2 # SPDX-License-Identifier: GPL-2.0
3 # description: Event probe event parser error log check
4 # requires: dynamic_events events/syscalls/sys_enter_openat "<attached-group>.<attached-event> [<args>]":README error_log
6 check_error
() { # command-with-error-pos-by-^
7 ftrace_errlog_check
'event_probe' "$1" 'dynamic_events'
10 check_error
'e ^a.' # NO_EVENT_INFO
11 check_error
'e ^.b' # NO_EVENT_INFO
12 check_error
'e ^a.b' # BAD_ATTACH_EVENT
13 check_error
'e syscalls/sys_enter_openat ^foo' # BAD_ATTACH_ARG
14 check_error
'e:^/bar syscalls/sys_enter_openat' # NO_GROUP_NAME
15 check_error
'e:^12345678901234567890123456789012345678901234567890123456789012345/bar syscalls/sys_enter_openat' # GROUP_TOO_LONG
17 check_error
'e:^foo.1/bar syscalls/sys_enter_openat' # BAD_GROUP_NAME
18 check_error
'e:^ syscalls/sys_enter_openat' # NO_EVENT_NAME
19 check_error
'e:foo/^12345678901234567890123456789012345678901234567890123456789012345 syscalls/sys_enter_openat' # EVENT_TOO_LONG
20 check_error
'e:foo/^bar.1 syscalls/sys_enter_openat' # BAD_EVENT_NAME
22 check_error
'e:foo/bar syscalls/sys_enter_openat arg=^dfd' # BAD_FETCH_ARG
23 check_error
'e:foo/bar syscalls/sys_enter_openat ^arg=$foo' # BAD_ATTACH_ARG
25 if grep -q '<attached-group>\.<attached-event>.*\[if <filter>\]' README
; then
26 check_error
'e:foo/bar syscalls/sys_enter_openat if ^' # NO_EP_FILTER