1#!/bin/sh
2# SPDX-License-Identifier: GPL-2.0
3# description: Event probe event parser error log check
4# requires: dynamic_events events/syscalls/sys_enter_openat "<attached-group>.<attached-event> [<args>]":README error_log
5
6check_error() { # command-with-error-pos-by-^
7    ftrace_errlog_check 'event_probe' "$1" 'dynamic_events'
8}
9
10check_error 'e ^a.'			# NO_EVENT_INFO
11check_error 'e ^.b'			# NO_EVENT_INFO
12check_error 'e ^a.b'			# BAD_ATTACH_EVENT
13check_error 'e syscalls/sys_enter_openat ^foo'	# BAD_ATTACH_ARG
14check_error 'e:^/bar syscalls/sys_enter_openat'	# NO_GROUP_NAME
15check_error 'e:^12345678901234567890123456789012345678901234567890123456789012345/bar syscalls/sys_enter_openat'	# GROUP_TOO_LONG
16
17check_error 'e:^foo.1/bar syscalls/sys_enter_openat'	# BAD_GROUP_NAME
18check_error 'e:^ syscalls/sys_enter_openat'		# NO_EVENT_NAME
19check_error 'e:foo/^12345678901234567890123456789012345678901234567890123456789012345 syscalls/sys_enter_openat'	# EVENT_TOO_LONG
20check_error 'e:foo/^bar.1 syscalls/sys_enter_openat'	# BAD_EVENT_NAME
21
22check_error 'e:foo/bar syscalls/sys_enter_openat arg=^dfd'	# BAD_FETCH_ARG
23check_error 'e:foo/bar syscalls/sys_enter_openat ^arg=$foo'	# BAD_ATTACH_ARG
24
25if grep -q '<attached-group>\.<attached-event>.*\[if <filter>\]' README; then
26  check_error 'e:foo/bar syscalls/sys_enter_openat if ^'	# NO_EP_FILTER
27fi
28
29exit 0
30