Teach test_verifier to parse verifier output for insn processed
and compare with expected number.

Signed-off-by: Alexei Starovoitov <a...@kernel.org>
Acked-by: Edward Cree <ec...@solarflare.com>
Acked-by: Jakub Kicinski <jakub.kicin...@netronome.com>
---
 tools/testing/selftests/bpf/test_verifier.c | 15 ++++++++++++++-
 1 file changed, 14 insertions(+), 1 deletion(-)

diff --git a/tools/testing/selftests/bpf/test_verifier.c 
b/tools/testing/selftests/bpf/test_verifier.c
index a08c67c8767e..82359cdbc805 100644
--- a/tools/testing/selftests/bpf/test_verifier.c
+++ b/tools/testing/selftests/bpf/test_verifier.c
@@ -76,7 +76,7 @@ struct bpf_test {
        int fixup_percpu_cgroup_storage[MAX_FIXUPS];
        const char *errstr;
        const char *errstr_unpriv;
-       uint32_t retval, retval_unpriv;
+       uint32_t retval, retval_unpriv, insn_processed;
        enum {
                UNDEF,
                ACCEPT,
@@ -14444,6 +14444,19 @@ static void do_test_single(struct bpf_test *test, bool 
unpriv,
                }
        }
 
+       if (test->insn_processed) {
+               uint32_t insn_processed;
+               char *proc;
+
+               proc = strstr(bpf_vlog, "processed ");
+               insn_processed = atoi(proc + 10);
+               if (test->insn_processed != insn_processed) {
+                       printf("FAIL\nUnexpected insn_processed %u vs %u\n",
+                              insn_processed, test->insn_processed);
+                       goto fail_log;
+               }
+       }
+
        if (fd_prog >= 0) {
                __u8 tmp[TEST_DATA_LEN << 2];
                __u32 size_tmp = sizeof(tmp);
-- 
2.17.1

Reply via email to