@vger.kernel.org Cc: Alban Crequy , =?UTF-8?q?Iago=20L=C3=B3pez=20Galeiras?= , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , "David S. Miller" , Jakub Kicinski , Jesper Dangaard Brouer , John Fastabend , Stanislav Fomichev , netdev@vger.kernel.org, bpf@vger.kernel.org, xdp-newbies@vger.kernel.org, Krzesimir Nowak Subject: [bpf-next v3 01/12] selftests/bpf: Print a message when tester could not run a program Date: Mon, 8 Jul 2019 18:31:10 +0200 Message-Id: <20190708163121.18477-2-krzesimir@kinvolk.io> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190708163121.18477-1-krzesimir@kinvolk.io> References: <20190708163121.18477-1-krzesimir@kinvolk.io> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This prints a message when the error is about program type being not supported by the test runner or because of permissions problem. This is to see if the program we expected to run was actually executed. The messages are open-coded because strerror(ENOTSUPP) returns "Unknown error 524". Changes since v2: - Also print "FAIL" on an unexpected bpf_prog_test_run error, so there is a corresponding "FAIL" message for each failed test. Signed-off-by: Krzesimir Nowak --- tools/testing/selftests/bpf/test_verifier.c | 17 +++++++++++++---- 1 file changed, 13 insertions(+), 4 deletions(-) diff --git a/tools/testing/selftests/bpf/test_verifier.c b/tools/testing/selftests/bpf/test_verifier.c index c5514daf8865..b8d065623ead 100644 --- a/tools/testing/selftests/bpf/test_verifier.c +++ b/tools/testing/selftests/bpf/test_verifier.c @@ -831,11 +831,20 @@ static int do_prog_test_run(int fd_prog, bool unpriv, uint32_t expected_val, tmp, &size_tmp, &retval, NULL); if (unpriv) set_admin(false); - if (err && errno != 524/*ENOTSUPP*/ && errno != EPERM) { - printf("Unexpected bpf_prog_test_run error "); - return err; + if (err) { + switch (errno) { + case 524/*ENOTSUPP*/: + printf("Did not run the program (not supported) "); + return 0; + case EPERM: + printf("Did not run the program (no permission) "); + return 0; + default: + printf("FAIL: Unexpected bpf_prog_test_run error (%s) ", strerror(saved_errno)); + return err; + } } - if (!err && retval != expected_val && + if (retval != expected_val && expected_val != POINTER_VALUE) { printf("FAIL retval %d != %d ", retval, expected_val); return 1; -- 2.20.1